Welcome to the Law Enforcement Cyber Center
The Law Enforcement Cyber Center (LECC) is designed to assist police chiefs, sheriffs, commanders, patrol officers, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology. The LECC also directs visitors to strategic partners who provide training, technical assistance, and access to critical information. Please take advantage of the resources made available through this website, share it with colleagues, and encourage others to contribute ideas and new content by clicking the Suggestion Box button below.
Another important feature of the LECC is the secure law enforcement sensitive information available through the FBI Cyber Shield Alliance (CSA). The CSA is a protected portal that provides an array of FBI cyber-security resources and intelligence for the law enforcement community, such as free online training, alerts and notifications. To access the secure CSA website, please see this page.
This paper is designed to aid in educating law enforcement executives on their responsibility to ensure the cybersecurity of their organizations is managed in an effective manner. It provides essential background material to create a greater understanding of the complex issues involved. This paper will be of assistance to any law enforcement executive, whether they are involved in state, province, local, or tribal law enforcement organizations.
Click here to view the entire document.
BJA and PERF Release The Utah Model: A Path Forward for Investigating and Building Resilience to Cyber Crime
As new internet-based technologies are introduced, cybercrime is growing exponentially, both in the proliferation of crimes and the associated impact on victims concerning financial loss, invasion of privacy, blackmail, and threats to our national security. To respond to this ever-changing threat, national and local police agencies across the globe continue to explore ways to coordinate resources with each other and attack the problem. This document highlights the many promising practices of the Utah State Model in support of “Operation Wellspring” and related efforts involving law enforcement leaders, cyber investigators, fusion center staff, emergency management personnel, and other national subject matter experts, working in partnership with the Federal Bureau of Investigation and the Department of Homeland Security. However, this document is more than a “case study.” Indeed, this publication serves as a foundational national document, strategically targeted, for Governor’s, their staff, and others, to guide and inform their policies and practices. Special thanks are given to the Utah Department of Public Safety, FBI, DHS, IACP, RAND, NW3C, NGA, NACSIO, ASCIA and others.
Click here to view the entire document.
See our Chief’s Corner for more information by Chiefs, for Chiefs.
Directory of Cybercrime Labs and Resources
Search for regional crime labs and other resources to help with cybercrime investigations and assistance.
Begun in 2012, a recently completed renovation project reflects the increasing diversity of laboratory services needed to support the mission of ICE Homeland Security Investigations (HSI).
Today, the laboratory supports every type of case that ICE/HSI and its law enforcement partners investigate – including document fraud, gang-related activity, drug trafficking, bulk cash smuggling, human smuggling, child exploitation, cybercrime, and terrorism.
The HSI Polygraph Program, a part of the HSI Forensic Laboratory, conducts polygraph examinations in support of a wide variety of HSI investigations. The renovation has also allowed the laboratory to enhance a number of other capabilities, including work with digital media evidence and chemistry as well as research and development efforts.
For more information about the Forensic Lab:
Any evidence submitted to the HSI Forensic Laboratory for examination and could require the travel of an expert witness to appear at a court proceeding will be at the cost of the submitting agency. It is also requested that prior to sending evidence for examination all submitting agencies contact their nearest HSI field office, which can assist in facilitating coordination between the laboratory and the submitting agency.
Houseparty was launched in February 2016 by Life on Air as a free, easy-to-use video conferencing platform. It was built from the remnants of previous failed attempts at creating a livestreaming application, and was initially launched under a pseudonym, Alexander Herzick. It experienced relatively slow growth before going viral in late 2016. Houseparty can support video conferences (“houseparties”) with up to 8 simultaneous participants, in which every participant can see and talk to every other participant. The application is currently available via the Google Play Store and Apple iOS Store.
For more information, please visit: https://www.nw3c.org/docs/research/houseparty.pdf
Roblox is a user-generated massive multiplayer online social gaming platform. The name Roblox was created by blending the words “robots” and “blocks.” Roblox users create their own virtual worlds and design their own avatars and games within the platform. New users must register with a username, email address, and date of birth. After registration and email verification, the new user then selects and customizes a virtual character that is used as his or her identity in the Roblox world.
For more information, please visit: https://www.nw3c.org/docs/research/roblox.pdf
This document provides material designed to assist law enforcement in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don’ts, and links to further cyber training and resources. Download and read the full article at https://www.it.ojp.gov/GIST/1191/Understanding-Digital-Footprints–Steps-to-Protect-Personal-Information
This fun infographic shows many different kinds of electronic devices that may be found in a residential home. Where possible, we describe the technologies imbedded within the devices, and the kinds of data they generate. While some devices store data on the device itself, others act as sensors that transmit data back to a smartphone application, cloud service provider, or other remote location.
This information provides resources to those who prosecute cyber crimes, and includes both links to statutes and case law explicitly focusing on cyber crimes, as well as links to other legal resources related to cyber crime prosecution, such as digital search warrants, and litigation guides. Click here to view more.
In an effort to support and advance police/community interaction addressing cyber crime and victimization, the National White Collar Crime Center, International Association of Chiefs of Police, and the Office of Community Oriented Policing Services, and the U.S. Department of Justice, have developed training modules that identify the most common types of Internet and computer-related scams, and instructional tools to help people avoid being victimized by these scams. Click here to view the latest training module.
- Continue reading
- Continue reading
- arrived at Florida's d... Continue reading
- Continue reading
While online threats are constantly evolving, many cyber criminals use variations of the same methods with cyber attacks. Specifics of these attacks may differ, but the nature of the attacks stay the same. Cyber criminals take advantage of a user’s lack of technical expertise and inherent trusting natures. By understanding these common threats and risks, … Continue reading Protecting Yourself from Cyber Threats
Use the tips below in a variety of NCSAM communications: Set strong passwords. Make them long and complex, change them regularly, and don’t share them with anyone. Secure your most sensitive accounts. When it is available, use multi-factor authentication to keep your accounts more secure. Keep a Clean Machine. Keep your operating system, browser, and … Continue reading Cybersecurity Tips to Share
Tool now owned by security firm Avast was hacked via a supply chain attack, an increasingly common method of infection More than two million users of anti-malware tool CCleaner installed a version of the software that had been hacked to include malware, the app’s developer confirmed on Monday. Piriform, the developer of CCleaner now owned … Continue reading CCleaner: 2m users install anti-malware program … that contains malware
WASHINGTON (Reuters) – The Trump administration on Wednesday told U.S. government agencies to remove Kaspersky Lab products from their networks, saying it was concerned the Moscow-based cyber security firm was vulnerable to Kremlin influence and that using its anti-virus software could jeopardize national security. The decision represents a sharp response to what U.S. intelligence agencies … Continue reading Trump bans US government from using Russian cyber security firm Kaspersky