{"id":19820,"date":"2013-12-01T12:00:00","date_gmt":"2013-12-01T17:00:00","guid":{"rendered":"http:\/\/iacpmag.wp.matrixdev.net\/cyber-training-and-technical-assistance\/"},"modified":"2024-10-14T09:37:59","modified_gmt":"2024-10-14T13:37:59","slug":"cyber-training-and-technical-assistance","status":"publish","type":"post","link":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/","title":{"rendered":"From the Director: Cyber Training and Technical Assistance"},"content":{"rendered":"<p><a name=\"top\"><\/a><br \/>\nThe Internet has revolutionized the ability worldwide to not only communicate, but also share all types of information. Unfortunately, these capabilities are also available to the modern-day criminal. These changes, generally considered good, have created a new, darker methodology for crimes to be committed by anyone with a computer, a cellphone or smartphone, a connection to the Internet, and a bit of technical expertise. The landscape is constantly evolving, and the responsibility to enforce the law and protect citizens has created a tremendous need for additional training and tools for law enforcement. Officials need to not only identify these types of crimes, but also have the tools, capabilities, and specialized skills to collect evidence, investigate, and assist with the prosecution of cybercrimes. Adding to the complexity of many of these crimes is the reality that a suspect may not be in that the official\u2019s jurisdiction, let alone the same state, or even the same country.<\/p>\n<p>In October 2012, Richard McFeely, Executive Assistant Director of the Federal Bureau of Investigation\u2019s (FBI\u2019s) Criminal, Cyber, Response, and Services Branch, confirmed the concerns about the use of the Internet and computers when he stated, \u201cIt\u2019s important that everybody understand that if you have a computer that is outward-facing\u2014that is connected to the web\u2014that your computer is at some point going to be under attack\u2026.You need to be aware of the threat and you need to take it seriously.\u201d<a href=\"#1\"><sup>1<\/sup><\/a> Director of National Intelligence (DNI) James Clapper echoed the same concerns when he testified before the Senate Select Committee on Intelligence in March 2013. As part of his testimony, he stated that those meaning to do the United States harm are increasingly gaining \u201ccyber expertise,\u201d which they use \u201cto achieve strategic objectives by gathering sensitive information from public- and private-sector entities, controlling the content and flow of information, and challenging perceived adversaries in cyberspace.\u201d<a href=\"#2\"><sup>2<\/sup><\/a><\/p>\n<p>As a former federal prosecutor, I understand and appreciate the crucial role the FBI, Department of Homeland Security (DHS), DNI, and the entire intelligence community play in protecting the United States from cyber threats. However, while federal agencies are uniquely situated to respond to international cyberthreats that are often behind and linked to many cybercrimes at the local level, this battle is not just at the federal level. As with many other types of crime, it is the men and women who make up the state, local, tribal, and territorial public safety communities who are on the front line facing the challenge presented by cybercrime every day. The contributions they make cannot be overstated.<\/p>\n<p>The term <i>cybercrime<\/i> is frequently used to cover a wide range of criminal activity and sometimes creates confusion. The term <i>cyber<\/i> can encompass identity theft and fraudulent schemes; cyber bullying or stalking; computer hacking; system intrusions; denial of services; and even espionage and terrorism. Because the term is so broad, experts have suggested using the term <i>cybercrime<\/i> with appropriate modifiers to differentiate the type of crime or intrusion and the required law enforcement response or action, such as cyber investigation and forensics, cyber infrastructure protection, cyber intrusion, and so forth. The use and consistent application of such terms would help everyone better understand the various dimensions of the cybercrime challenge and help us speak a common language in coordinating our activities. As we enhance our national capability to respond to the cyber challenge, speaking a common language is only one challenge; building expertise and capacity through training and technical assistance and coordinating our nations\u2019s resources and law enforcement response is another. We are collaborating with FBI, DHS, International Association of Chiefs of Police (IACP), and other federal, state, local, and tribal partners on these types of issues.<\/p>\n<p>To specifically address these needs, the Bureau of Justice Assistance (BJA) is proud to be partnering with the IACP on the Law Enforcement Cybercrime Resource Center to help identify training, resources, tools, and technical assistance to assist law enforcement in developing the expertise necessary to meet the cybercrime challenge. The project will be a web-based portal designed for law enforcement officials to ask simple questions and get specific answers with a list of resources, no matter what level of technical experience the requestor may have.<\/p>\n<p>With continued strains on law enforcement budgets, it is also important for us to work together to enhance the ability of law enforcement officers to prevent and respond to cybercrimes, intrusions, and attacks. BJA has been a leader in this area for a number of years. Since 1995, BJA has provided training, resources, and technical assistance to law enforcement to develop the technical and forensic capacity to deal with electronic crime. Over the past five years, BJA providers like the National White Collar Crime Center (NW3C) and SEARCH have offered free technical training to over 35,000 officers.<a href=\"#3\"><sup>3<\/sup><\/a> These classes include basic and advanced training for cyber investigations, forensics, data recovery, digital evidence collection, intrusion investigations, financial crimes, and classes for intelligence analysts. Many of these trainings have been offered regionally, reducing an agency\u2019s need to travel, thereby lowering costs and reducing time officers are away from the job. Feedback from participants continues to stress the need for training and resources and has highlighted the need to provide basic training online.<\/p>\n<p>In 2010, we addressed the use of handheld devices with Drakontas and Drexel University. The focus was to provide law enforcement officers with basic knowledge of handheld electronic devices they may encounter and how they could find vital information for their investigations. This self-paced online class allows officers with varied technical experience to gain valuable knowledge. The response to that class has been so well received that some states are considering requiring this class for their officers.<\/p>\n<p>Another project created in partnership with the Fox Valley Technical College, National Criminal Justice Training Center (NCJTC), provides online training for small and rural law enforcement and prosecutors in the area of cyber investigations. This project supported the development of a series of webinar events, distance learning modules, and roll-call videos for officers and prosecutors.<\/p>\n<p>Jurisdictional challenges are another unique element of cybercrimes. Determining which agency should gather evidence and investigate, as well as identifying the proper jurisdiction for the investigation and prosecution, presents new challenges. As with other criminal cases, when elements of the crime cross state lines or international borders, the need to involve federal agencies is often essential. In recognition of this problem, BJA has leveraged resources by partnering with the Global Justice Information Sharing Initiative (Global), a federal advisory committee to the U.S. Attorney General on justice information, and by convening a Cyber Task Team under Global\u2019s Criminal Intelligence Coordinating Council (CICC). CICC brings leaders from diverse agencies together to examine facts and make recommendations on how to best address electronic-based crime. It also plays a role in helping to identify agencies\u2019 roles and responsibilities, the appropriate interaction needed between agencies, and the resources that can be provided to state, local, and tribal law enforcement.<\/p>\n<p>BJA\u2019s National Training and Technical Assistance Center (NTTAC) offers additional resources for criminal justice and law enforcement officials and works to facilitate the delivery of high-quality, strategically focused training and technical assistance (TTA) to achieve safe communities nationwide. BJA NTTAC\u2013provided assistance covers a broad set of topic areas including training, information dissemination, technical assistance, and facilitation of multi-agency and cross-jurisdictional teams and working groups. This extends to the area of cybercrime training (for investigations and forensics), awareness, and possibly technical assistance. Public safety agencies and their members can get additional information at <a href=\"https:\/\/www.bjatraining.org\">https:\/\/www.bjatraining.org<\/a>.<\/p>\n<p>BJA looks forward to continuing to support our partner agencies and organizations in this crucial arena. We applaud the leadership of IACP Executive Director Bart Johnson and IACP board members, who have demonstrated a willingness to help elevate this issue and ensure it receives the consideration it demands through the creation of the Law Enforcement Cybercrime Resource Center. By working together, with everyone\u2019s support, we can lead efforts to help address these critical challenges.\u00a0♦<\/p>\n<p><b>Notes:<\/b><br \/>\n<a name=\"1\"><\/a><sup>1<\/sup>\u201cCyber Security: Focusing on Hackers and Intrusions,\u201d FBI press release, October 26, 2012, http:\/\/www.fbi.gov\/news\/stories\/2012\/october\/cyber-division-focusing-on-hackers-and-intrusions (accessed November 12, 2013).<br \/>\n<sup>2<\/sup>James R. Clapper, \u201cWorldwide Threat Assessment,\u201d <i>Ambassadors Review<\/i> (Spring 2013), <a href=\"https:\/\/americanambassadors.org\/page\/publications\">http:\/\/www.americanambassadors.org\/publications\/ambassadors-review\/spring-2013\/worldwide-threat-assessment<\/a> (accessed November 12, 2013).<br \/>\n<a name=\"3\"><\/a><sup>3<\/sup>National White Collar Crime Center (NW3C) can be accessed at <a href=\"http:\/\/www.nw3c.org\">http:\/\/www.nw3c.org<\/a>; SEARCH can be accessed at <a href=\"http:\/\/www.search.org\">http:\/\/www.search.org<\/a>.<\/p>\n<p>Please cite as:<\/p>\n<p style=\"margin-left: .5in;\">Denise E. O\u2019Donnell, \u201cCyber Training and Technical Assistance,\u201d From the Director, <i>The Police Chief<\/i> 80 (December 2013): 20\u201321.<\/p>\n<p align=\"center\"><a href=\"#top\">Top<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet has revolutionized the ability worldwide to not only communicate, but also share all types of information. Unfortunately, these capabilities are also available to the modern-day criminal. These changes, generally considered good, have created a new, darker methodology for crimes to be committed by anyone with a computer, a cellphone or smartphone, a connection to the Internet, and a bit of technical expertise. The landscape is constantly evolving, and the responsibility to enforce the law and protect citizens has created a tremendous need for additional training and tools for law enforcement. Officials need to not only identify these types of crimes, but also have the tools, capabilities, and specialized skills to collect evidence, investigate, and assist with the prosecution of cybercrimes. Adding to the complexity of many of these crimes is the reality that a suspect may not be in that the official\u2019s jurisdiction, let alone the same state, or even the same country.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[155],"tags":[],"class_list":["post-19820","post","type-post","status-publish","format-standard","hentry","category-from-the-director"],"acf":{"post_author":"<strong>Denise E. O'Donnell, Director, Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice<\/strong>","legacy_article_id":"3203","legacy_issue_id":"122013","main_category":"From the Director"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From the Director: Cyber Training and Technical Assistance - Police Chief Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From the Director: Cyber Training and Technical Assistance\" \/>\n<meta property=\"og:description\" content=\"The Internet has revolutionized the ability worldwide to not only communicate, but also share all types of information. Unfortunately, these capabilities are also available to the modern-day criminal. These changes, generally considered good, have created a new, darker methodology for crimes to be committed by anyone with a computer, a cellphone or smartphone, a connection to the Internet, and a bit of technical expertise. The landscape is constantly evolving, and the responsibility to enforce the law and protect citizens has created a tremendous need for additional training and tools for law enforcement. Officials need to not only identify these types of crimes, but also have the tools, capabilities, and specialized skills to collect evidence, investigate, and assist with the prosecution of cybercrimes. Adding to the complexity of many of these crimes is the reality that a suspect may not be in that the official\u2019s jurisdiction, let alone the same state, or even the same country.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/\" \/>\n<meta property=\"og:site_name\" content=\"Police Chief Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TheIACP\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-01T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-14T13:37:59+00:00\" \/>\n<meta name=\"author\" content=\"matrixsuperadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TheIACP\" \/>\n<meta name=\"twitter:site\" content=\"@TheIACP\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"matrixsuperadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/\"},\"author\":{\"name\":\"matrixsuperadmin\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/845991022f6502e521826e97f251a3f0\"},\"headline\":\"From the Director: Cyber Training and Technical Assistance\",\"datePublished\":\"2013-12-01T17:00:00+00:00\",\"dateModified\":\"2024-10-14T13:37:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/\"},\"wordCount\":1425,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\"},\"articleSection\":[\"From the Director\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/\",\"url\":\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/\",\"name\":\"From the Director: Cyber Training and Technical Assistance - Police Chief Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#website\"},\"datePublished\":\"2013-12-01T17:00:00+00:00\",\"dateModified\":\"2024-10-14T13:37:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.policechiefmagazine.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From the Director: Cyber Training and Technical Assistance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#website\",\"url\":\"https:\/\/www.policechiefmagazine.org\/\",\"name\":\"Police Chief Magazine\",\"description\":\"Police Chief Magazine\",\"publisher\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.policechiefmagazine.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\",\"name\":\"Police Chief Magazine\",\"url\":\"https:\/\/www.policechiefmagazine.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png\",\"contentUrl\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png\",\"width\":500,\"height\":246,\"caption\":\"Police Chief Magazine\"},\"image\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TheIACP\",\"https:\/\/x.com\/TheIACP\",\"https:\/\/www.instagram.com\/theiacp\/\",\"https:\/\/www.linkedin.com\/company\/international-association-of-chiefs-of-police\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/845991022f6502e521826e97f251a3f0\",\"name\":\"matrixsuperadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/25da67e1201b43a6eb59a7b51ba51cfa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/25da67e1201b43a6eb59a7b51ba51cfa?s=96&d=mm&r=g\",\"caption\":\"matrixsuperadmin\"},\"url\":\"https:\/\/www.policechiefmagazine.org\/author\/matrixsuperadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"From the Director: Cyber Training and Technical Assistance - Police Chief Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/","og_locale":"en_US","og_type":"article","og_title":"From the Director: Cyber Training and Technical Assistance","og_description":"The Internet has revolutionized the ability worldwide to not only communicate, but also share all types of information. Unfortunately, these capabilities are also available to the modern-day criminal. These changes, generally considered good, have created a new, darker methodology for crimes to be committed by anyone with a computer, a cellphone or smartphone, a connection to the Internet, and a bit of technical expertise. The landscape is constantly evolving, and the responsibility to enforce the law and protect citizens has created a tremendous need for additional training and tools for law enforcement. Officials need to not only identify these types of crimes, but also have the tools, capabilities, and specialized skills to collect evidence, investigate, and assist with the prosecution of cybercrimes. Adding to the complexity of many of these crimes is the reality that a suspect may not be in that the official\u2019s jurisdiction, let alone the same state, or even the same country.","og_url":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/","og_site_name":"Police Chief Magazine","article_publisher":"https:\/\/www.facebook.com\/TheIACP","article_published_time":"2013-12-01T17:00:00+00:00","article_modified_time":"2024-10-14T13:37:59+00:00","author":"matrixsuperadmin","twitter_card":"summary_large_image","twitter_creator":"@TheIACP","twitter_site":"@TheIACP","twitter_misc":{"Written by":"matrixsuperadmin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#article","isPartOf":{"@id":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/"},"author":{"name":"matrixsuperadmin","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/845991022f6502e521826e97f251a3f0"},"headline":"From the Director: Cyber Training and Technical Assistance","datePublished":"2013-12-01T17:00:00+00:00","dateModified":"2024-10-14T13:37:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/"},"wordCount":1425,"commentCount":0,"publisher":{"@id":"https:\/\/www.policechiefmagazine.org\/#organization"},"articleSection":["From the Director"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/","url":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/","name":"From the Director: Cyber Training and Technical Assistance - Police Chief Magazine","isPartOf":{"@id":"https:\/\/www.policechiefmagazine.org\/#website"},"datePublished":"2013-12-01T17:00:00+00:00","dateModified":"2024-10-14T13:37:59+00:00","breadcrumb":{"@id":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.policechiefmagazine.org\/cyber-training-and-technical-assistance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policechiefmagazine.org\/"},{"@type":"ListItem","position":2,"name":"From the Director: Cyber Training and Technical Assistance"}]},{"@type":"WebSite","@id":"https:\/\/www.policechiefmagazine.org\/#website","url":"https:\/\/www.policechiefmagazine.org\/","name":"Police Chief Magazine","description":"Police Chief Magazine","publisher":{"@id":"https:\/\/www.policechiefmagazine.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policechiefmagazine.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.policechiefmagazine.org\/#organization","name":"Police Chief Magazine","url":"https:\/\/www.policechiefmagazine.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png","contentUrl":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png","width":500,"height":246,"caption":"Police Chief Magazine"},"image":{"@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TheIACP","https:\/\/x.com\/TheIACP","https:\/\/www.instagram.com\/theiacp\/","https:\/\/www.linkedin.com\/company\/international-association-of-chiefs-of-police\/"]},{"@type":"Person","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/845991022f6502e521826e97f251a3f0","name":"matrixsuperadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/25da67e1201b43a6eb59a7b51ba51cfa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/25da67e1201b43a6eb59a7b51ba51cfa?s=96&d=mm&r=g","caption":"matrixsuperadmin"},"url":"https:\/\/www.policechiefmagazine.org\/author\/matrixsuperadmin\/"}]}},"category_objects":[{"term_id":155,"name":"From the Director","slug":"from-the-director","term_group":0,"term_taxonomy_id":155,"taxonomy":"category","description":"","parent":152,"count":102,"filter":"raw"}],"thumbnail_url":"","_links":{"self":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/19820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/comments?post=19820"}],"version-history":[{"count":4,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/19820\/revisions"}],"predecessor-version":[{"id":83695,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/19820\/revisions\/83695"}],"wp:attachment":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/media?parent=19820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/categories?post=19820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/tags?post=19820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}