News Archive

Watch the National Forum Session on Data Access 101 via Facebook Live on August 1 @ 2 PT

July 24, 2017

The National Criminal Justice Association (NCJA) will stream the session “Data: What It is, Why You Need It and What in the World to Do With It” live from the National Forum on Criminal Justice on August 1 from 2:00-3:30 pm PT.  This session is geared for novices and addresses issues and questions including: Data:  we need it to decide which problems to tackle, to choose which initiatives to fund, and to measure whether those programs are working as planned. But do we have the data we need? If not, who does and will they share? How do we know if the data are telling us what we need to know? And how in the world do we pay for the analysis? Presenters are Jeff Bender, Deputy Commissioner, NYS Division of Criminal Justice Services; and Terry Salo, Deputy Commissioner, NYS Division of Criminal Justice Services. Glenn Fueston, Executive Director, MD Governor’s Office of Crime Control and Prevention will serve as moderator.
NCJA will stream this session using Facebook Live at https://www.facebook.com/thencja and the recording will be available on the NCJA website at http://www.ncja.org/home.

 

Source: NCJA

Free Online Training on the Global Reference Architecture

June 30, 2017

SEARCH and the National Center for State Courts recently launched a new version of the training course on the Global Reference Architecture (GRA), a framework and set of standards that makes it easier, faster, and more affordable for justice and public safety practitioners to design effective information sharing solutions. This updated and self-paced online training course is presented in 10 modules and helps stakeholders gain a common understanding of the GRA framework, standards, methods, and processes. 

The training demonstrates how to establish a governance structure, develop an information sharing architecture, model and document services, and create information models.   The course includes interactive, hands-on implementation labs that tie lessons together and is presented via an easy-to-use interface integrating narration, video, and written text with a certificate of completion option. 

The GRA Training Course is suitable for a range of trainees, including executives, senior managers, project managers/coordinators, and implementers.  

Source: SEARCH NCSC

Retired News Reporter Develops Algorithm to Try and Identify Serial Killers Using UCR Data

April 10, 2017

In 2004, Thomas Hargrove, a 61-year-old retired news reporter from Virginia, became aware of the Federal Bureau of Investigation’s Uniform Crime Reporting (UCR) Supplementary Homicide Report and contemplated whether it was possible to teach a computer how to spot serial killers.  He spent months trying to develop an algorithm that would identify unsolved cases with enough commonalities to suggest the same murderer.  Hargrove eventually founded the Murder Accountability Project (MAP), a small nonprofit seeking to make FBI murder data more widely and easily available.  MAP has already assembled case details on 638,454 homicides from 1980 through 2014, including 23,219 cases that had not been reported to the FBI.  This is the most complete list of case-level details of U.S. murders available anywhere, and the group’s Web site has made it available at no cost to anyone with statistical analysis software.  

NW3C Virtual Currency Online Training

April 10, 2017

The National White Collar Crime Center (NW3C) recently released an online training course on virtual currency.  The 30-minute course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency.  It covers various types of virtual currency, including the difference between decentralized and centralized currencies, with a strong focus on Bitcoin: what it is, how it is stored, and Bitcoin-specific investigative tips and techniques.  Individuals must have an NW3C online learning account and be employed by a law enforcement organization to access the no-cost training.

Most Hackers Can Access Systems and Steal Valuable Data Within 24 Hours: Nuix Black Report

April 6, 2017

Cybercrime is an ever-growing issue for state, local, tribal, and territorial law enforcement.  With advancements in technology, coupled with the oversharing of personal information, law enforcement needs to not only ensure the public’s safety online but also be cognizant of the digital footprint that people are leaving behind.  The National White Collar Crime Center (NW3C) has developed an online training course based on the Understanding Digital Footprints—Steps to Protect Personal Information resource.  The 35-minute course introduces the concept of digital footprints and best practices in protecting personal identifying information.  Topics include understanding consequences of oversharing personal information, limiting an individual’s digital footprint, protecting privacy on social media sites, and steps to take after becoming a target of doxing.  Individuals must have an NW3C online learning account and be employed by a law enforcement organization to access the training.

States Band Together for Large-Scale Cloud Purchasing Agreement

April 5, 2017

Utah has taken the lead on what state information technology (IT) leaders have hailed as the largest cloud hosting services agreement to date.  Through the National Association of State Procurement Officers (NASPO) Value Point program, state officials and their partners have been hashing out the details of what will equate to a collective procurement agreement expected to benefit more than 34 states.  The Value Point platform gives states purchasing similar items cooperative buying power as one organization rather than on a state-by-state basis.  The final cooperative agreement, expected in August, will help a cadre of states move forward with cloud service procurement through a cohesive cooperative bargaining agreement and vetted contractors.

Strengthening Cyber Defenses Through Fusion Center Engagement

April 5, 2017

With the explosion of hacktivism and other forms of cybercrimes in recent years, fusion centers have increased their intelligence gathering and their focus on cybersecurity.  The level at which state and local law enforcement and private industry are involved with fusion centers varies by area, but to measurably reduce cyber vulnerability, state and local governments must interact regularly with fusion centers and encourage more private companies to share information.  Four recommendations are provided to help state and local governments engage with fusion centers. 

BJA’s VALOR for Blue Adds New Online Learning Module

April 4, 2017

Registered users can visit the U.S. Department of Justice, Bureau of Justice Assistance’s VALOR for Blue Web site to access a new online training that overviews research conducted by the FBI Behavioral Science Unit to evaluate the officer, the offender, and the circumstances that brought them together in deadly force encounters.  The training examines case studies of officers who faced a drawn gun and a suspect’s account of his decisions after killing an officer and identifies the moral, mental, and physical preparations necessary for officers to survive violent encounters.  Each new VALOR for BlueLearning module includes printable handouts, a promotional poster, and ready-to-use resources. 

Anti-Surveillance Clothing Aims to Hide Wearers From Facial Recognition

April 4, 2017

The Hyperface project involves printing patterns onto clothing or textiles, which then appear to have eyes, mouths, and other features that a computer can interpret as a face.  This new kind of camouflage aims to reduce the confidence score of facial detection and recognition by providing false faces that distract computer vision algorithms from facial recognition software—the kind used by social media, online retailers, law enforcement, and the military. 

NIC’s Jayne Friedland Holland: Fusion Centers Can Help Agencies Combat Hacktivism

March 29, 2017

Jayne Friedland Holland, chief security officer at information services provider NIC, has said that fusion centers can help government agencies defend against hacktivism and other cybercrimes through intelligence data sharing.  She recommended that state and local agencies collaborate with other stakeholders, establish an internal information sharing structure, initiate outreach to the private sector, and introduce fusion center personnel to authorities to deepen engagement with fusion centers.  

Source: Executive Biz

NIJ National Sexual Assault Policy Symposium Video, Transcript Available

March 29, 2017

Visit https://nij.gov/multimedia/Pages/video-national-sexual-assault-policy-symposium.aspx to access video and transcripts for the National Institute of Justice’s first National Sexual Assault Policy Symposium, held in September 2016.  In the video, symposium organizers and attendees describe the groundbreaking event and its significance in improving and advancing sexual assault response across jurisdictions in the United States.

Source: National Institute of Justice

National Crime Victims’ Rights Week Starts April 2

March 28, 2017

The Office for Victims of Crime offers resources related to National Crime Victims’ Rights Week, set for April 2–8, 2017.  Visit https://ovc.ncjrs.gov/ncvrw2017/fact_sheet.html for fact sheets on this year’s theme, “Strength—Resilience—Justice.”  This theme reflects a vision of the future in which all victims are strengthened by the response they receive, organizations are resilient in response to challenges and communities are able to seek collective justice and healing. 

What the Public Knows About Cybersecurity

March 28, 2017

A Pew Research Center survey was conducted on June 17–27, 2016, among 1,055 adult Internet users living in the United States.  The survey consisted of 13 questions and was designed to test Americans’ knowledge of a number of cybersecurity issues and terms.  The results of the survey found that many Americans are unclear about some key cybersecurity topics, terms, and concepts. 

Search Earth With AI Eyes Via a Powerful New Satellite Image Tool

March 15, 2017

On March 7, a New Mexico startup that provides artificial intelligence (AI)-driven analysis of satellite images to governments, academics, and industry released a public demo of its GeoVisual Search, a new type of search engine that combines satellite images of Earth with machine learning on a massive scale.  Users can pick an object anywhere on Earth that can be seen from space, and the system returns a list of similar-looking objects and their locations on the planet.  GeoVisual Search operates on top of an intelligent machine-learning platform that can be trained and will improve over time.  This technology could potentially be used in various way by law enforcement, such as helping identify critical infrastructure and assets in an area.

Source: CNET

Threat Hunting Becoming Top-of-Mind Issue for SOCs

March 14, 2017

The use of threat-hunting techniques to combat cyberattacks is increasing, according to a new report.  Threat hunting appears to have become a top-of-mind issue for security executives at many organizations.  But a relative lack of security staff and technology tools is limiting their ability to fully build out such programs.  The Information Security Community on LinkedIn recently polled its members on the state of threat hunting in their security operations centers.  The poll, sponsored by several security firms, elicited responses from 330 members.  The majority of respondents indicated that threat hunting either should or will be their top security initiative in 2017.  “Threat hunting” is a term that is generally used to describe the practice among security organizations to proactively search for and weed out threats on their network instead of waiting to discover them after an attack has materialized.  Organizations that have implemented successful threat-hunting programs have often pointed to the emphasis on human skills as a major contributory factor.

Most Hackers Can Access Systems and Steal Valuable Data Within 24 Hours: Nuix Black Report

March 14, 2017

Most Hackers Can Access Systems and Steal Valuable Data Within 24 Hours: Nuix Black Report

The Nuix Black Report—the results of a confidential survey of 70 professional hackers and penetration testers at DEFCON, the world’s largest hacking and security conference—will overturn many conventional understandings and customs of the cybersecurity industry.  By examining the security landscape from the hacker’s perspective, the report has revealed results that are contrary to the conventional understanding of cybersecurity. For example:

  • Respondents said traditional countermeasures such as firewalls and antivirus almost never slowed them down, but endpoint security technologies were more effective at stopping attacks.
  • More than half of respondents changed their methodologies with every target, severely limiting the effectiveness of security defenses based on known files and attacks.
  • Around one-third of attackers said their target organizations never detected their activities.
Source: Nuix

Massive Indiana IoT Lab Brings Innovation Space to the Midwest

March 13, 2017

The Internet of Things (IoT) ecosystem in Indiana is about to get a big boost.  The Indiana IoT Lab-Fishers recently announced it will act as a space for businesses to research, innovate, and collaborate on projects in the expanding field.  It will aim to help businesses investigate and improve the four main parts of IoT solutions:  ideation, cloud data, edge software, and development.  Connected devices are prevalent in our daily lives, from wearable fitness bands to self-driving cars, and it is important to understand the potential security risks involved.  Indiana Governor Eric Holcomb said the initiative falls in line with his “Next Level Legislative Agenda,” which proposes investing $1 billion over the next ten years in innovation and entrepreneurship.

The Intelligence-Driven Prosecution Model: A Case Study in the New York County District Attorney’s Office

March 9, 2017

The Intelligence-Driven Prosecution Model (IDPM), designed and implemented by the New York County District Attorney’s Office (DANY), is a prosecutorial strategy rooted in the rigorous collection of background information about the people, places, and problems driving crime in specific neighborhoods.  Through enhanced information gathering—including close coordination with local law enforcement and robust community outreach—the IDPM intends to facilitate improved prosecutorial decision making.  Technology-centered intelligence collection that focuses on specific people and places driving crime adds a unique dimension to data analysis.  With funding from the U.S. Department of Justice’s Bureau of Justice Assistance, a study was conducted to document how the IDPM operates and explore the model’s implementation and effects in New York County, known more widely as the borough of Manhattan.

Law Enforcement Near Miss Database

March 7, 2017

The Police Foundation has developed a voluntary, nondisciplinary reporting system that allows law enforcement personnel to read about and anonymously share “close calls” or “near misses,” to help protect others from similar incidents.  The database is designed to capture reports of incidents in which law enforcement officers narrowly avoided serious injury, fatalities, significant property damage, or other significant crisis, so that these events can be learned from to improve safety for officers and civilians.

Press Release: SAVER Program Reports Now Available for Download

March 6, 2017

On February 6, 2017, the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced that reports produced by the System Assessment and Validation for Emergency Responders (SAVER) Program are now available for download on the S&T Web site, a one-stop shop for resources to help responders make better purchasing decisions.  The goal of the SAVER Program is to provide cost and time savings to federal, state, and local responders as they decide which equipment to purchase.

Source: DHS

New FBI Wanted App: Making It Easier to Find Fugitives and Missing Persons

February 13, 2017

The just-released FBI Wanted mobile app allows the public to view, search, sort, filter, and bookmark the full range of information issued by the FBI, including pictures and descriptions of wanted fugitives, missing persons, crime suspects, deceased victims, and others the Bureau is seeking to locate or identify. The free app works on Apple and Android devices, including smartphones, iPads, and iPods. The FBI hopes that the public will use the information in the app to help solve cases and return missing persons to their homes.

 

Source: FBI

Center Arms Deputies With Data to Fight Crime

February 10, 2017

Personnel at the Montgomery County Sheriff’s Office’s Criminal Intelligence Center in Dayton, Ohio, analyze data in almost real time to support area law enforcement, and the center is an invaluable resource to local departments.  For example, one local law enforcement agency relies on the center particularly on lengthy investigations that require detectives to put all the players together in complicated cases.  

Source: Dayton News

License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities

February 10, 2017

License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities is designed specifically for law enforcement entities and fusion centers to assist their efforts in developing and implementing comprehensive privacy, civil rights, and civil liberties policies regarding the use of automated license plate readers (ALPRs or LPRs) in intelligence and investigative activities.  Developed by state, local, and federal law enforcement practitioners with LPR expertise and privacy subject-matter experts, the provisions of the LPR Policy Template are intended to be incorporated into agency operational policies and day-to-day operations. Each section represents a fundamental component of a comprehensive policy that includes baseline provisions on LPR information collection; information quality; access and disclosure; redress; security, retention, and destruction; accountability and enforcement; and training. Sample language is provided for each recommended provision, as well as appendices that contain a glossary of terms and definitions, citations to federal and case law, and a draft model policy. 

Source: GLOBAL

House Passes Bill Requiring Warrants for E-Mail Searches

February 10, 2017

On February 6, 2017, the House passed a bill aimed at modernizing the United States’ aging law covering law enforcement access to e-mails and other stored files.  The current law, known as the Electronic Communications Privacy Act, allows law enforcement to access any stored files without a warrant if such material is left on a third-party server for more than 180 days.  But that law was passed in 1986—three years before the invention of the Internet—when computer owners did not have the same systems as modern users, such as cloud hosting, Webmail, and online photo galleries.  The Email Privacy Act alters the previous rule to universally require warrants for such information. The same bill cleared the House in 2016 on an overwhelming 419-0 vote, but it stalled in the Senate.  

Source: Reuters

New Jersey Buys Police Body Cameras

February 1, 2017

Thirty-seven law enforcement agencies across New Jersey will share $566,000 in grants to buy 1,132 police body-worn cameras. The grants are being provided using funds from the U.S. Department of Justice Edward Byrne Memorial Justice Assistance Grant Program. Agencies can use up to $500 in grant funds for each camera or camera package, including camera and related equipment. Police departments in 15 of New Jersey's 21 counties received awards.

Source: NJToday

NIST to Launch Ongoing Face Recognition Vendor Test

January 31, 2017

The U.S. National Institute of Standards and Technology (NIST) will launch a new, ongoing “Face Recognition Vendor Test” beginning in February 2017.

The test will be aimed at evaluating the face recognition performance on cooperative images, as collected in civil and criminal identity management applications. NIST notes that the test will also evaluate accuracy on more difficult images, including in-the-wild and photo journalism images and noncooperative surveillance stills.

Emerging Issues for Improving the Law Enforcement Response to Domestic and Sexual Violence: Three New Reports Now Available

January 30, 2017

The Office of Violence against Women (OVW) is pleased to announce the release of several documents that address emerging issues related to improving the law enforcement response to domestic violence, dating violence, sexual assault, and stalking.  The documents reflect input from diverse stakeholders and were developed in conjunction with OVW’s national technical assistance providers.

OVW hopes that these documents and tools will be helpful for law enforcement and victim advocacy organizations across the country as they continue to work together to strengthen a coordinated community response, improve policies to respond to emerging issues, and enhance services and support for victims of sexual assault, domestic violence, dating violence, and stalking.

Source: DOJ

Pennsylvania Justice Network and Cumberland County Laboratory Information Management System Web Service Project

January 12, 2017

In Cumberland County, law enforcement and forensic laboratories have merged their recordkeeping systems, eliminating a duplication of efforts and thus, decreasing the wait time for results of forensic testing.

In 2014, the Pennsylvania Justice Network received a $250,000 grant from the Edward Byrne Memorial Justice Assistance Grant (JAG) Program to improve justice information sharing. This award was in conjunction with a $480,000 Paul Coverdell National Forensic Science Improvement award. With funding from these awards, officials developed a new laboratory management system, leveraged existing Web services, and improved the sharing of information about blood evidence between the county’s forensics lab and criminal justice agency partners.

This project is in support of the long-standing efforts by the Pennsylvania Commission on Crime and Delinquency to improve information sharing and automate data exchanges within the criminal justice system.

Source: BJA

NIST Finalizes Cyberattack Recovery Guidance

January 11, 2017

Preventing all cyberattacks is a good, but unrealistic, goal. That’s why preparing for recovery from a cyber incident can be just as important as prevention, according to the National Institute of Standards and Technology. The agency’s Guide for Cybersecurity Event Recovery provides a single resource to help organizations develop strategies to contain an opponent and restore operations quickly.

Source: GCN

BJA Funding Opportunities

January 10, 2017

The U.S. Department of Justice (DOJ), Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA) has recently released a number of funding opportunities for law enforcement and criminal justice agencies, ranging from preventing and reducing intellectual property theft and related crime, to assisting agencies, to supporting agencies in employing data-driven, cross-sector strategies to reduce crime, increase trust, and improve community safety. Funding opportunities include: The Smart Policing Initiative, The Body-Worn Camera Policy and Implementation Program, The Intellectual Property Enforcement Program, The Byrne Criminal Justice Innovations Program. A complete listing of BJA’s open solicitations can be found at https://www.bja.gov.  

Source: BJA

Critical Infrastructure Threat Information Sharing Framework: A Reference Guide for the Critical Infrastructure Community

January 9, 2017

How are threats to critical infrastructure shared in real-time? Who is responsible for sharing threat information? To address these questions and to build a basic framework, the Department of Homeland Security (DHS) Office of Infrastructure Protection (IP) has released the Critical Infrastructure Threat Information Sharing Framework: A Reference Guide for the Critical Infrastructure Community, a resource for critical infrastructure owners and operators, as well as other private sector, federal, and state, local, tribal, and territorial government partners that share or need access to threat information.

Source: PM-ISE

Report on Law Enforcement Use of UAS

December 19, 2016

The Police Foundation has released new recommendations for local law enforcement agencies considering the use of small unmanned aircraft systems (sUAS) for public safety purposes. Community Policing & Unmanned Aircraft Systems (UAS) Guidelines to Enhance Community Trust provides guidance on all aspects of UAS use in public safety, including operational, training, and legal and regulatory compliance considerations. 

The One Thing You Need to Do Before Shopping Online: Lock Down Your Login

December 14, 2016

For millions of Americans, getting the best holiday shopping deals and discounts have become as much a part of Thanksgiving as turkey, football, or pumpkin pie.  Increasingly, that shopping takes place online, which provides a lot of conveniences but also raises the specter of scams, fraud, or identity theft. Just as consumers have migrated towards online shopping, credit card thieves have started shifting their efforts online as well. During the holidays, deeply discounted products look appealing and shoppers make quick purchasing decisions without always taking into consideration the online purchasing risks that can be present. Many Americans have had their online accounts hacked and personal information compromised because of stolen credentials or weak logins.

The White House recently launched the “Lock Down Your Login” campaign to encourage all Americans to protect themselves online with strong authentication. For more information on strong authentication and the new campaign, please visit www.LockDownYourLogin.com. You’ll find specific advice on how to turn on strong authentication on a variety of Web sites and services that Americans use each day.

In addition, DHS’ Stop.Think.Connect. Campaign has a number of tips and resources to help consumers protect themselves when shopping online.

Source: DHS

Video Evidence: A Primer for Prosecutors

December 13, 2016


Video Evidence: A Primer for Prosecutors was developed for the purpose of educating prosecutors on the numerous sources of video evidence, the benefits of its use in court, and challenges faced by prosecutors’ offices in the handling of video evidence. A sample process flow is included as step-by-step guidance on the procedures a prosecutor may follow when preparing and handling video evidence. This process flow corresponds to a typical case flow, from receipt of evidence through the trial. The primer also includes a glossary of terms and list of recommended resources for further reading.

Source: GLOBAL

2016 Digital Cities: Winners Focus on Transparency, Security, Infrastructure

December 12, 2016

The 2016 Digital Cities Survey results are in. Dozens of cities were selected by a judging panel at the Center for Digital Government as the most strategic, efficient, and innovative guardians of public-sector tech in the nation. The top-ranked cities will receive an award at the National League of Cities’ annual conference in Pittsburgh.

The first-place winners in five population categories are: Los Angeles, California; Virginia Beach, Viirginia; Durham, North Carolina; Roanoke, Virginia; and Tamarac, Florida. Judges evaluated the survey submissions of each city by considering 10 key characteristics of a digital city: open, mobile, engaged, collaborative, secure, staffed/supported, connected, efficient, resilient, and innovative. And the six criteria by which the responses were evaluated are: city priorities supported by ICT; demonstrated return on investment; progress over the previous year; creative/innovative approaches; effective collaboration; and successful measures of transparency, privacy, and security.

Attorney General Lynch’s Video Statement on Hate Crimes in America

December 9, 2016

Attorney General Loretta E. Lynch released a video statement today on the FBI’s newly announced 2015 Hate Crime Statistics as well as on recent media reports of alleged hate crimes and harassment around the country. The statement reminds individuals to report these incidents to both local law enforcement and the Justice Department in order to ensure that career investigators and prosecutors are able to enforce hate crime statutes at the local, state, and federal levels.

For more information on the Justice Department's efforts to combat hate crimes, please visit the Civil Rights Division Web site.

Source: DOJ

Public Safety Primer on Cloud Technology

December 8, 2016

The Public Safety Primer on Cloud Technology is a high-level primer for law enforcement and public safety communities regarding video and the cloud environment. With the quantity of video evidence now available, storage is a significant problem for record management systems and bandwidth capability. Obtaining video from a major event is often problematic for law enforcement and public safety agencies without the capability to request and store public video submissions. As such, agencies are turning to cloud environments as a solution for emergencies and major incidents to address video-related issues including storage, cataloging, conversion, and real-time analysis. Law enforcement and public safety agencies need to be educated on cloud technology for video and versed on associated considerations, particularly as more vendors enter this field. Responsively, the Public Safety Primer on Cloud Technology was developed as an easy-to-read frequently asked questions (FAQ) guide, answering common questions in a straightforward manner. It features information on the services that cloud environments can provide as well as guidance for agencies considering contracts with cloud vendors. In addition, this product includes a glossary of cloud terminology and a list of recommended resources for further reading. Perhaps, most importantly, this resource includes critical information on privacy, security, and data ownership.

Source: GLOBAL

Justice Department Releases Intake and Charging Policy for Computer Crime Matters

December 7, 2016

As computers play an ever-greater role in our lives and cybercrime becomes both more commonplace and more devastating, the need for robust criminal enforcement of effective computer crime laws will only become more important.  As we said in public remarks last year, we urgently need targeted updates to the Computer Fraud and Abuse Act that will help the department protect our privacy and security online.  A number of recent prosecutions have demonstrated our commitment and success in bringing significant prosecutions under these vital statutes.  Prosecutors in U.S. Attorneys’ Offices across the country, in conjunction with the Computer Crime and Intellectual Property Section (CCIPS) in Washington, have brought cases against hackers and carders like Roman Seleznev and Marcel Lazar and cyber stalkers and sextortionists like Ryan Vallee and Michael Ford, and have conducted challenging and cutting-edge cybercrime operations, such as the takedown of the Darkode hacking forum last year.

It is, of course, not enough to have effective laws; those laws must also be enforced responsibly and consistently.  It is also important that the public understand how the department applies the law in this context.  In order to further that goal, the Criminal Division, primarily through CCIPS, has been sharing its knowledge about cybercrime and the laws that impact cybersecurity for two decades.  We have convened public-private partnership eventspublished public manualstestified numerous times before Congress on threats such as ransomware, participated in and recently hosted[external link] symposia and released Best Practices for Victim Response and Reporting of Cyber Incidents.  Many of these materials, as well as press releases related to computer crime and intellectual property prosecutions, are available at cybercrime.gov.

Source: DOJ

University of Maryland to Begin Using Gunshot Detection Technology on Campus

December 6, 2016

The University of Maryland recently began using the ShotSpotter gunshot detection system as a potential deterrent to active shooter situations on campus. The ShotSpotter system instantly detects gun shots and sends a map to dispatchers so they know where shots were fired. The university has already installed ten sensors around campus. ShotSpotter has previously been deployed in a number of major U.S. cities.

Source: Fox5dc

Secretary Johnson Participates in President’s Interagency Task Force to Monitor and Combat Human Trafficking

December 5, 2016

Secretary of Homeland Security Jeh Johnson participated in the annual meeting of the President’s Interagency Task Force (PITF) to Monitor and Combat Human Trafficking at the White House. The PITF works to provide a whole-of-government response to the heinous crime of human trafficking. As part of the Task Force, the U.S. Department of Homeland Security (DHS) works to combat human trafficking through a victim-centered approach. 

At the meeting, Secretary Johnson discussed the progress that DHS has made in combatting human trafficking over the past fiscal year, as well as throughout the course of this Administration.  The Blue Campaign, created in 2010 to serve as the Department’s unified effort to combat human trafficking, coordinates these important efforts.

In FY2016, the Blue Campaign entered into more formal partnerships than in any other year in Blue Campaign’s history. Partners such as the District of Columbia, the Virginia Office of the Attorney General, and the City of Los Angeles are now bringing awareness materials and training opportunities to local communities from coast to coast.

Source: DHS

Boston.gov Opens Its Source Code

November 15, 2016

Like the new Boston.gov Website? If you’re a software developer or a municipal Website manager, you can build your own version by grabbing the freely available source code and tweaking as you see fit. The city’s Digital Team just released the entirety of its source code on GitHub so that developers can continue to enhance the site and other cities can benefit from it.

Source: GCN

FBI’s Cyber Investigation Certification Program

November 14, 2016

The Federal Bureau of Investigation (FBI), in partnership with Carnegie Mellon University, the FBI’s Cyber Division, and the International Association of Chiefs of Police (IACP), has developed the new Cyber Investigation Certification Program (CICP).  The self-guided online program is available to all federal, state, local, tribal, and territorial (SLTT) law enforcement personnel on the FBI’s Law Enforcement Enterprise Portal (LEEP).   Each course in the program has an assessment at the end of the training, and, upon successful completion of each course, participants will receive a course certificate.  The first responder course is available now, and additional courses are in planning and development. 

Source: FBI

IACP Releases New Law Enforcement Benchmarking and Performance Analytics Portal

November 10, 2016

Data helps drive better, more informed decision making.  With this in mind, the International Association of Chiefs of Police (IACP) and IACP NET partnered with the Community Oriented Policing Services (COPS) Office to create the new Law Enforcement Benchmarking and Performance Analytics Portal.  The secure Benchmark Portal enables law enforcement agencies to conduct comparative analyses with peer agencies.  Agency representatives can visit the portal and input their agency’s information and immediately query and visualize the results.  The tool is free for participating law enforcement agencies, and access is restricted to law enforcement agency representatives only.  Additional information, including an informational flyer and a PDF version of the portal questions, is available on the main Benchmark Portal Web site.

Source: IACP

California Shares Cybercrime Services With Local Law Enforcement

November 9, 2016

The California Cyber Crime Center (C4), a newly minted forensic and digital crimes group based in Fresno, California, that as of October 11, unifies the California Department of Justice's (DOJ) resources to investigate and prosecute cybercrime, enhance digital evidence capabilities, and promote innovation.  C4 supports DOJ internally as well as local and state law enforcement agency partners throughout the cybercrime lifecycle by providing services, technical assistance, and training related to cybercrime, digital evidence, and digital forensics.  One example of support that C4 offers is the Cyber Response Vehicle (CRV), which serves as a mobile cyber laboratory, allowing multiple staff to work as if they were in the computer lab to collect, acquire, and process loose media, mobile devices, personal computers, servers, and other sources of electronically stored information during the course of an investigation.  

White House Opens Code.gov Repository

November 8, 2016

The White House has opened a new source code resource to share a trove of custom software developed for federal projects. Federal CIO Tony Scott wrote in a Nov. 3 blog post that the newly opened Code.gov is a follow-on to this past summer's White House federal open source policy aimed at improving agency sharing of federally developed software source code.

Source: FCW

FBI’s Next Generation Identification (NGI) System

November 7, 2016

The term “biometrics” is not limited to fingerprints—it also includes palm prints, irises, and facial recognition.  In an effort to harness new technologies and to improve the application of tenprint and latent fingerprint searches, the Federal Bureau of Investigation’s (FBI) Criminal Justice Information Services (CJIS) Division has established a new system, the Next Generation Identification (NGI), to replace the Integrated Automated Fingerprint Identification System (IAFIS).  The NGI provides the criminal justice community with the world’s largest and most efficient electronic repository of biometric and criminal history information. 

Source: FBI

How LA’s Security Center Combats Cyberthreats

November 4, 2016

In the past year, the city of Los Angeles has seen the number of cyberattacks launched against it grow by 250 percent—and that’s a good thing. Spotting so many incidents means that city officials are able to detect and mitigate them before they become major problems.  This capability is largely the result of the city’s Integrated Security Operations Center (ISOC). Completed on August 1, 2015, ISOC is the culmination of a two-year physical and virtual project to consolidate more than 200 million log records and data every 24 hours.

Source: GCN

IACP Assessment of IL3CP Shows Promising Results

October 12, 2016

Intelligence-Led Community Policing, Community Prosecution, and Community Partnerships (IL3CP) is a unique approach to community policing that extends community partnerships to include prosecutorial and community service organizations along with law enforcement. This new model connects the criminal justice system and the community through seamless communication and partnerships.

IL3CP, developed by the Rockland County, New York, District Attorney’s Office (RCDAO), synthesizes three contemporary law enforcement concepts into a collaborative approach to crime reduction. In an effort to explore the effectiveness of IL3CP, the IACP worked with law enforcement and prosecutors in Mesa, Arizona; Newport News, Virginia; and Saint Paul, Minnesota, to replicate the IL3CP concept.

In the detailed project report available today, this approach showed promising results for being a collaborative and unifying response to crime and community problems by strengthening relationships between citizens and law enforcement. While the complexity of the project did not allow for a comprehensive program evaluation, all pilot sites experienced positive results and voluntarily expanded the IL3CP concept to additional communities within their jurisdictions.

Source: IACP

House Passes Bill to Make It Easier for First Responders to Acquire New Technologies

October 10, 2016

The First Responder Access to Innovative Technologies Act (H.R. 5460), which requires the Federal Emergency Management Agency (FEMA) to develop a transparent process to review requests by first responders to use their Urban Area Security Initiative or State Homeland Security Grant Program funds to purchase equipment for which voluntary industry standards do not exist.

Introduced by Representative Donald M. Payne, Jr. (NJ-10), ranking member of the House Committee on Homeland Security Subcommittee on Emergency Preparedness, Response, and Communications, the legislation would make it easier for first responders to acquire new equipment and technologies they need to respond to evolving threats.

The bill, which now goes to the Senate, was praised by House Speaker Representative Paul Ryan’s (R-WI) office as a “commonsense step to help our first responders stay ahead of the curve when dealing with new threats.”

Source: HSToday

National Cyber Security Awareness Month

October 7, 2016

October is National Cyber Security Awareness Month (NCSAM), which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. NCSAM is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident.

NCSAM 2016 Weekly Themes

Week 1: October 3-7, 2016 – Every Day Steps Towards Online Safety with Stop.Think.Connect.™

Week 2: October 10-14, 2016 – Cyber from the Break Room to the Board Room

Week 3: October 17-21, 2016 – Recognizing and Combating Cybercrime

Week 4: October 24-28, 2016 – Our Continuously Connected Lives: What’s Your ‘App’-titude?

Week 5: October 31, 2016 –Building Resilience in Critical Infrastructure

Please visit the NCSAM Resources page to find the 2016 NCSAM One Pager with information about the weekly themes.

Source: DHS

National Fusion Center Association and the Electricity Information Sharing and Analysis Center Rapid Deployment Project

October 7, 2016

The Office of the Program Manager for the Information Sharing Environment (PM-ISE) is working with the National Fusion Center Association (NFCA) and the Electricity Information Sharing and Analysis Center (E-ISAC) to consider using the national fusion center network as a way to convene electrical infrastructure subject-matter experts who need rapid access to classified data or communications systems in the event of an emergency situation.  This effort also has the potential to develop into a long-term information exchange relationship between the energy sector and fusion centers to provide situational awareness of threats and vulnerabilities in their areas of responsibility.  

 

Source: ISE

Directory of Cybercrime Labs and Resources

October 6, 2016

The Law Enforcement Cyber Center (LECC) is designed to assist police chiefs, sheriffs, commanders, patrol officers, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.  The site also includes resources on training, technical assistance, and other critical information, including a comprehensive directory that allows law enforcement to connect with cybercrime experts and practitioners across the United States.  This search tool enables visitors to identify and contact local, regional, and national organizations (both private and government) that offer cyber-related services and assistance to law enforcement officials and prosecutors, for example, cybercrime units, training facilities, fusion centers, and forensic labs.  Searches may be conducted using zip code, state, keyword, or areas of expertise. 

Source: IACP LECC

Ocoee Police Improves Crime Analysis With New Software

October 5, 2016

For a yearly subscription cost of approximately $700, the Ocoee Police Department has begun subscribing to Internet-based software that allows officers to create their own area-specific crime maps. For example, a patrol sergeant could use the tool to improve duty assignments in a specific area. Also, area residents can use an interactive feature on the Web site to search the database and to set up personalized text alerts. 

Source: Orange Observer

Responder News: 2016 National Preparedness Report Highlights Emergency Response Collaboration

October 4, 2016

This spring, the Federal Emergency Management Agency issued its 2016 National Preparedness Report which evaluates core capabilities of U.S. government agencies tasked with providing emergency preparedness and response. The findings monitored progress from the last five years with a primary focus on five mission areas: prevention, protection, mitigation, response, and recovery.

The report highlighted several U.S. Department of Homeland Security (DHS) initiatives, programs, and case studies that demonstrate the department’s interagency collaborative efforts and cross-discipline programs to better prepare emergency first responders for a wide range of situations.

The shared intelligence will allow emergency managers to build on lessons learned and identify a path forward. For example, DHS and interagency partners continue to build on work that began in 2012 to enhance the capabilities of the National Network of Fusion Centers to collect and share intelligence among fusion center customers.

Source: DHS

U.S. Department of Justice Awards Over $20 Million to Law Enforcement Body-Worn Camera Programs

October 3, 2016

The U.S. Department of Justice has announced awards totaling over $20 million to 106 state, city, tribal, and municipal law enforcement agencies to establish and enhance law enforcement body-worn camera programs across the United States. The awards, funded under the Office of Justice Programs' Bureau of Justice Assistance's (BJA) Fiscal Year 2016 Body-Worn Camera Policy and Implementation Program, will help law enforcement organizations implement body-worn camera policies, practices, and evaluation methods to make a positive impact on the quality of policing in individual communities. Under this grant announcement, BJA awarded over $16 million to state, local, and tribal law enforcement agencies, as well as a $3 million supplemental award to continue support for body-worn camera training and technical assistance. 

Source: DOJ

FBI Releases Materials on N-Dex System

September 30, 2016

The Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division has released a fact sheet and a brochure on its N-DEx System. Since its inception in 2008, the N-DEx System has grown to include data from thousands of law enforcement and criminal justice data sources, and is available at no cost to agencies or users wishing to search the hundreds of millions of records available through the system or participate by sharing their data. The investigative nature of the system is a force-multiplier, allowing agencies to access even more data in less time and make connections between seemingly unrelated information not previously available.

You can download the brochure from https://www.fbi.gov/file-repository/n-dex-brochure.pdf/view and the fact sheet from https://www.fbi.gov/file-repository/2016-it-n-dex.pdf/view.

Source: FBI