skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 212434 
Title: Securing Law Enforcement Computer Systems (SLECS)
Corporate Author: International Assoc of Chiefs of Police
United States of America

National White Collar Crime Ctr
United States of America
Date Published: 2003
Page Count: 0
Sponsoring Agency: Bureau of Justice Assistance
Washington, DC 20531
International Assoc of Chiefs of Police
Alexandria, VA 22314
National White Collar Crime Ctr
Glen Allen, VA 23060
Sale Source: National White Collar Crime Ctr
10900 Nuckols Road, Suite 325
Glen Allen, VA 23060
United States of America
Type: Issue Overview
Format: CD-ROM
Language: English
Country: United States of America
Annotation: This CD-ROM provides guidance to State and local law enforcement executives and managers on protecting their information systems from security breaches.
Abstract: Recent data suggests that State and local law enforcement agencies are lagging behind on safeguarding vital information systems from technological breaches. Due to increased concerns over information security, the National White Collar Crime Center (NW3C) designed this CD-ROM presentation in cooperation with the International Association of Chiefs of Police (IACP) to educate non-technical individuals on the importance of having multiple layers of security to protect law enforcement information systems and networks. The presentation is divided into five segments with each segment presenting a hypothetical case in which fictional Chief Hugh Wilson must answer to computer security breaches that have caused varying amounts of damage to the police agency. The five security breaches involve: (1) a police sergeant who was killed following the theft of a police laptop computer; (2) a pornographic site operating on the police department’s internal computer network; (3) the entire computer network for the city being shut down by hackers, rendering police files inaccessible; (4) the destruction of vital police files including criminal histories and evidence log files; and (5) the injection of pictures of Porky Pig into police computer files. Following each fictional scenario, a list of best practices are presented that would have helped stop the security breaches from occurring. These best practices range from installing and configuring firewalls to implementing and enforcing user policies. The CD-ROM also contains a resource section that identifies low-cost methods of computer security that most police agencies can immediately implement.
Main Term(s): Computer privacy and security; Police information systems
Index Term(s): Local criminal justice systems; Security systems; State police
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.