Cybersecurity Resources for State and Local Law Enforcement

The National Consortium for Advanced Policing (NCAP) recently released the Cybersecurity Guide for State and Local Law Enforcement and an accompanying issue brief: A Policy Roadmap to Enhance Capabilities.  The guide was created to help state and local law enforcement agencies protect themselves, as well as businesses and community members, from cyber-related threats.  The issue brief is a companion to the guide and focuses on how policymakers at federal, state, and local levels, in both the executive and legislative branches of government, can take steps to improve the cyber authorities an

Continue Reading

Illinois Moves Toward Advancing a Distributed and Decentralized Information Sharing Environment

The Illinois Criminal Justice Information Authority (ICJIA) is offering technical assistance and support to Illinois county leaders seeking to establish county-wide data exchange.  In this information sharing environment, public safety and criminal justice agencies would:

Continue Reading

NIEM Version 3.2 is Now Available

NIEM version 3.2  and its associated products are now available for download and use.  Products include NIEM XML schemas (XSD), a spreadsheet (MS Excel) of all data components in the model, and alternate database formats (MS Excel, MS MDB, and CSV).

Continue Reading

Addressing the Challenges of Maintaining a Robust State and Regional Information Sharing Environment

As a means of monitoring and advancing the priority actions identified during the 2015 Addressing the Challenges of a Robust State and Regional Information Sharing Environment: A Summit of State Policy Leaders, an Implementation Working Group (IWG) was established.

Continue Reading

Privacy, Civil Rights, and Civil Liberties Remain Important for Information Sharing Future

Privacy, civil rights, and civil liberties (P/CRCL) – as they relate to the public and private space – are increasingly woven into the work of countering terrorism and violent extremism. P/CRCL also plays an important role in cybersecurity conversations.

Continue Reading

SEARCH Offers Resource for Developing Common Charge Tables

As system interoperability grows, it is important for justice stakeholders to share charge information in order to improve the overall accuracy of the respective data systems involved in the justice process.

However, the justice community has developed multiple ways to represent and describe offenses in their data systems—in fact, such terms as “offenses,” “crimes,” and “charges” are often used interchangeably. These differences underscore the need to align charge data between data systems.

Continue Reading

Accelerating Adoption of Advanced Police Incident Reporting

City and county law enforcement executives have often found the Uniform Crime Reporting (UCR) summary process cumbersome with regard to developing strategies for responding to specific categories of crime and in making comparisons with other jurisdictions.

Continue Reading

DHS Seeks Better Private-public Sharing of Cyber Threat Information

The Department of Homeland Security wants private-sector companies to get under the agency’s information-sharing umbrella in order to better manage and mitigate cyber risks to critical infrastructure.

Continue Reading

Interoperability In Focus

Interoperability is one of the hottest buzzwords in government.  It is harder to say than chrysanthemum, and yet I hear it flowing effortlessly out of the mouths of our leaders across all sectors.  Everyone wants it, yet it seems to evade a precise definition and means different things to different people.  I offer that is just how it should be.

Continue Reading

JCAT Releases 2016 Intelligence Guide for First Responders

Recently, the Joint Counterterrorism Assessment Team (JCAT) released the 2016 Intelligence Guide for First Responders. The guide was produced for first responders by first responders and was designed to improve information sharing among state, local, tribal, and territorial jurisdictions and the federal government. Some topics included in the resource are handling and protecting information, how to gain access to Internet-based U.S. government systems, and understanding the Nationwide Suspicious Activity Reporting Initiative.

Continue Reading


Subscribe to News