Why Police Agencies Can't Communicate in a Crisis

Picture_013.jpg

Kent Police Control Room 

The four separate US police agencies involved in the disorganised response to last summer's protests in Ferguson, Mo., couldn't easily talk to each other. It might seem inconceivable that interagency communication would be a problem in 2015. But nine years after The 9/11 Commission Report recommended better communications between agencies, and decades since federal reports began identifying problems with how first responders co-ordinate, there are still no federal standards in place. While there has been some progress toward a nationwide solution, it's still a long way off.

A draft summary of a Justice Department report on the law enforcement response to the Ferguson protests, which was leaked first to the St. Louis Post-Dispatch, makes brief mention of the apparent communication breakdown among cops in Ferguson. “The problem is, you have something like 18,000 agencies all across the country, most of them with fewer then 10 people in the department," says Raymond E. Foster, a retired Los Angeles Police Department lieutenant and author of Police Technology. "They use their own equipment on their own frequency. Some of them even have their own language”—using different ten-codes for communications over police radios. A 2012 Congressional Research Service report says a nationwide solution would need to include such teams as 911 dispatchers and emergency medical technicians, which would put the number of agencies at 65,000 nationwide.

The solution is twofold: establishing a broadband frequency that those agencies can access, and making sure everyone at those agencies has the equipment to use it. That's not a small or cheap task. The 2012 CRS report puts the estimated cost of the broadband setup "in the tens of billions of dollars," while radios could cost between $500 and $6,000 for each responder at every one of those 65,000 agencies.

There has been progress. In 2012, Congress passed the Middle Class Tax Relief and Job Creation Act of 2012, which included $7 billion in funding for FirstNet, the national First Responder Network Authority. The authority would begin the process of establishing a public safety broadband network, which would set up its core in Reston, Va. States will then be required to build their own networks to tap into that core. 

A new CRS report released in May called FirstNet "an important step toward reaching what has been a national goal since September 11, 2001." Still in planning phases, construction has not yet officially begun, though grants were given to five "early builder" projects. The CRS report warns that, as FirstNet pushes forward, "states may consider the federal presence excessive and cease to cooperate with FirstNet, jeopardizing the purpose of the network."

That wouldn't be unprecedented. Dysfunctional emergency communications among agencies stretch as far back as 1967, when President Lyndon Johnson’s Commission on Law Enforcement cited the problem of “many separate police communications systems in close proximity” complicating simple interactions among agencies and with civilians.
The goal is to have FirstNet's network in place and operational by 2022. Foster is skeptical that it or any other program will solve the nation's emergency communication problems. "There’s probably a way to make this work nationwide,” Foster says. “We just haven’t been able to.”

Crime in Kent in the UK increased despite the introduction of a new police computer system designed to predict where crime was likely to happen.

Research shows that some officers did not understand how the software worked while others did not have enough time to use the technology properly, Kent Police said.

Kent Police said it has now changed the way the £130,000 system is used.
However the system has gone down on occasions – most recently in June 2015.

The "predictive policing" project, based on software pioneered in Los Angeles, was approved by the now-abolished Kent Police Authority.

Information Management: http://bit.ly/1HdgcDl
BBC:  http://bbc.in/1RihHbh

« ICWATCH Database Gathers the CV’s of 27,000 Intelligence Employees
UK’s Home Secretary named Internet Villain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

CyberSec Vietnam

CyberSec Vietnam

The CyberSec Vietnam Conference on 13 June 2024 in Ho Chi Minh City focuses on the critical pursuit of building trust in digital networks and fortifying Vietnam's cybersecurity ecosystem.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.