How Cyber crime attacks and frauds affect UK crime reporting figures?

November 19, 2014 10:51 am

How would UK crime reporting figures be effected if all cyber crime attacks, frauds were actually reported? This is a very broad question and one that is probably worrying a lot of people. Especially those reporting crime statistics. According to […]

Cyber Crime Investigations within UK Law Enforcement – Observation

November 12, 2014 10:23 am

During the last 6 months it has become increasingly apparent that Cyber Crime will be the next battle ground for crime investigators. The inaugural ACPO Cyber Crime Conference in Nottingham suggested that Law Enforcement organisations are in a fire fighting […]

How to manage confidential informants in counter terrorism investigations

November 12, 2014 9:20 am

Following a few simple steps law enforcement agencies can ensure they manage Confidential Informants effectively and mitigate risks:   No confidential informant should ever be used unless their “activity” behaviour has been authorised at an appropriate level within the law […]

10 Golden Rules for Undercover Operations Management System

October 29, 2014 8:15 am

Undercover operations; more specifically the use of confidential informants are sometimes the only way that the activities of terrorist groups can be thwarted. The most difficult task then becomes that of creating a system where such activity can be monitored, regulated and […]

The Importance of Comprehensive Record Keeping among Narcotics Units

October 27, 2014 12:07 pm

Two Covington police officers will be suspended without pay after an investigation into the use of confidential informant funds found they violated several department policies, Chief Tim Lentz said. The case, reported by The Times-Picaynne in great New Orleans, is, of course, […]

Maximising Incident Management Data – The Power of Reporting

March 31, 2014 2:37 pm

All incidents provide a great opportunity for response and application of corrective actions. Any Security Strategy can be improved by collection and analysis of incident data. Modern Security Technology has significantly eased those efforts. Usually organizations use incident management systems […]

Effective Risk Management for Modern Threats

February 13, 2014 8:44 am

Increase in breaches is forcing risk management and security professionals to face increasingly sophisticated attacks as well as rigorous scrutiny on their controls and measures. Although each company is different, with unique priorities and needs, there are several risk management […]

Incident Response – Best Practice.

January 20, 2014 8:53 am

Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time […]

Best practices for compliance in an ever-changing regulatory landscape

January 16, 2014 9:51 am

By taking the proper steps to implementing a flexible system for regulation, organizations can not only improve processes, but can also stay ahead of the curve as compliance regulations continue to evolve. A recent Bank Tech report suggested tips for […]

Using confidential informants in buy/bust type investigations

January 13, 2014 2:10 pm

Whether it is Ohio or Washington law enforcement operations involving confidential informants in drug investigations always carry with them the risk that somehow, somewhere along the way something is going to go wrong that brings not only the particular case under investigation […]