ilets conference 2015 there should’ve been more patrol/detectives in this room and here’s why…

39
ILETS CONFERENCE 2015 THERE SHOULD’VE BE EN MORE PATROL/DETECTIVES IN THIS ROOM AND HERE’S WHY….

Upload: meghan-johns

Post on 25-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

ILETS

CONFE

RENCE

2015

T HE R

E SH

OU

L D’ V

E BE E N

MO

RE

PAT RO

L / DE T E C

T I VE S I

N T

HI S

RO

OM

AN

D H

E RE ’ S

WH

Y ….

THE AUTO CYCLE

The auto cycle is already out there, this was seen at Carl’s Cycle Sales in Boise by Kevin and I one weekend:

THE ELIO, BY ELIO MOTORS..

This is the ELIO, it gets 84 mpg, it has a speed of 107 mph, it will cost roughly $6800 and there are already 40,000 of them pre-ordered. They are one seat, however there is a two seat option.

The AUTOCYCLE, will be registered as a motorcycle, with a motorcycle plate. It is not required to have a motorcycle endorsement and you are not required to wear a helmet.

ONLINE INSURANCE VERIFICATION

This comes into effect 07/01/2015 and requires law enforcement officers to verify insurance via the internet, prior to issuing a citation. The law is already written, 49-1234.

They have not decided yet how you will log in, whether it be individual officer or agency specific.

Insurance companies will be required to submit insurance info electronically to the State, it has not yet been confirmed how often they will do this.

It is in state, Idaho only and you will not be able to verify insurance information on Commercial Vehicles, Golf Carts or Farm Equipment.

UTV/ATV LAW:As of 07/01/2015, you will be allowed to cross and

travel on State Hwy 55 within city limits in a 45MPH zone or less on a UTV/ATV. Still not allowed to cross or travel on the Highway in the County areas, you can on a snowmobile, but not a UTV. Cascade City and McCall City have not come up with an ordinance at this point to stop this from happening.

CLARIFICATION ON FELONY DUI SUSPENSIONS AND A RESTRICTED DRIVER’S PERMIT……On felony DUI’s previously there was confusion about absolute suspension and allowing for a restricted driver’s permit.

It now will read that if you are convicted of a felony DUI, you will be eligible for a restricted driver’s permit after one year of ABSOLUTE suspension, they must carry the RLP paperwork in their vehicle and they will be required to have an interlock device. The permit will only allow for medical and work related conditions.

NOW FOR THE GOOD STUFF……..

BUMP.COM

WHAT IS BUMP.COM?

Well…

Bump.com is a website that you sign up to, you “claim” your vehicle plate and it connects to your Facebook account.

You claim your plate like so….

Then it allows people to search for your vehicle plate and it links to your Facebook account and WA LA… CREEPER has just figured out who you are and where you are. It also tracks where you have been and you can add your car details and photos of your car.

SCENARIO: You are at a stop light, creeper sees you, writes your plate down, enters it into BUMP.COM and now he knows everything he needs to know from your Facebook account on where to stalk you…

THE BAD SIDE: THE GOOD SIDE:

NDEX – THE NATIONAL DATA EXCHANGE PROGRAMWhat is it?

The National Data Exchange (N-DEx) provides criminal justice agencies with a mechanism for sharing, searching, linking, and analyzing information across jurisdictional boundaries. A national repository of criminal justice records submitted by agencies from around the nation, N-DEx uses those records to “connect the dots” between data on people, places, and things that may seem unrelated in order to link investigations…and investigators. N-DEx supplies free, secure, and immediate access to relevant information, enhances the criminal justice community’s ability to share that information in a timely manner, and provides analysis and collaboration tools to assist investigators working cases cooperatively with other agencies.

What it means for Idaho and your agency:

Currently there are 6 agencies in Idaho participating in a BETA program with NDEX in uploading their records. It is not available yet, but it will be soon. CJIS will be contacting Sheriff’s and Chief’s once they are firm on the system working properly. THIS IS A NATIONWIDE DATABASE.

How it works:

You create a user profile through LEEP (formerly LEOnline)

 In order to access this information, you will need to obtain a membership from LEEP, which can all be done online through the website. It takes 14 days to get approved.

There are different levels of data sharing:

GREEN: FULL ACCESS – this allows agencies to see everything, including narratives, photos, etc. You can search names, vehicles, anything.

YELLOW: SOME ACCESS – this limits what agencies will see, the submitting agency picks and chooses data.

RED: This is tricky. If you query on an agency who has limited their access to RED, it will not return any information, but it sends that agency a notice that you have inquired about it and they will contact you.

JASON THOMAS – EMERGING TECHNOLOGY

WHAT YOU DON’T KNOW ABOUT YOUR XBOX ONE…..DID YOU KNOW YOUR XBOX IS SPYING ON YOU, EVEN IF IT’S

TURNED OFF?

https://www.youtube.com/watch?v=Hi5kMNfgDS4

As long as your device is plugged in, it is watching and it can be hacked. The KINECT sensor is sold with all XBOX 1 gaming systems.

WHAT YOUR GAMING SYSTEM KNOWS ABOUT YOU

If you watch any of these on your XBOX, it’s saving your data profile and tailoring the advertisements to what you watch. Advertisers are making big moves from convincing people to intriguing people on their products through the use of these devices. It’s learning what you want to see.

Did you know that at anytime you are watching something and you want to know what brand of sneakers Lebron James is wearing or where Chris Wallace from FOX News gets his ties, now virtually any product in any scene in any movie can be stopped and shopped? Say you are watching Mad Men and you say, “XBOX, pause. What is Don Draper Drinking?” Up comes the fulfillment site for an Old Fashioned, with the ingredients and preferred brand of bourbon. At which point you can ask XBOX to see if any of your local stores carries that brand.

BIOMETRIC DATA – THE WAVE OF THE FUTUREDon’t think it’s too far fetched to think that we are going to be

“micro chipped” as human beings in the not too far distant future…

Who do you think has the largest database of fingerprints, other than the Government?

Who has the largest data base of voice recognition?

And.. What about facial recognition?

The answers might surprise you………..

WALT DISNEY…….

Walt Disney holds the largest database of fingerprints, other than the Government.

They have developed a fingerprint scanner that ties to your Disneyland Ticket to help prevent fraud. The fingerprint is scanned with the ticket to prevent you from leaving the park and giving your ticket to another person to re enter or to use someone else’s annual pass.

HELLO SIRI…….

APPLE is the largest owner of voice recognition data. Here’s what happens. Whenever you speak into Apple’s voice activated personal digital assistant, it ships it off to Apple’s data farm for analysis. Apple generates a random numbers to represent the user and it associates the voice files with that number. This number — not your Apple user ID or email address — represents you as far as Siri’s back-end voice analysis system is concerned. Once the voice recording is six months old, Apple “disassociates” your user number from the clip, deleting the file.

FACEBOOK…..

FACEBOOK has the largest database of facial recognition data. Due to the amount of photos that are uploaded to Facebook on a daily basis…

SOCIAL MEDIA – KEEPING TABS…

YIK YAK - live feed of a 10 mile radius of where you might be, chat site, huge bullying site, parties.

The GPS coordinates of the location from which the

message was posted.

REDDIT.COM TINDER.COM

FOURSQUARE.COM

GOOGLE – PHOTO RECOGNITION SEARCHhttp://

www.google.com/insidesearch/features/images/searchbyimage.html

This can be photos or even tattoos of someone, which may link to their facebook account.

THINGS THAT KEEP CYBER SECURITY PROS AWAKE AT NIGHT……

RANSOMWARE - A typical case involves a hacker getting access to your computer, often through a link on an email you shouldn’t have clicked on, and then locking access to important files such as pictures and spreadsheets—which you can only recover through the payment of a fee, often involving bitcoins. Once things have gone this far, there’s very little a security firm can do.

HOME SWEET HOME - U.K.-based cyber security firm Sophos demonstrated how easy it is to hack into connected devices like an Internet-connected light-bulb that homeowners can control via their smartphones. Sophos hijacked it and made it blink really fast—a Sophos engineer said that, if he wanted to, he could make it explode.

http://blogs.wsj.com/briefly/2015/04/30/5-things-that-keep-cyber-security-pros-awake-at-night/

SEX AND LABOR TRAFFICKING…

IDAHO is not EXEMPT from sex and labor trafficking. Montana has the largest area of human sex trafficking and they are a neighboring state. It doesn’t stop at the borders. Northern Idaho has seen a recent influx of sex and labor trafficking.

It is a $32 billion dollar industry and Native American and Alaskan kids are more at risk and targeted.

There are tons of escort ads on the internet, not just craigslist.

Backpage.com is a big one. Key words are “two girl deal” or “2 Fer”

BlackPlanet.com

NCMEC (National Center for Missing and Exploited Children) have tons of resources that we can use if we have issues with runaways, etc.

NOW FOR THE SCARY STUFF……

THE DARKNET – THE INTERNET UNDERGROUNDWhat is the DARKNET?

The Darknet is a way to browse the internet anonymously. It began in 2004 and was designed for the military to communicate within itself, to keep messages encrypted and secret. Think of it as a separate internet from what you know.

It is virtually impossible to trace back to it’s original domain because it logs on from your computer and then through multiple computers across the world and finally comes out somewhere on the darkside. This is how it keeps it anonymous.

This is kind of how it works visually:

HOW DO YOU ACCESS THE DARKNET?

You have to download a browser that takes you to the darknet. The example used was TOR.COM

BROWSING WITH TOR

Once you download TOR, it looks very similar to a normal internet browser, however if you use google to search, it will have a different country name after GOOGLE, because it routes through so many computers that it thinks you are in another Country…

TOR stands for – The Onion Router. Most websites you visit on the Darknet will no doubt end in the extension “.onion” Onions are (the food) are made of up of mulitple layers, when you cook with them you peel them off and throw them into the mix. .Onion is used because the websites you’re visiting are deeper and harder to find, as they’re behind layers of anonymity.

Lots of Law Enforcement agencies use TOR to browse the internet undetected.

As with the normal internet The DARKNET is even more dangerous, because of the nafarious characters that are on it, you MUST use a “dirty” computer to surf if you want to be safe from hacking and stealing information from off of the computer.

HOW TO NAVIGATE THE DARKNET?

Dark Net is like the early internet. Information for beginners is hard to find. Everyone start with the Hidden Wiki (http://kpvz7ki2v5agwt35.onion), a crowd sourced directory of links. The Hidden Wiki makes an effort to classify the links listed, so you can minimize your exposure to the bad stuff. But like the real internet, the experience relies on following links to discover new things. Because the link are cryptic, Before clicking, remember that: “What has been seen cannot be unseen”.

TOR MARKETPLACES….

WHAT CAN YOU BUY AND SEE ON THE DARKNET….

Things you never thought you’d see on mainstream internet.

There are lots of good sites and information available such as: Political advocacy, whistle-blowing, blogs, essays, forums, etc. Because of the protection offered by the tor network and its hidden services, activists in oppressive regimes are free to exchange ideas and organize themselves.

There is the darkside of wikipedia, it’s called The Hidden Wiki. It takes you to links of drugs, child pornography, lots of illegal and immoral things on here. It is also used by journalist and bloggers where in their countries, freedom of speech is prohibited. The fact that so many of the dark Web's users are enemies also leads to a strange dynamic. Governments and terrorists, law enforcement and criminals are amongst the biggest users of Darknet communications. 

You can purchase a lot of things in there as well…….

Drugs, Weapons, fake ID’s, passports, credit cards, how to hack books….

Here are a few examples of what you can get…

SILK ROAD

This site has been taken down and seized by the FBI…. There are more and more that pop up though because the name is synonymous with illegal activity, so you will see Silk Road 2 or 3 or 4, etc…… The creator of this site hired a hitman for $80,000 to kill an employee who was blackmailing him. He reportedly made $80 million off of commissions of his webstie. A DEA agent has also been indicted.

HOW DO YOU BUY STUFF…..

INTRODUCING THE BITCOIN….

THE BITCOIN….

The BITCOIN is currently one of the hottest ways to pay with digital currency. Money is worth what ever everyone believes in. Everyone believes that paper money is valuable, now the new thing is digital currency.

You install the Bitcoin wallet on your computer or mobile phone, it will generate your first Bitcoin address and you can create more whenever you need one. You can disclose your addresses with friends and vice versa. It is not illegal to purchase Bitcoin. It is not a stable market.

How do you get Bitcoins.. People commonly buy and sell Bitcoins through exchanges, though this isn’t necessary. In order to make transactions on an exchange, you must have a Bitcoin wallet to keep your currency in. Once you have settled on a broker or exchange, you create an account with a user name and password and link your bank account. Mt. Gox (and others) ask for personal information and photographic scan of a drivers license, passport, or national ID card. Coinbase asks for your phone number, and some exchanges even require a recent utility bill to confirm your identity and location.

Coinbase and Bitstamp make it pretty easy to buy Bitcoins, exchanging real-world money from your bank for the virtual currency, or vice versa. For first time buyers, there is usually a delay of a couple days to a week for orders to go through. LocalBitcoins.com is a platform that connects people looking to buy and sell locally with trading partners around the world in more than 4,500 locations. This approach can actually be faster than going through a centralized exchange, and it offers more flexible payment options, such as PayPal, cash, and Western Union.

A relatively new method is a Bitcoin ATM made by Robocoin. The first machine opened at a coffee shop in Vancouver, Canada, in October. It lets you buy, sell, and trade Bitcoin in exchange for cash and checks in 60 different currencies.

This is a Bitcoin address in your wallet: 1NtT9qZgCrTvbPfCq7zfWCGWCqjtgt7Ufz

The only way to track transactions if you know the Bitcoin address for an account.

Blockchain.com shows Bitcoin transactions, you can watch hundreds of thousands of dollars go through hands in minutes.

HACKERS, MALWARE AND PHISHING…..

The INTERNET is a wonderful tool for finding useful every day information to do a multitude of different things. YOUTUBE has become one of the largest DIY and how to sites in the nation. There are a lot of good things that come from it. However with good comes evil….

How to crack many Master Lock combinations in eight tries or less.

http://arstechnica.com/security/2015/04/28/how-to-crack-any-master-lock-combination-in-8-tries-or-less/

A FINAL NOTE OF ADVICE

ANYONE CAN ACCESS THIS HIDDEN INTERNET VERY EASILY, BUT IF YOU DECIDE TO GO EXPLORING, PLEASE BE VERY

CAREFUL.

THERE ARE A LOT OF UNSAVOURY CONTENT AS WELL AS A LARGE NUMBER OF CRIMINALS. DON’T JUST CLICK LINKS WITHOUT THINKING ABOUT WHERE YOU MIGHT END UP,

WHAT YOU MIGHT SEE OR WHO YOU MIGHT MEET.

DO NOT DOWNLOAD ANYTHING TO YOUR COMPUTER. NO BIT TORRENTS AND NO DOWNLOADS AS THEY MAY GIVE AWAY

YOUR ACTUAL IP ADDRESS WHEN STORING THINGS TO YOUR COMPUTER.