New Study on Criminal Justice Information Sharing

Enhancing information sharing practices is a function of twenty-first century policing efforts and a new study published by the Southern Criminal Justice Association is worth a read for its examination of information sharing tools used in Southern California. The journal articles focuses on the distribution of information regarding sex offenders and their follow-on interaction with law enforcement from agencies across San Diego County.  This is important to the LECC community as more empirical research strengthens the ability to measure outcomes of information sharing practices.

 » Read more

Emerging Threats: End-to-End Encryption (E2EE)

By Melissa McDonough

Law enforcement officers today are faced with many new applications that that allow users to communicate or store information privately. As consumers become more concerned with privacy and security, the use of these applications continues to rise. And they aren’t just for criminals or spooks – secure messaging apps have gained widespread popularity among the general populace.

The novelty of these apps is that rather than encrypting only part of a conversation,

 » Read more

Online Hijacking

It used to be that hijacking was something only done in person, but as we discuss in this blog post, online hijacking—where someone or some service takes over an individual’s online account—is now a growing occurrence. Not all forms of online hijacking are “criminal”; for example, browser hijacking— when your Internet search function is diverted to websites you never intended to visit or when advertisements are misleading and redirect you from the main website—may be a nuisance,

 » Read more

Identification Through Anonymized Data

Much of the data individuals provide is assumed to be protected because it is anonymized—stripped of any information that identifies who those individuals are. Such anonymized data is everywhere. But how safe is the underlying assumption that individuals can’t be reidentified through such data? Unfortunately, as we discuss in this blog post, there is repeated evidence that this underlying assumption is not holding up—something that raises real concerns that people can be victimized through information they release that can be traced back to them and that makes this an emerging law enforcement issue.

 » Read more

#Greenbirds

On Twitter, the “#” sign refers to a hashtag—a way to group conversations together and make topics of discussion easier to discover and search.  Our blog topic of discussion is #Greenbirds—which involves social media influencers on Twitter supporting the Islamic State (also known as ISIS or ISIL).

#Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks—is a report from London-based researchers at the International Centre for the Study of Radicalisation and Political Violence who are studying foreign fighter networks. 

 » Read more

Catphishing

You may have heard of the terms “phishing” or even “spearphishing”—they both refer to attempts by bad actors to gain personal information to pilfer bank accounts or damage reputation.  Phishing is a broader term for wide-reaching untargeted solicitations, whereas spearphishing concerns attempts to target a particular population set like veterans, the elderly, or employees of a particular company for example.

This type of targeting will be familiar with law enforcement, but what you may not know is that early hacking routines were known as “phone phreaking” and the word usage stuck. 

 » Read more

Emerging Threat: Doxing

dox

“Doxing” is the publication of personally identifiable information (PII) of someone to the internet, generally for malicious purposes. The kinds of information disclosed may include the victim’s home addresses, family members’ information, and financial information.

Hacktivist groups dox government officials in response to perceived injustices with the objective of embarrassing the victim, or providing the information so others may target the victim for malicious activity. In some cases, organized cyber criminal groups and criminals may take advantage of information released during doxing incidents but are not known to conduct the activity themselves.

 » Read more

IACP Conference