Advertisement

Criminals use everyday technology to track police, undermine investigations, MS-ISAC report shows

A new report from the Multi-State Information Sharing and Analysis Center warns that criminals and nation states are ramping up the vulnerabilities in everyday digital devices.
Listen to this article
0:00
Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment.
data breach
(Getty Images)

A report published Tuesday by the Multi-State Information Sharing and Analysis Center shows that modern technology is making it easier than ever for criminals and foreign adversaries to monitor police officers, expose investigations and threaten public safety.

The report, which comes from a division of the New York nonprofit Center for Internet Security, focuses on “ubiquitous technical surveillance,” the ability to collect huge amounts of information from devices, such as cell phones, apps, cameras, social media presences and Bluetooth devices. These devices, the report says, leave digital trails allowing criminal groups to track officers’ locations through smartphone data, scrape online records to find home addresses or use hacked security cameras and smart doorbells to watch police activity in real time.

John Cohen, who heads the Program for Countering Hybrid Threats at CIS, said that although criminal organizations, transnational and domestic, have always found ways to surveil law enforcement as part of their “operational playbook,” the modern technology they’re using presents a more existential physical and digital threat.

“What’s different is that they are now able to leverage advanced technologies, many of which are the technologies that were once reserved for use by the intelligence community,” Cohen said. “They are using the trade craft that has been leveraged by intelligence professionals to turn the tables and spy on law enforcement personnel.”

Advertisement

The report warns that commonly used technologies in police stations, such as unencrypted radio channels and personal devices, contain information that criminals can use. Cohen added that criminals can also track smartphones when they come in contact with each other and share data, endangering officers, confidential informants, witnesses and entire investigations.

Several incidents of criminals using these techniques are highlighted in the MS-ISAC report, including drug cartels identifying FBI contacts using leaked phone information, ransomware attacks that exposed thousands of police case files and criminals using AI-powered tools to identify masked officers.

“They will use technologies that allow them to collect cell phone numbers of law enforcement personnel. Once you have that, you can use it to collect other intelligence,” Cohen said. “This represents an existential officer safety and operational security challenge for police departments, sheriff’s agencies and federal law enforcement agencies.”

Artificial intelligence is another tool in criminal enterprise arsenal, the report notes, used to hack cameras and leak data to identify officers. Similar to state and local governments that are trying to harness AI to enhance their operations, Cohen said, AI helps strengthen and reduce the cost of criminals’ surveillance and spying efforts.

“We’ve seen criminal organizations and foreign spy services and terrorist groups embrace the power of the internet, they’ve also embraced the power they’re increasingly leveraging advanced computing like AI,” he said “Whether it’s using it as a way to develop more believable phishing campaigns, or developing content online that elicits their response, or whether it’s developing highly sophisticated cyber cyber penetration techniques to gain access to information.”

Advertisement

The report calls for major updates to police technology policies, including encrypting all police communications, tightening rules around officers’ personal phones and Bluetooth devices, improving cybersecurity training and requiring agencies to conduct regular digital risk assessments. It also recommends helping officers and their families scrub personal information from data broker websites that criminals commonly use.

State governments, Cohen added, have an important role to play in solving these issues, as many smaller or rural police departments often lack the budgets or technical expertise to strengthen their cybersecurity.

“The reality is that while major cities and states may have the resources to employ advanced and more sophisticated cyber security capabilities, for smaller jurisdictions, it’s a much greater challenge,” Cohen said. “We are working with states to employ what is known as the ‘statewide model,’ where states can help support and bring resources to those smaller jurisdictions.”

Sophia Fox-Sowell

Written by Sophia Fox-Sowell

Sophia Fox-Sowell reports on artificial intelligence, cybersecurity and government regulation for StateScoop. She was previously a multimedia producer for CNET, where her coverage focused on private sector innovation in food production, climate change and space through podcasts and video content. She earned her bachelor’s in anthropology at Wagner College and master’s in media innovation from Northeastern University.

Latest Podcasts