Site Map - Law Enforcement

Social Media and Criminal Organizations

- In the social media world, individuals are encouraged to readily serve up personal data about where they are, who they are with, and when. But cartel members who use Facebook or similar social sites, for target selection can easily exploit this information to establish behavior patterns.

Security Metrics

- See an example of how a security department can come up with reliable and consistent metrics for security. The first step was to develop categories into which incidents could be recorded.


- Find out how Philadelphia’s City Center District helps coordinate police activities with business interests to reduce crime and make the city more attractive to businesses and tourists.

Creating Public Support for SARs

- A survey indicates several hurdles to public reporting of suspicious activity, including a basic understanding of what to report.

Morning Security Brief: Chavis Carter Autopsy, Mexican Airport Security, Venue Sued After Patron Injured in Brawl, and More

- Chavis Carter death ruled a suicide. Mexico City airport cops reassigned. A patron is suing a venue after being injured in a brawl. And more.

Protective Operations: A Handbook for Security and Law Enforcement

- Author Glenn McGovern introduces the concept of protective operations as a continuum, ranging from situational awareness, at its most basic level, to protective details, safe houses, and new identities, at its increasingly complex levels.

Police Chiefs Adopt Guidelines for Unmanned Aerial Vehicles

- The International Association of Chiefs of Police has voted to adopt guidelines for the use of unmanned aerial vehicles.

Warrantless Cell Phone Tracking Approved: Appeals Court

- An appeals court has ruled that law enforcement does not need a probable cause warrant to track a suspect using that suspect's own mobile phone GPS.

Ransomware Holds Computers Hostage, Demands Payment

- Hackers are using a virus that disguises itself as a message from the FBI to extort money from computer users. The FBI is calling it “ransomware.”

FBI: Sikh Temple Shooter Killed Himself

- The gunman who went on a shooting rampage at a Sikh temple in Wisconsin died from a self-inflicted gunshot, according to the FBI.

Morning Security Brief: Sikhs Reluctant to Add Security, Evacuations Begin Ahead of Ernesto, Reuters Hack, and More

- Sikhs reluctant to increase security at their houses of worship. Latin America preps for Ernesto. Old version of software led to Reuters hack. And more.

Morning Security Brief: Olympic Security Breach, Hate Group Infiltrates German Police, 2013 Biosecurity Concern, and More

- A journalist bypasses Olympic security with a $15 costume. German officials want to know why two KKK members were allowed to stay on the force. By 2013 a biological attack may be more likely than a nuclear attack. And more.

Report: Sex Offenders Hide Identities to Circumvent Parole Rules

- About 16 percent of sex offenders attempt to hide or change their identities in an effort to circumvent parole rules aimed at preventing them from striking again, according to a recent study.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.