Welcome to the Law Enforcement Cyber Center
The Law Enforcement Cyber Center (LECC) is designed to assist police chiefs, sheriffs, commanders, patrol officers, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.
If you have fallen victim to a scam, or need to report fraud, please file a complaint @ IC3.gov.
Disclosed in December, the hack struck eight federal agencies and numerous companies, including software provider SolarWinds Corp. US intelligence agencies publicly attributed it to Russian state actors. Moscow has denied involvement in the hack.
click here for more information
The reliance and value of using data and tools to track and stop bad actors using cryptocurrency is quickly becoming one of the best ways for law enforcement, intelligence and other authorities to successfully protect citizens and businesses.
Click here for more information.
The FBI should establish a “formalized bureau-wide dark web strategy” to address operational shortcomings in how it tackles illegal darknet activities, a Department of Justice (DoJ) audit has recommended. The DoJ’s Office of the Inspector General (OIG) concluded that the status quo – whereby FBI units involved in dark web investigations develop their own strategies in isolation – led to inefficiencies, overlaps in remit, and misallocated resources.
Click here for more information
Recently, McAfee released a new global report entitled “The Hidden Costs of Cybercrime.” As the name suggests, the report examines the financial and underreported impacts of cyber-threats. According to the findings, cybercrime losses cost the global economy upwards of $1 trillion; this is equivalent to 1 percent of global GDP and a 50 percent increase since 2018.
click here from more information.
IT security professionals are expected to know everything. Most of them are self-taught and have learned on-the-job. Over time, experience has turned them into battle-hardened soldiers. The pressure is real, as they are responsible for the configuration, administration and, most importantly, the security of the entire infrastructure.
click here for more information.