Other names | APB, BOLO |
---|---|
Uses | Policing, politics |
Types | Computer, radio, paper |
An all-points bulletin (APB) is an electronic information broadcast sent from one sender to a group of recipients, to rapidly communicate an important message. [1] The technology used to send this broadcast has varied throughout time, and includes teletype, radio, computerized bulletin board systems (CBBS), and the Internet. [2]
The earliest known record of the all-points bulletin is when used by United States police, which dates the term to 1947. Although used in the field of policing at the time, the APB has had usage in fields such as politics, technology and science research. However, since the 21st century, due to advances in technology, all-points bulletins have become significantly less common and are now only primarily used by police departments in countries such as the United States, Canada, Australia and the United Kingdom.
The functionality of all-points bulletins was based on the latest advances in computer networking at the time, developed in the 1940s and continuing evolution through to the 1970s. Different from e-mail or teleconferencing, which are designed for a limited list of recipients, all-points bulletins were digital message "broadcast systems." [3] It is described that "each message placed on [an APB] is intended for a wide audience," and they were some of the first technologies which could do so in an efficient and effective manner. [3]
Users access these all-points bulletins "through terminals or microcomputers by dialling in over dedicated or general-purpose telecommunication lines." The APB then shows messages that will be readable for the users of the system, and in some systems, users are able to attach their own messages similar to a virtual bulletin board. [3] Consequently, messages would not only be able to be seen by the sender, but also by subsequent users of the digital bulletin system, who could also add their own information and messages to this bulletin. Users were thus able to build information upon one another, enabling discussion of ideas and information between individuals in society, despite using different computers in different locations. [2]
However, in regard to the technical functionality of the computerized bulletin systems, there is a lack of significant research on the technical construction and development of these terminals and computers. Thus, modern knowledge of the technicalities of these older all-points bulletin systems is restricted.
The modern technological evolution of the all-points bulletin is mainly only used in the world of policing. [4] Police officers will use computers, both at the police station and fitted in their vehicles, connected to a private police intranet, to access APBs. Other forms of media that perform similar functions to APBs include smartphone apps and internet web pages. [4] Besides in the field of policing, APBs are almost completely out of use in 21st century society. Due to the rapid evolution of the internet and other technology beginning in the early 2000s, the all-points bulletin is becoming an increasingly less useful method of communicating messages, and less information is being published about it.
In the field of policing, an all-points bulletin contains an important message about a suspect or item of interest, which officers may be in search for. They are primarily used for individuals who are classified as dangerous and for crimes of high priority. [1] In these fields, the APB may also be known as a BOLO, for "be on (the) look-out", and ATL, for "Attempt to Locate". [5]
In the "event the radio is not a viable means for transmitting data (i.e., radio traffic is busy)", the police officer will use the digital all-points bulletin. [6] The officer enters the same exact information into the mobile computer terminal. By doing this, they are able to make the message equivalent to a radio message, with the same codes. [7] This allows the same automated information to be gathered by other police officers who are receiving the bulletin.
In 1970, Farmville Police department in North Carolina, United States, reported about their implementation of the all-points bulletin (APB) system beginning in 1968. [1] If a stolen car was reported, officers would send out a radio broadcast to all patrol cars and to various other stations within a certain radius. In relatively short time, the message can be relayed around the state. However, after the introduction of the bulletin, the similar function can be done, but faster. Police can send out an APB that will reach thirteen states, through the use of teletype. [1] Officers also used the APB if they were required to notify individuals about the death of family members.
In 1973, in Oglala, South Dakota, two FBI agents and a Native American activist were killed. [8] "Five months after a firefight at Oglala, an all-points bulletin was issued by the Portland FBI for a motorhome and a station wagon carrying federal fugitives". The bulletin cautioned, "Do not stop, but advise FBI." Soon after the bulletin was released, the vehicles were located, and the fugitives were arrested. [8]
In 1967, Los Angeles County Road Department discovered parts of a human skeleton in the Angeles National Forest. [9] The department issued an all-points bulletin with a thorough description of the skeleton, using x-ray data and autopsy, which received numerous responses from various missing persons bureaus. From this, Police Department records showed that a person of similar description was reported to have disappeared on 19 March 1966. After several follow-ups with hospitals using x-rays and medical records, the remains were confirmed to be that person and the case was closed. [9]
The all-points bulletin was used months prior to the 9/11 attacks in the US with regards to terrorism. Prior to the 9/11 attacks, for 21 months, the CIA had identified "two terrorists" living in the United States. [10] After an all-points bulletin was later issued for the men on 23 August 2001 for the police to track the men, it was insufficient time for the police to track the men. [10]
In Australia, a similar, longer acronym for the all-points bulletin that is used by New South Wales and Victoria Police law enforcement is KALOF or KLO4 (for "keep a look-out for"). [4] Queensland used to use BOLF (be on the lookout for), and now, with Western Australia Police, use LOTBKF ('Look Out To Be Kept For'). [11] The United Kingdom uses a similar system known as the all-ports warning or APW, which circulates a suspect's description to airports, ports and international railway stations to detect an offender or suspect leaving the country. Due to the high numbers of commuters at such places, British police forces often use the all-points warning to contact specific airports, ports or stations and circulate descriptions individually using all-points bulletins. [4]
All-points bulletins have been used in politics, where users are able to leave messages, read messages left by others previously, and respond to others' messages. In 1986, the electronic all-points bulletins were being used by politicians as another means of communicating with voters. [2] Politicians would use APBs "to inform constituents about their recent activities and how they stand on selected issues", improving their "interactive capability" with the electorate. [2]
Additionally, APBs had functioning two-way communication systems, where voters were able to write messages back to the politicians via the computer keyboard. [2] This enabled voters to respond to politicians about their own stances on certain issues and to engage in digital discussions with one another and also the politicians. This ability to discuss ideas and politics without being in-person was previously not done before in political history.
Due to this and other "additional unique features", political APBs simply offered new abilities that platforms traditional media such as newspapers and televisions at the time could not and opened new doors for politicians. [12] However, overall access to political APBs was very limited, with CompuServe (leading digital APB provider) having 150,000 subscribers and the penetration rate for personal computers reached 14% in 1984. [12]
The phrase an "all-points bulletin" was used to describe the report of the sudden disappearance of cheatgrass near Winnemucca, Nevada in 2003. [13] That spring, a rangeland manager in the Winnemucca office of the Bureau of Land Management noticed that large areas usually covered by cheatgrass were bare. [13] A local rancher helped Cindy Salo, PhD identify an outbreak of army cutworms as the most likely cause of the cheatgrass disappearance in Nevada. [13] Salo's findings allowed her to predict a similar army cutworm outbreak in northwest Nevada and southwest Idaho in 2014. [14]
In search of a gene linked to a poorly known bone disease known as fibrodysplasia ossificans progressiva (FOP), scientist Frederick Kaplan issued an internet-based all-points bulletin to doctors worldwide asking for any families with FOP to go to him for study. [15] He did this via online articles and electronic mail. In response to the bulletin, Kaplan and his team were able to obtain 50 willing patients to run their experimentation with. Eventually, he and his team were in fact able to identify the gene responsible, known as the ACVR1 mutation. [15] This would go on to allow deeper research about the disease, and potentially allow for the development of a treatment for the disease.
In May 2010, Scientific American medical editor Christine Soares proposed that a "modern all-points bulletin" may take the shape of what is known as forensic profiling. This technology would allow police detectives to describe a suspect's pigmentation, ancestry, and likelihood of being obese, a smoker, or an alcoholic. [16] Far beyond using DNA "fingerprints" to link an individual to a crime scene, it would enhance police ability to develop sketches of unknown persons by reading traits inscribed in their DNA. [16] In 2020, established Harvard professor Jonathan Zittrain published speculations about future evolution of the all-points bulletin. Zittrain argues that in the future, the act of sending out an all-points bulletin will take the form of "asking millions of distributed scanners to check for a particular identity and summon police if found". [17]
A bulletin board system (BBS), also called a computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user performs functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users through public message boards and sometimes via direct chatting. In the early 1980s, message networks such as FidoNet were developed to provide services such as NetMail, which is similar to internet-based email.
Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.
Instant messaging (IM) technology is a type of synchronous computer-mediated communication involving the immediate (real-time) transmission of messages between two or more parties over the Internet or another computer network. Originally involving simple text message exchanges, modern IM applications and services tend to also feature the exchange of multimedia, emojis, file transfer, VoIP, and video chat capabilities.
A virtual community is a social work of individuals who connect through specific social media, potentially crossing geographical and political boundaries in order to pursue mutual interests or goals. Some of the most pervasive virtual communities are online communities operating under social networking services.
Jonathan L. Zittrain is an American professor of Internet law and the George Bemis Professor of International Law at Harvard Law School. He is also a professor at the Harvard Kennedy School, a professor of computer science at the Harvard School of Engineering and Applied Sciences, and co-founder and director of the Berkman Klein Center for Internet & Society. Previously, Zittrain was Professor of Internet Governance and Regulation at the Oxford Internet Institute of the University of Oxford and visiting professor at the New York University School of Law and Stanford Law School. He is the author of The Future of the Internet and How to Stop It as well as co-editor of the books, Access Denied, Access Controlled, and Access Contested.
Social software, also known as social apps or social platform includes communications and interactive tools that are often based on the Internet. Communication tools typically handle capturing, storing and presenting communication, usually written but increasingly including audio and video as well. Interactive tools handle mediated interactions between a pair or group of users. They focus on establishing and maintaining a connection among users, facilitating the mechanics of conversation and talk. Social software generally refers to software that makes collaborative behaviour, the organisation and moulding of communities, self-expression, social interaction and feedback possible for individuals. Another element of the existing definition of social software is that it allows for the structured mediation of opinion between people, in a centralized or self-regulating manner. The most improved area for social software is that Web 2.0 applications can all promote co-operation between people and the creation of online communities more than ever before. The opportunities offered by social software are instant connections and opportunities to learn. An additional defining feature of social software is that apart from interaction and collaboration, it aggregates the collective behaviour of its users, allowing not only crowds to learn from an individual but individuals to learn from the crowds as well. Hence, the interactions enabled by social software can be one-to-one, one-to-many, or many-to-many.
An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporarily archived. Also, depending on the access level of a user or the forum set-up, a posted message might need to be approved by a moderator before it becomes publicly visible.
An online service provider (OSP) can, for example, be an Internet service provider, an email provider, a news provider (press), an entertainment provider, a search engine, an e-commerce site, an online banking site, a health site, an official government site, social media, a wiki, or a Usenet newsgroup.
Electronic civil disobedience can refer to any type of civil disobedience in which the participants use information technology to carry out their actions. Electronic civil disobedience often involves computers and the Internet and may also be known as hacktivism. The term "electronic civil disobedience" was coined in the critical writings of Critical Art Ensemble (CAE), a collective of tactical media artists and practitioners, in their seminal 1996 text, Electronic Civil Disobedience: And Other Unpopular Ideas. Electronic civil disobedience seeks to continue the practices of nonviolent-yet-disruptive protest originally pioneered by American poet Henry David Thoreau, who in 1848 published Civil Disobedience.
In computer and telecommunications networks, presence information is a status indicator that conveys ability and willingness of a potential communication partner—for example a user—
APB is a video game released in arcades by Atari Games in 1987. The player assumes the role of "Officer Bob," a rookie police officer. As Bob, players drive around the city, ticketing motorists for minor infractions and pulling over more serious offenders. Eventually, players must apprehend criminals for which an all-points bulletin has been called.
Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software.
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.
Social computing is an area of computer science that is concerned with the intersection of social behavior and computational systems. It is based on creating or recreating social conventions and social contexts through the use of software and technology. Thus, blogs, email, instant messaging, social network services, wikis, social bookmarking and other instances of what is often called social software illustrate ideas from social computing.
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international network of investigators, to determine the extent and nature of government-run internet filtering programs. Participating academic institutions included the Citizen Lab at the Munk Centre for International Studies, University of Toronto; Berkman Center for Internet & Society at Harvard Law School; the Oxford Internet Institute (OII) at University of Oxford; and, The SecDev Group, which took over from the Advanced Network Research Group at the Cambridge Security Programme, University of Cambridge.
The army cutworm is the immature form of Euxoa auxiliaris. The adult moth is called a "miller moth" because of the fine scales on its wings that rub off easily and remind people of the dusty flour that covers the clothing of a miller.
Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders, and it provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e-mail are that confidential and authenticated exchanges can be started immediately by any internet user worldwide since there is no requirement to install any software nor to obtain or to distribute cryptographic keys beforehand. Secure messages provide non-repudiation as the recipients are personally identified and transactions are logged by the secure email platform.
CONFER is one of the first computer conferencing systems. Highly sophisticated for its time, it was developed in 1975 at the University of Michigan by then graduate student Robert Parnes. The CONFER system continued to be a widely used communication tool until 1999. CONFER is the progenitor of the computer conferencing systems Caucus, PicoSpan, and YAPP.
Information technology (IT) is a set of related fields that encompass computer systems, software, programming languages, and data and information processing, and storage. IT forms part of information and communications technology (ICT). An information technology system is generally an information system, a communications system, or, more specifically speaking, a computer system — including all hardware, software, and peripheral equipment — operated by a limited group of IT users, and an IT project usually refers to the commissioning and implementation of an IT system. IT systems play a vital role in facilitating efficient data management, enhancing communication networks, and supporting organizational processes across various industries. Successful IT projects require meticulous planning, seamless integration, and ongoing maintenance to ensure optimal functionality and alignment with organizational objectives.
The history of email entails an evolving set of technologies and standards that culminated in the email systems in use today.
See also various Queensland Government Hansard reports