Skip to main content

Fwd: [CSSAMSU] Understanding ???unmarked police cars???

---------- Forwarded message ----------
From: Jerry McAllister <jerrymc@msu.edu>
Date: Thu, Oct 13, 2011 at 2:08 PM
Subject: Re: [CSSAMSU] Understanding ???unmarked police cars???
To: CSSAMSU@list.msu.edu


On Thu, Oct 13, 2011 at 10:04:37AM -0400, Shuang Zhou wrote:

Hi Shuang,

> Thanks for the info.  Share something from the internet.  It could be
> wrong, but if an unmarked car is trying to stop you and you are not
> sure if it is a real police car, keep driving slowing, but do not
> stop amd call 911  to confirm if there is any police officer patroling
> in that areaa. This info could be wrong, please use caution.

Many personal safety experts recommend doing this, but I do not think
there is any police official policy that accepts this action.  If there
is, then it is fairly new.

As for unmarked cars, there are various ways to be unmarked.  Some just
do not have the obvious lights on top.  Others do not have the lights
or any markings on the side or rear.   In Michigan, most police cars
have the state owned license plate which has an 'X' in the middle of
the number, but an unmarked car may or may not have this.

A few years ago some people tried to fight tickets in court if they
were stopped by an unmarked car, but I think this has been finally
a lost cause.   I am not sure, though.

The main point is that you should drive safely and carefully regardless
of the way cars are marked or decorated.

////jerry


>
> ???????????? iPad
>
> ??? 2011-10-13???0:36???Calvin Sun <csun@CALVINSUN.COM> ?????????
>
> > ????????????
> >
> > This note discusses the practice, by police departments in the United
> > States, of using ???unmarked cars.???  I am sorry, but I cannot find a
> > translation for this phrase.  I tried some terms of my own, but my friends
> > laughed when they read it, so I think these terms are wrong lol:  ???????????????
> > ??? and ??????????????????.???
> >
> > In any event, an unmarked police car looks like any other car, for example
> > one that you or I would drive.  That is, such a car, even though driven by a
> > police officer, will not have any special exterior light fixtures, colors or
> > markings.  In particular, it will not have the word ???police??? written on
> > the car.
> >
> > This practice is important to you in two respects.  First, of course, you
> > should be careful at all times when driving, because the ???ordinary??? car in
> > your vicinity might be a police car, and that car could stop you if you are
> > breaking any traffic laws.  In such a case, depending on the violation and
> > other factors, you possibly might have immigration issues as a result.
> >
> > Second, for your own safety, you should know how to tell that such a car is
> > really a police car, not an impostor, ??????????????????????????????.  The things I am
> > about to mention are true for many police departments, but not necessarily
> > all departments, and not necessarily for the police department that serves
> > the area where you are.  Police departments can have different policies if
> > they are in different states, or even if they are within the same state or
> > the same county (or parish, in Louisiana).
> >
> > With regard to the use of unmarked cars, many departments have the following
> > policies:
> >
> > -          The officer most likely will be in full uniform.
> >
> > -          The department might use such cars only during daylight, not at
> > night
> >
> > -          The department might deliberately NOT use such cars for traffic
> > stops. I have heard that the Los Angeles Police Department follows this
> > policy, but have not confirmed it.  However, local police in the
> > Philadelphia area DO make traffic stops using unmarked cars.
> >
> > -          An unmarked police car will most likely have MANY lights, mounted
> > inside the car, and usually red, blue and white.  In addition, the
> > headlights might be designed to blink alternately.  In other words, the car
> > probably will not have only one single flashing light, but probably instead
> > will look like the Rockefeller Center Christmas tree lol.
> > www.rockefellercenter.com/tour-and-explore/the-tree-at-rockefeller-center/
> >
> > I hope this information helps.
> >
> > Calvin Sun
> >
> > 610-296-3947
> >
> > csun@calvinsun.com
> >
> > www.calvinsun.com
> >
> > ??????17:15
> >
> >
> > ================================================================
> > To Subscribe or Unsubscribe CSSAMSU mailing list, please go to:
> >
> >     http://list.msu.edu/archives/cssamsu.html
> >
> > Click "Join or leave the list". For further assistance, please
> > contact Jerry McAllister jerrymc@msu.edu
> > ================================================================
>
> ================================================================
> To Subscribe or Unsubscribe CSSAMSU mailing list, please go to:
>
>      http://list.msu.edu/archives/cssamsu.html
>
> Click "Join or leave the list". For further assistance, please
> contact Jerry McAllister jerrymc@msu.edu
> ================================================================
>

================================================================
To Subscribe or Unsubscribe CSSAMSU mailing list, please go to:

    http://list.msu.edu/archives/cssamsu.html

Click "Join or leave the list". For further assistance, please
contact Jerry McAllister jerrymc@msu.edu
================================================================

Comments

Popular posts from this blog

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k