All cloud products sold to law enforcement must comply with the FBI’s Criminal Justice Information Services (CJIS) Security Policy. Unfortunately, a recent study showed that half of law enforcement officials have no knowledge or are not familiar with CJIS rules and requirements. The International Association of Chiefs of Police (IACP) conducted the study and to help has issued a report,“Guiding Principles on Cloud Computing in Law Enforcement.”
GPN reached out to Paul Rosenzweig, senior advisor to the Washington, D.C.-based Chertoff Group, who offers his views on the topic. Michael Chertoff is one of the founders of the firm and is a former secretary of the U.S. Dept. of Homeland Security.
By: Paul Rosenzweig
Source: Government Security News
State and local law enforcement hold vast quantities of personally identifiable information (PII) about their citizens. Arrest records; conviction records; finger prints; mug shots - all of them are collected by police departments around the country. And, increasingly, this information is stored in a digital form with a cloud service provider. How secure is that cloud storage? Jennifer Lawrence and other celebrities know that the answer is "not necessarily as secure as we might hope." And therein lies an alphabet soup of rules and standards. Cloud data privacy is an alphabetic minefield of confusing three letter acronyms (TLAs to those of us in the know). State and local law enforcement who don't make the effort to get to know these acronyms and what they mean do so at their own peril - at least insofar as they collect and store data about their citizens in cloud-based storage systems.
By: Mark Weatherford and Brian Harrell
Source: Intelligent Utility
A little over a decade ago, the term convergence was de rigueur when talking about bringing the disciplines of physical security and IT security together to solve the challenges of stove-piped security. Fast forward to 2015 and the challenges remain mostly the same, except the conversations are now about how to bring three disciplines-physical security, cybersecurity (formerly called IT security) and operational technology security (industrial control system/SCADA security)-together to manage the threats facing the electric utility industry.
By: Bryan Cunningham
Source: Federal Times
In the late 1970s, Leonard Nimoy (RIP Mr. Spock) hosted a weekly television "documentary" called "In Search Of...," in which he quested after Bigfoot, the Loch Ness Monster and other mythical creatures or phenomena. Nimoy's mysterious quarry almost always eluded him.
Source: Government Executive
God forbid. You're an Assistant District Attorney in the midst of a case when gunfire erupts in the offices of a local magazine headquartered in your city which recently satirized ISIS. In "retaliation," terrorists have executed a dozen magazine employees although most had nothing to do with the offending column. Your top cops and prosecutors are immediately on the trail, but the gunmen disappear into the underworld of Europe. Your citizens demand swift justice and exemplary police work traces your perpetrators to social media accounts housed on servers in France. Time being of the essence, you quickly request vital evidence from the French social media companies before the killers' trail goes cold.