Browsing All Posts filed under »Commercial Intelligence«

A New Hope…

December 24, 2013 by

0

Dave Aitel has graciously allowed us to run his commentaries before – see Hackers May Help Choose The Next US President and Aitel On Cyberwar. Dave is the founder and Chief [Security|technology|executive][1] Officer of Immunity, Inc, and runs the Daily Dave mailing list, where this article was originally published. It is re-published here with his kind permission. So […]

To Whom the 4th Amendment Doesn’t Apply

June 9, 2013 by

6

Guest blogger Chris Swan contributed this from the UK. Chris is Chief Technology Officer of CohesiveFT, where he focuses on product development and product delivery. After a decade as a Combat Systems Officer in the Royal Navy, Chris moved to the financial services industry where over the last 12 years he was an engineer, architect, […]

Strikeback! Commission on IP Theft Report Gets All Ronin On China

May 23, 2013 by

0

A bipartisan group that studies the effects and impacts of IP theft in the US, The Commission on the Theft of American Intellectual Property, has released a report outlining their findings on the scope of the issue and making policy recommendations to combat it. The most interesting proposal among several: strikeback to re-capture stolen IP […]

CBKB Nominated for Innovating Justice Award

September 24, 2012 by

0

This morning I saw that the folks over at the Cost-Benefit Knowledge Bank for Criminal Justice (CBKB) have been nominated for an Innovating Justice Award. Before I talk about the IJA, let me just mention that the work done by the CBKB is absolutely essential to law enforcement agencies across the United States (they’ve also […]

Cyber-Criminal OPSEC – a Three-Part Series. Part III: TTTP

June 15, 2012 by

6

In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talked about computer environmentals, and how it’s possible to build a device fingerprint based on what the user presents when they show up to a web server and ask for something and how […]

“With That Revealing Shirt? He Was Just Begging to be Hacked.” Blaming The Victim in the STRATFOR Hack

January 3, 2012 by

15

In the days since the STRATFOR breach, I initially gave the firm high marks in communicating with its user base after idiotically allowing all their data go bye-bye. I’m going to modify that stance a bit in another post – I now see that they have in fact fallen very short of what they could […]

EPIC sues DHS over Social Media

December 22, 2011 by

0

The Electronic Privacy Information Center (EPIC), has filed a lawsuit against the United States Department of Homeland Security (DHS) over what EPIC states is DHS’ failure to comply with Freedom of Information Act requests by EPIC regarding DHS programs to monitor social media. Say that ten times fast. The lawsuit stems from one of several […]

Snapshot: Progressive and Privacy

November 16, 2011 by

17

Dragon NewsBytes pointed this morning to a piece about security researcher Trevor Eckhart, who discovered that Sprint and Verizon phones are running CarrierIQ, a piece of software which has the potential to track minute details about callers’ lives. This reminds me of the conversation Dave and I were having recently about the large swathes of […]

Simple Attacks Can Be Devastating

August 18, 2011 by

5

In the 1989 film Field of Dreams, Terrance Mann is being annoyed by Ray Kinsella. Mann picks up a crowbar and walks towards Kinsella saying, “I’m going to beat you with a crowbar until you leave.” I think anyone would accept that a crowbar is an excellent, if simple, weapon, and beating someone with one […]

LAPD on Predictive Policing; #OpBART and Cyber Intel

August 17, 2011 by

3

With The New York Times running a high-profile story on police analytics and predictive policing, analysts can expect questions from command staff about what the heck that actually is. An early draft of a 2009 predictive policing overview for the LAPD has been published on PublicIntelligence.net. The draft report gives some very basic information about […]

OSINT, Search Tools & Search Tip Roundup

July 19, 2011 by

4

Over the past two weeks – in fact since March – we’ve been talking a lot about search, specifically how law enforcement and analysts can use open sources to enhance their understanding of a given issue or target. This article is a roundup, and some new stuff to help cops and analysts search for things. […]

More Search-fu for Intelligence and Law Enforcement from Eric Olson

July 18, 2011 by

4

I read a piece on Police Led Intelligence this morning talking about more effective use of online search engines for police officers (great post!). Nick’s right – many in the Law Enforcement and Intelligence communities can do even more than they are by learning more about how search engines work, but there’s a second part to […]

No, you probably don’t need a data warehouse – unless your initials are “NYPD”

July 11, 2011 by

2

A journalist working on a piece about some high-end technology [from a vendor whose name I can’t mention, but whose initials are IBM] being touted as saving the day at a large agency [I can’t reveal the agency, but its initials are NYPD] asked some questions about crime mapping, Compstat and crime analysis and I […]

Social Media Search Tips for Cops & Law Enforcement Analysts

July 1, 2011 by

18

Yesterday I posted to the IACA list a link to Kurrently, a real-time search engine for Facebook and Twitter, and I was really surprised at the number of people who emailed me off-list saying that they’d been looking for something like this for a long time. This makes me realize that it’s time we listed […]

PLI Podcast: NetWitness’ Alex Cox on Cyber Investigations and Forensics

May 18, 2011 by

0

This week on the Police-Led Intelligence Podcast, we’re joined by Alex Cox, principal analyst at NetWitness, now a part of RSA, the security Division of EMC. A former police officer and forensics investigator, Alex’s team currently looks for similarities between cyber attacks. NetWitness produces a monitoring platform that focuses on network forensics: it’s easiest to […]