Is this e-mail not displaying correctly? View it in your browser.
Bureau of Justice Assistance, U.S. Department of Justice; Global Justice Information Sharing Initiative; Five in 5—Criminal Intelligence Coordinating Council

The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a snapshot of law enforcement and criminal intelligence-related articles, resources, and research that may be of interest to CICC members and partners working to improve the nation’s ability to develop and share criminal intelligence. 

The CICC’s mission—to advocate for and support state, local, and tribal law enforcement and homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation—is important, contemporary, and essential.  Five in 5 is provided for your information and awareness as an effort to assist the criminal intelligence community in understanding trends, training, and activities that may impact law enforcement and criminal intelligence.  You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate.

 
 
1. Phone Tracking

Lawmakers Press for Details on Police Phone-Tracking Technology
Lawmakers are seeking answers on the Baltimore, Maryland, Police Department’s (BPD) use of a controversial cell-phone surveillance device—known as a stingray—and have requested clarification on a nondisclosure agreement (NDA) with the Federal Bureau of Investigation.  BPD personnel indicate that they obtain court orders before using the device, but the scope of the technology's use has been concealed because of NDAs with the FBI.  Developed as a tool to fight terrorism, the stingray has been acquired by dozens of law enforcement agencies across the country and is also used in routine investigations, such as locating stolen cell phones. 

To read this article, refer to:  http://www.baltimoresun.com/news/maryland/politics/bs-md-ci-stingray-police-react-20150409-story.html.

 
 
2. Facial Recognition

Facial Recognition Air Entry Pilot
The U.S. Customs and Border Protection (CBP) recently published the Privacy Impact Assessment for the CBP 1:1 Facial Recognition Air Entry Pilot, which addresses the privacy risks of using facial recognition software at an air port of entry.  The pilot is currently evaluating CBP’s use of facial recognition technology as a tool to assist in the confirmation of identity. The pilot will determine the viability of this technology in identifying imposters and determine integration into current CBP entry processes.

To view CBP’s privacy impact assessment, refer to:  http://www.hsdl.org/?abstract&did=763426&fromemail=1.

 
 
3. Justice Information Conference

2015 NAJIS Conference
The National Association for Justice Information Systems (NAJIS) is hosting its 33rd annual NAJIS Conference on October 5–8, 2015.  NAJIS conferences are geared to educate and demonstrate best practices on justice information system implementation for local, state, and federal justice practitioners, with the agenda designed for both technical and nontechnical attendees.  IT technologies and standards that improve and engineer information sharing will be explored in depth during the conference. 

For more information on this conference, or to register, refer to:  http://www.najis.org/.

 
 
4. Digital Encryption

As Encryption Spreads, U.S. Grapples With Clash Between Privacy and Security
Law enforcement and intelligence officials are warning that the growing use of encryption on digital devices, such as smartphones, could hinder criminal and national security investigations.  This article discusses the pros and cons of law enforcement access to data on digitally encrypted devices and the work that the White House is doing to develop a balanced solution that protects privacy and provides options for law enforcement.

For more information, refer to:  http://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html?tid=pm_world_pop_b.

 
 
5. Public Records Requests

How to Ease the e-Discovery Impact of FOIA Requests
The Freedom of Information Act (FOIA) and resulting backlog of record requests is driving the technological need for an automatic process to search, review, and redact documents electronically.  To enhance agencies’ responsiveness to requests, IT teams should be trained by e-discovery experts on advanced analytics and predictive coding technologies.

To read more about e-discovery recommendations, refer to:  http://fcw.com/articles/2015/04/03/impact-of-foia-requests.aspx?admgarea=TC_Policy.