Thursday, July 30, 2009

Leadership Author to Speak at Professional Mojo Workshop Lineup

Editor's Note: While not specifically addressing technology, this workshop is conducted as a webinar - a low cost, highly effective delivery method.

Professional Mojo, a national service provider of online workshop content for small businesses, nonprofit organizations and entrepreneurs, today announced the addition of Lt. Raymond Foster, best-selling author, and trainer, to their online workshop schedule in August for
Leadership: Texas Hold ‘em Style.

Using poker as analogy for
leadership, Captain Andrew Harvey, CPD (ret.), Ed.D. and Lieutenant Raymond Foster, LAPD (ret.), MPA, found the right mix of practical experience and academic credentials to write a definitive book for leaders. Working together, Harvey and Foster have written Leadership: Texas Hold em Style. Most often leaders find they are given a set of resources people, equipment, funds, experience and a mission. As Foster noted, "You're dealt a certain hand. How you play that hand as a leader determines your success." They are now bringing this learning to the Professional Mojo community.

“We are thrilled to have Lt. Foster with us. He offers practical, easy to follow steps that leaders in all businesses can instantly identify with and incorporate into their organization. I know it will be a content-rich presentation,” commented Lee Brogden-Culberson, Chief Mojo Officer with Professional Mojo.

A graduate of the West Point
Leadership program, Foster was a sworn member of the Los Angeles Police Department for 24 years. He retired in 2003 at the rank of Lieutenant. He holds a bachelor’s degree from the Union Institute and University in Criminal Justice Management and a Master’s Degree in Public Financial Management from California State University, Fullerton.

Foster is a noted author who has published numerous articles in magazines such as Government Technology, Mobile Government, Airborne Law Enforcement Magazine, and Police One. He has appeared on the History Channel and on radio programs in the United States and Europe as a subject matter expert in technological applications in law enforcement.

His first book, Police Technology, is used in over 100 colleges and universities nationwide. He latest book,
Leadership: Texas Hold ‘em Style, has been adopted by several universities for course work in leadership, by several civil service organizations and has been well received in the wider market.

Professional Mojo is a boutique company that specializes in helping new, early stage and small business owners leverage social media and organic lead generation to reach customers and prospects directly. Website design services are available to those wishing to expand on what they learn in the workshop. The Mojo Mavens also have a particular soft spot for nonprofit and faith-based organizations, and facilitate online workshops, keynote talks and in-person training just for them via Outreach Mojo.

For additional information on this release, please contact:
Rachael Gatzman
Phone: (866) 2611-2715
Email: rgatzman@professionalmojo.com
Website:
www.professionalmojo.com

Summary
Professional Mojo welcomes Lt. Raymond E. Foster, best-selling author and trainer, to their online workshop
Leadership Texas Hold ‘em Style scheduled for Tuesday, August 25, 2009.

Wednesday, July 29, 2009

To Ban or Not to Ban? Solutions to Cell Phone Use and Driving Requires More Research and Thoughtful Analysis

This week's release of a landmark study on cell phone use and distracted driving by the Virginia Tech Transportation Institute (VTTI) provides important new data about the problem, but also raises significant questions about countermeasures to address the dangers associated with cell phone use and texting while driving.

Researchers at VTTI concluded that text messaging increased the risk of a crash or near miss 23 times for heavy vehicle/truck operators. The findings were stated to be applicable to drivers of light vehicles and cars. Surprisingly, the risk of dialing a cell phone was significantly less than texting, while the risk of talking or listening on a cell phone was almost negligible. Previous studies from the University of Utah, Carnegie Mellon University and the Insurance Institute for Highway Safety placed a much higher risk on cell phone use.

GHSA has never doubted the dangers of cell phone use and texting while driving. The Association focuses on a "no-use" message and seeks to restore some common sense to driving. However, GHSA has not yet supported a complete ban on the practice because of the difficulty of enforcing such laws.

We are pleased to learn that later this year the National Highway Traffic Safety Administration (NHTSA) will conduct an enforcement demonstration project to attempt to showcase how a state can effectively enforce a cell phone ban. GHSA strongly supports this effort. Highway safety laws are only effective if they can be enforced and if the public believes they will be ticketed for not complying. To date, that has not been the case with many cell phone restrictions.

GHSA's full membership has not reviewed the organization's current cell phone policy since 2006. Numerous studies and better data have become available since that time and the Association will review our policy based on this new information. With this data and the development of an effective enforcement approach, I expect GHSA would support a total cell phone/texting ban. While more research is being conducted to examine the effectiveness of laws and development of other countermeasures, GHSA urges that:

States ban all non-emergency cell phone use/text messaging for new drivers including teen drivers. The bans for new drivers should be enforced primarily by parents as part of graduated licensing laws. Fourteen states plus D.C. currently have these laws.


States include a category for cell phone/electronic equipment distraction on crash investigation forms. At least 29 states plus D.C. currently include this information.


The federal government fund a media campaign to alert the public to the dangers of distracted driving. This effort is needed to help develop a culture that will make the practice socially unacceptable much the same way that drunk driving is with the vast majority of the public.


The federal government fund a media campaign to alert the public to the dangers of distracted driving. This effort is needed to help develop a culture that will make the practice socially unacceptable much the same way that drunk driving has become with the vast majority of the public.


The federal government continue to fund research on distracted driving, particularly the effectiveness of various countermeasures and new technological applications that would limit or eliminate distractions.


Employers implement policies banning cell phone/texting use by all employees during working hours.

Current Cell Phone Laws are posted online at:
www.ghsa.org/html/stateinfo/laws/cellphone_laws.html.

The Governors Highway Safety Association (GHSA)® is a nonprofit association representing the highway safety offices of states, territories, the District of Columbia and Puerto Rico. GHSA provides leadership and representation for the states and territories to improve traffic safety, influence national policy and enhance program management. Its members are appointed by their Governors to administer federal and state highway safety funds and implement state highway safety plans. Contact GHSA at 202-789-0942 or visit www.ghsa.org.

Sunday, July 26, 2009

American Heroes Radio

July 26, 2009 (San Dimas, CA) American Heroes Radio reorganized its platform and launched a new website today. American Heroes Radio provides a platform for the lives, stories and accomplishments of our American Heroes. Each week, a different member of our military, law enforcement, firefighting and emergency services are guests. Previous guests have included: a World War II fighter pilot speaking about his experiences over Iwo Jima; a Navy captain tell his story of Cold War submarine hunting; an Iraq war veteran who was wounded in the head by an RPG; or, any of the large numbers of interviews of law enforcement officials around the country speaking about their expertise, careers and often hair-raising adventures.

American Heroes Radio now has 63 episodes in the archive and weekly shows scheduled through September 2009. You can explore the radio program here:

American Heroes Radio

Saturday, July 25, 2009

Managed Internet Security Subscriptions: Wave of the Future? (Part 2 of 7)

According to the CERT® Program, part of the Software Engineering Institute (SEI), a federally funded research and development center (FFRDC) sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University, “Organizations must practice strong computer security. CERT is also continuously researching various aspects of computer security that can benefit organizations.”

The primary goals of the CERT program are to ensure that appropriate technology and systems management practices are used to resist attacks on networked systems and to limit damage and ensure continuity of critical services in spite of attacks, accidents, or failures.

The SEI advances software engineering and related disciplines to ensure the development and operation of systems with predictable and improved cost, schedule, and quality. CERT, the home of the well-known CERT Coordination Center, studies security vulnerabilities, research long-term changes in networked systems, and develop information and training to help their clients improve security.

When designing malicious code, attackers often take advantage of vulnerabilities in software. In 2006 alone, the CERT Coordination Center received more than 8,000 reports of vulnerabilities. But many of these vulnerabilities are a result of software defects that could easily have been avoided. Through secure coding initiative, CERT is identifying common programming errors and developing secure coding standards to reduce the number of vulnerabilities introduced into software.

The field of survivable systems engineering explores the current state of systems to identify problems and propose engineering solutions. The work described below focuses on the development lifecycles for both new development and COTS-based systems. It includes analysis of how susceptible these systems are to sophisticated attacks and suggestions for improving the design of systems based on this analysis.

Note: Be certain to download a copy of their pdf-format, 68-page CERT Research 2005 Annual Report. Their URL can be found at the end of this article.

(The Annual Report describes current CERT Research projects in terms of problems addressed, research approaches, expected benefits, accomplishments, and plans. Each project is also summarized and links within project summaries lead to longer project descriptions.)

The current trend seems to indicate that people will continue to seek and purchase concomitant managed security services because they are the best forms of protection available. This level of professional grade technology coupled with a team of security experts available to help with any security problem will continue to grow as protection-sensitive consumer order these services for home and small business computers managed security services are the future of Internet security.

Click here to download the CERT Research 2005 Annual Report as a PDF file.

© MMIX, Etienne A. Gibbs, MSW, Internet Safety Advocate and Educator

About the Author:

Etienne A. Gibbs, Internet Security Advocate and Educator, consults with individuals, small business owners, and home-business entrepreneurs regarding online protection against spyware, viruses, hackers, and other pc-disabling cybercrimes.
To obtain more information and receive a free evaluation, visit him at www.SayNotoHackersandSpyware.com.

Thursday, July 23, 2009

IT Consolidation Made Easy

Date: July 29, 2009 Time: 1:00pm ET/11:00am PT

Server virtualization technology, combined with sophisticated planning and migration tools have made IT consolidation a reality for a growing number of large enterprises with multiple data center locations. Join Ross Chevelier, CTO for Novell Americas, to discuss key IT consolidation drivers, challenges and trends and a look at how PlateSpin Workload Management provides a more reliable and efficient way to consolidate multiple IT environments.

Register Now:
http://www.cio.com/webcast/496367/?source=ciocib_072309

FieldSearch

Notice: Now Available FieldSearch for Mactintosh (October 2008)
Version 3.0 Released May 2008

The Field Search software suite of products was developed by the National Law Enforcement and Corrections Technology Center – Rocky Mountain Region (NLECTC-Rocky Mountain).

The software is designed specifically for use in the field by non-technical criminal justice personnel to quickly and efficiently search an offender’s computer and create a detailed report of their findings. Field Search for Windows® (FS-Win) runs live in a native Windows ® environment. Similarly, Field Search for Macintosh (FS-Mac) runs live in the native Mac OS X® environment. This approach provides a fast, powerful yet easy method of examining and monitoring computer use. In essence Field Search blends preview functions with evidence gathering and reporting functions.

Originally designed to assist probation and parole officers in sex offender management the Field Search suite is equally effective in first responder situations or examining computers for evidence of other crimes.

This software is provided free of charge to public sector criminal justice agencies. However, Field Search should be approved for use and supported by your agency's policies and procedures before it is used in the field.

MORE INFORMATION
http://www.justnet.org/Pages/fieldsearch.aspx

Wednesday, July 22, 2009

Public Safety Technology in the News

Municipal Complaint? There’s an App for That
Boston Globe, (07/09/2009), Michael Levenson

Boston will soon unveil an iPhone application to allow citizens to photograph problems such as potholes and graffiti and e-mail them to city hall immediately. City officials say they expect to pay Connected Bits, the New Hampshire company that designed the software, about $25,000 for technical support this year. The city will then review use of the service to determine if it is worth the cost. The application will be free to download from Apple and will allow residents to use global positioning system technology on their iPhones to pinpoint the exact location of the problem for city hall. Residents will get a tracking number so they can follow up if the city does not fix the problem.
www.boston.com/news/local/massachusetts/articles/2009/07/06/boston_to_debut_8216killer_app8217_for_municipal_complaints/

Attorney General Holder Announces $8.7 Million in Recovery Act Grants to Support Law Enforcement Efforts on the Southwest Border
PRNewswire, (07/15/2009)

Three California communities will receive $8.7 million to fight crime and drug trafficking along the border with Mexico. The U.S. Department of Justice Recovery Act grants to Chula Vista, San Mateo County and San Diego County are for hiring, retention, assistance and equipment to combat criminal narcotics activity. The Chula Vista Police Department, on behalf of the California Border Alliance Group, plans to use the money to support task force efforts to gather intelligence related to cross-border violence. The San Mateo County Sheriff's Office, along with the Northern California High Intensity Drug Trafficking HIDTA, will develop an automated intelligence management system to track wholesale distribution from Mexican drug trafficking organizations out of the San Francisco area. San Diego County plans to create a team of 16 uniformed officers to patrol the border for drug smuggling and criminal activity and fund a dedicated deputy district attorney to prosecute those appr! ehended.
news.prnewswire.com/DisplayReleaseContent.aspx?ACCT=104&STORY=/www/story/07-15-2009/0005060853&EDATE

Most Users Clueless About Cybersecurity, FBI Says
PC World, (07/12/2009), Maxine Cheung

Lack of awareness and education on the part of Internet users are driving increases in Internet crime rates, experts say. To protect themselves, users need to educate themselves about the threats and issues in the online world. Michael Stawasz of the computer crime and intellectual property section of the U.S. Department of Justice and Austin Berglas of the cybercrime unit at the FBI’s New York office spoke at a recent panel session on security. Berglas said people need to be careful about personal information on their computers. Security and antivirus software are helpful, but computers should be kept up to date with security updates and users need to guard their user id and passwords.
www.pcworld.com/businesscenter/article/168263/most_users_clueless_about_cybersecurity_fbi_says.html

U.S. Marshals Discuss New Courthouse Security Efforts at National Conference
Daily Business Review, (07/13/2009), Julie Kay

The U.S. Marshals Service is enhancing security in federal courthouses and helping to improve state courthouse security as well. As part of the National Sheriffs’ Association conference, the Marshals Service sought to share information with local sheriffs, who are often responsible for security at state courthouses. According to Michael Prout, assistant director of the Marshals Service, threats against federal judges and prosecutors increased nationally from 500 in 2003 to nearly 1,300 in 2008. The Marshals Service increased its judicial security staff by 16 percent and its protective intelligence staff by 500 percent this year. A unit of eight explosives sniffing dogs travels around the country to work at potentially dangerous trials. Newer courthouses have special features such as entry cameras with facial recognition software matched to watch lists, angular construction to withstand explosions and windows whose glass will fall straight down when shattered.
www.law.com/jsp/article.jsp?id=1202432184553&pos=ataglance

Newly Accredited Houston Lab Expands Regional Computer Forensics Laboratory Network
FBI, (07/16/2009)

The Greater Houston Regional Computer Forensic Laboratory is the latest lab to receive accreditation in digital and multimedia evidence from the American Society of Crime Laboratory Directors/Laboratory Accreditation Board. The Houston lab is part of the Regional Computer Forensic Laboratory program, a network of 16 FBI-sponsored digital forensics labs and training centers devoted to examining digital evidence. The lab is managed by a coalition of federal , state and local law enforcement organizations. The accreditation process is an intensive assessment that evaluates the qualifications of all lab personnel, the labs operational and technical policies and the labs quality management system.
www.fbi.gov/pressrel/pressrel09/lab_071609.htm

City Morgue Gets a $26.8 Million Makeover
Pittsburg Post-Gazette, (07/18/2009), Don Hopey

Allegheny County has a new $26.8 million morgue and crime lab complex that officials say should improve medical examiners’ efficiency. The 80,000 square-foot facility has crime labs equipped with computerized robots that will perform DNA testing and a scanning electron microscope that can identify trace gunshot residue. The facility also includes a security 24-hour evidence drop-off locker area, onsite crime vehicle processing, firing range and DNA lab. County Medical Examiner Dr. Karl Williams said the new facility will help the morgue and crime lab reduce laboratory analysis and crime case backlogs. The biggest backlog is in ballistics testing. The morgue handles about 800 complete autopsies a year.
www.post-gazette.com/pg/09199/984773-53.stm

Fingerprinting Planned for Polk Students on Buses
The Ledger, (07/16/2009), John Chambliss

The Polk County School District in Florida plans to fingerprint more than 4,000 students for the next school year to track them on school buses as a safety measure. Students will place their thumbs on a fingerprint reader as they get on and off buses. District Assistant Director of Operations Lum Thornhill says fingerprinting will help track down a child if the youngster does not arrive home after getting off a bus. But officials of the American Civil Liberties Union have raised privacy concerns. Rob Davis, director of transportation for the school district, said parents would likely have the option to opt out of having their children scanned. The district wants to eventually use the fingerprint ID system on all 47,000 students who ride buses.
www.theledger.com/article/20090716/NEWS/907165060/-1/WIRE17?Title=Fingerprinting-Planned-for-Polk-Students-On-Buses

Michigan Police Get $41m in Stimulus
WOOD Television, (07/16/2009)

West Michigan law enforcement agencies will use part of a $41 million grant to reduce the backlog in forensic labs. The money from the Edward Byrne Memorial Justice Assistance Grant Program is a result of the federal stimulus package. The Grand Rapids Police Department will collect more than $700, 000. Local drug enforcement teams will receive about $800, 000. Michigan State Police will receive $2.8 million to reduce the backlog at the department's forensics labs, which help identify evidence, including DNA results, for police agencies across the state.
www.woodtv.com/dpp/news/local/grand_rapids/Michigan_police_get_41m_in_stimulus

'Empire Challenge' Focuses on Interopability

By Donna Miles
American Forces Press Service

July 22, 2009 - Taking advantage of emerging technologies to collect and analyze intelligence, then testing out better ways to get it out to warfighters who need it is the focus of a demonstration project under way in the California high desert and at sites in the United States and several other countries. U.S. Joint Forces Command's Empire Challenge 2009 kicked off two weeks ago and continues through July 31, bringing together 1,700 participants in a live, joint and coalition ISR interoperability demonstration, Air Force Col. George J. Krakie said today during a media roundtable.

ISR is military shorthand for intelligence, surveillance and reconnaissance.

The most visual part of the demonstration is taking place at Naval Air Weapons Station China Lake, Calif., a hot, dusty, high-desert environment Krakie said closely resembles conditions warfighters and their equipment face in Iraq and Afghanistan.

"Blue" forces are running convoy operations, and "red" forces are setting up ambushes against them, using roadside and vehicle bombs and firing mortars against bases and logistics operations. Meanwhile, airborne intelligence-gathering platforms are flying overhead: U-2 high-altitude reconnaissance aircraft, RQ-4 Global Hawk unmanned aerial vehicles and ScanEagle unmanned aircraft systems, among them.

But China Lake is just part of the demonstration.

Computer modeling and simulation and analysis is under way at Joint Forces Command's Joint Intelligence Lab in Suffolk, Va.; the Combined Air Operations Center-Experimental at Langley Air Force Base, Va.; each service's distributed common ground or surface system laboratories; and allied forces sites in Great Britain, Canada, Australia and the Netherlands.

The demonstration, so complicated that it took more than a year to plan, combines realistic combat scenarios and behind-the-scenes intelligence support. Its central purpose, explained John Kittle, the operational commander, is to improve situational awareness throughout the battlefield.

"We're focused on trying to answer the problems that warfighters have identified for us – to provide ISR solutions or improve ISR support for those problems that they are identifying today on the battlefield in Iraq and Afghanistan," he said.

Warfighters came up with basic areas they said require more or better ISR support: irregular warfare and counter-IED operations; strike operations; and persistent surveillance across multiple domains, Kittle said. But warfighters also wanted to see improved ISR management, with a better way of sorting through, processing and distributing the massive amounts of intelligence collected.

"We cannot possibly exploit all the data that is being collected," Kittle said. "That problem is actually going to get worse as time goes on because of the new sensors and new platforms, and new collection capabilities being asked for and put on line."

Empire Challenge is working through some of those challenges in a highly realistic environment. Intelligence collected at China Lake or generated through computer modeling and simulation is fed to analysts at participating sites, who turn it around as quickly as possible.

"Although we have a lot of great technology out there, the real focus is making sure that critical ISR data collected – whether it comes from a U.S. platform or one of our coalition partners' platforms – enters into this exploitation enterprise and can get to the warfighter at the tactical edge," Krakie said.

To test this process, the demonstration is evaluating interoperability along three lines of operations, he explained. It's making sure data flows seamlessly between the five distributed common ground and surface systems – one for each service and one for U.S. Special Operations Command. It's ensuring U.S. systems are interoperable with those of allies and coalition partners. And it's making sure ISR data gets from the intelligence side of the house to the command-and-control part of the operation.

"It does no good if all this intelligence data is moving around the data world but doesn't get to the warfighter at the tactical edge," Krakie said. "So that is one of the key focuses for us during Empire Challenge."

Monday, July 20, 2009

Army Partially Terminates Future Combat Systems Manned Ground Vehicle

The Department of the Army announced today that it will partially terminate the Manned Ground Vehicle (MGV) development effort under the Future Combat Systems (FCS) Brigade Combat Team (BCT) System Development and Demonstration (SDD) contract with the Boeing Company. The partial termination is for the convenience of the government.

The Army is taking this action to comply with both the Secretary of Defense's recommendation to cancel the FCS BCT program as well as the June 23 FCS BCT acquisition decision memorandum. The Army issued a stop work order for MGV and Non-Line of Sight Cannon (NLOS-C) efforts on June 24, in preparation for the partial termination.

The termination of the MGV effort will also negatively impact the development of the NLOS-C, which remains under a stop work directive. The Army, in conjunction with the Department of Defense (DoD), is working with the Congress to determine a viable path forward for the NLOS-C related efforts.

In coordination with the DoD, the Army is conducting a 120-day requirements analysis for a new ground combat vehicle (GCV) program. Incorporating lessons learned and threats encountered from the wars in Iraq and Afghanistan, the Army will continue to leverage the work accomplished during the FCS MGV development efforts into the new GCV.

As the Army transitions to a holistic BCT modernization plan, the Boeing Company will continue to perform as a prime contractor on the Early-Infantry BCT (E-IBCT) spin out effort. The first increment of this plan (insertion of FCS technology to the E-IBCTs) will provide the Infantry Brigade Combat Teams an enhanced network capability, improved situational awareness and a remote indirect fire capability.

For more information please contact Lt. Col. Martin Downie, martin.downie@us.army.mil or (703) 697-7591.

Saturday, July 18, 2009

Managed Internet Security Subscriptions: The Wave of the Future?

It used to be that, if you wanted to surf the Internet, you simply turned on your computer and logged-on to your browser. It was a safe and richly rewarded experience for communicating, educational, entertaining, researching, and shopping purposes. With companies like Yahoo.com and Hotmail.com/MSN.com offering free email accounts, soon everyone under the sun had at least one account. Some have been known to have four or five accounts. Some even had as many as ten different accounts.

As consumer use expanded online, it wasn’t long before the criminal elements found a easy way to make a quick buck with little or no risk of getting caught. Thus, a whole new industry was born. Hackers, the ones looking for a fast and easy buck and the ones looking to make a name for themselves by shutting down computers at major businesses or organizations, thereby creating havoc among all concerned, came into existence. Through their hacking, spamming, phishing, pharming, and keylogging activities, they stole identities, personal and financial information, and simply created an overwhelming annoyance.

The hackers via their devious conduct spawn a new industry: the anti-virus software industry. Thus was born a wealth of major and minor players selling off-the-shelf software to combat the virus attacks, software to combat the spyware, combined software to combat both, and more. Internet service providers soon jumped on the bandwagon and offered their version or a partnered version of the anti- software. In the meanwhile, the hackers always seemed to be two steps ahead – ahead of the industry and ahead of the law enforcement authorities.

Enter a new concept: It is no longer sufficient protection for the consumer, business, or agency to purchase off-the-shelf software packages. Although they are excellent products at what they do, there still remains a void where the hackers are prevailing.

If I may use a fishing analogy: It is no longer safe or productive to go after them with one, two, or more fishing lines that are baited to catch the target or targets they are created to catch. What is needed is more productive approach, a multi-purpose fishing net approach in order to:
  • catch the dangers,

  • prevent future attacks,

  • alert when new threats are in existence,

  • be mended and updated daily,

  • become invisible to the preying eyes of the barracudas, and

  • have a team of extremely well trained and proficient net menders.
This fishing net approach is just coming to light for the past 2-3 years. Known as a comprehensive, or managed security services, it is presented to the consumer as a subscription service, similar to subscriptions he would purchase for his Internet access, his telephone, his cable TV, or his daily or weekly newspaper.

(to be continued . . . )

Remember: When you say "No!" to hackers and spyware, everyone wins! When you don't, we all lose!

© MMIX, Etienne A. Gibbs, MSW, Internet Safety Advocate and Educator

About the Author:

Etienne A. Gibbs, an Internet Security Advocate and Educator, consults with individuals, small business owners, and home-business entrepreneurs regarding online protection against spyware, viruses, hackers, and other pc-disabling cybercrimes. To obtain more information and receive a free evaluation, visit him at www.SayNotoHackersandSpyware.com.

Friday, July 17, 2009

Integrated Biometrics Identification System

A recent benefit of computer technology is the ability for a police officer to transmit a record of an individual’s fingerprint impressions from the field and receive confirmation of identity in the amount of time a routine detention takes. Devices such as the Integrated Biometric Identification System (IBIS) or Remote Data Terminal (RDT) make it possible to catch wanted persons while they are stopped, regardless of the name or identification they provide.

Read On
http://www.police-technology.net/integrated_biometrics_identification_system.html

Security Manager's Guide to Video Surviellance

Download the Guide Here:
http://www.police-technology.net/myfiles/SecurityManagerGuideVideoSurveillance.pdf