|
The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a snapshot of law enforcement and criminal intelligence-related articles, resources, and research that may be of interest to CICC members and partners working to improve the nation’s ability to develop and share criminal intelligence. The CICC’s mission—to advocate for and support state, local, and tribal law enforcement and
homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation—is important, contemporary, and essential. Five in 5 is provided for your information and awareness as an effort to assist the criminal intelligence community in understanding trends, training, and activities that may impact law enforcement and criminal intelligence. You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate. Please contact cicc@iir.com to submit an article for consideration in the CICC’s Five in 5.
|
|
|
|
|
|
Video Surveillance |
How to Survive the Surveillance Video Data Flood
The surveillance market is witnessing explosive growth as the public sector is capturing higher-quality data from drones, in-car video, surveillance video, body cameras, digital content, and other new sources. In addition, the length of time evidentiary video needs to be kept has greatly increased. Traditional storage architecture methods used by public sector agencies has not kept up with the changing landscape of retention policies. An enterprise approach allows organizations to look across all the applications and create a “public safety data lake” to store and manage all of the evidence and video data on a common infrastructure.
The article is available at https://gcn.com/articles/2016/04/15/surveillance-data.aspx.
|
|
|
|
|
|
|
Child Exploitation Investigation |
ICE Participates in Europol-Led Effort to Identify Victims of Child Abuse
Victim identification specialists from the U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations have been working with top experts from around the globe at Europol’s headquarters in The Hague, Netherlands, to work unsolved cases in an effort to identify victims of child sexual abuse and exploitation. The coordinated effort of this Europol Victim Identification Task Force has yielded significant results. In addition, Europol has distributed intelligence packages to several countries to assist in the identification of victims.
The article is available at https://www.ice.gov/news/releases/ice-participates-europol-led-effort-identify-victims-child-abuse.
|
|
|
|
|
|
|
Fusion Center |
TBI Offers Behind the Scenes Look on Media Day
The Tennessee Bureau of Investigation (TBI) hosted members of the media for a rare look behind the scenes on April 22. Statewide law enforcement have always experienced challenges in sharing information rapidly, so in 2007, the TBI opened a fusion center and partnered with several state and federal partners. The TBI now has three portable fusion centers that can be set up anywhere in the state and have access to internal files, in addition to a fleet of violent crime response trucks. These capabilities are utilized by the TBI to assist local law enforcement out in the field.
The article is available at http://www.wbrc.com/story/31796674/tbi-offers-behind-the-scenes-look-on-media-day.
|
|
|
|
|
|
|
Information Sharing |
Pittsburgh Seeks Help to Improve Law Enforcement Collaboration
Regional law enforcement is operating on a limited budget to share information about potential homegrown terrorists and could benefit from federal help to implement high-tech investigation tools. The Pittsburgh, Pennsylvania, Police Department chief stated that the region’s splintered municipal makeup cripples their ability to share information among police departments, and officials hope to establish centers for intelligence sharing and public safety training.
The article is available at http://triblive.com/news/allegheny/10314194-74/enforcement-law-pittsburgh.
|
|
|
|
|
|
|
Cyber |
Users Are Patching Windows, But QuickTime and Java Vulnerabilities Remain
Software vulnerabilities on personal computers running Microsoft Windows should prompt users to patch all their software and uninstall both Apple QuickTime and Oracle Java. Users may think their PCs are secure because they are running Windows Update, but most are still at risk because of vulnerabilities against outside attacks—most notably Apple's QuickTime and iTunes, Oracle Java JRE, and Adobe Reader.
The article is available at http://www.zdnet.com/article/users-are-patching-windows-but-quicktime-and-java-vulnerabilities-remain-says-secunia.
Cyber resources are available at www.iacpcybercenter.org.
|
|
|
|
|
|