Cyber Beat Blog

Rules of the Road, Car Commandeering in the Age of Autonomous Vehicles

By Anne Stickells

Semi-autonomous vehicles have started to enter the market, and fully autonomous vehicles will likely follow. Elon Musk predicts that Tesla will be producing fully autonomous cars within roughly two years (he acknowledges the regulation and safety approval process might take an additional one to two years). Similarly, Toyota plans to launch its first self-driving vehicle by 2020, and Google plans to start commercializing its self-driving car the same year.

 » Read more

Cyber Disruption Response Guide

By National Association of State Chief Information Officers (NASCIO)

State government must now view cyber attacks that are more than cyber incidents.  We must prepare for larger magnitude events.  These can be termed cyber disruptions, disasters or even catastrophes.  This publication includes the following:

  • A call to action for states to develop state cyber disruption response plans that include: a governance structure that clearly designates who is in charge in a given event or phase of an event;

 » Read more

Emerging Threats: End-to-End Encryption (E2EE)

By Melissa McDonough

Law enforcement officers today are faced with many new applications that that allow users to communicate or store information privately. As consumers become more concerned with privacy and security, the use of these applications continues to rise. And they aren’t just for criminals or spooks – secure messaging apps have gained widespread popularity among the general populace.

The novelty of these apps is that rather than encrypting only part of a conversation,

 » Read more

Periscope: A Look into the Live Streaming Services of a Social Media App

periscopeby the National White Collar Crime Center

Advancements in digital technology including devices such as smartphones, tablets, personal computers, and gaming devices have given society near constant and instant access online.  With the proliferation of technology has also come the evolution of online content, largely dominated today by social media giants Facebook®, Twitter®, and Instagram®.

In March 2015, Twitter acquired the live video streaming service called Periscope®. Periscope allows anyone with a Twitter account or mobile phone number to easily live stream from their iOS® or Android® devices. 

 » Read more

The Difficulties of Litigating Cyber Crime

By Melissa McDonough

The past several decades brought many new challenges to law enforcement, particularly due to the emergence of new technology. One such issue is cyber crime, which has been a challenge for law enforcement in both establishing laws against the activity, as well as providing tools for law enforcement officers to combat cyber crime. This article will review some difficulties for law enforcement officers at the state and local level in litigating cyber crimes affecting businesses and private citizens.

 » Read more

Cyber incidents against local government and law enforcement agencies

By Sasha Romanosky, PhD.
 
In a previous blog, we saw the number of cyber incidents across all sectors of business, based on a sample of 12,000 events over the years 2004-2014. Next, we examine just the subsample of incidents affecting municipal, county, state and federal government agencies. The chart below reflects the various subsectors of governmental organizations victimized by cyber attacks during this time period, which totals just over 1,400 incidents.

 » Read more

Cyber incidents against government agencies

By Sasha Romanosky, PhD.

I recently examined a dataset of over 12,000 cyber incidents that occurred during the years 2004-2014. These events include data breaches (unauthorized theft or loss of personal information), privacy violations (unauthorized collection or use of personal information), security incidents (hacks directed specifically at an organization), and other sorts of phishing or identity theft scams. The incidents relate to private sector corporations, but also include schools, non-profits, and many forms of government agencies.

 » Read more

New Report on Future Internet Technologies Puts a Spotlight on Information Security

By: John S. Hollywood

In late 2014, the RAND Corporation hosted an expert panel for the National Institute of Justice on how the criminal justice community can take advantage of new Internet technologies such as the Internet of Things, intelligent agents, and semantic tagging. RAND recently released its report on the workshop (http://www.rand.org/pubs/research_reports/RR928.html), describing the panel’s assessment of the science and technology needed to take advantage of emerging opportunities while mitigating potential threats.

 » Read more

Attorney General Kamala Harris to Help Law Enforcement in Investigations of Criminal Invasions of Sexual Privacy

By: Danielle Citron, Lois K. Macht Research Professor of Law, University of Maryland

California’s Attorney General Kamala Harris has created a first-of-its-kind online resource designed to assist law enforcement in understanding and investigating crimes related to the cyber exploitation of a person’s nude images in violation of privacy and without consent (also known as nonconsensual pornography). Before discussing the resources created by AG Harris’s Task Force, let me first briefly explain the destruction caused by nonconsensual pornography,

 » Read more

Sharing and Safeguarding Information

By: John S. Hollywood

Law-enforcement agencies increasingly need to share information with other nearby agencies, as well as with regional, state, and federal repositories of criminal justice information. A recent report from the RAND Corporation, Improving Information-Sharing Across Law Enforcement: Why Can’t We Know? (http://www.rand.org/pubs/research_reports/RR645.html), reviews progress to date on improving the sharing of law-enforcement information, discusses the sizable barriers remaining, and identifies approaches to overcoming those barriers.

 » Read more

IACP Conference