Law Enforcement Technology

APR 2014

Issue link: https://let.epubxp.com/i/286869

Contents of this Issue

Navigation

Page 9 of 47

10 Law Enforcement Technology April 2014 www.officer.com CYBERCRIME six months to a year before they use that information to steal money." For some it's about opportunity. For others, it's bigger than that—it's about building something. This is highly tech- nological, highly organized borderless crime. Many cybercrime investigations span multiple countries. Because of this, upper-level law enforcement orgs must work closely with state and local agen- cies to put the pieces together. "There's always a catch-up that seems to be happening, and that's true for the government agencies, be it the FBI or CIA and the different law enforcement agencies supporting them," says Schober. "Because some of the criminals are so advanced…a lot of times they're exploiting weaknesses that aren't yet known." Eric Feldman is unit chief of cyber- crimes with the Transportation Security Administration, a division that employs more than 250 certified computer forensic analysts and a number of spe- cial agents. This center is the main investigatory agency for transnational crime, including human smuggling, human/weapons/narcotics trafficking; child exploitation, money laundering, etc. He says given the international nature of online crime it is generally not something a state or local department can work beginning to end. "That's why partnership is so important." He says education is the key to ensure state and local are engaged throughout the inves- tigation in order to get prosecutions. The cybercrime center is constantly producing and refining training to keep its workforce up-to-speed on changing technology. They work closely with the Department of Homeland Security and academic communities. "Cybercrime is a multibillion dollar elicit economy and we have to…dili- gently position ourselves to be able to combat that threat. I wish street crime went down with the increase of crime online but of course it doesn't. It's just another mechanism for criminals to hide behind," says Feldman. The Silk Road was a high profile case that cast a bright light on under- ground marketplaces and the anony- mous nature of currency exchange. There are many other such "marketplac- es of vice" alive and well, some 100 per- cent elicit, buried deep beneath the lay- ers of the encrypted Tor network, the same network Edward Snowden used to send information about PRISM to the Washington Post and the Guardian in 2013. Tor software masks the true Internet protocol addresses of its users, thereby providing complete anonymity. Not long after Silk Road was detected, Silk Road 2.0 sprang up ready to con- tinue doing business. The Conceal Carry Tote pro.tuffyproducts.com/let | 866.318.8339 made in usa • Keyless entry combination lock enables all team members access. • Locking Cable or Mounting Sleeve provide secure storage locations. • Inside is lined to protect and cushion contents. • Welded steel construction • Durable powder coat fi nish The Portable Safe The Tactical Security Lockbox Scan this code with your smartphone to view these gear storage solutions or browse all our heavy duty products built to withstand a lifetime of abuse. SERIOUS THEFT PROTECTION TUFFY S E C U R I T Y P R O D U C T S ® Circle 16 on Reader Service Card LET_08-11_Cybercrime0414.indd 10 3/20/14 9:03 AM

Articles in this issue

Links on this page

Archives of this issue

view archives of Law Enforcement Technology - APR 2014