1,000 research outputs found

    Emerging Technologies, Law Enforcement Responses, and National Security

    Get PDF

    Ransomware against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory

    Get PDF
    Technologically advanced hackers are able to commit a crime and leave undiscovered by the authorities. Recent increases in cyber-attacks utilizing technology known as ransomware are leaving police departments and other institutions in the serious situation of having to pay ransom to cybercriminals. The present study employs a Cyber-Routine Theoretical approach in explaining why ransomware victimization has become a viral phenomenon. Data were derived from the recent reported cases of ransomware attacks towards police departments in the U.S. and analyzed in order to build a victim profile. This study shows that online lifestyle and cybersecurity are the salient factors that contribute to the ransomware victimization. Future potential preventive measures and policies will be discussed

    Introductory Computer Forensics

    Get PDF
    INTERPOL (International Police) built cybercrime programs to keep up with emerging cyber threats, and aims to coordinate and assist international operations for ?ghting crimes involving computers. Although signi?cant international efforts are being made in dealing with cybercrime and cyber-terrorism, ?nding effective, cooperative, and collaborative ways to deal with complicated cases that span multiple jurisdictions has proven dif?cult in practic

    GUIDE FOR THE COLLECTION OF INSTRUSION DATA FOR MALWARE ANALYSIS AND DETECTION IN THE BUILD AND DEPLOYMENT PHASE

    Get PDF
    During the COVID-19 pandemic, when most businesses were not equipped for remote work and cloud computing, we saw a significant surge in ransomware attacks. This study aims to utilize machine learning and artificial intelligence to prevent known and unknown malware threats from being exploited by threat actors when developers build and deploy applications to the cloud. This study demonstrated an experimental quantitative research design using Aqua. The experiment\u27s sample is a Docker image. Aqua checked the Docker image for malware, sensitive data, Critical/High vulnerabilities, misconfiguration, and OSS license. The data collection approach is experimental. Our analysis of the experiment demonstrated how unapproved images were prevented from running anywhere in our environment based on known vulnerabilities, embedded secrets, OSS licensing, dynamic threat analysis, and secure image configuration. In addition to the experiment, the forensic data collected in the build and deployment phase are exploitable vulnerability, Critical/High Vulnerability Score, Misconfiguration, Sensitive Data, and Root User (Super User). Since Aqua generates a detailed audit record for every event during risk assessment and runtime, we viewed two events on the Audit page for our experiment. One of the events caused an alert due to two failed controls (Vulnerability Score, Super User), and the other was a successful event meaning that the image is secure to deploy in the production environment. The primary finding for our study is the forensic data associated with the two events on the Audit page in Aqua. In addition, Aqua validated our security controls and runtime policies based on the forensic data with both events on the Audit page. Finally, the study’s conclusions will mitigate the likelihood that organizations will fall victim to ransomware by mitigating and preventing the total damage caused by a malware attack

    CRYPTOCURRENCY: CHANGING THE GAME FOR STATE AND LOCAL LAW ENFORCEMENT

    Get PDF
    Criminals have increasingly embraced cryptocurrency, accounting for its explosion. This thesis traces cryptocurrency’s growth and the government’s failure to combat it and provides a guide for state and local law enforcement to identify and curb illegal cryptocurrency. It highlights cryptocurrency’s key exploitable characteristics and recommends agency policies and procedures, pinpointing some drivers of organizational change to accelerate state and local law enforcement agencies’ preparedness. The thesis offers cases to demonstrate how law enforcement mastered DNA analysis by creating policies and procedures, increasing knowledge, and acknowledging legal precedents. The work reveals a critical need for cryptocurrency training and education at state and local levels. Identifying cryptocurrency in criminal investigations and populating shared databases is a pressing need, so leveraging federal partnerships and educational institutions for training should advance efforts. Collaborating with private companies on cryptocurrency identification software will also change the game. In sum, sharing intelligence, performing community outreach for prevention, and reexamining cold cases through new cryptocurrency intelligence may stem these crimes.Civilian, New Jersey State PoliceApproved for public release. Distribution is unlimited
    • …
    corecore