Security Assessment Unit 2 Ip

  • 804 views
Uploaded on

A security Assessment of the local police department’s incident reaction capability will be presented here in this article. In this discussion you can see the focus on the department’s lack of …

A security Assessment of the local police department’s incident reaction capability will be presented here in this article. In this discussion you can see the focus on the department’s lack of technology integration at street level officer. This article will include a draft of an excerpt for the security assessment which will provide examples of recent developments which will help the department’s patrol officers to communicate better and perform their required job in the field. An explanation of the ever shrinking size of computers and digital radio technologies could possibly improve officer and public safety will also be evident. The thesis for this article is “There is no security on this earth. Only opportunity” (Macarthur, 1995-2009)

More in: Business , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
804
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
26
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Running Head: SECURITY ASSESSMENT INCIDENT REACTION CAPABILITY<br />Communications Network<br />Carla J. McCoy<br />Unit 2 Individual Projects – CRJ216<br />May 22st, 2009<br />American InterContinental University <br />Abstract<br />A security Assessment of the local police department’s incident reaction capability will be presented here in this article. In this discussion you can see the focus on the department’s lack of technology integration at street level officer. This article will include a draft of an excerpt for the security assessment which will provide examples of recent developments which will help the department’s patrol officers to communicate better and perform their required job in the field. An explanation of the ever shrinking size of computers and digital radio technologies could possibly improve officer and public safety will also be evident. The thesis for this article is “There is no security on this earth. Only opportunity” (Macarthur, 1995-2009)<br />Introduction<br />It’s true that there really is no security on this earth. Opportunity is abundant though which is evident when it comes to technology and how fast it changes. Opportunity will allow police officers and agencies to be able to update and upgrade their equipment where they can better assist the community and one another as well. There is a lack of Technology Integration as well which need to be reviewed where technology is concerned. This is a constant research that needs to be evident in order to provide each law enforcement agency to be able to keep state of the art equipment that is needed to perform their field of work. Communication between officers is a very important thing and very sensitive and confidential so keeping updated equipment is important and each officer should be trained in those areas when the equipment becomes available for them to use. <br />Lack of Technology Integration<br />There are agencies that lack information regarding identifying a successful technology integration strategy and the acquisition process as well. Technology Acquisition is very costly which will normally call for all departments to explore their needs in order for them to avoid making ill-advised decisions when it comes to expensive individual technologies. There must be long and short term strategies prior to making decisions in this case. Once they prioritize then they are faced or rather challenged with the task of technology management such as procedures, certification, policies, protocols, and training in order to ensure the appropriate use of new tools. One project that a department can use would be by realizing that with limited financial resources that they can implement unsuccessful technology within the project. There are normally very rapid changes in technology and if you combine that with law enforcement agencies that are in need of guidance and assistance then you’ve created a formidable demand for an increased technical assistance. (Brandon, 2006)<br />There is always additional technical assistance that is needed among the entire law enforcement community. Let’s take the (IACP) for example. The International Association of Chiefs of Police and conjoin that with the COPS office has created the (TTAP) which is the nationwide Technology Technical Assistance Program. What this does is help agencies in making comprehensive assessments of their own technology needs. Some good future TTAP deliverables include items such as TechBytes which is a series of news bulletins which will be made to law enforcement executives nationwide by using the IACP Website http://www.iacptechnology.org Very concise updates on the issues of current technology that is related to the law enforcement agencies or community will be made available. Another deliverable will be Technology Leadership Academies which is basically Five technology training academies that will be delivered across the country to aid or help law enforcement be able to have the capability to acquire, plan, and manage technology. Another deliverable will be a Regional Technology Mentor List which is basically a List of technology mentors that will be combined with technology leadership academies. This will be made to law enforcement executives anytime there are issues or questions that may arise. (Brandon, 2006) <br />Digital Radio<br />When considering the 700 MHz band this is specifically set aside for much more modern radio systems that require a digital technology with high spectrum efficiency. Anytime you are dealing with Digital technology it will always have several advantages over analog. Digital signals are more efficient, which also allows more users over the same bandwidth and have better voice quality among being computer code which uses encryption and an increased security inherent capability. Through software programming in the radio the digital transmissions can be very easily encrypted when using simple encoding, and in decoding the bits and bytes. In considering whether or not it’s text, voice, or full motion video data is data which makes it easier and allows for one communication system rather than two redundant expensive systems. (National Task Force on Interoperability, 2005) Now let’s take a look at three various types of Radio Frequency Systems which can either be privately owned or commercially owned. When you are looking at a simple voice radio system then everyone can transmit and receive the information within a single channel or frequency. For police officers this means that they cannot use the radio until the dispatcher has finished transmitting the message. This type of system is called simplex systems which include various drawbacks. Some drawbacks would include where if one user was simply trying to convey a message that was a nonemergency while at the same time another user is trying to convey an emergency then these are both compromised by the emergency information that is not able to be received or ends up garbled which is something that is only partially received or not understood properly because of the radio frequency. (Foster, 2005)<br />Things that can cause this type of interference would be a malfunction, an outside interference, a skipped transmission or the attempt of two users trying to broadcast among a simplex system at the same time. One big disadvantage to any police agency in using simple voice systems is that outside users that enjoy listening to police radio traffic. This becomes a problem because police are often broadcasting sensitive and very confidential information. Now let’s take a look at a trunked radio system which is mainly used for a larger police station or agency that uses larger spectrum efficiency because they use all frequencies. If there are twenty field users for example among a repeated voice system then an allocation of a particular channel to each beat may be chosen. There is a microprocessor that will look at the other frequencies available and make a decision as to which one or ones that are not being used which then sends a message back to the police officers which informs every other officer which frequency the officer is about to use. This normally happens so fast that even if there are an open frequency the users does not experience delay when pressing a microphone button or talking. What this does is act like a telephone trunk system that opens up all frequencies to be used by all groups involved. This system requires hardware and software that are very complex. Law Enforcement is constantly looking for and relying on computers to enhance field operations. (Foster, 2005)<br />Let’s mention the (FDMA) Frequency Division Multiple Access system as well. This device has a radio frequency of 30 kHz and is divided into three channels which are 10 kHz wide. Using this system benefits police agencies three fold and increase the number of frequencies that can be used in combination with their trunked radio systems. Let’s also take a look at cellular telephones which are evident among many people today. Let’s take a look at the year 2002 when there were just over sixteen million cellular telephone users in the United States alone and there were over 140 million subscribers of cellular service as well by December of 2002. Cellular telephones have an array between two and six directional antennas. Anytime someone refers to their own cellular phone as being cloned then what they are actually saying is that there is electronic equipment that is monitored that is sending to the cellular telephone it’s ESN to the cell site. A cloning of the ESN is actually the essence of cellular telephone fraud. (Foster, 2005)<br />Conclusion<br />There are so many people in this world that love security and love being able to outsmart the basic computer system no matter which area its’ in. Opportunity in technology will allow challenges to these types of people and make it harder for them to outsmart systems of this sort, although computers are pretty easy to figure out if they are in the right frame of mine. However law enforcement needs to stay updated and keep an open communication line with one another and be able to respond to situations when the community needs them to. Training is a very important part of this process where law enforcement is concerned because these officers need to stay updated and on track with technology because it’s always moving very fast. Let’s just remember that no matter what type of security in technology that is ever offered that there is always going to be someone out there who can and will eventually outsmart that security. Opportunity is always available with technology and is constantly changing which is a good thing not only for law enforcement, but for the community as well. <br />References<br />Brandon, N., (2006) IACP Technology Technical Assistance Program (TTAP) Update<br /> Technology Talk also presented by The Police Chief, vol. 73, no. 11 in 2006. Retrieved on May 23rd, 2009 from: http://policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1045&issue_id=112006<br />Foster, R., (2005) Chapter Three Wireless Communications eBook from Communications<br /> Network Prentice Hall, Unit 2 Individual Project Assignment CRJ216-0902A-02 with Professor Makin, retrieved on May 23rd, 2009 from: https://mycampus.aiu-online.com<br /> <br />Macarthur, D., (1995-2009) Security Quotes Wisdom Quotes retrieved on May 23rd, 2009 from: <br />http://www.wisdomquotes.com/cat_security.html<br />National Task Force on Interoperability, (2005) Why Can’t We Talk? Working Together to<br /> Bridge the Communications Gap to Save Lives retrieved on May 23rd, 2009 from: http://www.fcc.gov/pshs/docs-basic/ntfi-interoperability0205.pdf<br />