Law enforcement professionals provide a crucial function in society. By leveraging modern technology advancements, agencies can achieve that quality of service and keep the American people safe from ongoing threats. The International Association of Chiefs of Police (IACP) Annual Conference and Exposition 2023 offered law enforcement agencies and security professionals the opportunity to learn from experts in the top fields, develop partnerships and get access to technologies that will aid in navigating the current landscape.
Securing Sensitive Law Enforcement Data
A reoccurring challenge for law enforcement is an increase in ransomware attacks against them. Agencies reported a significant jump in attacks in the last two years, from 34% of departments reporting a ransomware hack in 2021, to nearly 69% in 2023. The average ransomware payment increased 500% in 2023 to over $1 million and over 25% of these attacks began with a phishing or malicious email. To combat this, agencies and departments must strengthen their cybersecurity postures and align with the NIST Cybersecurity Framework. Speakers at IACP provided five themes of questions agencies should ask to evaluate their cyber readiness:
- Identify: Is our agency able to find weak spots, prioritize our response to them and track them? Have we done asset management, risk assessments and supply chain risk management?
- Protect: Is our “front door” locked? Are we taking proactive measures to protect our data today? Have we implemented identity and access management (IAM), awareness and training and overall data security procedures?
- Detect: Can we tell when something goes wrong? Can we identify issues confidently and quickly in the case of an anomaly?
- Respond: How do we respond when bad things happen? Have we instituted clear communication, analysis, mitigation and response planning?
- Recover: Are we ready to recover and learn from an incident and make the necessary changes to ensure it does not happen again?
Addressing these questions and acting on them means committing to fostering a culture of security and secure best practices. There are many technologies that can aid in this endeavor including artificial intelligence (AI) Ops, which assesses system patterns and behaviors to identify and surface anomalies; IAM, which provides an extra layer of authentication through biometrics and contextual authorization; and cloud and virtual environments, which agencies can employ in combination with infrastructure-as-a-service to enhance security.
The Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) has released two new updates to its security policy, Versions 5.9.1 and 5.9.2, based on the key pillars of data confidentiality, integrity and availability. These policies now require initial security training for personnel who need access to Department of Justice (DOJ) materials as well as the completion of yearly training for the extent of their access time. In conjunction with these policies are key technologies to safeguard data such as IAM, multi-factor authentication (MFA), system monitoring and others. Employing these solutions and safety measures boost community trust in law enforcement and the security of digital evidence. CJIS policies also reiterate to law enforcement officers the importance of doing their due diligence in securing both the data and their vital tools that otherwise could be rendered obsolete in the event of an attack. The Cybersecurity and Infrastructure Security Agency (CISA) has dedicated funding for state agencies to help with this endeavor of protecting the LE cyber space.
Rising Innovative Technologies for Law Enforcement Agencies
Implementation of body worn cameras (BWC) has been a growing initiative for law enforcement (LE) agencies for the last several years. With the Bureau of Justice Assistance’s Body Worn Camera Policy and Implementation Program (BWCPIP) more departments are able to receive grant funding and training for BWCs allowing more widespread usage of the technology especially in small, rural or tribal LE agencies. So far, this program has provided over $180 million in funding towards this effort. To support these BWC data advancements and further the technology benefits, LE agencies are looking for cloud storage and organization solutions, interoperability for data sharing, AI algorithms to efficiently tag videos and analytics software to pull relevant insights.
AI in the law enforcement field also provides many other time saving benefits including automating some procedures and everyday tasks like report writing. Before implementing AI, agencies must audit their current processes to assess the specific use cases and preemptively address any challenges. Establishing guidelines for AI usage by law enforcement, not only assists internally with governance and accountability, but also helps build public trust by delineating the technology capabilities.
Drones are another up-and-coming technology displaying value across public safety and emergency response. In the aftermath of Hurricane Ian in 2022, LE agencies deployed unmanned aircraft systems (UAS) and, through these drones, were able to conduct situation assessments, wide area searches, mapping of critical roadways to expedite the movement of resources and more. This UAS teaming approach has increased the speed and efficiency of first responders, as well as the ability to easily share the information with other agencies.
Whether it is body worn cameras and drones, or AI, cloud and other solutions, security must be baked into the technology and operational processes. As partners in this current landscape, every party involved both in law enforcement and industry has the responsibility to educate themselves and maximize collaboration and the technologies available to continue to make the United States a safe place.
To learn more about Carahsoft’s Law Enforcement Technology Solutions, visit our vertical portfolio and start your journey to enabling a safer tomorrow.
*The information contained in this blog has been written based off the thought-leadership discussions presented by speakers at the IACP Annual Conference and Exposition 2023.*
Automation and Continuous Monitoring (ConMon) stand at the forefront of FedRAMP modernization as the memo underscores the significance of automation and the use of machine-readable formats for authorization and ConMon artifacts. The new guidance will create a system for automating security assessments and reviews, as well as expand on the initiative to obtain FedRAMP security artifacts solely through automated, machine-readable processes. The General Services Administration (GSA) also plans to update ConMon processes within 180 days and exclusively accepting machine-readable artifacts within 18 months.
One step towards achieving cybersecurity is observability. In a time when education leaders are asked to do more with less, observability allows institutions to understand what is happening within their networks and why. Observability should be used to empower education IT teams and in conjunction with active monitoring platforms, which will help them understand the full scope of the data in their network management systems to then apply actionable intelligence to solve issues. When exploring this data, IT staff should consider these questions:
“Private 5G networks have distinct benefits for government, which is why DOD has stated that it is a strategic direction for the department. At Federated Wireless, we custom-build networks for high performance, scale and unlimited capacity using best-of-breed technology from a large ecosystem of suppliers. Private wireless networks provide strong security and control over where the data resides. Unlike a traditional cellular carrier that sends data through an off-site central core, private 5G networks are secure enclaves that are governed by zero trust architectures.”
In December 2015, the Chula Vista Police Department (CVPD) established the Unmanned Aircraft Systems (UAS) Committee with the primary aim of evaluating the integration of UAS into its public safety operations.
While bad actors have utilized the capabilities of AI, the healthcare industry can also use it to improve cybersecurity. AI does not need breaks, and therefore can run all day reducing the time needed to identify a security breach by analyzing large amounts of data in real time. On a similar note, AI can identify multiple devices and manage network endpoint detection for large networks. AI has been used to predict Domain Name System (DNS) attacks before occurrence, preventing and mitigating these attacks. It can implement Secure Access Service Edge (SASE), analyze identities and manage risk. With its strength of detecting patterns, AI can distinguish subtle patterns of attack that would otherwise go unnoticed by people.
With the progression of AI and telehealth, hearing diverse voices on the implementation of these tools cannot be overlooked as medical professionals change the way they utilize technology. It is imperative that new technology is working to make medical support and processes simple for communities that may not have as many resources when it comes to telehealth and digital medical records. For example, a chat box that pops up on a medical practice’s website may have been created to help patients, but non-English speaking patients do not benefit if the box is not programmed to display and understand other languages.
Analytics Innovations Draw a Complete Data Picture
The DoD and 5G form a mutually beneficial relationship. 5G is created with security built in, so an investment in 5G is an investment in cybersecurity. By utilizing 5G at bases, the DoD can test its capabilities, as well as streamline and amplify the effectiveness of non-combat operations. This can include supply chain efficiency, large scale IoT networks, asset tracking and logistics management all while reducing costs. In return, the DoD tests and further funds 5G. The addition of 5G can provide lower mission costs, enhanced speed and provide higher quality operations. It also factors in risk reduction to each operation, by taking the cumbersome human process out of the equation and making certain operations less complex.