lawenforcement

Latest

  • Electron microscopes stop thieves from covering their tracks

    by 
    Jon Fingas
    Jon Fingas
    02.24.2015

    Ask the police and they'll tell you that serial numbers seldom help catch thieves -- dedicated crooks are usually smart enough to file off those digits so that stolen items can't be linked to a crime. Researchers at the National Institute of Standards and Technology might have just found a way to recover those numbers and stop criminals in their tracks, however. Their new technique uses electron microscopes to spot damaged crystal patterns in steel, revealing characters even when they've been polished into oblivion. Current recovery approaches (like acid etching or electrolytic polishing) only sometimes work, and frequently provide faint clues at best -- the microscope produces clear evidence that you could use to convict someone in court.

  • Google fights rule that would let the US hack devices worldwide

    by 
    Jon Fingas
    Jon Fingas
    02.19.2015

    The US is already snooping on computers around the world, but Google is worried that it might be sneaking in a rule change that would sanction more nosy behavior. The search firm has filed comments protesting an advisory committee proposal that would let the government get warrants for "remote access" to phones and PCs when their locations are hidden "through technological means." While the change is ostensibly targeted at American suspects masking their connections or running botnets, Google is worried that the proposal is worded such that it would allow law enforcement to hack into devices worldwide without any real political debate on the subject. After all, someone on a virtual private network could easily be in another country -- you might not know until you've broken in.

  • Police are using software to predict where crime will happen

    by 
    Jon Fingas
    Jon Fingas
    02.11.2015

    Police are unlikely to ever have a Minority Report-like ability to get inside would-be criminals' heads, but they may already have the next-best thing. Developers like PredPol are offering "predictive policing" software that tells cops where and when crimes are likely to happen based on the location, the nature of the crime and the time of day. The software knows that there's a good chance that a burglary or gang slaying will lead to similar activity in a given area, or that you'll see drunken fights outside of a dive bar in the early morning. Theoretically, police just have to patrol these areas more often to stop crime before it starts.

  • UK government reveals its hacking guidelines

    by 
    Jon Fingas
    Jon Fingas
    02.08.2015

    It's no secret that numerous countries see hacking as a viable security strategy, but the British government has been reluctant to admit as much. Ask it about GCHQ's ability to mess with communications, for example, and it will only say that whatever it does is legal and necessary (even if it isn't). The nation's leaders just got a little more honest, however: the UK Home Office has published the guidelines that law enforcement and spies follow when using "equipment interference" (read: hacking) to get into phones and PCs. The rule set largely deals with high-level issues such as proportional uses of hacks, data retention and the validity of warrants, but it's a rare acknowledgment that these digital intrusions even take place. It goes so far as to mention that the UK intercepts and bugs gadgets it wants to spy on, much like its American counterparts. Minister James Brokenshire claims that the government is being "as open as it can be" about its security policies by publishing the documents, and this is certainly a milestone given earlier secretiveness.

  • Dropbox now reports when non-US governments want your data

    by 
    Jon Fingas
    Jon Fingas
    01.28.2015

    While Dropbox was quick to embrace transparency reports, it's been pretty opaque about data requests from outside the US. How do you know which countries want your info? You don't have to wonder any longer. The cloud storage outfit has published its first transparency report revealing data requests from beyond American borders. There aren't many at all (just 20 in total), but it's clear that some governments are nosier than others. Half of all requests came from France and Germany, while the rest are spread between nations as far-ranging as Australia and Brazil. The report now covers the number of accounts affected by these demands, too. More detailed stats won't do much to end intrusive surveillance, but they'll at least let you know who might be poking around your online files.

  • Police think Waze's traffic app puts officers in danger

    by 
    Jon Fingas
    Jon Fingas
    01.26.2015

    You may use Google's Waze app primarily to avoid traffic jams and watch out for speed cameras, but some American police see it as a threat -- and they want Google to do something about it. Officers speaking to the Associated Press believe that Waze's police finding feature, which is mainly meant to warn about speed traps, makes it too easy for would-be cop killers to find targets. These critics hope to muster support from law enforcement groups and push Google into disabling the feature so that it's not relatively trivial to "stalk" uniformed people from a phone.

  • Police reportedly arrest UK hacker behind gaming network attacks

    by 
    Jon Fingas
    Jon Fingas
    12.31.2014

    Lizard Squad probably shouldn't have bragged about being impossible to track following its cyberattacks against the PlayStation Network and Xbox Live. According to both The Daily Dot and a Thames Valley Police report, law enforcement arrested alleged group member Vinnie Omari on December 29th -- not for the gaming network attacks themselves, but for stealing from PayPal accounts. Omari says that the cops haven't pressed formal charges (they released him on bail), but they also confiscated all his computing devices and storage to gather evidence.

  • Judge says police can create fake Instagram accounts to see photos

    by 
    Jon Fingas
    Jon Fingas
    12.21.2014

    Many would argue that cops cross the line when they impersonate people on social networks to catch suspects, but that doesn't mean that fake accounts are always off the table. In a recent opinion, New Jersey district judge William Martini contends that police don't need search warrants to create bogus Instagram accounts for the sake of seeing a suspect's photos. As Martini explains, it's "consensual sharing" -- the perpetrator is both making these pictures public and willingly providing access to others. That's bad news for Daniel Gatson, an alleged burglar who insisted that law enforcement needed probable cause (that is, reasonable belief that there's evidence of a crime) to peek at an Instagram feed laden with shots of cash and jewelery.

  • NYPD dispersing body cameras amidst police brutality uproar

    by 
    Chris Velazco
    Chris Velazco
    12.03.2014

    New York City's brass hasn't fully committed to tricking out its nearly 35,000 person police force with body cameras yet, but Mayor Bill DiBlasio is eager to give them a shot. That's why the NYPD is testing the waters with a pilot program that'll see select officers from six commands throughout the city go about their daily duties while wearing matchbook-sized cameras on their chests. According to the New York Times, that first batch of 54 camera-equipped cops could be on the streets in certain sections of the city as early this weekend.

  • Engadget Daily: Gear S review, the White House offers funding for body cams and more!

    by 
    Andy Bowen
    Andy Bowen
    12.01.2014

    If you thought Samsung's Gear S smartwatch could rid you of the need for your phone, think again. We reviewed the wearable, and as it turns out, you'll need a handset just to get the thing up and runnin'. That's not all we have today, though -- read on for all our news highlights from the past 24 hours.

  • White House offers $263 million in funding for police body cameras

    by 
    Jon Fingas
    Jon Fingas
    12.01.2014

    In case it wasn't glaringly clear, police accountability is a major concern these days -- and the White House is convinced that technology can help solve the problem. It's now promising up to $263 million in matched funding for law enforcement agencies that want to buy body cameras for their officers. About $75 million of the fund is for purchasing the cameras themselves (up to 50,000 of them); the rest is devoted to storage, training and outreach programs meant to renew the level of trust between cops and the communities they serve. This is just one part of a much larger solution that also includes an overhaul of how the government distributes military gear, but it could make a big difference if it provides video evidence whenever there are complaints of excessive force or rights abuses. [Image credit: Aaron P. Bernstein/Getty Images]

  • US courts hope an old law will help them bypass phone encryption

    by 
    Jon Fingas
    Jon Fingas
    11.26.2014

    Federal law enforcement might not be having much success pushing for laws that require a security backdoor on your phone, but that doesn't mean it's out of options. Judges (including one who published an opinion on a New York fraud case) have been leaning on the All Writs Act, a 1789 law granting courts power to carry out their duties, to compel phone makers to provide "reasonable technical assistance" in unlocking devices. Theoretically, this could force vendors to help decrypt phones when they'd otherwise say they couldn't.

  • Seattle police get help publishing body camera videos online

    by 
    Jon Fingas
    Jon Fingas
    11.24.2014

    The police aren't often fond of publishing body camera and dashcam footage online, but not necessarily for nefarious reasons -- the volume of privacy-focused video editing they require can prove overwhelming. In Seattle, for example, a flood of public disclosure requests from an anonymous programmer (known by his "policevideorequests" handle) risked scuttling a body cam trial run before it got off the ground. However, that one-time antagonist is now coming to the city's rescue. The man has agreed to help Seattle's police department publish video by showing them how to quickly redact clips and get them online. As the unnamed person explains, it should mostly involve ready-made tools; the police will strip audio from clips using free software and lean on YouTube's automatic face blurring to protect identities.

  • US Marshals will auction 50,000 Bitcoins seized from Silk Road

    by 
    Jon Fingas
    Jon Fingas
    11.17.2014

    Want a virtual piece of law enforcement history? You're about to get your chance. The US Marshal's Service is holding an auction on December 4th that will sell off 50,000 Bitcoins from Ross Ulbricht (aka Dread Pirate Roberts), the alleged founder of the black market website Silk Road. You'll need plenty of real-world cash to get your hands on this digital currency, though. The feds are selling the digital currency in batches of 2,000 to 3,000 coins, and you'll need to place a minimum $100,000 deposit by December 1st to claim one of them. Not exactly an impulse purchase, then. At least this isn't the last auction you'll see -- police seized a total of 144,000 Bitcoins in the Silk Road bust last year, and roughly half of them have yet to go on sale. [Image credit: AP Photo/Rick Bowmer]

  • The FBI faked a news website to catch a bomb threat suspect

    by 
    Jon Fingas
    Jon Fingas
    10.28.2014

    The DEA isn't the only US law enforcement agency using impersonation on the web to catch suspects, it seems. The American Civil Liberties Union's Christopher Soghoian has noticed documents showing that the FBI created a fake, spyware-laden version of the Seattle Times' website to catch a teen bomb threat suspect in 2007. When the teen clicked the link to check out an equally fake Associated Press story, the hidden software installed itself and sent both the target computer's location and its internet address to officers. As you might gather, both civil liberty advocates and media outlets are furious -- the FBI effectively conducted a phishing attack, and neither the AP nor the Times appreciate having their names and likenesses used without permission.

  • Facebook wants the DEA to promise that it won't create fake accounts

    by 
    Jon Fingas
    Jon Fingas
    10.18.2014

    Remember how the DEA got caught impersonating a woman on Facebook in an attempt to catch criminals who contacted her? Yeah, Facebook isn't at all pleased. It just sent a letter asking the anti-drug agency to promise that it won't create fake accounts or otherwise stomp all over the social network's terms of service. As the site argues, the DEA's moves "threaten the integrity" of its user base -- the point of Facebook's real identity policy is to foster trust, and sting operations violate that trust. Law enforcement isn't above this rule, the company says. It's not certain if the letter will have any effect; the Justice Department tells BuzzFeed News that it doesn't believe this trickery happens frequently. Whether or not that's true, it's safe to say that Mark Zuckerberg and crew have set some firm boundaries for future cases. [Image credit: Tim Sloan/AFP/Getty Images]

  • FBI director sees progress in the US' ability to fight cyberattacks

    by 
    Jon Fingas
    Jon Fingas
    10.07.2014

    FBI director James Comey has held office for more than a year, but he hasn't really had an opportunity to explain his views on camera. What does he think about the US' ability to cope with cyberattacks, for example? If you've been curious to understand his approach, you'll be glad to know that CBS News has posted the first part of an interview with Comey touching on these subjects. He reveals that he's happy with the progress the government has made on dealing with online intruders, even if it's clear that there's still a long way to go. As he explains, the US' digital defense is a lot like a high school soccer team. It's competent on the field, but no where near the World Cup skill it needs to stop many threats.

  • North Dakota cops use a drone to nab three suspects in a cornfield

    by 
    Mariella Moon
    Mariella Moon
    10.02.2014

    Both the Argentine and the UK police have nabbed bad guys with the help of drones in the past, but what about American cops? Well, the police department in Grand Forks, North Dakota, for one, is putting its drone to good use -- just recently, the city's cops have caught four underage men who've been pulled over for drunk driving using a quadcopter called Qube. The teenagers reportedly ran into a cornfield after being pulled over, but instead of giving chase, the cops flew their trusty Qube to find them amidst rows upon rows of corn.

  • Los Angeles police don't want you flying drones over their stations

    by 
    Jon Fingas
    Jon Fingas
    08.03.2014

    The cops may be eager to experiment with drones for tracking bombs and (possibly) suspects, but they're apparently not that keen on people turning the tables. The LAPD claims that activist Daniel Saulmon was trespassing when he flew a machine over a Hollywood police station's parking lot. He was spying on "private property," Lieutenant Michael Ling claims. As you might imagine, Saulmon (who has a history of recording officers on the ground) disagrees. He didn't step inside, after all, and he contends that law enforcement doesn't have the same privacy rights as individuals.

  • Confiscated data must be returned or deleted if it's not covered by a warrant

    by 
    Michael Gorman
    Michael Gorman
    06.18.2014

    Picture a scenario where the government's accused you of a crime. During its investigation, law enforcement copies your computer's hard drive to look for evidence of your misdeeds (pursuant to a warrant, of course). Until today, it was unclear if law enforcement could hold onto copies of your data forever. A new Federal Court decision, however, has crystallized things for us all: the government can no longer keep that data indefinitely. United States v. Ganias is the name of the case in question, and the court held that indefinite retention of our digital files is an illegal seizure under the 4th Amendment to the US Constitution.