What’s New

Cybercrime Blog

Who Has Access to Your Smart Home?

In today’s modern tech world, homes are evolving every day, accommodating more technological advances to meet consumer demands. Any device that can be plugged into a wall outlet can be added to a controlled home network.

Click Here to Read Blog

Wearable Devices: Are They Secure?

Wearable devices like smart watches, fitness tracking bands, smart glasses and hands free headsets have become easy to sync with smartphones and other devices and applications to help users feel more organized, connected and up-to-date. However, the increasing amount of personal information that wearables contain poses a significant security risk.

Click Here to Read Blog

Business Email Compromise: A Growing Threat to American Businesses

As technology advances, threats related to cybersecurity grow. According to the FBI, as of 2017 there have been 15,690 recorded reports of business related email compromise (BEC). This growing problem has cost American businesses $675 million, not to mention the security violations these compromises have caused. This is an alarming increase from 2016’s total of $360 million.

Click Here to Read Blog

New Products

Starting a CyberCrime Unit: Key Considerations for Police Chiefs

Nearly every crime has a digital component. As such, police leaders are under increased pressure to dedicate resources to combat cyber-enabled crime. The purpose of this document is to offer law enforcement executives key considerations for establishing a cybercrime unit, including: scope, recruitment/staffing, inter-agency partnerships, training, and funding.

 

 

 

 

 

Body-Worn Cameras a Decade Later: What we Know

Ten years ago, body-worn cameras (BWCs) were still very much an emerging technology. With one notable exception, the Oakland (CA) Police Department, very few law enforcement agencies — and virtually none from large U.S. cities — deployed BWCs, and even fewer had strong written policies in place to govern the use of this potentially powerful tool. In 2013, PERF, with support from the U.S. Department of Justice’s Office of Community Oriented Policing Services (COPS Office), conducted an in-depth examination of the use of BWCs in police agencies across the country.

 

 

 

Cybercrime: What can a Governor do?

The National Governors Association (NGA) and their Meet the Threat initiative have created strategies for strengthening cybersecurity practices to connect policy leaders from every state with private-sector experts and federal partners to highlight innovative practices and identify ways state-driven solutions can be replicated nationwide.

This document discuss the ongoing challenges for cybercrime enforcement and provides recommendations for Governors incorporate into their states.

 

 

 

Community Engagement Strategies for State, Local, Tribal, and Territorial Law Enforcement Unmanned Aircraft System Programs

The Police Executive Research Forum (PERF), with support from the U.S. Department of Justice (DOJ) Office of Community Oriented Policing Services (COPS Office) and in consultation with the State, Local, Tribal and Territorial (SLTT) Unmanned Aircraft Systems (UAS) Working Group,3 developed this guide to assist public safety agencies in building an outreach strategy for engaging the community when considering a UAS (drone) program. This guide serves as a companion piece to our earlier publication, Roadmap to Implementing an Effective Unmanned Aircraft System (UAS) Program, 4 an eight-step guide to planning a drone program.

 

 

 

 

Bitcoin and Cryptocurrencies – Law Enforcement Investigative Guide

This investigative guide developed the Regional Organized Crime Information Center (ROCIC) will provide law enforcement with the real facts of bitcoin, what it is, how criminals are using it.

 

 

 

 

 

The emergence of the cloud has presented unique challenges to many actors across the criminal justice system. The purpose of this document is to discuss the inherent challenges of obtaining data stored on cloud-based platforms, followed by resources for navigating them.

 

 

 

 

 

With the proliferation of digital devices and platforms for internet-enabled communication, technology companies are often the gatekeepers of all electronic data. This document talks about how U.S. law enforcement agencies can secure overseas data through the MLAT process.

 

 

 

 

 


Cybersecurity Awareness Training

This paper is designed to casually explain common vulnerabilities and initial steps to proactively protect an agencies infrastructure.

Click here to view the entire document.