Police Magazine Logo
MenuMENU
SearchSEARCH

Cyber Security: Locking Down the Databases

Computer security is one of the primary concerns for many of the nation's companies and government agencies. Billions of dollars is spent each year on preventing external threats from entering protected networks. But the sad truth is that most computer network breaches are caused by sloppy internal security policies and procedures.

August 8, 2014
Cyber Security: Locking Down the Databases

Photo: Mark W. Clark

6 min to read


Computer security is one of the primary concerns for many of the nation's companies and government agencies. Billions of dollars is spent each year on preventing external threats from entering protected networks. But the sad truth is that most computer network breaches are caused by sloppy internal security policies and procedures.

Talk to cybersecurity specialists, and they will tell you in choice words that many computer users just don't understand what it takes to protect a network. One problem that is pretty much universal is that people tend to be a bit careless with key security information. They write their passwords on Post-It notes and slap them on the desks beside their computers; they use "1234" or their names and birthdates as passwords; and/or they share passwords with unauthorized users.

Ad Loading...

The FBI's Criminal Justice Information Systems (CJIS) division has long been concerned about the security of criminal databases used by law enforcement officers. CJIS maintains such databases as NCIC, IAFIS, and VICAP, and these databases contain confidential information about criminals, suspects, and victims. CJIS is responsible for maintaining the privacy of that information, and it doesn't want unauthorized people to access it. In recent years such security breaches have become much more likely as law enforcement agencies are now using the information in the field on easy-to-lose and easy-to-steal devices like laptop computers, tablets, and smartphones.

Three years ago CJIS decided it was time to ask the agencies that use its databases to do a better job of making sure only authorized personnel have access. It issued a mandate that agencies using FBI databases implement a multifactor authentication process that would prevent anyone but the right people from seeing the information. The mandate was scheduled to take effect last October, but CJIS decided to extend the deadline to this October. It's not known if it will be extended again this year.

"CJIS continually extends the deadline because this is an unfunded mandate so some of these agencies just don't have the funding to become compliant," says Jennifer Shoemaker of Panasonic's Public Sector Team.

Complex and Confusing

Experts say most law enforcement agencies are aware of the CJIS database security mandate, but some agencies are having a hard time complying. And budgets are not the only reason.

Ad Loading...

One complicating factor is that each state also has a mandate for law enforcement database security, and the state requirement may exceed their federal counterpart's. Shoemaker says the differences between the state and federal security mandates can lead to confusion. She offers the following example of how the two mandates can contradict. "Federal CJIS guidelines say that inside the four doors of a police vehicle is a compliant place for your laptop. So federally if the laptop stays inside the vehicle then it doesn't have to comply with this mandate. The state of Florida says that's not the case."

The interpretation of what the feds mean by "stays in the vehicle" is also tricky. On its face it sounds like the clause automatically granting compliance to laptops that stay in police vehicles resolves the vast majority of CJIS compliance concerns for agencies nationwide, as most law enforcement laptops are inside patrol cars. But it doesn't. Shoemaker says "stays in the vehicle" means it literally isn't removed from the vehicle. Since many agencies assign laptops to officers, not vehicles, even if those laptops spend much of the day in vehicle mounts they still need to be fitted with some sort of multifactor authentication protocol to gain federal CJIS compliance.

Multifactor Authentication

In order to comply with the CJIS mandate, agencies have to gate access to FBI databases with a two-part authentication protocol. Specifically that means the officer has to both know something and bring something to unlock access.

Knowing something is the easy part. It's the same password procedure that almost every American uses every day on both work and personal devices.

Ad Loading...

Bringing something is considerably more complicated. Accessing officers have to either carry with them a radio frequency identification (RFID) card, a security token, a dongle, or something in that vein or use some physical aspect of themselves such as a fingerprint or a retinal pattern to unlock the data.

Shoemaker says biometric scanners are by far the most popular secondary authentication method used by the agencies she contacts. Some of the reasons that biometric authentication is so popular with so many agencies is that the scanners are easy to use and can be built into most manufacturers' devices for nominal cost. And there's another reason many agencies prefer biometric access over systems that require officers to carry a separate object: "It's hard to lose your fingerprints," Shoemaker explains.

Facial recognition is another biometric protocol that shows promise. Swiss company KeyLemon has had much success offering a facial recognition security application for the medical and security industries and believes its new facial and voice recognition application could be very popular as a biometric authentication tool for law enforcement. The company hopes to work with computer manufacturers to offer the software to customers as a built-in option, but it is also available in a free evaluation version at www.keylemon.com. The full version can also be downloaded from the company's Website for a $60 one-time fee per user. It runs on Mac OS, Windows, Android, and iOS.

Anthony Gioeli, KeyLemon's vice president of sales and marketing, says the application is easy to install, easy to set up, and more than 90% accurate. No special hardware is needed to use KeyLemon; all it requires is a Web camera and a microphone, both of which are usually built into most laptops. The facial recognition software reads the person's face regardless of facial hair or glasses (though sunglasses can be a problem), and the voice recognition software reads the user's voiceprint regardless of language or accent, according to Gioeli.

Gioeli says there are advantages to having both voice and facial recognition capabilities on the same law enforcement computer. "We recommend officers use the voice recognition or the facial recognition based on conditions. They can either speak to the device or look at it, whichever is more convenient," he explains.

Ad Loading...

RFID cards are another secondary authentication option. Many law enforcement agencies use key cards for the doors into their stations, so officers have to carry the cards on their person at all times on duty anyway. What some agencies do for secondary authentication on their digital devices is they add RFID chips to the key cards and an application that reads them on the devices they use to access FBI databases. Of course, the downside to this system is that officers can easily lose the cards.

Seeking Help

All of this technology can be pretty intimidating for some agencies seeking to gain compliance with the CJIS mandate. Which as discussed can be pretty confusing. Panasonic's Shoemaker says of the federal and state mandates that the guidelines are "very organic and ever changing. It's hard to keep up with."

The mandate and its requirements can be particularly taxing for smaller agencies that don't have IT support. Many of these agencies are now depending on their county sheriffs to lend a computer-savvy hand. "Some IT staffs from sheriffs' offices actually manage the hardware and even the databases for smaller agencies in their counties," Shoemaker says. "Some smaller agencies even access the FBI criminal databases through their local sheriff's office."

And smaller agencies are not the only ones who can find the federal and state CJIS mandates bewildering. Shoemaker says she's seen a lot of turnover in public safety IT and the new hires often are not aware of the mandates or what to do about them.

Ad Loading...

Shoemaker says one of the most costly aspects of complying with the mandate is the time that law enforcement and public safety IT personnel have to spend determining the best solution to meet their needs and the requirements of the mandate. She recommends that agencies seek out the help of the companies and systems integrators that sell, install, and service their computers.

FOR MORE INFORMATION:

Brite Computers

Dell

DRS Technologies

Ad Loading...

Getac

KeyLemon

Panasonic

Rugged Notebooks

Stealth

Subscribe to our newsletter

More Technology

Close-up of a person holding an Axis body-worn camera toward the viewer. The camera is in sharp focus, while the person wearing a dark uniform appears blurred in the background outdoors.
TechnologyMay 7, 2026

Case Study Details Integration of Body-Worn Cameras with CAD

The Billerica Police Department (Massachusetts) improved transparency and accountability, sharpened evidence management, and reduced manual hours by integrating Axis body-worn cameras with its Computer-Aided Dispatch (CAD) system.

Read More →
Dark map of downtown Chicago displaying three emergency alerts for reported gunfire near Randolph Street, W Harrison Street, and N Columbus Drive. Blue circular markers indicate locations near Union Park, Clark Art Museum, and Jack Academy High School.
TechnologyMay 7, 2026

ZeroEyes Public Safety Alerts Integrates Samdesk for Real-Time Risk Detection and Awareness

ZeroEyes has integrated Samdesk into its Public Safety Alerts platform to deliver faster, verified intelligence to help organizations understand emerging risks and respond quickly.

Read More →
High-angle view of cars with lights turned on crossing the George Washington Bridge at dusk.
TechnologyMay 7, 2026

NJ Police Department Combines Strong Technology & Public Safety Strategy

The Fort Lee Police Department in New Jersey has modernized with Genetec Security Center, including video management, automatic license plate recognition (ALPR), and Clearance digital evidence management.

Read More →
Ad Loading...
Graphic with image of crime scene investigator and yellow evidence markers and black box covering the persons idenity and headline Automated Redaction.
TechnologyApril 30, 2026

Pimloc & Dynamic Workflow Solutions Partner to Deliver Data Management and Automated Redaction

The joint redaction solution from Pimloc and Dynamic Workflow Solutions helps agencies reduce FOIA response time and compliance risk by automatically redacting faces, license plates, and other sensitive information from digital evidence.

Read More →
Fans cheer at Saban Field at Bryant-Denny Stadium during a football game at The University of Alabama.
TechnologyApril 23, 2026

The University of Alabama Rolls Out Couter-Drone Technology

The University of Alabama is using D-Fend Solutions as a counter-drone technology supplier for campus and game-day airspace security. The University integrates D-Fend’s EnforceAir into its Emergency Operations Center (EOC), utilizing a unified command framework to collaborate with local, state, and federal partners during major events.

Read More →
Man working in front of multiple computer screens.
TechnologyApril 22, 2026

Motorola Solutions Now Part of the Cyber Threat Alliance

Motorola Solutions is now part of the Cyber Threat Alliance, the first formally organized nonprofit group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries.

Read More →
Ad Loading...
Bar chart showing what police departments spend budget on for security.
TechnologyApril 22, 2026

Genetec 2026 State of Physical Security Report Reveals Public Safety Priorities & Challenges

Survey results from Genetec’s 2026 State of Physical Security Report highlight the demand for integrated systems that improve response times and reduce investigative workload. Nearly nine in 10 respondents said they use security data to help keep officers safe.

Read More →
Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Ad Loading...
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →