Browsing All Posts filed under »Law-Enforcement Software«

CBKB Nominated for Innovating Justice Award

September 24, 2012 by

0

This morning I saw that the folks over at the Cost-Benefit Knowledge Bank for Criminal Justice (CBKB) have been nominated for an Innovating Justice Award. Before I talk about the IJA, let me just mention that the work done by the CBKB is absolutely essential to law enforcement agencies across the United States (they’ve also […]

Cyber-Criminal OPSEC – a Three-Part Series. Part III: TTTP

June 15, 2012 by

6

In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talked about computer environmentals, and how it’s possible to build a device fingerprint based on what the user presents when they show up to a web server and ask for something and how […]

Cyber-Criminal OPSEC – a Three-Part Series. Part II: Environmentals

June 12, 2012 by

3

In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talk about computer environmentals, and building a device fingerprint. And in Part III, we talk about tools, techniques, tactics and procedures used by cyber criminals. One of the things that mystifies us most […]

When Stupid Strikes: Social Media Policy and Training

January 31, 2012 by

8

A Bay-area police agency has found itself at the center of a firestorm which began with comments on Twitter apparently by one of its officers. The officer apparently posted to a Twitter account the comment, “Get those fucking hackers. I’m a cop in the Bay Area CA. I’d go after them with both guns.” Awesome. […]

“With That Revealing Shirt? He Was Just Begging to be Hacked.” Blaming The Victim in the STRATFOR Hack

January 3, 2012 by

15

In the days since the STRATFOR breach, I initially gave the firm high marks in communicating with its user base after idiotically allowing all their data go bye-bye. I’m going to modify that stance a bit in another post – I now see that they have in fact fallen very short of what they could […]

An Update Roundup from the PLI Guys

August 31, 2011 by

2

Some random thoughts since we’ve both been slammed at work and with travel. And for me, clean-up at our house in the Northeast after hurricane Irene blew through. My family was actually among the luckier – friends in Massachusetts are still without power, four days later. First, I was personally happy to see the United […]

The Top 5 Things Cops Must Do To Secure Their Networks. Now.

July 12, 2011 by

15

With word last week that yet another police agency has been hacked and its records placed online, and with word yesterday that 90,000 military emails and password hashes from the consulting firm Booz Allen Hamilton had been placed online (analysis here), and today that the mobile phone of London’s police chief was hacked, we at PLI […]

No, you probably don’t need a data warehouse – unless your initials are “NYPD”

July 11, 2011 by

2

A journalist working on a piece about some high-end technology [from a vendor whose name I can’t mention, but whose initials are IBM] being touted as saving the day at a large agency [I can’t reveal the agency, but its initials are NYPD] asked some questions about crime mapping, Compstat and crime analysis and I […]

German Police Hacked, Suspect Tracking Information breached

July 8, 2011 by

0

We’re out of the office today but wanted to note quickly that SC Magazine Australia is reporting that a German police network has been  hacked, and suspect tracking data stolen. Hackers have broken into the German Federal Police and swiped location data used to track suspects. The attack launched by the left-wing n0-N4m3 Cr3w hacking […]

LE Technology: Rocky DeStefano on Vendor (Mis)communications

July 7, 2011 by

0

Rocky DeStefano is friend of ours. A former Air Force intelligence guy, he found that his ability to envision order in fantastically huge datasets and articulate paths to sanity suited people well in such companies as ArcSight (which went public, then was taken private by HP), Decurity (which he sold to RSA), and NetWitness (which […]

Social Media Search Tips for Cops & Law Enforcement Analysts

July 1, 2011 by

18

Yesterday I posted to the IACA list a link to Kurrently, a real-time search engine for Facebook and Twitter, and I was really surprised at the number of people who emailed me off-list saying that they’d been looking for something like this for a long time. This makes me realize that it’s time we listed […]

Another AZDPS Breach; Defending Police Networks

June 29, 2011 by

2

Last week we talked about the need to secure police networks. This week the dicsusion will continue, but first we should note that it appears the Arizona Department of Public Safety has suffered another breach – or at the least, that a second tranche of stolen documents has been published. The second tranche, which we […]

Attacks on Police Networks

June 24, 2011 by

4

Law enforcement agencies must behave as if lives depend upon the security of police computer networks, because they do. Agencies simply must understand that poor network security is something which poses immediate and great risk to officers, witnesses, confidential informants, suspects, ongoing investigations, and all those at other agencies with whom we share information, on local, […]

Our First Announcement: Nick & Dave At Law Officer

June 20, 2011 by

1

A couple of weeks ago I said that we’d have some announcements, and here’s the first one: Dave and I are the new technology columnists for Law Officer Magazine and will be producing features and other content for LawOfficer.Com. We’re very excited about our debut column, which is running in the June issue. We broke the […]