Criminal Justice News

Sunday, July 30, 2006

Sex, Spies and Sabotage

Dale Griffis, Ph.D, former police captain with the Tiffin Police Department and internationally known law enforcement specialist, is the 72nd author listed by Police-Writers.com. His book “Secret Weapons : Two Sisters' Terrifying True Story of Sex, Spies and Sabotage” is the 170th book listed on the website.

Click for more information about his book

Thursday, July 27, 2006

COP PUBLISHES CHILDREN’S BOOK

(San Dimas, CA) On July 26, 2006, police-writers.com added its first cop authored children’s book. According to Raymond E. Foster, the editor of the list, “Sergeant Randy Garcia, Humboldt County Sheriff’s Department authored The Trunk and the Tortoise which is the first in his planned series, The Streamer Trunk Adventures.” Garcia is the 67th state or local police officer to be added to the list. His contribution brings the total number of cop authored books to 158.

In Garcia’s book, the main character Hunter is based on Garcia’s son. According to the book release, “Hunter has just completed the fourth grade and is not looking forward to spending another boring summer hanging around the house. When his grandfather, Captain Mike, sails into town, toting his mysterious steamer trunk, Hunter quickly formulates a plan. He stows away in the trunk, and the two begin an adventurous sailing trip filled with peril and excitement. Unwittingly, they stumble across a nefarious plan to smuggle endangered tortoises from the Galapagos Islands.”

Police-writers.com now lists 67 state or local police officers who have written 158 books. The website can be searched by author, department and category. The categories are fiction, true crime, biographical, academic, tactical and other. The police officers listed on the site come from 35 different departments.

Twenty-six writers are listed from the Los Angeles Police Department, giving it the distinction as the number one originator of cop writers. While the New York Police Department is running a distant second, with eight writers, “that is likely to change.” says Foster. Foster added, “we are finding new authors all the time and given the number there are probably plenty more NYPD cops who have published.”

Tuesday, July 25, 2006

Retiree Wages 10-Year Battle to Clear Name After Identity Theft

By Elaine Wilson

FORT SAM HOUSTON, Texas, July 25, 2006 – John Smith's house wasn't ransacked, his wallet was never snatched, nor was his life threatened in exchange for a handful of cash on a dimly lit city street. Identity theft can happen to anyone. Experts recommend checking your credit reports periodically.

Yet he was robbed of something he will spend the rest of his life trying to reclaim -- his identity. The crime left him saddled with thousands of dollars of debt, a plunging credit score and costly disputes with creditors that have lasted for more than a decade. "I've been fighting this battle since 1996," the retired Army major said. "The scary part is I don't know when or if it will ever end."

Smith is a victim of identity theft, one of an estimated 10 million U.S. victims each year, according to the FBI. Identity thieves steal records, bank statements, mail, credit reports and even "dumpster dive" to obtain personal information. They use the stolen information to open credit card, bank and cell phone accounts, and may even use a stolen identity to get a job or skip out on a court date after an arrest. Victims can spend years recovering their good name and credit record, both infinitely more valuable than any number of stolen ID or credit cards.

"Thieves have gotten more sophisticated over the years," said Brian J. Novak, legal assistance attorney here. "Identity theft offers a way to rob the bank without physically running into the bank and risking violence." The topic has become a hot one in today's globally connected society where company laptops are stolen and hacked and consumers regularly send off personal information into cyberspace, and into the hands of "phishers," without a second thought. Along with the personal devastation, the crime has a hefty price tag, costing American businesses and consumers a reported $50 billion a year, according to the FBI.

Although in the limelight today, 10 years ago identity theft was barely a household term, particularly for an Army major with a flawless payment history and perfect credit. Smith was blissfully unaware of any troubles in 1996. He and his family had just served a three-year stint at an Army post in Europe. He returned home and applied for a home loan with the confidence brought about by years of low interest rates. To his surprise, he was denied.

"They told me I had horrible credit," he said. "I couldn't believe it. I never missed a payment on anything." He immediately ordered a credit report and saw delinquent charge after delinquent charge racked up throughout the southern half of the country -- New Mexico, Colorado, Arizona, Kentucky, Tennessee and California. Although Smith never physically lost his wallet or ID cards, a thief had obtained his information and was roaming throughout the country posing as Smith, using his name, past addresses and Social Security number. Smith contacted a few of the creditors and saw the forms the identity thief filled out with handwriting completely different from his own. For a cell phone company, the thief even posed as a carpet cleaner, a job the physician assistant had never held.

In the three years Smith was in Europe, the fugitive had piled up thousands of dollars in debt and left a breadcrumb trail of overdue cell phone bills, delinquent credit cards and exorbitant, unpaid department store purchases. Smith was shocked. "He had too much information, more than he could have gotten off of a check," he said. "It had to be someone who found information in my wallet while I was at the gym or someone from finance or personnel."

Smith immediately ordered a fraud alert so he would be notified whenever someone used his name or Social Security number to apply for credit and told credit agencies about his situation. He also painstakingly copied records and reports proving he was nowhere near where the debts were incurred.

But for dozens of unpaid creditors, the question was never which was the real John Smith, but which one was going to pay. Smith's answer every time has been, "not me."

"I have a two-drawer file cabinet just devoted to identity theft," he said. "For every discrepancy on my report, I have to make copies and send them through certified mail. It's exceedingly time consuming, but I haven't had to pay for a debt yet." However, Smith has paid a different price. "I had bad credit for a while, very poor credit," he said. "Each time I apply for credit I have to go prove that I'm not a bad risk. My credit has improved a lot but my interest rates are still higher than they should be.

"Even if you win a case, you still lose," Smith said. "You take a loss, whether it's paperwork or credit scores." Smith is still haunted 10 years later by crimes he didn't commit with delinquent notices and threats of lawsuits. He can't change the past, but Smith hopes that by sharing his story he can help others protect their future.

"Protect your identity," he advises. "Don't leave your personal information unlocked in the gym or in your car. Limit how much information you give out. And check your credit report once or twice a year. "I made the mistake of not checking my credit annually, especially while I was overseas," he added. "If I had, I may have been able to catch the problem sooner and nip it in the bud before it got as far as it did."

And for those battling the crime, "Get to a lawyer," he said. "You can get through it, but you'll need the help." *The name was changed to protect the subject's identity.

Friday, July 21, 2006

Terrorism Picks

The Washington Post asked Peter Bergen, a journalists who met and interviewed Osama bin Laden, and Warren Bass, a 9/11 Commission staffer pick the best books on terrorism.

Click to view their selections
http://www.hitechcj.com/homelandsecurity/terrorism_books.html

Wednesday, July 19, 2006

Crime Mapping Research Conference

The National Institute of Justice is accepting papers to be presented at the 9th Crime Mapping Research Conference.

The Crime Mapping Research Conference is about the study of society and its relationship with the elements that contribute to crime and the implementation of criminal justice. Papers can be submitted on a wide range of issues—from technical solutions to research methods to applied practices to policy decisions that impact society.

Deadline for submission: September 29, 2006
The Conference takes place March 28-31, 2007, in Pittsburgh, PA.
Application form: In PDF In MS Word

Learn more about the Conference at: http://www.ojp.usdoj.gov/nij/maps/

Tuesday, July 18, 2006

War College Guide to National Security Policy Available for Download

This edition (408 pages in PDF Format) of the U. S. Army War College Guide to National Security Policy and Strategy reflects to some extent recent changes in the structure of the core curriculum at the War College. The college broke its traditional core course, “War, National Policy and Strategy,” into two courses: “Theory of War and Strategy” and “National Security Policy and Strategy.” The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues. Because little time has past since the publication of the most recent version of this book, this edition is largely an expansion of its predecessor rather than a major rewriting. Several chapters are new and others have undergone significant rewrites or updates, but about two-thirds of the book remains unchanged. Although this is not primarily a textbook, it does reflect both the method and manner we use to teach strategy formulation to America’s future senior leaders. The book is also not a comprehensive or exhaustive treatment of either strategy or the policymaking process. The Guide is organized in broad groups of chapters addressing general subject areas. We begin with a look at some specific issues about the general security environment—largely international. The section on strategic thought and formulation includes chapters on broad issues of strategy formulation as well as some basic strategic theory. The third section is about the elements of national power. A section on the national security policymaking process in the United States precedes the final section that deals with selected strategic issues.

http://www.hitechcj.com/homelandsecurity/war_college_guide.html

Thursday, July 13, 2006

CrimeWeb

CrimeWeb is a free, centralized web based clearinghouse designed to facilitate the timely and efficient exchange of public safety related information between law enforcement agencies and the communities they serve.

This is an email, zip code based service. You enter your ZIP and email, if there is a public safety announcement - like a missing child, or major crime, in your area, you receive an email. It was developed by a Texas Police Captain as part of his FBI National Academy Project.

http://www.crimeweb.net/


Raymond
www.criminaljustice-online.com

Monday, July 10, 2006

65th Police Writer

Dale Ford, retired from the Midwest City Police Department (Oklahoma), joins his brother and sister police officers with Inconceivable Danger; a true crime story about the hunt for a dangerous drug lord in the Midwest. Dale is the 65th police officer to be listed on www.police-writers.com and marks the 154th listed book written by American Police Officers.

Sunday, July 09, 2006

Racist extremists active in U.S. military

July 7, 2006 -- Under pressure to meet wartime manpower goals, the U.S. military has relaxed standards designed to weed out racist extremists. Large numbers of potentially violent neo-Nazis, skinheads and other white supremacists are now learning the art of warfare in the armed forces.

Department of Defense investigators estimate thousands of soldiers in the Army alone are involved in extremist or gang activity. "We've got Aryan Nations graffiti in Baghdad," said one investigator. "That's a problem."

Southern Poverty Law Center President Richard Cohen urged Defense Secretary Donald Rumsfeld to adopt a zero-tolerance policy regarding racist extremism among members of the U.S. military.

"Because hate group membership and extremist activity are antithetical to the values and mission of our armed forces, we urge you to adopt a zero-tolerance policy when it comes to white supremacy in the military and to take all necessary steps to ensure that the policy is rigorously enforced," Cohen wrote in a letter to Rumsfeld

READ ON

Saturday, July 08, 2006

64th Police Writer

Police Writers, a website dedicated to police officers who have written books added the 64TH author, retired sergeant David Jebb, of the San Diego Police Department (California). Jebb's book, The Thirteenth Time Zone brings the total number of listeed books written by police officers to 153.
Click to visit Police Writer
www.police-writers.com

Police Writers add author

Police Writers, a website dedicated to police officers who have written books added the 63rd author, Quintin Peterson of the Metropolitan Police Department, Washington DC. Peterson’s two books, “The Wages of Sin” and “Sin” bring the total number of listed books written by police officers to 152.

Click to visit Police Writers http://www.police-writers.com/

Friday, July 07, 2006

Hurricane and Disaster Planning Workshop for Law Enforcement and Emergency Planners

Dates: August 17, 2006

Location: Charleston, South Carolina

Application Deadline: July 27, 2006

The National Law Enforcement and Corrections Technology Center Southeast Region (NLECTC-Southeast), a program of the National Institute of Justice, and the University of South Carolina's Department of Criminology and Criminal Justice are sponsoring a Hurricane and Disaster Planning Workshop for August 17, 2006. The purpose of this one-day workshop is to bring representatives of agencies likely to experience a hurricane or similar disaster (natural or man-made), together with those who have experienced one to share solutions, discuss outstanding issues, and review current disaster plans. Attendees will gain insight into the hard lessons learned from past events, along with knowledge of model plans that have been developed from these experiences.

Application Form
Space is limited. Please download the application form and fax or mail the completed form to:

http://www.justnet.org/pdffiles/hurricane_workshop_2006.pdf


NLECTC-Southeast
Attn: Bill Deck
5300 International Blvd.
North Charleston, SC 29418
Fax: 843-207-5283

Tentative Agenda
0900-0930 Opening Remarks
University of South Carolina
NLECTC-Southeast
South Carolina Department of Public Safety
South Carolina Law Enforcement Division
0930-1045 Definition of a Disaster
Experiences of the Slidell, Louisiana Police Department
Chief Freddy Drennan
1045-1115 Break
1115-1230 Law Enforcement Lessons Learned from Hurricane Katrina
Mike Smith and Jeff Rojek
University of South Carolina
1230-1400 Lunch (not provided)
1400-1600 Planning, Preparation, and Response to Disaster
Jim Madden, Florida Department of Law Enforcement
1600-1630 Questions and Closing Remarks
Freddy Drennan, Jim Madden, Jeff Rojek, and Mike Smith

Tuesday, July 04, 2006

OSINT SOURCE

After a nearly 24 month hiatus IntellNet.org has been re-launched.Founded in early 2000 as a private project to more easily disseminate information, during the 4 years since its creation IntellNet proved itself to be a great source of knowledge. With today's re-launch, The Intelligence Network will stand upon the shoulders of giants in order to see further and push higher; expanding upon the very foundations of the U.S.Open Source Intelligence (OSINT) community.

According to Brooke Isoldi, general editor of the website, “It is with both humility and courage that we acknowledge those that not only came before, but after as well in what has become a global effort to achieve synergy with the flow of information. In the coming months, we will unveil initiatives designed to enhance and develop current and new capabilities as well as extend our reach into both existing and un-chartered territories. In line with these developments, I have placed the IntellNet website and The OSINT Group under the umbrella of The Intelligence Network where they will be autonomous divisions with similar methods and common goals. New divisions will be created as more initiatives are deployed and we will be increasingly in need of intelligent, savvy and thoughtful individuals to staff them. Additionally, The Intelligence Network will maintain an open door policy to any similar organizations willing to collaborate, on any level in order to further our common goals.”