scholarly journals Law Enforcement Fusion Centers: Cultivating an Information Sharing Environment while Safeguarding Privacy

2016 ◽  
Vol 32 (1) ◽  
pp. 11-27 ◽  
Author(s):  
Jeremy G. Carter ◽  
David L. Carter ◽  
Steve Chermak ◽  
Edmund McGarrell
Author(s):  
Cody Minks ◽  
Anke Richter

AbstractObjectiveResponding to large-scale public health emergencies relies heavily on planning and collaboration between law enforcement and public health officials. This study examines the current level of information sharing and integration between these domains by measuring the inclusion of public health in the law enforcement functions of fusion centers.MethodsSurvey of all fusion centers, with a 29.9% response rate.ResultsOnly one of the 23 responding fusion centers had true public health inclusion, a decrease from research conducted in 2007. Information sharing is primarily limited to information flowing out of the fusion center, with little public health information coming in. Most of the collaboration is done on a personal, informal, ad-hoc basis. There remains a large misunderstanding of roles, capabilities, and regulations by all parties (fusion centers and public health). The majority of the parties appear to be willing to work together, but there but there is no forward momentum to make these desires a reality. Funding and staffing issues seem to be the limiting factor for integration.ConclusionThese problems need to be urgently addressed to increase public health preparedness and enable a decisive and beneficial response to public health emergencies involving a homeland security response.


2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Michael A. Hansen ◽  
John C. Navarro ◽  
Sierra A. Malvitz

PurposeThe purpose of this study is to explore the availability of information on law enforcement websites in the state of Wisconsin.Design/methodology/approachThe study conducted a content analysis of all 179 county and municipal local law enforcement agency websites within Wisconsin. The authors then implemented a comparative analysis that explored whether the quantity and quality of information available on law enforcement websites are similar to those of local governments and school districts. The authors then estimated models to test whether there is a relationship between the population size served and gender distribution of law enforcement departments to the availability of information on law enforcement websites.FindingsLaw enforcement websites contain a noticeable lack of information. The finding is even more apparent when comparing law enforcement websites to the websites of local governments and school districts. Finally, the authors show a positive link between information sharing on law enforcement websites and the proportion of the civilian staff at an agency that are women.Originality/valuePast studies that reviewed the make-up of law enforcement websites analyzed large law enforcement departments rather than local law enforcement departments, which notably represent the majority of most law enforcement departments. The authors also explicitly demonstrate that the commitment to information sharing is lagging within law enforcement websites compared to local-level governments. Future scholarship and law enforcement departments may benefit from exploring the employment of female civilians.


2013 ◽  
Vol 4 (3) ◽  
pp. 1-14 ◽  
Author(s):  
Priscilla M. Regan ◽  
Torin Monahan

Decentralized organizational approaches to security provision introduce new challenges for controlling information-sharing practices, safeguarding civil liberties, and ensuring accountability. Department of Homeland Security “fusion centers,” and the multiple organizations and databases that are part of fusion centers, engender an environment in which information is migrating beyond original purposes of counterterrorism. Indeed, based on intensive qualitative research, the authors have found that fusion centers that were originally oriented toward “counterterrorism” have quickly broadened their scope to include all crimes, and those that began as “all crimes” have migrated only marginally to terrorism. This is the result of three quite predictable factors: fusion centers have to be valuable to their states, there is too little activity that is clearly terrorism related, and fusion center personnel have to use their time and skills constructively. Nonetheless, even if local policing needs are met through fusion-center funding and support, many of the activities of fusion-center analysts lend themselves to mission creep and violations of civil liberties.


Author(s):  
Darryl Plecas ◽  
Amanda V. McCormick ◽  
Jason Levine ◽  
Patrick Neal ◽  
Irwin M. Cohen

2007 ◽  
Vol 5 (5) ◽  
pp. 55 ◽  
Author(s):  
Lili Yang, PhD, MSc, BSc, MBCS, CITP

Emergency response to any man-made or natural disasters involves different organizations—such as fire and rescue service, emergency medical services, law enforcement (police forces), and responders from other governmental and nongovernmental organizations. Information sharing and management among these responding organizations is essential for the success of the emergency responses, not only during a disaster but also before and after the disaster. Information sharing among different organizations cannot occur overnight and must be in place before a disaster occurs, be able to be easily used during the disaster, and be maintained after the disaster. In this article, information sharing requirements and features for emergency response are discussed before an information sharing infrastructure is proposed. It is particularly expected to enable the response organizations to efficiently communicate with each other in the charged and high-pressure atmosphere of an on-going disaster response. On-site information collection is suggested to be carried out through wireless sensor networks (WSN) and radio frequency identification (RFID). The key technologies for securing information sharing in emergency response management are identified. Our ongoing project SafetyNET is described to illustrate the implementation of the information sharing system.


2020 ◽  
Vol 25 (4) ◽  
pp. 307-316
Author(s):  
András Toth

AbstractOne of the essential prerequisites for an efficient and effective organisation in our information society is the timely provision of information to the entitled person or persons. This is particularly important in the public, economic and business sphere, in public administration, law enforcement agencies and military operations as well. The information must always be available in the right place, at the right time, in the required quantity, quality and format, in order to gain and maintain the information superiority. This paper aims to analyse and present the methods of information sharing among different classified and non-classified systems and networks, their proposed areas of application, the security measures required for their safe implementation, and the risks and issues arising from their use. In this part of the article, the author analysed the different international security management procedures, the possible threats, vulnerabilities and solutions to create the most effective information-sharing environment.


Author(s):  
Asli Yagmur Akbulut ◽  
Jaideep Motwani

Citizens around the globe are demanding better services and more responsiveness from their local, state, and national governments. Governments are responding to this challenge by implementing a vast range of information technologies (IT) that crosses departmental and organizational boundaries. Integration and information sharing among government agencies have the potential to increase the productivity and performance of government operations, improve policy-making, and provide better services to citizens (Akbulut, 2003; Dawes, 1996; Landsbergen & Wolken, 2001). For example, September 11, 2001 terrorist-related events have shown the importance of integration and information sharing among federal, state, and local law enforcement agencies in order to protect the safety of citizens by combating crime and terrorism. As Whiting and Chabrow (2001) pointed out, “The intelligence gaps among law enforcement agencies became obvious in the aftermath of the terrorist attacks. Two of the suspected hijackers, for example, reportedly were on an INS watch list. But that information never found its way to the Federal Aviation Administration…” (p. 2). As the investigation into these attacks continues, the Federal Bureau of Investigation, Customs Service, the INS, the Central Intelligence Agency, the National Security Agency, as well as other law enforcement and intelligence agencies are trying to share information on an extraordinary scale.


Sign in / Sign up

Export Citation Format

Share Document