Skip to main content

Technology/Computer Applications

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20131115-233911-DC

Submitted by Anonymous (not verified) on

Violation of victim rights, civil rights discrimination, family law court services of alameda county city of Oakland. Father 4children equal protection 14amendment due process. 10+ yrs local agencies fcs fvlu opd cps conflict state voc#A08-0908129. Father/victim forced to create victim advocacy group self help, no resources available. Work through DOJ 8+ yrs and FBI 3/10. Case#rf03095015 now confidential, no more family law in Oakland, still illegal practices and patterns of corrupt behavior. Contact justice dept and FBI as well as attorney general California.

20131107-181426-NM

Submitted by James Lah on

I am a new Chief of Police to this organization. I need assistance with statistically capturing our crime rates, and I also need assistance with planning and implementing a data driven organization. In essence, I need help with finding what our problems are, and then finding the hardware, software, and training so that we can effectively allocate our manpower.

20131104-93209-NJ

Submitted by Shaun Ali on

Our agency is is the process of implementing a resource deployment model, "Data Driven Approcahes to Crime and Traffic Safety" (DDACTS). This model relies heavily on crime analysis and intelligence led policing. We are requesting assistance for training and education in the crime analysis field,

20130923-121127-AZ

Submitted by James Lah on

We are beginning an upgrade of our computer-aided dispatch (CAD) and Mobile systems for the Mesa Police Dept (PD) and the Mesa Fire Dept (FD). Both the PD and FD use a shared CAD system. Because it's a shared system, a major issue we are having is trying to define, specifically, what needs to be done with the CAD/Mobile from a FBI CJIS Security perspective - i.e. what configuration, both software security and/or infrastructure, must be in place to meet CJIS Security compliance?

Subscribe to Technology/Computer Applications