Criminal Intelligence Coordinating Council's Five in Five No Images? Click here The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a collection of resources that may be of interest to law enforcement and homeland security partners working to improve the nation’s ability to develop and share criminal intelligence. The Five in 5 highlights promising practices, case studies, and success stories and identifies products, reports, training, and toolkits to build, implement, and enhance a criminal intelligence capability. You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate. Please contact cicc@iir.com to submit a success story or resource for consideration in the CICC’s Five in 5. To view the Five in 5 archive, visit: https://it.ojp.gov/FiveIn5. WebinarDevelopmentally Informed and Trauma-Informed Police OfficerPolice officers are not social workers or psychologists, nor should they be expected to take on these roles. Still, law enforcement professionals have daily interactions with vulnerable children and families, and officers can perform in their professional roles more effectively when they are grounded with knowledge about human development. Sponsored by the International Association of Chiefs of Police, in coordination with the Office of Juvenile Justice and Delinquency Prevention, this no-cost webinar will offer key information about typical human development, coupled with information about signs and symptoms of acute traumatic exposure and strategies for officers to intervene effectively on-scene. Date: July 30, 2019 Time: 1:00 p.m. – 2:00 p.m., ET COAP Webinar Series Making Data Simple—Dashboards and Visualization Reviewing and discussing data with stakeholders can be challenging because people have different comfort levels with data and statistics. Sometimes, the most effective way to communicate data findings is through the creation of effective data visualizations. Data dashboards have become popular because they can be easily explained and interpreted by a variety of users. This webinar will demonstrate some of the data visualization techniques used by two organizations to improve understanding of substance use, criminal justice, and public health outcomes. Presentation topics will include the following:
Date: Thursday July 18, 2019 Time: 2:00 p.m. to 3:00 p.m., ET Mass Attacks in Public SpacesSecret Service National Threat Assessment Center’s Annual Report
The Secret Service National Threat Assessment Center (NTAC) is tasked with delivering research, training, consultation, and information sharing on threat assessment and the prevention of targeted violence, including targeted attacks against workplaces, houses of worship, schools, and other public spaces. The research and information produced by NTAC guides not only the Secret Service’s approach to preventing assassinations, called threat assessment, but also informs the communitywide approach needed to prevent incidents of targeted violence. This report is NTAC’s second analysis of mass attacks that were carried out in public spaces, and it builds upon Mass Attacks in Public Spaces – 2017. With this latest report, the Secret Service offers further analysis and operational considerations to our partners in public safety. Webinar What Justice Professionals Need to Know About Hate Crime Hate crimes and bias incidents are occurring throughout the United States, in big cities and small towns, highly publicized or going unreported. These crimes can represent the ultimate in violence, or perpetrators can spread their message of fear and intimidation through words and rhetoric. Hate crimes are different from any other crimes you will encounter as a law enforcement officer. They can happen anywhere, and anyone can be a target. No one is safe, and there is no protection. And they do not affect just the victim—they can affect an entire community. This no-cost webinar, hosted by the Justice Clearinghouse, will walk attendees through the three Rs, Recognize, Respond, and Report, so that hate crimes can be addressed properly and promptly. Date: Tuesday, July 16, 2019 Time: 1:00 p.m. – 2:00 p.m., ET Livestream EventThe Value of Facial Recognition in Law Enforcement Recently, there has been a wave of criticism about the use of facial recognition technology by law enforcement. San Francisco, California, has gone so far as to ban the use of the technology across government, and other state and local governments are considering similar measures. Yet supporters of the technology have been underrepresented in this debate, and many of the positive uses of facial recognition are not yet fully understood by the public. There are many opportunities to use facial recognition technology as an investigative tool to solve crimes; as a security countermeasure against threats in schools, airports, and other public venues; and as means to securely identify individuals at ports of entry. Join the Information Technology & Innovation Foundation for a discussion about the benefits of using facial recognition for law enforcement and public safety, the current safeguards in place that govern its use, and the opportunities for policymakers to address legitimate concerns without limiting the potential of this technology. The event is free and open to the public. The in-person meeting will be held at the Information Technology and Innovation Foundation, 1101 K Street NW, Suite 610A, Washington, DC 20005. The event will also be livestreamed. Date: Wednesday, July 24, 2019 Time: 2:00 p.m. to 3:30 p.m., ET The mission of the CICC is to advocate for and support state, local, and tribal law enforcement and homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation. This publication is funded in whole or in part through a grant from the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this publication (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided).
|