Chiefs' Corner

 

logo_large

 

RISS

by Donald F. Kennedy, Jr., Chair, RISS National Policy Group

The Regional Information Sharing Systems® (RISS) is a nationwide program that provides secure information and intelligence sharing capabilities, investigative and analytical services, and officer safety event deconfliction to thousands of local, state, federal, and tribal law enforcement agencies; fusion centers; and other appropriate partners across the country.  RISS consists of six centers and the RISS Technology Support Center (RTSC).  RISS supports and responds to the needs of its six regions while working together and with partners on nationwide initiatives.  RISS offers numerous resources that aid investigative efforts, including investigation of cyber-related threats and crimes.

Read more here at RISS

See our Chief’s Corner for more information by Chiefs, for Chiefs.

Directory of Cybercrime Labs and Resources

Search for regional crime labs and other resources to help with cybercrime investigations and assistance.

What's New?

NATIONAL WHITE COLLAR CRIME CENTER CYBER ALERT

Whisper is the largest online platform where people share real thoughts and feelings, forge relationships and engage in conversations on an endless variety of topics—without identities or profiles. Whisper content and stories reach hundreds of millions of people each month across platforms. Whisper is spearheading a movement that believes that happiness starts with being your real self. Whisper is backed by venture investors including Sequoia Capital, Lightspeed Venture Partners, Thrive Capital, Shasta Ventures, Trinity Capital, and CAA Ventures. (“Whisper Press” 2016).

For more information, please visit: http://www.nw3c.org/docs/research/whisper-application.pdf

Protecting law enforcement from cyber threats

This document provides material designed to assist law enforcement in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don’ts, and links to further cyber training and resources. Download and read the full article at https://www.it.ojp.gov/GIST/1191/Understanding-Digital-Footprints–Steps-to-Protect-Personal-Information

 

Want to follow the LECC on RSS?

Just point your RSS reader to http://www.iacpcybercenter.org/feed/ (for the blogs) and  http://www.iacpcybercenter.org/news/feed/ for our news feeds.

 

Internet of Things Infographic

This fun infographic shows many different kinds of electronic devices that may be found in a residential home. Click on the icons to reveal how the IoT devices generate and store data. Click here to begin exploring the digital home.

 

For the Prosecutor

This information provides resources to those who prosecute cyber crimes, and includes both links to statutes and case law explicitly focusing on cyber crimes, as well as links to other legal resources related to cyber crime prosecution, such as digital search warrants, and litigation guides. Click here to view more.

 

Cybercrime Community Awareness and Prevention

In an effort to support and advance police/community interaction addressing cyber crime and victimization, the National White Collar Crime Center, International Association of Chiefs of Police, and the Office of Community Oriented Policing Services, and the U.S. Department of Justice, have developed training modules that identify the most common types of Internet and computer-related scams, and instructional tools to help people avoid being victimized by these scams. Click here to view the latest training module.

News

  • Making this one change could eliminate spam, says police tech chief

    Danny Palmer National Crime Agency urges organisations to adopt this protocol to help put an end to email spam Cybercrimes like phishing and malware distribution could almost be eradicated if organisations took one simple step to actively fight against it, a senior member of the UK's organised crime fighting operation has claimed. ... Continue reading
  • Edmonds PD detective shares tips for keeping kids safe online

    Larry Vogel It’s a jungle out there. The Internet and the staggering growth of social media apps have created what one parent described during a Thursday night Edmonds Police Department presentation as “a perfect storm” for cyber crimes against young people. Ranging from cyber bullying to malicious harassment to cyber stalking to... Continue reading
  • UK watchdog to hire hundreds as it prepares for country to adopt a ‘once in …

    Ms Denham, speaking to a House of Lords committee last week, also urged the Government to establish an interim data sharing agreement with the European Union to ensure information can continue to flow as soon as the country leaves. Experts have warned that even if the UK adopts t... Continue reading
  • How Far Should IT Practitioners Go to Police Corrupt Data?

    Eric Chabrow FBI Director James Comey Worries about Manipulated Information One of FBI Director James Comey's biggest concerns is the manipulation of information stored on government, business and private computers. "It's not just even the loss of data. Increasingly, we are worried about the corruption of data," Comey said at a B... Continue reading
More Updates