Call to Action and Issue Brief: Justice System Use of Prescription Drug Monitoring Programs—Addressing the Nation’s Prescription Drug and Opioid Abuse Epidemic

Focusing on states’ prescription drug monitoring programs (PDMPs), this resource provides useful guidance to justice practitioners and policymakers, along with practical tools such as the PDMP best-practices checklist, a compendium of resources and references (including BJA’s Law Enforcement Naloxone Toolkit and Web site), and recommended next steps for addressing this critical public safety and public health challenge. Details and Download

Five in 5

The Criminal intelligence Coordinating Council’s (CICC) Five in 5 is a snapshot of law enforcement and criminal intelligence-related articles, resources, and research that may be of interest to CICC members and partners working to improve the nation’s ability to develop and share criminal intelligence. Read the Latest Edition

Five in 5; Criminal Intelligence Coordinating Council

Grantee Guidelines for Global Standards Package Compliance

To promote increased interoperability among justice information sharing systems, the Office of Justice Programs (OJP) has started issuing guidance relative to the use of the Global Standards Package. Continue to the Global Standards Package

Video Evidence: A Law Enforcement Guide to Resources and Best Practices

Designed for chiefs, sheriffs, and line officers to provide answers to straightforward questions they may have regarding properly securing, collecting, storing, and analyzing video, as well as to provide sources for training. Details and Download

Video Evidence coverpage thumbnail Video Evidence background section thumbnail Video Evidence FAQ thumbnail

Information Sharing News News Archive | Subscribe

Building Bridges in the Ocean State: Automating Privacy Policy Enforcement to Enable Information Sharing

A May 24, 2016, Webinar will be hosted to share how Rhode Island automated privacy policy and access controls in a cross-boundary juvenile criminal history exchange.  Learn about this first use-case of electronic privacy automation using the Global Reference Architecture (GRA) and the Global Privacy Technical Framework for sharing information across domains.

Source: NCSC
ICE Participates in Europol-Led Effort to Identify Victims of Child Abuse

Victim identification specialists from U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) have been working with top experts from around the globe at Europol’s headquarters in The Hague to work unsolved cases in an effort to identify victims of child sexual abuse and exploitation. The coordinated effort of this Europol Victim Identification Task Force (VIDTF) yielded significant results: More than 250 series of child sexual abuse images and video files have been uploaded to the INTERPOL International Child Sexual Exploitation Database and additions made to more than 300 existing series.

Source: ICE
Department of Justice Releases the 2016 National Strategy for Child Exploitation Prevention and Interdiction

The U.S. Department of Justice has released the 2016 National Strategy for Child Exploitation Prevention and Interdiction.  The report provides a comprehensive threat assessment of the nature and scope of the current dangers facing our nation’s children and, for the first time, dedicates an entire section to the unique challenges confronting child exploitation in Indian Country.  It examines existing efforts, assesses new threats, and highlights innovative ways in which the federal government and its partners can address child exploitation.

Source: DOJ
New Jersey Cybersecurity and Communications Integration Cell (NJCCIC): Information Sharing Success at the State and Local Level

The smart government model of partnerships among and across federal, state, local, tribal, and territorial stakeholders across the Information Sharing Environment (ISE) has been in existence for over a decade for a very good reason:  collaboration allows faster information sharing at all levels of government by fostering the quick dissemination of vital information to partners responding to critical incidents, from cyberattacks to terror plots.  Read more about the NJCCIC, a shining example of this collaborative approach.  Also, visit the NJ Cybersecurity site for a range of cyber resources.  

Source: PM-ISE
Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers?

After much speculation over who provided the Federal Bureau of Investigation with a solution for hacking into the San Bernardino shooter’s iPhone, The Washington Post reported this week that it was a “gray hat” hacker who assisted the agency.  There are three types of hackers: white hats, black hats, and gray hats—ranging from helpful to criminal.

Cyber resources are available at www.iacpcybercenter.org.

Source: WIRED

How Do I...?

Featured Downloads

Events Spotlight

  1. 5/23/2016
    IACP LAW ENFORCEMENT INFORMATION MANAGEMENT (LEIM) TRAINING CONFERENCE & TECHNOLOGY EXPOSITION
  2. 8/7/2016
    2016 National Forum on Criminal Justice

 

Global Information Sharing Toolkit; Click to Launch
Global Standards and Products Open for Public Comment
Join Global on LinkedIn
This Web site is funded in whole or in part through a grant from the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this Web site (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided).