Tuesday, January 01, 2008

Criminal Investigations and Tactics

Editor's Note: One of the authors is a former servicemember.

January 1, 2008 (San Dimas, CA) Police-Writers.com is a website that lists state and local
police officers who have written books. The website started out 2008 by adding three police officers from California who have written books on criminal investigations and police tactics.

Daniel R. Sullivan served twenty-five years with the Los Angeles Police Department, retiring as a Deputy Chief. During his career with the Los Angeles Police Department Daniel Sullivan was the Program Manager for the Development of the City of Los Angeles Emergency Command Control Communication System and involved in the security planning for the 1984 Olympic Games.

Daniel Sullivan has a BS in Criminal Justice Administration and a Masters in Public Administration. After his career with the Los Angeles Police Department, Daniel Sullivan entered the private security as a well known security specialist including being a member of a worldwide response team for kidnap for ransom and extortion cases covered by a Lloyds of London syndicate. Daniel R. Sullivan is the co-author of two books: Criminal Investigations Standards and Homicide Investigations.

Marvin G. Engquist retired as a Detective Supervisor after twenty five years of service with the Los Angeles Police Department. In his last assignment, he was responsible for the supervision of numerous high profile Homicide investigations in the City of Los Angeles. Marvin Engquist is a graduate of the FBI. National Academy. He has testified as an expert witness in Federal, State and County courts, and is recognized internationally as an expert in Major Case Death Investigation. Marvin Engquist is the author of California Criminal Evidence.

Wayne R. Lippert is a graduate of the U.S. Naval Academy, Annapolis. During his 4-1/2 year period he served on various small ships, including two tours on large minesweepers off the beaches of North Korea in that "forgotten war." As executive officer he qualified for command, and did take temporary command of a minesweeper when the captain was no longer able to do so.

After leaving the
military, Wayne Lippert continued his life long interest in military history. He expanded his interest further by going through the Sheriff's academy at the ripe age of 52. He then served the Los Angles Sheriff’s Department as a reserve deputy Sheriff for 14 years. This included time in patrol cars as well as doing horse patrols in the mountains. He later worked at the pistol range. He held the highest reserve classification for the State of California (Level One - Designated). He was certified by the National Rifle Association as a police firearms instructor. He was a practicing C.P.A. in California for over 30 years. Wayne Lippert is the author of Stay alive: How to street fight with a pistol.

According to Joseph J. Truncale, of the American Society of
Law Enforcement Officers, “The author is clearly at odds with the goals and objectives of competition shooting as compared to survival shooting. He feels that present police training does not focus enough on the type of shooting to survive on the streets. Police trainers who have the responsibility to provide their officers with realistic and practical methods to survive on the street will want a copy of this very informative manual.”

Police-Writers.com now hosts 817
police officers (representing 367 police departments) and their 1728 law enforcement books in six categories, there are also listings of United States federal law enforcement employees turned authors, international police officers who have written books and civilian police personnel who have written books.

Team Works to Defend Digital Battlefield in Europe

By Kristopher Joseph
Special to American Forces Press Service

Dec. 31, 2007 - In 1983, with the Cold War still going strong, a movie called "War Games" depicted an eccentric
computer hacker named David Lightman, played by Matthew Broderick. With dogged determination to play a military-generated "game" -- Global Thermonuclear War -- David managed to hack into the North American Aerospace Defense Command computer system and almost caused an actual nuclear war with the Soviet Union. "War Games" represented the tensions and anxieties of the ever-looming nuclear threat during the Cold War nuclear arms race. The global war on terrorism has replaced many threats of the Cold War. Many believe that in today's "information age" there are real David Lightmans who pose a cyber threat to military networks that could cause the loss of innocent lives unless something is done about them.

"We are taking a proactive approach to stop these 'hacktivists' from attacking our systems," said Robert Hembrook, deputy chief of intelligence for
United States Army Europe's 5th Signal Command here.

For the first time in the European
military theater, a cyber-threat intelligence cell has been created for the specific purpose of detecting, monitoring and combating malicious digital infiltrations on military computer networks, Hembrook said.

Cyber defense is implemented at the Department of Defense level and already was under way in the halls of U.S. European Command, in Stuttgart, but a fully developed and funded European theater-level cyber cell now is active within 5th Signal Command, Hembrook said.

The cell consists of three experienced intelligence and
computer experts whose jobs are to observe potentially harmful data passing from the Internet into friendly networks, identify patterns of attacks, analyze data, and advise the operators of the network so that they can take preventative action to ensure the safety and security of all systems in the European footprint.

"The fact is that there are people currently trying to break into our systems in an effort to obtain data or plant viruses that put servicemembers and their missions at risk," one of the cyber cell members said. "We simply cannot be vulnerable in this area."

The
military, along with most other organizations, relies more and more on the speed and capabilities of computer-based technology to give it an edge on the battlefield. This reliance also allows an extra avenue of attack for the enemy. "This cyber cell marks a change of approach in the intel world," a team member said. "We are already experts on predicting physical attacks from the enemy, but we never had a dedicated staff to predict and prevent virtual attacks at a theater level."

Besides combating threats from the outside, the cell is also involved with helping its
military users prevent "digital fratricide" from the inside. For work and morale purposes, DoD policy allows users filtered, monitored access to the World Wide Web on government computers. According to a cell member, this is to obtain business-related information and to visit non-work related sites as long as casual browsing does not affect getting missions accomplished.

"It's a delicate relationship of balancing functionality and security," a cell member said. "We know that many users can't do their job without computers and the Internet, so we look for ways to help protect them."

"Users need to know that Internet access is a privilege and not a right," one cyber cell member said.

The cell has taken another proactive step by leaving their offices and actively engaging and informing commanders and military communities of their findings as well as stressing the importance and relevance of the cyber battlefield.

Another cell member said that the team's audience is the
leadership in theater because they are the ones who can affect changes in how members of the DoD deal with and fight these cyber threats.

"We have had nothing but positive feedback from commanders," one cell member said. "They are taking our reports seriously, and more and more they are seeing that, if our data or systems get compromised or abused, threats to our systems can affect not only those sitting behind a desk, but also those on the front lines."

Since the 5th Signal Cyber Cell has shared its results to the intelligence community, other
military organizations are asking how they too can have a cyber cell to find their own digital landmines, team officials said.

"This (cyber cell) is unprecedented at this level," a cell member said. "I saw the need for this when I worked at the DoD level. Members of the cell believe that network-defensive measures should be implemented at all levels in the military because a computer's role is becoming just as vital as an M-16 rifle in terms of winning today's wars.

"As much as the
military trains its own on weapon safety, so we should be training them on computer and network safety," the cell member said. "That is where informing the leadership and giving them briefings becomes so vital."

In a 2006 interview for Defense Systems magazine, Tom Reardon, chief of the Intelligence Division for Network Enterprise Technology Command at Fort Huachuca, Ariz., had this to say about the level of importance
computer networks play in military operations: "Network-centric operations are how we prosecute war and sustain the warfighter. If an enemy can degrade or destroy that capability, the tide of the battle could easily be turned in their favor. Worse yet, if the enemy succeeds in denying our network-centric capability, our forces may not be able to deploy; we couldn't show up to seize or defend terrain or support an ally."

Today, the 5th Signal Cyber Threat Intelligence Cell team members are the U.S.
Army Europe warfighters in virtual trenches making sure the digital frontlines are defended.

"From an intel point of view, we've gone from 'patch the leaks' to 'build a better boat,'" Hembrook said.

(Kristopher Joseph is a public affairs specialist and editor of 5th Signal Command's biannual Echo magazine.)