Is this e-mail not displaying correctly? View it in your browser.
Bureau of Justice Assistance, U.S. Department of Justice; Global Justice Information Sharing Initiative; Five in 5—Criminal Intelligence Coordinating Council

The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a snapshot of law enforcement and criminal intelligence-related articles, resources, and research that may be of interest to CICC members and partners working to improve the nation’s ability to develop and share criminal intelligence. 

The CICC’s mission—to advocate for and support state, local, and tribal law enforcement and homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation—is important, contemporary, and essential.  Five in 5 is provided for your information and awareness as an effort to assist the criminal intelligence community in understanding trends, training, and activities that may impact law enforcement and criminal intelligence.  You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate. Please contact cicc@iir.com to submit an article for consideration in the CICC’s Five in 5.

 
 
1. Online Training

Hovering Friends or Foes Drone/Unmanned Aerial Vehicles (UAV) Technology Webinar Series—March 2016

The U.S. Department of Homeland Security's Joint Critical Infrastructure Partnership is partnering with several organizations to offer a webinar series on drone/UAV technology, use cases, threats, deterrents, regulations, and recommendations to improve response to a drone/UAV-related incident.  The series consists of three different Webinars featuring panelists of both industry and government professionals followed by a participant question-and-answer session and discussion.  Each Webinar will run for a maximum of two hours and feature up to five panelists who are operations professionals.  There is no cost to register for this series.

  • March 3, 2016 – 1:00 p.m. (EST)—Drone/UAV Technology Overview
  • March 10, 2016 – 1:00 p.m. (EST)—Drone/UAV Use Cases, Threats, and Deterrents
  • March 17, 2016 – 1:00 p.m. (EDT)—Drone/UAV Policy, Barriers, and Recommendations

Additional information on the training and the registration link is available at http://www.ahcusa.org/drone-webinar-series.html.

 
 
2. Technology

BlueLine Grid Deploys First-of-Its-Kind Mobile App Security for Super Bowl 50

The security teams behind Super Bowl 50 integrated a new mobile app as part of their surveillance strategy. The app was developed by BlueLine Grid technology—a DC-based startup that operates a collaboration network for law enforcement, first responders, and security teams around the country.  The security mobile app was deployed to the Northern California Regional Intelligence Center, one of the 78 federally-supported intelligence and information centers that include representatives from top federal, state, and local agencies.  “The BlueLine Grid platform enables us to alert our public safety and private sector partners in real time and get their feedback more quickly and effectively,” said NCRIC Director Mike Sena, who is also President of the National Fusion Center Association. “It’s a first-of-its kind approach to critical incident management and regional collaboration.”

The article is available at http://www.i4u.com/2016/02/104564/blueline-grid-deploys-first-its-kind-mobile-app-security-super-bowl-50.

 
 
3. National Security

Local and Federal Law Enforcement Drill Terror Scenarios in “Operation Heat Shield”

Nearly two dozen South Florida law enforcement agencies joined together on Saturday for a daylong active shooter simulation. Dubbed Operation Heat Shield, the training took place in prime target spots, such as the Coast Guard base on Miami Beach, Marlins Park, and Miami International Airport.

Miami-Dade Police Director Juan Perez said that while individual agencies routinely conduct these kinds of drills, Saturday’s was the first of its kind to systematically engage law enforcement entities across South Florida.  Among those overseeing the training was Homeland Security Secretary Jeh Johnson.  The goal of the exercise was to reduce the vulnerability of the state and the county to disasters, both natural and man-made.  Operation Heat Shield also involved 300 civilian volunteers to pose as hostages and victims.

The article is available at http://www.miamiherald.com/news/local/crime/article58904428.html.

 
 
4. Fusion Center

Former Teradata Corporation Executive to Build Crime Data Center in Dayton, Ohio

Montgomery County, Ohio, Sheriff Phil Plummer has hired Bruce Langos, a former Teradata Corporation executive, to build a Dayton fusion center.  There are 29 law enforcement agencies in Montgomery County, and the goal is to build one intelligence center to avoid duplicating efforts.  Since 2005, Montgomery County has funded the Justice Web system—a system that lets police officers and judges enter a name and obtain an individual’s criminal history. Plummer believes the center needs to be multijurisdictional, with more than one community supporting the system.  The center will use geospatial mapping, predictive analysis, and other tools and draw from social media and other databases.

The article is available at:  http://s.iir.com/OhioCrimeDataCenter

 
 
5. Cyber

The President’s National Cybersecurity Plan:  What You Need to Know

On February 9, 2016, President Obama directed the Administration to implement a Cybersecurity National Action Plan (CNAP), a long-term strategy to ensure that the federal government, the private sector, and American citizens can take better control of our digital security.  The CNAP will invest more than $19 billion to ensure that (1) Americans have the security tools they need to protect their identities online, (2) companies can protect and defend their operations and information from hackers, and (3) the U.S. government protects the private information citizens provide for federal benefits and services. 

The article is available at https://www.whitehouse.gov/blog/2016/02/09/presidents-national-cybersecurity-plan-what-you-need-know.

Cyber resources are available at www.iacpcybercenter.org.