The Hendon Media Article Search System allows visitors to search online articles from any of our publications. Below is a list of articles matching your search criteria. Click on an article title to view the entire article.
By Jim Weiss
The Clearwater, Fla., PD’s SWAT team recently underwent training conducted by the NTOA designed to teach techniques and service options used in the planning and execution of high risk search and arrest warrants. Preplanning in detail and briefing personnel prior to deployment are crucial to this type of operation.
(This article was originally published in Tactical Response Jul/Aug 2011)
By Randy Means
In May 2011, the Supreme Court fi nally answered a question
that has troubled lower courts for years: May police
enter a house without a search warrant under the exigent
circumstances exception to the warrant requirement when police
decisions and conduct create the exigent circumstances?
(This article was originally published in Law and Order Jul 2011)
By Tim Burke
Technology keeps changing, and so must public safety agencies in order to keep up with it.
(This article was originally published in Public Safety IT Nov/Dec 2010)
By Stephen G. Serrao
Knowing the “rules of engagement” for information management before investing in technology for law enforcement is very important.
(This article was originally published in Public Safety IT Jul/Aug 2010)
By Audrey Fraizer
Janice Quintana knew the task ahead wouldn’t be easy. The director of the Office of Unified Communications (OUC) in Washington, D.C., said the majority of those answering and dispatching emergency calls at the Unified Communications Center (UCC) was skeptical when she announced another change was close down the road.
(This article was originally published in Public Safety IT May/Jun 2010)
By Brad Brewer
Law enforcement today is constantly dealing with shrinking budgets and resources while being asked to do more.
(This article was originally published in Public Safety IT Jan/Feb 2010)
Iowa DOT to launch GPS reference network
(This article was originally published in Public Safety IT Jan/Feb 2009)