Search This Blog
Tuesday, April 26, 2011
Law Enforcement Online
So you’re a police officer in Topeka, Kansas who’s looking for information about gangs in your state. Or an intelligence analyst in the U.K. who wants to chat with peers about the latest counterterrorism trends. Where do you turn?
One important answer: to Law Enforcement Online, or LEO.
LEO is a secure, Internet-based communications portal for law enforcement, first responders, criminal justice professionals, and anti-terrorism and intelligence agencies around the globe. LEO catalyzes and strengthens collaboration and information-sharing by providing access to sensitive but unclassified information and various state-of-the-art communications services and tools. It is available to vetted users anywhere in the world around the clock and is offered free of charge to members.
LEO started in 1995 as a small dial-up service with just 20 members. Now, it has more than 100,000 members across the world and a host of features and capabilities offered through a Virtual Private Network on the Internet.
What does LEO offer specifically? Here’s a rundown:
1. A national alert system directing members to the LEO site for information on emergencies (like the London bombings, for example);
2. Some 540 Special Interest Groups (SIG) that allow members who share expertise or interests to connect with each other, including sections on terrorism, street gangs, and bombs;
3. Access to important and useful databases, like those run by the National Center for Missing and Exploited Children;
4. E-mail services, which enable members to submit fingerprints to the FBI for processing by our Integrated Automated Fingerprint Identification System;
5. A Virtual Command Center (VCC)—an information sharing and crisis management tool that allows the law enforcement community to use LEO at local and remote sites as an electronic command center to submit and view information and intelligence;
6. Distance learning, with several online learning modules on topics like terrorism response, forensic anthropology, and leadership; and
7. A multimedia library of publications, documents, studies, research, technical bulletins, and other reports of interest to LEO users.
Do you all feel that this improves our society?
Monday, April 18, 2011
Are You Next to be Sued?
1) Normally, people are sued only for sharing music, not for just downloading it. Make sure you keep copyrighted material out of your shared folder or disable the sharing feature of your P2P application.
2) Avoid publicly accessible file sharing networks, such as those at colleges. Sometimes, these networks will report you making your chance of getting sued significantly greater.
3) To be safe, you could always just avoid downloading any copyrighted material.
If you have received notice or your ISP address has already been sued visit the Electronic Frontier Foundation's website at www.eff.org for help and additional information.
Sunday, April 10, 2011
Epsilon Data Breach: Expect a Surge in Spear Phishing Attacks
Phishing' scams are the number one concern from this breach. Hackers could send fake emails pretending to be your bank, pharmacy, hotel or other business that were customers of Epsilon. The email will look real and will be convincing as attackers have the customer's name and the company information that they did business with. The email could ask unsuspecting users to click on a link which can ask for credit card numbers, run malware, install spyware or carry out other attacks.
Epsilon posted a press release two days later after the breach happened on March 30. The breach is currently under the investigation of the U.S. Secret Service, which asks all Epsilon customers who are suspicious about any fraudulent emails to report to phishing-report@us.cert.gov.
http://www.dailyrosetta.com/epsilon-data-breach-under-investigation/12190.html
Sunday, April 3, 2011
Going Dark
Sunday, March 27, 2011
Cloud Computing & Jurisdiction
Monday, March 21, 2011
Youtube: Law Enforcements New Best Friend
Today, many youth boast about crimes they have committed via YouTube. Hopefully they will think twice after this story:
Four teen boys from Scottsdale, Arizona posted a video of their gang vandalizing property with the title boasting, ""Hey, this is basicly (sic) just a video of us breaking stuff." The video displayed these boys smashing their skate boards into vending machines and looting all of the candy out of them.Another shot showed one of these hooligans smashing into a front windshield of a car and finishing it off with his foot.
About a month after the video was posted on YouTube; the children were detained by local authorities who identified their faces from the video. Now they are facing charges in Maricopa County Juvenile Court for robbery and criminal damage.
So who's laughing now boys?
http://www.azcentral.com/news/articles/0321sr-vandals0322ON.html
Sunday, March 13, 2011
Why do people commit cyber crimes?
1. Easy of Anonymity. It is much easier to get away with criminal activity in a cyber world than in the real world. There is a strong sense of anonymity than can draw otherwise respectable citizens to abandon their ethics in pursuit personal gain.
2. Inadequate Legal Jurisdiction. Computer networks literally span the entire globe. This makes it virtually impossible for any government to enact or enforce laws when computer criminals are set up in foreign countries.
3. New Technology. Many computer criminals use their computers merely as a logical extension of “traditional” crimes that can take advantage of computer technology to help facilitate or carry out crime. For example, automated software can be programmed to steal credit-card numbers, personal-identification information and even cell-phone codes.
4. Holding a Grudge. Malicious computer codes like worms and viruses are often spread by someone who is seeking to cause harm to an individual or company-possibly over losing a job, perceived unethical business conduct or maybe even jealousy or envy. Such parties intend to destroy or cripple their targets for the personal satisfaction of seeing them suffer the effects.
5. Thrill of the Game. For many computer criminals, the excitement and challenge of exploiting a computer system can be too great to resist.
6. Opportunistic crime. Individuals who spend a significant amount of time on their computer have many opportunities to commit crimes. These people may have never known that these criminal prospects exist before, but, by spending increased amount of time on the Internet, have come to see a whole variety of opportunities laid out in front of them.
What do you think? Would you like to add something to this list?
Read more: Why Do People Commit Computer Crimes? eHow.com http://www.ehow.com/about_4709031_do-people-commit-computer-crimes.html#ixzz1GWkxpSR3
Monday, March 7, 2011
Permission to Hack: Finding Out the Hard Way
Leon Walker (AP Photo)(CBS/WWJ/AP) Leon Walker, a Michigan man facing felony charges for allegedly hacking into his estranged wife's computer to access her e-mails, has had his trial postponed to give his lawyers more time to prepare their case.
Walker, of Rochester Hills, is accused under a state hacking law of reading then-wife Clara Walker's e-mail on a laptop in their home in 2009.
The trial was originally slated to begin this month. Instead, it was rescheduled for April 11, in Oakland County Circuit Court in Pontiac.
Walker, an information technology worker, faces up to five years in prison for violating an Internet computer misuse law which was designed to protect the stealing of trade secrets and identities.
Clara Walker, 35, filed the complaint against her husband last year, after she learned he had hacked into her email account and read emails which exposed an affair she was having with her second husband. He had been arrested on charges of beating her in front of a child she had with her first husband.
Walker claims his now ex-wife had told him the password, and that he originally went into her account to confirm that she was taking their 3-year-old daughter on liaisons with the second husband.
Walker also presented the emails to the first husband because he was allegedly concerned for the child's safety. The first husband then filed for custody of the child and attached the emails to the court filing, reports Arizona Central.
Walker's lawyer Leon Weiss is using the additional time to review police records from the sheriff's office involving spouses and ex-spouses reporting that their e-mails had been read; however, he could not find a single prosecution, says Arizona Central.
Prosecutor Paul Walton said Walker's actions merited the felony charge and that he used the information to "humiliate her."
Leon and Clara Walker divorced in December 2010.
http://www.cbsnews.com/8301-504083_162_20030408-504083.html
So before you try to use someone else's e-mails against them you better think twice, because you could be on your way to becoming a convicted hacker.
Sunday, February 27, 2011
"Pirates with Attitudes:" Sharing or Illegal?
“Pirates with Attitudes” was a worldwide group distributing thousands of copyrighted software including the then unreleased Windows 2000. The site did not actually sell software, but was more of a barter system. Intel employees would give the site access to software they obtained from work in exchange for software that the site had. Justin Robbins from Charlotte, NC was a Microsoft employee who supplied Microsoft software and allowed access to Microsoft’s internal network with his personal identification and password. The software was available on a hidden internet site at a university in Quebec, Canada called Sentinel.
The Question:
The website did not receive a monetary profit for the software, but instead received additional software that they could use. Think about the current controversy over Limewire and how songs are only exchanged with no money involved. Do you think the Pirates with Attitudes group should be punished for sharing software among their group?
The Court's Answer:
Seventeen defendants were indicted from the group in 2000 by a federal grand jury after an undercover FBI investigation. The members pleaded guilty and received jail time, house arrest, probation, and fines. The group was in violation of the No Electronic Theft (NET) act, which holds people responsible for copyright infringement even if no profits are involved. So, basically, under the NET act you do not actually have to sell copyrighted software to be at fault.
Follow this link to view the indictment:
http://www.cybercrime.gov/pirates.htm
http://www.justice.gov/criminal/cybercrime/pirates.htm
Monday, February 21, 2011
ISP Data Retention Mandate
Recently, the Department of Justice provided testimony to Congress regarding the issue of Internet Service Provider data retention. The testimony emphasized the critical need to preserve digital data and highlighted several cases where investigations of serious crimes were inhibited due to the lack of data retention by the ISP.
Currently, there are no standard requirements for ISP data retention and practices vary widely among providers. Privacy advocates argue that data retention should be minimized in order to protect individual privacy and prevent misuse of data. They fear that a data retention mandate would create databases that could be used to track the internet activities of all users and could inhibit freedom of speech . Service providers argue that data retention requirements would pose a significant cost burden that would have to be passed on to the consumer . In balancing those concerns against the priority of public safety, it is important to consider the following:
1. Law enforcement's ability to obtain data is controlled through laws regarding subpoenas, court orders, search warrants and surveillance requests. A data retention mandate would not reduce the protections provided by those rules.
2. The consumer already bears a high cost for the damage inflicted by internet crime. Increasing the ability of law enforcement to investigate and prosecute internet criminals could reduce this cost burden.
Standardizing data retention rules for ISPs is an important step in improving the ability to fight internet crime and the DOJ should continue to work with the ISPs , Congress , and other interested parties to find the best solution.
Read the DOJ testimony here: http://www.justice.gov/criminal/ceos/Justice%20Data%20Retention%20Testimony.pdf
Read Time Warner Cable's data retention policies here: http://www.timewarnercable.com/corporate/subpoenacompliance.html