by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : October 2015
GCN OCTOBER 2015 • GCN.COM 29 According to the Homeland Security Investigations agency, one in five girls and one in 10 boys in the United States will be sexually exploited before they reach adulthood. Protecting victims and catching offenders has been the focus of thousands of federal, state and lo- cal law enforcement agents. In 2011, the HSI Cyber Crimes Cen- ter’s Child Exploitation Investigations Unit (CEIU) created the National Child Victim Identification Program to identify and rescue child victims, apprehend offenders and locate crime scenes. The program included a Victim Identification Laboratory where seized images, videos, audio and metadata are analyzed, enhanced and clarified. Investigation of child pornography trafficking generates more data than many law enforcement agencies can process. In 2014, CEIU seized 5.2 petabytes of data, 52 percent of which involved child sexual exploitation. Unfortunately, much of it is inacces- sible because investigators lack stan- dard technologies to share data across the law enforcement community. To meet the challenge, in 2012 CEIU joined forces with officers from across the law enforcement communi- ty, including the International Centre for Missing and Exploited Children (ICMEC), to launch Project Vic and put the latest forensic tools to work sifting through evidence of victims of child pornography. Richard Brown, technology ad- vancement officer at ICMEC, said the primary goal of Project Vic was to get law enforcement “on the same page when it came to standardizing the way they exchanged data with each other and the services they need to access.” Tool providers had been using pro- FINDING CHILD VICTIMS IN A HAYSTACK OF FORENSIC IMAGES A DHS program uses the latest tools to identify victims of child sexual exploitation and pursue their traffickers AT A GLANCE PROJECT: Global Combat Support System-Army ORGANIZATION: Department of the Army A unified view into the contents of 40,000 logistics databases supports better tactical decisions on and off the battlefield. 154,000 end users in the Army, National Guard and Army Reserve. Using enterprise resource manage- ment software from SAP, the system seeks to offer commanders a composite view of logistical data to sharpen deci- sion-making on and off the battlefield. “For the first time, GCSS-Army is ty- ing in a logistics function for all associ- ated financial transactions into a single consolidated database,” said Lt. Col. Christopher Romero, product manager of GCSS-Army. By providing near-real-time informa- tion on cost and supplies, the system will enable commanders to build “a complete logistics picture where they can make sound tactical decisions, manage budgets effectively and en- hance their readiness,” he added. The goal is to have a unified view — “one version of the truth in real-time data,” Romero said — of the logistics status of Army units that is available anywhere, anytime. Those features will also eliminate the need to reconcile costs between the older systems — a benefit the Army estimates will save two hours a day for the average soldier working at a supply office. Furthermore, the system is a key component of the Army’s strategy to be financially auditable by the end of fiscal 2017. The Army has divided the massive transition into two waves. In Wave 1, expected to occur in fiscal 2016, the Army will switch out all Standard Army Retail Supply System and associated fi- nancial management systems. In Wave 2, the Army will replace the Property Book Unit Supply Enhanced and the Standard Army Maintenance System- Enhanced. In addition, the Army has mounted a significant program to educate users on the new system through simula- tions and other online exercises. The backbone of the initiative is a website that offers training materials on new applications and new terminology. Simply changing the term “requisition” to “purchase order” can affect business processes and users at all levels of the Army, Romero noted. “Soldiers are more tech savvy today,” he added, “but it’s critical they get informed about the program early, take the web-based training and provide stakeholders [with] feedback.” Army officials say the GCSS project is already beginning to pay for itself, primarily by avoiding the costs related to managing legacy logistics systems. Within the first years of full system deployment, the Army expects to save at least $8 billion in avoidable costs. — Paul McCloskey 1015gcn_020-038.indd 29 10/5/15 12:52 PM
January and February 2016