FREE e-Newsletter
Important News - Hot Topics
Get them Now!

Cobalt Software Platform - Mark43
Mark43's Cobalt software platform unites a set of law enforcement tools securely...

No upcoming webinars scheduled

Cover Story

Cyber Terrorism: Preventing Online Assault

Is your agency's network ready to withstand cyber terrorism attacks from Anonymous?

September 19, 2014  |  by - Also by this author

Photo: Mark W. Clark
Photo: Mark W. Clark

Hackers constantly target law enforcement. According to the head of the Los Angeles Sheriff's Department's Data Security team, hackers attempt to infiltrate the agency's systems at least once every day—locally and from other states, countries, and continents. But the reasons for the attempts have changed. No longer merely games to demonstrate code-cracking skills "for fun or for fame," motivations are more likely to be nefarious now. Reasons could be financial or political. Whatever the intent, with our dependence on technology it's more important than ever that police agencies protect themselves against cyber terrorist attacks.


For an example of cyber terrorism perpetrated against law enforcement you need only look to the recent attacks by the collective known as Anonymous after a police officer in Ferguson, Mo., shot 18-year-old Michael Brown.

These loosely linked anarchist hackers first took to Twitter and urged citizens to threaten officers during protests. Next they caused the city's Web servers to crash, which took out department radios and forced law enforcement officers to communicate via text. Then they started releasing law enforcement-sensitive information. And it got personal.

Early on in the investigation, officials decided not to release the identity of the officer who shot Brown. In a bid to bully the police into releasing the name, an Anonymous member posted online the home address and phone number of St. Louis County police Chief Jon Belmar. Then they posted photos of his family as well as their names. The succession of creepy posts stopped just short of encouraging people to use this information to attack the chief and his family members.

When law enforcement didn't comply with the hacker group's demands, a member of Anonymous released an officer's name based on information culled from the Internet. It was incorrect information, but it demonstrates cyber terrorists' willingness to find and make sensitive information public and follow through on other threats against the government.

This is just one reason why protecting the security of law enforcement networks and data is so important. Large-scale attacks on major law enforcement infrastructure could compromise the safety of officers and the public. Here's what can be done to prevent such attacks.

Depend on Dedicated Experts

"I see attacks on a daily basis. It's about being vigilant and making sure security is in place to prevent these things from happening," says Soheil Naimi, information security officer for the Los Angeles Sheriff's Department. As the man in charge of his agency's cyber security, he makes sure multiple layers of protection exist between a hacker and the sensitive information housed on the network, the so-called onion model. This includes firewalls, antivirus software, and intrusion detection systems. "I'm always working hard to make sure our onion is in good shape," he says. And he and his co-workers have the time to do so.

Naimi acknowledges that not every department has the budget or need for a six-man unit devoted to cyber security, as he has. But he's adamant that every agency needs a unit or at least a person devoted to maintaining cyber security. If your agency is too small to hire someone fulltime, you can even hire someone from an outside company to work there part-time, he suggests. Just make sure you fully vet the company.

Deputy Superintendent John Daley, chief technology officer of the Boston Police Department, agrees wholeheartedly that cyber security requires special attention and can't be left as an afterthought to be handled by an already busy officer. "This is hard stuff even for people within tech to keep up with," he says. "There's a lot going on out there, and it's a challenge."

Utilize Resources

Making use of available resources is one way to stay on top of all of the cyber threats facing law enforcement today. A major resource everyone in law enforcement can now take advantage of is the FBI's new Cyber Shield Alliance. Launched in January, this extensive Website is designed as a one-stop-shop for anyone in policing looking for information about threats to cyber security. Site registration is available to sworn and non-sworn employees.

"It's a whole government approach. To make it easier to get intel, we've corralled resources from the DHS, FBI, DOD, Secret Service, and the Multi-State Information Sharing and Analysis Center (MS-ISAC)," says an FBI expert in cyber security who's an agent with the Bureau's Computer Intrusion Violations division. "Through the Cyber Shield Alliance Website, accessed via CJIS, you click on the 'intel reports' link and you can see a myriad of sources in one place so you can get a better understanding of the threatscape out there."

In addition to research on threats to guard against, if your agency does suffer a successful attack the Cyber Shield Alliance portal site serves as a central location to report a data breach. Submit a report through what is called e-Guardian and it will reach the FBI's Cyberwatch 24/7 call center. All the relevant federal agencies will be immediately notified so they can respond as needed without any additional calls.

Most people who visit the site will be those who maintain law enforcement networks, but the Cyber Shield Alliance can provide useful information to anyone interested and is also a resource for cybercrime investigators to find information about the newest criminal activities being perpetrated online.

Off the Web, members of other agencies can also provide a great source of intelligence. "Because we want to keep up to date with technology, we work with task forces, the FBI, the Secret Service, and the local DA's office," says Daley.

It might seem odd to work with the district attorney's office, but Daley says it's a matter of taking advantage of available resources. Investigators are able to share the DA's office's equipment and training, thereby protecting everyone's interests.

Daley is also a big proponent of establishing partnerships with local businesses, noting that companies have the added incentive of a "bottom line interest in keeping up on emerging threats." Under his leadership, the Boston Police Department has shared information about cyber threats within the business community for years and both sides find it mutually beneficial.

Get Training

With so many changes constantly taking place in technology, it's imperative that the people tasked with maintaining agencies' cyber security keep current with ongoing training. The Cyber Shield Alliance provides online courses, and is in the process of developing an extensive program that will provide certification in specific areas.

"The first phases will be online with actual scenario-based situations in virtualized environments, so individuals will be able to demonstrate that they understand the material," explains an FBI expert. "The final phase will culminate with a two-week capstone hosted at either an FBI or other federal service facility. You will sit in an environment where you'll collaborate with other law enforcement members in a cyber threat scenario and demonstrate skills used to work a case from beginning to end."

While these cyber investigative certification courses are being developed, in the meantime you can take other free online courses through the Cyber Shield Alliance that include both information technology industry classes and the FBI's own law enforcement-specific courses.

While the person or people dedicated to protecting your agency's cyber security need to be up on any new trends in this field, it's also important for all officers to be aware of any dangers. And it doesn't need to be complicated. LASD simply puts out a monthly e-newsletter to alert all employees to any new tips and threats, as well as reminders of how to be safe.

Not everyone is an IT expert, but virtually every employee at a law enforcement agency interfaces with the network nowadays. The average officer needs to be aware of the small mistakes that can create big problems for cyber security. Clicking on one wrong link or being careless with password information can spell real trouble for an entire department.

"You can have all the proper technical safeguards in place, but the most common point of compromise is the end user," warns Daley. "If you can educate the end user, you're so much better off in the long run. It's a matter of educating and preventing those types of common mistakes that can be made."


Cyber Shield Alliance



Comments (2)

Displaying 1 - 2 of 2

Joshua @ 9/22/2014 12:46 PM

If you wish to keep your systems secure you must actually monitor them, and make sure whatever you are monitoring is correct and is being reviewed. The article has good advice but a monthly possibly weekly email about threats to officers should be put out by all agencies. It should contain tips and tricks for officers and their families to stay safe. And one last tip, stay OFF of social media. if you are on it, dont use your real name and DON'T post pictures of you or your family. Make your profile private and no one other than your friends can view any of your comments and none of your personal data, that you shouldn't put up anyway.

TheRookie @ 9/23/2014 10:22 PM

Depend on these systems way to much today in my view. When I started we had mounted radios inside the Patrol Car. Then we had bricks, limited MDT's, went to the updated smaller scanner style with bulky MDT's, & then the 800mhz trunked system with all the toys now. Hard to turn back when or if systems crash.

Join the Discussion

POLICE Magazine does not tolerate comments that include profanity, personal attacks or antisocial behavior (such as "spamming" or "trolling"). This and other inappropriate content or material will be removed. We reserve the right to block any user who violates this, including removing all content posted by that user.

Other Recent Stories

LE Software 2018
Make use of these computer programs to help you on the job.

Police Magazine