Is this e-mail not displaying correctly? View it in your browser.
Bureau of Justice Assistance, U.S. Department of Justice; Global Justice Information Sharing Initiative; Five in 5—Criminal Intelligence Coordinating Council

The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a snapshot of law enforcement and criminal intelligence-related articles, resources, and research that may be of interest to CICC members and partners working to improve the nation’s ability to develop and share criminal intelligence. 

The CICC’s mission—to advocate for and support state, local, and tribal law enforcement and homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation—is important, contemporary, and essential.  Five in 5 is provided for your information and awareness as an effort to assist the criminal intelligence community in understanding trends, training, and activities that may impact law enforcement and criminal intelligence.  You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate. Please contact cicc@iir.com to submit an article for consideration in the CICC’s Five in 5.

 
 
1. Law Enforcement

New Report: Bringing Calm to Chaos:  A Police Foundation Review of the San Bernardino Terrorist Attacks

The Police Foundation recently released a review of the San Bernardino, California, terrorist attacks that occurred in December 2015.  During the incident, two terrorists attacked a training session and holiday party for San Bernardino County employees, killing 14 and wounding 24, including two police officers.  Further losses were averted by the response of the police department, the sheriff’s office, emergency services, and the Federal Bureau of Investigation, who came together to prevent additional deaths and injuries.  This review provides a detailed overview of the incident response; lessons learned to improve responding agencies’ policies, procedures, tactics, systems, culture, and relationships; and guidance to other agencies and first responders as they prepare for responses to terrorist, active shooter or other hostile events, and mass casualty incidents.  Full Review

 
 
2. Extremist Activities

Nazis vs. ISIS on Twitter: A Comparative Study of White Nationalist and ISIS Online Social Media Networks

The George Washington University’s Program on Extremism recently conducted a study to examine and compare the use of Twitter by white nationalists, Nazi sympathizers, and Islamic State of Iraq and Syria (ISIS) supporters, providing some preliminary comparisons of how each movement uses the platform.  ISIS has distinguished itself as a pioneer in the use of social media for recruitment, but while ISIS continues to be one of the most influential terrorist groups in the material world, other extremists are closing the gap in the virtual realm.  For example, on Twitter, ISIS’s preferred social platform, American white nationalist movements have seen their followers grow by more than 600 percent since 2012.  This study provides some preliminary comparisons of how each movement uses the platform and outlines major findings.  Study Results

 
 
3. Information Sharing

National Fusion Center Association and the Electricity Information Sharing and Analysis Center Rapid Deployment Project

The Office of the Program Manager for the Information Sharing Environment (PM-ISE) is working with the National Fusion Center Association (NFCA) and the Electricity Information Sharing and Analysis Center (E-ISAC) to consider using the national fusion center network as a way to convene electrical infrastructure subject-matter experts who need rapid access to classified data or communications systems in the event of an emergency situation.  This effort also has the potential to develop into a long-term information exchange relationship between the energy sector and fusion centers to provide situational awareness of threats and vulnerabilities in their areas of responsibility.  Read More

 
 
4. Technology

Cell Phone Alerts Used in New York to Search for Bombing Suspect

On Saturday, September 17, 2016, bombings occurred in New York City, New York, and Seaside Park, New Jersey.  Across New York City, cell phones blared the following Monday morning with the familiar tone of an emergency alert, typically used for weather-related advisories or abducted children.  For what is believed to be the first time, the nation’s Wireless Emergency Alerts system was deployed as an electronic wanted poster, identifying a 28-year-old man sought in connection with the bombings in Manhattan and New Jersey over the weekend.  The message was simple: “WANTED: Ahmad Khan Rahami, 28-year-old male. See media for pic. Call 9-1-1 if seen.”  The alert messages were targeted to a cell phone’s location using nearby towers, so people in and around New York City, including some in New Jersey, received it.  Read More

 
 
5. Cybersecurity

Announcing the Release of the First Cyber Readiness Index Country Profile

The Potomac Institute for Policy Studies (PIPS) recently released the United States Cyber Readiness at a Glance, the first of a series of country reports assessing national-level preparedness for cyber risks based on the Cyber Readiness Index (CRI) 2.0 methodology.  This first report provides an extensive analysis of the United States’ cyber security-related efforts and capabilities.  According to the CRI 2.0 assessment, the United States is on a path to becoming cyber ready and is currently partially operational in most of the seven CRI essential elements.  Read More

Download Full Report

Cyber resources are available at www.iacpcybercenter.org.