FREE e-Newsletter
Important News - Hot Topics
Get them Now!

Cobalt Software Platform - Mark43
Mark43's Cobalt software platform unites a set of law enforcement tools securely...

 

6 Key Findings of Incident Reporting

Brought to you by:

Register now!

Thursday, December 13, 2018 -- 11:00 AM PT/2:00 PM ET

An exceeding number of police departments and law enforcement agencies, whose officers spend upwards of 3-4 hours a day completing incident reports and other time-sensitive paperwork*, are turning to smarter tools, such as speech recognition solutions, to help transform their police reporting workflows.

Join us on Thursday, December 13, 2018 at 2:00 PM ET to hear why these law enforcement professionals are embracing smarter tools to complete higher-quality reports and move mission-critical information within the CAD/RMS faster and more efficiently – all by voice.

This discussion will provide you with an understanding of:

  • What law enforcement has to say about current reporting processes
  • Why officers, especially recruits, want smarter tools to help with police paperwork
  • Why manual reporting has a negative impact on report accuracy and productivity and can hinder criminal proceedings
  • How departments can speed up data entry within the CAD/RMs and move mission-critical information more accurately and efficiently
  • How speech recognition technology can help increase officer safety and improve situational awareness and productivity on patrol
  • Why embracing smarter technology increases community visibility, and minimizes costs

Learn how your department can make incident reporting faster, safer and more complete by registering for our webinar today.

*Role of Technology in Law Enforcement Paperwork Survey 

Speakers:

Eric La Scola, Product Marketing Manager, Dragon, Nuance

Register now!

Demystifying the Convergence of LTE and LMR Networks for First Responders

Brought to you by:

View now!

Originally aired: Thursday, December 6, 2018 -- 11:00 AM PT/2:00 PM ET

Narrowband Land Mobile Radio (LMR) networks and user radio equipment have been the cornerstone of mobile communications for First Responders for decades. The trend from traditional analog to more robust wireless broadband networks in recent years has improved the overall accessibility but questions remain on whether the new networks can provide all the required capabilities First Responders need to do their job.

Increasing demand for bandwidth intensive applications such as video, advanced mapping and analytics, alongside critical voice communications has been driving adoption of broadband LTE cellular networks, such as FirstNet.

Join our panel of industry experts for this insightful 60-minute on-demand webinar as they discuss the critical differences between LMR networks and LTE networking, how these technologies can successfully co-exist, and explore the future of critical communications for First Responders.

In this session, you will learn:

  • Current and future industry trends for LTE and LMR technologies
  • Challenges and obstacles with the convergence of technologies
  • Real-life examples of successful hybrid communication strategies for First Responders
  • Recommendations for future proofing your agency; adoption of new technologies and how to bridge the gap

Speakers:

Tony Morris, VP North American Sales, Enterprise Solutions, Sierra Wireless

Jesus Gonzalez, Analyst II, Critical Communications, IHS Markit

Ken Rehbehn, Principal Analyst, Critical Communications Insights

Andrew Seybold, Senior Partner, Andrew Seybold Inc.

Top News

FLEOA Blasts Apple's Refusal to Cooperate With FBI

February 18, 2016  | 

Following Apple Inc.'s refusal of a duly issued federal court order to assist the Federal Bureau of Investigation (FBI) in the procurement of data from the phones of the terrorist attackers in the San Bernardino, CA, shooting, the Federal Law Enforcement Officers Association (FLEOA) National President Nathan Catura issued the following statement:

"Tim Cook has grossly misrepresented the intentions of the FBI and the federal government. His implication that the US government wants to break into Apple customers' phones is akin to police searching a person's home without a warrant.

"Before the FBI or any law enforcement agency is able to search someone's phone, they must first obtain a court order issued by a federal judge or magistrate. In this case, it is outrageous for the CEO of one of the largest technology companies to suggest that federal agents are invading individuals' privacy after the lawful presentation of a federal court order. Tim Cook is employing fear-mongering tactics to prevent law enforcement from performing their duties.

"For the safety of all Americans, it is imperative that we continue to support and protect our national interest and national security. That is the goal. Unfortunately, Tim Cook is neglecting this fact which begs the question: how many more lives will be ruined or lost because the likes of Tim Cook and other billionaires who have a financial stake in the industry don't believe in American jurisprudence?

"This is a country of laws and no one, not even Tim Cook, is above that. He stands here, without any legal merit, actively choosing to ignore a federal court order. His arrogance has given him a false sense of superiority when it is in fact his responsibility as an American citizen to recognize and adhere to our system of laws, which were put in place to ensure both individual and national security. Tim Cook does not get to decide what laws he must comply with. That's not the American way of justice.

"It's time for Apple and Tim Cook to abide by the law and do their part to prevent another terrorist attack on American soil."

About FLEOA

The Federal Law Enforcement Officers Association (www.fleoa.org) is the largest nonprofit, nonpartisan professional association that exclusively represents over 26,000 active and retired federal law enforcement officers from over 65 agencies.


Comments (4)

Displaying 1 - 4 of 4

Robert @ 2/18/2016 2:52 PM

Expected response...not really news, more of a white paper or position statement.
To start at the end:
1. Yes we are a country of laws, and Apple has the right to respond and appeal the court decision. Just because the FBI could convince a single Magistrate that they are right, and Apple is wrong...does not mean that is the last word on what is legal.
2. This is not just a 'search warrant'. The FBI is asking Apple to do 2 things that are not covered in a search warrant. First, create a code or back door that does not exist today. This tool could then be used by anyone at anytime (once 2 people know it is no longer a secret). Secondly, Apple has a vested interest in keeping that knowledge (how to hack their system) secret...in essence Apple is being compelled to create physical evidence for the FBI (not just make the key; but show the FBI how to use the key).
This is a slippery slopes...can a Dr. be forced to perform an operation to remove a bullet to check the lands/groove

GP Cobb @ 2/18/2016 10:37 PM

What I read in Linked-in, does not align with the rights of the FBI. Once that primary and secondary encryption code is broken or released, it's all over the world, China, Russia and all the others have it that can hack. I am for Cook or any other provider to keep our phones private. The phone they want has a dead owner anyway...... JMO

Tom Ret @ 2/19/2016 11:09 AM

Why not have Apple take the phone, attempt to unscramble it, give the info to the FBI if successful but not divulge how they did it? If they keep it in house and then the method gets out then they have no one to blame but themselves.

Robert @ 2/19/2016 1:03 PM

I asked that question on a tech board...and I got 2 different responses (so these may not be accurate)

First Poster: Apple offered to do this, but the FBI said no. The FBI said the information gathered from the phone would be both physical evidence (potentially used in a trial and the chain of custody had to be maintained) & secret information, that could impact national security.

Second Poster: Apple doesn't even trust their own staff (or the FBI). Once they put a team together and make the firmware, and bypass the apple security certificate in essence the "key" exists. If a member of their team (or the FBI) decides to re-engineer the fix (in their own home...or the FBI lab) the key is lost. Apple would never know if their product was secure, unless they re-write the entire IOS (and replace the HW chip that holds the firmware).

Now, there is no accurate way to verify this....so it may all be inaccurate....but the board is pretty reputable data on apple inside moves...

Join the Discussion





POLICE Magazine does not tolerate comments that include profanity, personal attacks or antisocial behavior (such as "spamming" or "trolling"). This and other inappropriate content or material will be removed. We reserve the right to block any user who violates this, including removing all content posted by that user.

Other Recent News

NYPD Deploying 14 Drones, Activists Oppose Plan
"Drone technology will give our cops and their incident commanders an opportunity to see...
NITV FS Unveils Computer Voice Stress Analyzer III
The CVSA III was developed to be "the" 21st Century truth verification system for law...

Police Magazine