-Caveat Lector-

"Engler, Donna" wrote:
>
> NLECTC Law Enforcement & Corrections Technology News Summary
> Thursday, September 9, 1999
>
> The National Law Enforcement and Corrections Technology Center
> (NLECTC) provides the following information as a service to
> law enforcement, corrections, and forensic science
> practitioners.  The summary includes abstracts of articles
> from major national newspapers, business magazines, Web sites,
> national and international wire services, and periodicals
> focusing on law enforcement and corrections technology.
> Please note that providing synopses of articles on law
> enforcement and corrections technology or the mention of
> specific manufacturers or products does not constitute the
> endorsement of the U.S. Department of Justice or NLECTC.
>
> For more information on NLECTC and the web version of this
> news summary, please visit JUSTNET at http://www.nlectc.org.
> NLECTC may also be reached at 1-800-248-2742.
>
> Reproduction of this text is encouraged; however copies may
> not be sold, and the NLECTC Law Enforcement & Corrections
> Technology News Summary should be cited as the source of the
> information. Copyright 1999, Information Inc., Bethesda, MD.
>
> ***************************HEADLINES**************************
>
> "Law Enforcement Plays Catch-Up With Reorganized Crime"
> "Prison Riot"
> "Technology Changing Organized Crime"
> "Watchdogs Harness Net To Fish For Cybercrime"
> "Compaq To Ship New Version of Fingerprint Identification
> Technology From Identix"
> "Pennsylvania Finalizes Contract With M/A-COM's OpenSky For
> Statewide Public Communications Safety System"
> "Chief G-Man On The Digital Beat"
> "Milwaukee Authorities Use DNA to Charge Unknown 3-Time
> Rapist"
> "Louisiana Department of Public Safety Locks Up CA's Unicenter
> TNG For Expansive Statewide Network"
> "Hostage Standoff in S.C. Prison Ends"
> "Jilted Lover Terrorizes Woman and Family Before Shooting
> Officer, Self"
> "One Death Row Inmate Kills Another"
> "NCIC 2000 Goes Online"
> "Longview Police Test Weather Alert Application for Reverse
> 911 System"
> "Kodak Beefs Up Law Enforcement Photography Program"
> "Department Begins Use of Video-Based Red Light Camera System"
> "DuPont Multi-Threat Body Armor Technology"
>
> **************************ARTICLES****************************
>
> "Law Enforcement Plays Catch-Up With Reorganized Crime"
> USA Today (09/03/99) P. 15A; Johnson, Kevin
>
> Organized crime groups have restructured themselves in a
> manner that law enforcement officials are still struggling to
> understand. While the chain of command of crime groups was the
> traditional hierarchical structure years ago, today's networks
> operate more loosely and involve multinational and multiethnic
> partnerships. For example, Russians have worked with
> Colombians, while completely separate operations have involved
> Russians, Colombians, and Italians. Moreover, there are times
> when authorities are not able to tell crime groups from
> terrorist organizations. Access to a global financial system
> also allows the partnerships to work more quickly. Criminal
> networks are able to move large amounts of capital from one
> country to another, and can even destabilize lesser
> governments. "It's like fighting piranhas," says Mark
> Galeotti, director of the Organized Russian & Eurasian Crime
> Research Unit at Britain's Keele University. "While you are
> fighting with one, the rest of the school is probably eating
> the flesh off your back."
>
> --------------------------------------------------------------
>
> "Prison Riot"
> USA Today (09/08/99) P. 3A
>
> Corrections officials in New Mexico regained control of
> Guadalupe County Correction Facility--operated by Wackenhut
> Corrections Corp.--hours after a correctional officer was
> ambushed and stabbed to death during a riot involving about
> 300 prisoners. The riot took place during efforts to lock down
> the prison after an inmate was stabbed in a gymnasium. Four
> inmates have been killed in prisons operated by Wackenhut
> Corrections in the last nine months. Some New Mexico lawmakers
> responded to the riot by calling on the state to abandon the
> use of privately run prisons.
>
> --------------------------------------------------------------
>
> "Technology Changing Organized Crime"
> APBNews Online (09/02/99); Meek, James Gordon
>
> A three-day conference of top American, European, and Eurasian
> military leaders in Germany recently yielded fewer results
> than expected, but forged a new relationship between law
> enforcement officials from the West and the East. At a meeting
> sponsored by the FBI and the joint U.S.-German military George
> C. Marshall European Center for Security Studies, officials
> assessed the impact of organized crime on national security in
> the upcoming decade. Among the many threats law enforcement
> agencies around the globe are concerned with are the sale of
> humans for sex and labor, the trafficking of mass destruction
> weapons, and widespread financial fraud. One senior American
> official commented that the Russians remained recalcitrant
> about their serious troubles with organized crime, a problem
> he hopes they will address at later meetings. Although the
> future of global crime is difficult to predict, conference
> attendees, upon comparing notes, agreed that organized crime
> is more sophisticated and better funded than previously
> believed. In addition, more than 90 percent of those involved
> in organized crime will be computer literate to some degree by
> as early as next year. The leading threat of organized crime
> presently are the Russian-speaking mob groups that are
> operating in emerging democracies, according to FBI Organized
> Crime Section Chief Thomas Fuentes. On the whole, organized
> corruption is the most pervasive crime form because
> well-financed mob groups often have better cash flow than the
> law agencies of emerging democracies, making legal enforcers
> extremely vulnerable to mob money. In the future, governments
> of poorer, newer democracies may be controlled by organized
> crime. Even more startling, however, is the consensus that
> organized crime will inevitably hire mercenary terrorists to
> deploy a weapon of mass destruction to be employed as a
> blackmail strategy.
>
> --------------------------------------------------------------
>
> "Watchdogs Harness Net To Fish For Cybercrime"
> Age Online (09/06/99); Phillipps, Tim
>
> The Australian Securities and Investments Commission (ASIC) is
> pursuing the wave of criminal activity that inevitably follows
> the invention of any technology, endeavoring to combat fraud
> on the Internet. Analysts believe legitimate electronic
> commerce is the wave of the future and will provide
> exceptional consumer benefits such as greater efficiency,
> lower costs, and freedom of choice. During the past two years,
> as illegal activity has outpaced law enforcement officials'
> efforts to stop it, ASIC has obtained an increasing number of
> reports of illegal securities offerings or prescribed
> interests, and also prospectuses and associated marketing
> material posted on the Net without approval. Crimes included
> under Australia's Corporations Law include IPOs, bad
> investment advice, non-disclosures of potential conflicts of
> interest, share hawking, false statements, insider trading,
> and the promotion of "exotic" scams. The Internet has made
> crime extremely easy, considering the low cost, the use of
> cryptography, the immediacy of transactions, and the lack of
> tangible information, such as fingerprints or eyewitnesses. To
> combat Internet-based crime, law enforcement officials must
> master the Web, train in forensic computing, form partnerships
> with technology companies, develop specific legislation for
> enforcing Internet security, and educate consumers. During the
> past decade, more than 100,000 Australians have fallen victim
> to fraudulent or failed Internet investments, a statistic ASIC
> is endeavoring to reduce.
>
> --------------------------------------------------------------
>
> "Compaq To Ship New Version of Fingerprint Identification
> Technology From Identix"
> Business Wire (09/07/99)
>
> Compaq Computer Corp. and Identix Inc. jointly announced this
> week an upgrade of the Compaq Fingerprint Identification
> Technology device with Identix's BioLogon 2.0. The new version
> of the product now allows the full integration of smart card
> devices, provides for the enrollment of up to eight fingers
> per user, and works on both independent and networked systems
> around the globe. Additionally, the upgrade eliminates the
> need for passwords while providing IT administrators with
> easier management tools, thereby reducing network
> administration costs. The new device has a suggested retail
> price of $99 and is free to owners of versions 1.0 and 1.01,
> who may download the software and SDK from Compaq's Web site.
>
> --------------------------------------------------------------
>
> "Pennsylvania Finalizes Contract With M/A-COM's OpenSky For
> Statewide Public Communications Safety System"
> Business Wire (09/02/99)
>
> Tyco subsidiaries M/A-COM and AMP recently made the joint
> announcement that Pennsylvania will deploy a state-of-the-art
> digital public safety radio system, using M/A-COM's OpenSky
> Wireless IP Network. Under the 18-month, $95 million contract,
> M/A-COM will supply infrastructure equipment for the new
> digital voice and data radio system that will be comprised of
> several hundred base stations along with regional control and
> network control centers. These base stations will provide the
> necessary interface between mobile and portable radios and
> dispatch centers, tying together statewide agencies such as
> local law enforcement and fire and emergency medical service
> providers. Among the many advantages of OpenSky, the network
> is easily accessible by IP applications or devices and, though
> it is digital, remains compatible with analog radios, allowing
> agencies to upgrade at a more cost-feasible pace. Also, all
> voice messages are sent in a compressed, encrypted format that
> will protect the privacy of users. The Pennsylvania radio
> system will be the template for other states to follow,
> according to Dennis Martinez, Director of Wireless Systems at
> M/A-COM.
>
> --------------------------------------------------------------
>
> "Chief G-Man On The Digital Beat"
> APB News Online (09/07/99)
>
> Recognizing that cybercrime would become more pervasive as
> organized crime groups became technologically savvy, the
> Clinton administration created the FBI's National
> Infrastructure Protection Center (NIPC) last year, an agency
> charged with protecting national computer systems. Recently,
> NICP director Michael Vatis attended an exclusive conference
> in Germany sponsored by the Defense Department's George C.
> Marshall European Center for Security Studies that addressed
> the worldwide threat of organized crime to national security.
> Motivation for committing cybercrimes, Vatis later told
> reporters, will stem not from a desire for notoriety or to
> communicate a political message, but for illicit profit
> taking. In preparation for the Y2K computer rollover which may
> leave many systems vulnerable to cybercrime, the FBI recently
> announced it will cancel Y2K leave for its Washington staff
> and special agents while reducing leave for its other
> 27,000-strong workforce. Also, funding for the NICP has been
> boosted by a $10 million grant from the Attorney General's
> terrorism fund, adding to the $2.7 million for non-personnel
> allocations. The organization is comprised of 110 experts in
> Washington, with another 207 special agents in FBI offices
> nationwide, and 24 more employees will be added this year.
> Although many critics question whether the FBI is willing to
> share information about cybercrime, Vatis emphasizes that the
> bureau's mission is to gather and share information with other
> agencies, thereby making possible the international
> cooperation needed to combat border-hopping cybercriminals.
>
> --------------------------------------------------------------
>
> "Milwaukee Authorities Use DNA to Charge Unknown 3-Time
> Rapist"
> Washington Times (09/03/99) P. A6; Doege, David
>
> Milwaukee law enforcement authorities have obtained a judge's
> signature on a warrant for the arrest of a rapist known only
> by his DNA. Hoping to stave off the expiration of the statute
> of limitations on the last of three unsolved 1993 rapes,
> authorities have taken this step that experts are calling
> "extraordinary" and "creative." DNA evidence has finally
> matured as a source of proof admissible in a court of law,
> according to associate professor at Marquette University Law
> School Daniel D. Blinka. However, others say from the
> perspective of the defense, it is not entirely clear that the
> statute of limitations can be lengthened by filing nameless
> charges, according to Chair of the Wisconsin Bar Ray
> Dall'Osto. However, the likelihood of there being two positive
> matches in this particular case are extremely low--one in 1.96
> billion to one in 7.25 billion, in fact. Blinka fears this
> case will only raise future questions.
>
> --------------------------------------------------------------
>
> "Louisiana Department of Public Safety Locks Up CA's Unicenter
> TNG For Expansive Statewide Network"
> PR Newswire (09/07/99)
>
> The Louisiana Department of Public Safety (LADPS) has chosen
> Computer Associates (CA) International's Unicenter TNG for
> centralized management of its IT network, the company
> announced today. During the initial stage of implementation,
> LADPS will use CA's product to control thousands of desktop
> systems, applications, and databases at various locations. The
> Unicenter TNG Software Delivery Option will allow for upgrades
> of systems at more than 300 locations from the department's
> headquarters in Baton Rouge. Such software upgrades are needed
> given that the department is responsible for a medley of
> public safety entities that operate for 4 million residents.
> LADPS and other public safety administrations were also
> concerned about data security, and will now devise multi-level
> security functions for different databases with Unicenter TNG.
> Besides providing security and other benefits, the new
> software will significantly reduce administration costs,
> cutting the need for three-hour service calls to offices
> across 48,000 square miles. All problems and upgrades will now
> be handled at the Baton Rouge location.
>
> --------------------------------------------------------------
>
> "Hostage Standoff in S.C. Prison Ends"
> Associated Press (09/08/99)
>
> Two maximum-security prison inmates in South Carolina took two
> prison employees hostage but surrendered and released both
> unhurt after 13 hours of negotiations. Convicted murderer
> Wesley Floyd, 29, and John New, 20, who is serving 15 years
> for grand larceny, took the hostages Tuesday afternoon. The
> inmates were armed with a makeshift weapon known as a shank
> and will thus each be charged with two counts of hostage
> taking and possession of a weapon, according to John Barkley,
> a spokesman for the state Department of Corrections. The
> hostages were a prison school secretary, who was released
> Tuesday night, and a teacher for the Department of
> Corrections, who was released early this morning.
>
> --------------------------------------------------------------
>
> "Jilted Lover Terrorizes Woman and Family Before Shooting
> Officer, Self"
> APB News Online (09/03/99); Venezia, Todd
>
> A jilted boyfriend held his ex-lover and her three sons
> captive Wednesday in Howell Township, N.J., before shooting a
> police officer and committing suicide. Andrew Paul Tolliver,
> 41, of Cincinnati allegedly entered the home of Abby
> Maisonave, 39, brandishing a gun. Tolliver and Maisonave had
> had an affair earlier in the year after the two met in an
> Internet chat room. Maisonave had later ended the affair and
> subsequently obtained a restraining order against Tolliver
> after he began threatening her early last month, according to
> Assistant Monmouth County Prosecutor Peter Warshaw Jr.
> Tolliver shot Patrolman Mark Troutman in the back and turned
> the gun on himself a moment later. Troutman, who was wearing a
> bulletproof vest, was treated and released from a local
> hospital.
>
> --------------------------------------------------------------
>
> "One Death Row Inmate Kills Another"
> Associated Press (09/07/99); Martello, Thomas
>
> Convicted cop killer and reputed sociopath Robert "Mudman"
> Simon was killed in the New Jersey State Prison in Trenton by
> a fellow death row inmate. Simon, 48, was pronounced dead
> after fighting with Ambrose Harris, corrections spokeswoman
> Mary Ellen Bolton said this morning. Both inmates had been
> housed on the death row section of the prison pending appeals.
> Harris was convicted in February 1996 for the carjacking,
> rape, and murder of Lower Makefield, Pa., resident Kristin
> Huggins, 22, in 1992. Simon's death sentence was handed down
> in 1995 after he pleaded guilty to killing Franklin Township
> police officer Ippolito Gonzalez. Simon later recanted the
> guilty plea, but the N.J. Supreme Court upheld his death
> sentence. Simon had earlier served 12.5 years of a 10- to
> 20-year sentence for murdering his 19-year-old girlfriend
> after she refused to have sex with fellow members of his
> motorcycle gang. New Jersey reinstated the death penalty in
> 1982 but has not executed anyone since 1963.
>
> --------------------------------------------------------------
>
> "NCIC 2000 Goes Online"
> Law Enforcement Technology (08/99) Vol. 26, No. 8, P. 8
>
> On July 11, the National Crime and Information Center (NCIC)
> 2000 replaced the FBI's former NCIC. The new system serves
> 80,000 law enforcement agencies nationwide, and includes fast
> fingerprint matching and mugshots. NCIC 2000 can positively
> identify a set of fingerprints in minutes, and can process 2.4
> million transactions per day. In addition, the system stores
> 39 million records. NCIC 2000 stores a variety of data in 17
> different databases, including stolen vehicles, articles,
> securities, wanted persons, missing persons, gangs, and
> suspected terrorists. NCIC offers enhanced search capabilities
> for right index fingerprints, mugshots, and identifying
> images. The system maintains five-day logs of inquiries to
> notify different agencies if they are searching for the same
> information or individuals. To take advantage of NCIC, law
> enforcement agencies must be equipped with a laptop or
> personal computer, laser printer, document scanner, single
> fingerprint scanner, and a digital camera.
>
> --------------------------------------------------------------
>
> "Longview Police Test Weather Alert Application for Reverse
> 911 System"
> Police Chief (08/99) Vol. 66, No. 8, P. 16
>
> On May 4, the Texas, Police Department was able to use its
> recently implemented Reverse 911 system to notify 32
> particularly vulnerable sites about incoming tornadoes. The
> system, in conjunction with warning sirens, proved effective
> at getting the message out. Reverse 911 quickly delivers
> high-priority recorded messages to a defined area or list of
> recipients. All recipients can receive such messages in five
> to seven minutes. A bulletin board system that features crime
> prevention tips, carries the departments daily activity
> reports, and communicates information about department
> sponsored programs will be added to Longview's Reverse 911
> system.
>
> --------------------------------------------------------------
>
> "Kodak Beefs Up Law Enforcement Photography Program"
> Law Enforcement Technology (08/99) Vol. 26, No. 8, P. 16
>
> Kodak Professional is reorganizing its law enforcement dealer
> network into 16 dealerships nationwide. Kodak chose the
> dealers on the basis of excellent customer service for digital
> and film imaging in a law enforcement environment. The
> dealerships are located in major metropolitan areas, and are
> designed to serve geographical regions. In addition, Kodak is
> continuing to make the popular DC120 zoom digital camera
> available to law enforcement personnel. Kodak is releasing the
> "All Points Bulletin" newsletter to help employees better
> serve the needs of law enforcement customers. The newsletter
> provides product information, customer testimonials, and
> technological advice.
>
> --------------------------------------------------------------
>
> "Department Begins Use of Video-Based Red Light Camera System"
> Police Chief (08/99) Vol. 66, No. 8, P. 16
>
> Law enforcement officials in Vienna, Va., have begun giving
> red-light running citations based on an automated video system
> called CrossingGuard. Created by Nestor Traffic Systems,
> CrossingGuard uses video to detect and record violations,
> transmit digital images electronically in real-time via a
> phone line, and issue citations. The system determines
> violations based on a vehicle's speed and distance from the
> stop line. If a violation is predicted, CrossingGuard records
> and saves images before and during the violation from
> different angles, including color close-ups of the vehicle's
> plates. Virginia police say that CrossingGuard has allowed
> them to issue many more traffic citations more quickly than
> had been possible previously. In addition, CrossingGuard
> allows police to view emergency situations at any
> CrossingGuard equipped locale. A study from the Insurance
> Institute for Highway Safety says that red light running is
> the leading cause of urban crashes in the United States: there
> have been 3,753 fatal red light running crashes, and 4,238
> resulting fatalities, between 1992 and 1996.
>
> --------------------------------------------------------------
>
> "DuPont Multi-Threat Body Armor Technology"
> Law Enforcement Technology (08/99) Vol. 26, No. 8, P. 16
>
> Dupont has announced a new, patent-pending, "multi-threat"
> body armor. The new armor offers ballistic protection against
> NIJ levels II, IIA, and IIIA. In addition, the armor passed
> the California Ice Pick Test, demonstrating that it can
> protect against commercially manufactured knives and puncture
> weapons. The multi-threat armor is soft, flexible,
> comfortable, and concealable.
>
> **************************************************************
>
> The JUSTNETNews Mailing List is maintained by the National Law
> Enforcement and Corrections Technology Center. Regular
> postings include the weekly Law Enforcement and Corrections
> Technology News Summary and announcements from NLECTC and the
> National Institute of Justice Office of Science and Technology
> (NIJ/OS&T). To SUBSCRIBE, send the command "subscribe
> JUSTNETNews firstname lastname" to the address
> [EMAIL PROTECTED] To UNSUBSCRIBE, send the command
> "unsubscribe JUSTNETNews" to the address [EMAIL PROTECTED]
> If you need assistance, please contact [EMAIL PROTECTED] or
> call NLECTC at 1-800-248-2742.
>
> **************************************************************

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to