From BJA and Global No images? Click here Criminal Intelligence Coordinating CouncilMay 10, 2024 To better serve you and provide the most informative content related to public safety and intelligence, please email “Five in 5” recommendations for posting to the editor at fivein5@iir.com. HSDL ReportExploring Law Enforcement Hacking as a Tool Against Transnational CybercrimeReleased by the Carnegie Endowment for International Peace‘s Technology and International Affairs Program (TIA) and highlighted by the Homeland Security Digital Library, this report explores current cybercrime threats and potential ways to measure the success of technical takedowns. This report also examines the evolution of the practice among U.S. and allied law enforcement agencies (LEAs), noting an upward trend in collaboration. The report addresses the need to move beyond a military-centric approach to countering transnational cybercrime and instead argues for more parity in resourcing for LEAs. It also explains the necessity of working with commercial and private partners while acknowledging the hurdles to more robust cooperation. To conclude, it poses the major policy questions that can guide and enhance the benefits of more assertive LEAs in cyberspace. This publication incorporates reflections from in-person and virtual interviews conducted from autumn 2023 through spring 2024 with dozens of current and former Western LEA and government officials, legal scholars, cybersecurity practitioners, and civil society researchers in relevant fields. BJS BriefCrimes Involving Juveniles, 1993–2022Published by the Bureau of Justice Statistics (BJS), this brief presents findings on crimes involving juveniles, both as victims and as alleged or perceived offenders. It includes the rates of nonfatal violent victimization by age, number of deaths of juveniles due to homicide, percentage of nonfatal violent incidents in which the offender was perceived to be a juvenile, and percentage of persons arrested who were juveniles. SLATT WebinarHow to Build a Threat Assessment Threat Management TeamFunded by the Bureau of Justice Assistance and hosted by the State and Local Anti-Terrorism Training Program (SLATT), this webinar is available on two dates and will spotlight the key concepts and requirements for building scalable threat assessment threat management teams (TATMs) as a means of preventing or mitigating the risk of targeted violence. This webinar will use case studies to demonstrate how to build scalable TATMs while addressing the challenges and lessons learned from law enforcement and clinical perspectives alike. Date: Tuesday, June 11, 2024, and Wednesday, June 26, 2024 NIJ ArticleWhat NIJ Research Tells Us About Domestic TerrorismPublished by the National Institute of Justice (NIJ), this article discusses the findings of several domestic radicalization studies that cover a range of individual and network-centered risk and protective factors that affect radicalization processes (including online environments and military involvement). In addition, the article explores which factors shape the longevity of radicalization processes and their variation by group structure and crime type. It also examines which factors affect pathways away from domestic extremism. The article concludes with a discussion of how these findings can inform terrorism prevention strategies, criminal justice policy, and community-based prevention programming. NW3C CourseFC122 Intellectual Property Theft TrainingHosted by the National Center for White Collar Crime (NW3C) in collaboration with the National Association of Attorneys General (NAAG), this course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lectures, discussions, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Attendees are provided with relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors. Date: Tuesday, May 14, 2024 Did a colleague share this email with you? Click the link to become a subscriber. The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a collection of resources that may be of interest to law enforcement and homeland security partners working to improve the nation’s ability to develop and share criminal intelligence. The Five in 5 highlights promising practices, case studies, and success stories and identifies products, reports, training, and toolkits to build, implement, and enhance a criminal intelligence capability. You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate. To view the Five in 5 archive, visit: https://it.ojp.gov/FiveIn5. The mission of the CICC is to advocate for and support state, local, and tribal law enforcement and homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation. This publication is funded in whole or in part through a grant from the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this publication (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided). This project was supported by Grant No. 2018-DP-BX-K021 awarded by the Bureau of Justice Assistance, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative. The Bureau of Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, and the Office of Victims of Crime. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Justice. |