Cyber Beat Blog

Protecting Yourself from Cyber Threats

While online threats are constantly evolving, many cyber criminals use variations of the same methods with cyber attacks. Specifics of these attacks may differ, but the nature of the attacks stay the same. Cyber criminals take advantage of a user’s lack of technical expertise and inherent trusting natures. By understanding these common threats and risks, … Continue reading Protecting Yourself from Cyber Threats

2016 Deloitte-NASCIO Cybersecurity Study

Each year, the National Association of State Chief Information Officers (NASCIO) conducts a survey of state chief information officers (CIOs) to identify and prioritize the top policy and technology issues facing state government. State CIOs ranked cybersecurity as their top priority in 2014, 2015, and 2016. Considering that it seems that cybersecurity breaches in both … Continue reading 2016 Deloitte-NASCIO Cybersecurity Study

Understanding Digital Footprints—Steps to Protect Personal Information for law enforcement

Cybercrime is an ever-growing issue for state, local, tribal, and territorial (SLTT) law enforcement. With advancements in technology, coupled with the oversharing of personal information, law enforcement not only needs to ensure the public’s safety online but also be cognizant of the digital footprint that people are leaving behind. This document provides material designed to … Continue reading Understanding Digital Footprints—Steps to Protect Personal Information for law enforcement

The Future of Cyber Investigations at the FBI Is Unclear

by Sasha Romanosky and Cortney Weinbaum This commentary originally appeared on Inside Sources on August 24, 2016. Judge Robert J. Bryan of the U.S. District Court for the Western District of Washington might not realize it, but his actions may affect the extent to which the FBI emphasizes the law enforcement or intelligence gathering aspects … Continue reading The Future of Cyber Investigations at the FBI Is Unclear

New Study on Criminal Justice Information Sharing

Enhancing information sharing practices is a function of twenty-first century policing efforts and a new study published by the Southern Criminal Justice Association is worth a read for its examination of information sharing tools used in Southern California. The journal articles focuses on the distribution of information regarding sex offenders and their follow-on interaction with … Continue reading New Study on Criminal Justice Information Sharing

The Real Cost of Free WiFi

June 17, 2016 As warmer weather approaches, millions of Americans will be traveling on summer getaways. Regardless of where you are heading on your vacation, chances are that you will pack connected mobile devices like smartphones and tablets. Once on vacation, most travelers will connect to Wi-Fi to find local hotspots, navigate new cities and … Continue reading The Real Cost of Free WiFi

Pokémon Go: A Law Enforcement Alert

by the National White Collar Crime Center Click here to read or download the full advisory.   What is Pokémon Go? Pokémon Go is an Augmented Reality (AR) game that lets players attempt to capture small cartoon-style characters (“pocket monsters”, or Pokémon), using the real world as an interactive game board. The game is a … Continue reading Pokémon Go: A Law Enforcement Alert

Rules of the Road, Car Commandeering in the Age of Autonomous Vehicles

By Anne Stickells Semi-autonomous vehicles have started to enter the market, and fully autonomous vehicles will likely follow. Elon Musk predicts that Tesla will be producing fully autonomous cars within roughly two years (he acknowledges the regulation and safety approval process might take an additional one to two years). Similarly, Toyota plans to launch its … Continue reading Rules of the Road, Car Commandeering in the Age of Autonomous Vehicles

Cyber Disruption Response Guide

By National Association of State Chief Information Officers (NASCIO) State government must now view cyber attacks that are more than cyber incidents.  We must prepare for larger magnitude events.  These can be termed cyber disruptions, disasters or even catastrophes.  This publication includes the following: A call to action for states to develop state cyber disruption … Continue reading Cyber Disruption Response Guide

FBI Cyber Shield Alliance

IACP Conference

Contribute Content