
Share
Armed fighters in indigenous garb attack a squad of military police on a patrol. After the initial skirmish, the fighters surrender their arms and are detained by U.S. military forces, and a search of...

Share
RMS (records management system) and CAD (computer-aided dispatch) are ac-ronyms that every police officer has probably heard at least once in his or her career. Similarly, predictive policing, intelli...

Share
As technology advances, it becomes a larger part of “traditional” criminal investigations that previously had little nexus with technology. Law enforcement administrators should consider proactive...

Share
The Federal Bureau of Investigation (FBI) relies on its partnerships with local, state, tribal, and federal agencies to collaboratively guide courses of action when incorporating new technologies into...
Share
Technology is a key component of any law enforcement operation—new, innovative technologies can support more efficient crime prevention and response; better protect police officers and the public; a...

Share
Police executives need to understand four things about cybersecurity.
First, there has been a dramatic increase in both the frequency and sophistication of cyber attacks such as ransomware and ad m...

Share
n November 2004, Mosul, Iraq, was home to many displaced enemy fighters from Falluja and street gangs who roamed the city streets practicing the art of terror. During this time, an estimated 200 bodie...

Share
The potential uses for police UAVs seem, at present, almost limitless. Many UAV models are cheaper than cruisers and helicopters to purchase and operate, and their ability to fly and hover at varying ...