Criminal Intelligence Coordinating Council's Five in Five No Images? Click here The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a collection of resources that may be of interest to law enforcement and homeland security partners working to improve the nation’s ability to develop and share criminal intelligence. The Five in 5 highlights promising practices, case studies, and success stories and identifies products, reports, training, and toolkits to build, implement, and enhance a criminal intelligence capability. You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate. Please contact cicc@iir.com to submit a success story or resource for consideration in the CICC’s Five in 5. To view the Five in 5 archive, visit: https://it.ojp.gov/FiveIn5. National Public Safety PartnershipSuccess Story
The National Public Safety Partnership (PSP) was established in June 2017 under the direction of U.S. Attorney General Jeff Sessions. PSP serves as a U.S. Department of Justice (DOJ)-wide program that enables cities to consult with and receive coordinated training and technical assistance and an array of resources from DOJ to enhance local violence reduction strategies. The Bureau of Justice Assistance recently highlighted the PSP site Birmingham, Alabama, as a success story where the promise of PSP is working. Bureau of Justice Assistance National Training and Technical Assistance Center Resources The Bureau of Justice Assistance (BJA) National Training and Technical Assistance Center (NTTAC) is a training and technical assistance (TTA) resource to help state, local, and tribal justice agencies achieve safer communities. BJA NTTAC’s TTA is designed to meet the unique needs of criminal justice practitioners and agencies. BJA NTTAC’s TTA services include:
National Cyber StrategyDocument Release
On September 20, 2018, The White House released the 2018 National Cyber Strategy, outlining the steps the federal government is taking to advance an open, secure, interoperable, and reliable cyberspace. The strategy focuses on hardening federal cybersecurity and deterring malicious actors from launching digital attacks against the United States. The strategy offers four overarching goals: improve national security; boost the digital economy; combat cyberthreats; and advocate for Internet freedom. Responding to Persons Experiencing a Mental Health Crisis Publications This series of publications from the International Association of Chiefs of Police offers guidelines for law enforcement officers responding to situations involving individuals reasonably believed to be persons in crisis. The series addresses how officers can best make judgments regarding the mental state and intent of individuals and offers model policies for the use of special skills, techniques, and abilities to effectively and appropriately resolve situations while minimizing violence. VALOR Officer SafetyDownload the App Today! The VALOR Officer Safety and Wellness Program recently launched an update to the VALOR Officer Safety mobile app. With a contemporary look and an array of additional features, the VALOR Officer Safety app is more prepared than ever to provide law enforcement officers with cutting-edge training. Users can stay connected with the VALOR Program through the app and will receive important VALOR Program information through announcements, access links to all of VALOR’s social media accounts, and be able to view upcoming VALOR trainings that are open for registration. The mission of the CICC is to advocate for and support state, local, and tribal law enforcement and homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation. This publication is funded in whole or in part through a grant from the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this publication (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided). |