Welcome to the Law Enforcement Cyber Center
The Law Enforcement Cyber Center (LECC) is designed to assist police chiefs, sheriffs, commanders, patrol officers, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology. The LECC also directs visitors to strategic partners who provide training, technical assistance, and access to critical information. Please take advantage of the resources made available through this website, share it with colleagues, and encourage others to contribute ideas and new content by clicking the Suggestion Box button below.
Another important feature of the LECC is the secure law enforcement sensitive information available through the FBI Cyber Shield Alliance (CSA). The CSA is a protected portal that provides an array of FBI cyber-security resources and intelligence for the law enforcement community, such as free online training, alerts and notifications. To access the secure CSA website, please see this page.
by Donald F. Kennedy, Jr., Chair, RISS National Policy Group
The Regional Information Sharing Systems® (RISS) is a nationwide program that provides secure information and intelligence sharing capabilities, investigative and analytical services, and officer safety event deconfliction to thousands of local, state, federal, and tribal law enforcement agencies; fusion centers; and other appropriate partners across the country. RISS consists of six centers and the RISS Technology Support Center (RTSC). RISS supports and responds to the needs of its six regions while working together and with partners on nationwide initiatives. RISS offers numerous resources that aid investigative efforts, including investigation of cyber-related threats and crimes.
Read more here at RISS
See our Chief’s Corner for more information by Chiefs, for Chiefs.
Directory of Cybercrime Labs and Resources
Search for regional crime labs and other resources to help with cybercrime investigations and assistance.
Whisper is the largest online platform where people share real thoughts and feelings, forge relationships and engage in conversations on an endless variety of topics—without identities or profiles. Whisper content and stories reach hundreds of millions of people each month across platforms. Whisper is spearheading a movement that believes that happiness starts with being your real self. Whisper is backed by venture investors including Sequoia Capital, Lightspeed Venture Partners, Thrive Capital, Shasta Ventures, Trinity Capital, and CAA Ventures. (“Whisper Press” 2016).
For more information, please visit: http://www.nw3c.org/docs/research/whisper-application.pdf
This document provides material designed to assist law enforcement in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don’ts, and links to further cyber training and resources. Download and read the full article at https://www.it.ojp.gov/GIST/1191/Understanding-Digital-Footprints–Steps-to-Protect-Personal-Information
This fun infographic shows many different kinds of electronic devices that may be found in a residential home. Click on the icons to reveal how the IoT devices generate and store data. Click here to begin exploring the digital home.
This information provides resources to those who prosecute cyber crimes, and includes both links to statutes and case law explicitly focusing on cyber crimes, as well as links to other legal resources related to cyber crime prosecution, such as digital search warrants, and litigation guides. Click here to view more.
In an effort to support and advance police/community interaction addressing cyber crime and victimization, the National White Collar Crime Center, International Association of Chiefs of Police, and the Office of Community Oriented Policing Services, and the U.S. Department of Justice, have developed training modules that identify the most common types of Internet and computer-related scams, and instructional tools to help people avoid being victimized by these scams. Click here to view the latest training module.
- Continue reading
- Continue reading
- Continue reading
- Continue reading
While online threats are constantly evolving, many cyber criminals use variations of the same methods with cyber attacks. Specifics of these attacks may differ, but the nature of the attacks stay the same. Cyber criminals take advantage of a user’s lack of technical expertise and inherent trusting natures. By understanding these common threats and risks, … Continue reading Protecting Yourself from Cyber Threats
Use the tips below in a variety of NCSAM communications: Set strong passwords. Make them long and complex, change them regularly, and don’t share them with anyone. Secure your most sensitive accounts. When it is available, use multi-factor authentication to keep your accounts more secure. Keep a Clean Machine. Keep your operating system, browser, and … Continue reading Cybersecurity Tips to Share
Click here for the original article.Peter Ngigi, February 23, 2017 Cryptocurrencies come with many advantages and the most interesting one is the ability to make anonymous transactions or using an alias. Some Cryptocurrencies such as Monero and Zcash have perfected their privacy features to make their transactions fully anonymous. With Bitcoin, however, it’s not a … Continue reading Danish Police Now Able To Track Bitcoin Transactions
Click here for the original article.Call it a sign of the times. Police in Prince George’s County said gang members are recruiting people and even carrying out crimes through social media. Police are hoping to tackle this growing trend by getting the word out about this latest tactic. The police department hosted a roundtable Wednesday to … Continue reading Police, community tackle cyberbullying, recruitment of gang members on social media