Featured Chronicle: Crime and Technology

Published on March 6th, 2022 📆 | 3816 Views ⚑

0

Chronicle: Crime and Technology


Convert Text to Speech

Chronicle: Crime and Technology

KETV Newswatch 7's Rob McCartney talks with local law enforcement about tackling cybercrimes.



OMAHAā€™S NEWS LEADER CHRONICLING THE STORIES AND PEOPLE MAKING A DIFFEREN ICE OUR COMMUNITY. THIS I KETV NEWSWATCH SEVENS CHRONICLE. GOOD MORNING. THANKS FOR JOINING US ONOB R MCCARTNEY, YOU KNOW TECHNOLOGY LIKE THE CELL PHONE SITTING NEAR YOU OR MAYBE IN YOUR HAND. ITā€™S ALWAYS ALWAYS EVOLVING SO ARE THE CRIMES AND SCAMS TARGETING YOU THROUGH EMAIL TEXT OR EVEN BY PHONE. SO TODAY WEā€™REET GTING A LOOK AT HOW LOCAL LAW ENFORCEMENT SOLVE THOSE CRIMES AND KEEP UP WITH ALL THE CHANGES PLUS THE BIG SCAMS CRIME FIGHTERS ARE WOREDRI ABOUT AND HOW YOU CAN KEEP YOURSELF PROTECTED. FIRSTE W HAVE A WARNING ON QR CODES. THEYā€™RE SUPPOSED TO MAKE LIFE EASIER, BUT CYBERSECURITY PROFESSIONALS SAY THOSE CODES CAN BE COPIED AND THEN FEDAK TO STEAL YOUR INFORMATION. THE FBIā€™S CYBER CRIMES TEAM SAYS THERE ARE MEOR AND MORE OF THESE FRAUDS IN KATV NEWSWIDE. SEVEN. SAHRA FEELY HAS THEIR ADVICE ON HOW TO AVOID BEING SCAMMED. YOU LIKYEL SAW THE 32ND COINBASE AD DURING THE SUPER BOWL A QR CODE DANCING ACRSOS THE SCREEN WAITING FOR VIEWERS TO SCAN IT AND BE INTRODUCED. TO BITCOIN EVERYONEā€™S USING THEM NOW RESTAURTAN MENUS APPS AND FINANCIAL TRANSACTIONS ALL AMONG THE NEWEREC THNOLOGY USING QR CODES. MOST EVERYONE SCANS QR CODES USING TIRHE MOBILE DEVICE THEIR PHONE FBI SPECIAL AGENT. JAKE FOILS SAYS NOW SCAMME ARE USING THEM TOO ANYWHERE THAT QR CODES ARE BEING UD.SE THEREā€™S THAT VULNERABILITY THERE. HE SAYS THE TECHNOLOGY CAN BE MIMICKED. SO WHEN YOU CLICK ON THE LKIN TO OPEN A WEBSITE, YOU COULD GET A PHISHINGCA S FRAUDSTER LIKE THIS COULD CREATE A WEBSITE THAT LOOKS VERY SIMILAR TO THE ONE THAT YOUā€™RE EXPECTING TO GO TO BUT THEN STEALS YOUR INFORMATION ESSENTIALLY ANOTHER WAY SC. AMMERS. HICKJA R STYLE AN APP FOIL SAYS THOSE APPS COULD STEAL PRIVATE INFORMATION OFF YOUR PHONE OR EVEN YOUR LOCATION AND FOR FINANALCI APPS TTHA HAVE BITCOIN FOIL SAYS USERS HAVE TO BE VERY CAREFUL WHEN USING QR EACRTING WEBSITES TO GIVE THEIR INFORMATION OUT FOR TRANSACTIONS. HE SAYS SEOM ARE MALICIOUS WHAT THESE WEBSITES WERE ACTUAYLL DOING WAS GENATERING A QR CODE. T.BITCOIN WALLET ADDRESS FOIL SA YOU MUST INSPECT A WSIEBTE BEREFO OPENING IT AFTER YOUR PHONEā€™S CAMERA SCANS THE QR CODE ON ANDROID SPEWI OVER TO THE GOOGLE LENS TAKE A PHOTO OF THE QR CODE AND INSPECT THE URL TO MAKE SURE ITā€™S LEGITIMATE ON APPLE. ITā€™S EVEN EASIER BOTTOM RIGHT HAND CORNER. THIS IS THEREā€™S THIS LITTLE QR CODE ICONND A IF YOU INSTEAD SELECT THAT ITā€™LL GIVE YOU MORE DETAILS AUTBO THE QR CEOD BEFORE SENDING YOU THERE FOIL SAYS THE ONLY WAY THE FBI CAN INVESTIGATE IF MADEA WEAR THROUGH THE IC3 TIPS WEBSITE. I THINK QR CODESRE A DEFINITELY HERE TO STAY AND THEYā€™RE NOT IN HERENTLY DANGEROUS. BUT HE SAYS AS QR CODES GROW IN POPULATYRI THE SMSCA WILL TOO SERAPHILI KETV NEWS WATCH 7. I AM JOINING US NOW TO TALK ABOUT THESE CRIMES AS CAPTAIN JASON SCOTT. HE WORKS IN SPECIAL OPERATIONS THWI THE NEBRASKA STATE PATROL CAPTAIN. THANKS VERY MUCH FOR BEING HERE TODAY. SO IF YOU COULD ROLL BRIEFLY, JUST TELL ME WHAT YOU DO. WHATā€™S YOUR JOB IS IN WITH THE TECH CRIMES? SURE. YEAH. Iā€™M THE COMMANDER OF THE SPECIAL OPER. IS DIVISION AND AS A PART OF THAT OUR AIR WING DIVISION SWAT TEAM CANINEAZ HARDOUS DEVICE TECHNICIANS TECH CRIMES AND INTELLIGENCELL FALLS UNDER SPECIAL OPERATIONS. AND TECH CRIMES IS SOMETHING THAT WEā€™VE REALLY DOUBLED DOWN ON SINCE ABOUT 2017 AND WHY IS THAT THE THERE REALLY ISNā€™T A COMPONENT OF ANY CRIME THAT WE INVESTIGATE THAT DOESNā€™T HAV AE TECHNOLOGICAL PIECE TO IT ALL THE WAY FMRO A TRAFFIC CITATION TO FRAUD AND ASSAULTS AND DRUG TRANSACTIONS EVERYTHING WE DEAL WITH SEEMS TO HAVE A TECHNOLOGICAL PIECE TO IT, AND IT SEEMS TO BE GROWGIN EVERY DAY AND WE WANT TO STAY AHEAD OF THAT AND KEEP UP WITH IT AND YOU MENTIONED THA IT MEAN TECH IS ALWAYS CHANGING IT IS ALWAYS GROWING AND EVOLVING. HOW DO YOU KEEP UP? I MN,EA DO YOU HAVE EXPERTS JUST TO LOOK SPECIFICALLY AT WHATā€™S THE LATEST AND GREATEST? Iā€™' HALF WE CAN SEE TRENDS THAT ARE OCCURRING BUT TECHNOLYOG LIKE YOUR COMPUTER,OU Y KNOW, ITā€™S A VERY SHORT SHELF LIFE BEFORE ITā€™S OUTDATEDND A SOMETHING NEW IS OUT THERE CRIMINALS AND CRIME IS NO DIFFERENTHE T USE OF TECHNOLOGY TO FACILITATE CRIME AND WE TRY TO STAY A STEP AHEAD ON THE PUBLIC SAFETY SIDE SO THAT WE CAN INVESTIGATE AND SYTA ONLINE WITH THE SAME TECHNOLOGIES THATā€™S BEING USED TO PERPETRATE THE CRIMES THAT HARD TO DO. I MEAN, IT SEEMS LIKE THAT WOULD BE FRUSTRATING SOMETIMES BECAUSE SOMETHING NEW CESOM UP THAT YOU NEVER SAW COMING. IT CAN BE EXTREMELY FRUSTRATING BUT WEā€™VE GOT PEOPLE WHO ARE TRAINED AND THAT SPEND THEIR CAREERS DNGOI NOTNGHI BUT LOOKING AT TECHNICAL CRIMES OR THESE U OF TECHNOLOGY TO FACILITATE CRIME AND THEY HAVE AN IMMENSE AMOUNT OF TRAINING AND IMMENSE AMOUNT OF EXPERIENCE AND YOU MENTIONED USE OF TECHNOLOGY. I SAW A TWEET OF YEARS FMRO A COUPLE YEARS AGO ABOUT A YEAR AND A HALF OR SO AGO. IT WAS IN LINCOLN. AND YOU SAID HOW ARE NSP TECH CRIMES INVESTIGATORS CANNOT BE OUTSMARTED IT. IT WAS A CHILD PORNOGRAPHY CASE. I MEAN, HEREā€™S ACTUALLY THE TWEET THATAS W WAS OUT THERE HAS A COUPLE OF PHOTOS WITH IT SUSPECT HAD A VIRALTU SERVER SETUP. WHAT HAPPENED HERE. IS THIS COMMON? ITā€™S NOT COMMON. 'Iā€™S KIND OF WHY WE TWEETED IT OUT. THIS PERSON. HAD A WORK EXPEREIE AT WORK EXPERTISE AND IT INFRASTRUCTURE TYPE STUFF.SO HIMSELF WAS VYER ADVANCED DAN USING TECHNOLOGY AND HE HAD A VERY UNIQUE SETUP DURING THE SEARCH WARNTRA THAT THAT MORNING. SO JUST MAKING NOTE OF THE FTAC THAT IT'ā€™ ALL ITā€™S ALL PEOPLE IN ALL PLACES AND ALL THINGS THAT EAR UTILIZING TECHNOLOGY AND OUR PEOPLE WONā€™T BE OUTSMARTED. WEā€™RE ON T OF THE NATIONWIDE TRENDS AND WE TRY TO STAY IN FRONT OF IT TO THE BEST WE CAN BECAUSE THAT SET UP SEEMED FAIRLY SOPHISTICATED. I MEAN THE DEPTH ANDOU Y SAID THE GUY HAD A KNOWLEDGE ACKNOWLEDGE OF THIS ALREADY OUR TE CH CRIMES GETTING MORE INTRICATE. THEY ARE F SURE AND THEYā€™RE ALSO INTERNATIONAL IT LEAVES THE COUNTRY OFTENTIMES AND IS CONNECDTE AROUND THE WORLD. SO WE LEVERAGE OUR PARTNERSHIPS WITH FEDERAL AGENCIES LIKE FBI, WEā€™RE INVOLVED WITH THEIR TKAS FORCES IN THE CHILD EXPLOITATION AND THE CYBER NETWORK INTRUSION STUFF. WHAT KIND OF TECHNOLOGY DO YOU USE? WELL WITHOUT GETTING TOO SPECIFIC, LIKE I SAID, THERE'ā€™ TECHNOLOGY EVERYWHERE IN THE DAY-TO-DAY OPERATIONS OF THE STATE PATROL FMRO THE VEHICLE. THEREā€™S BODY WORN CAMERAS DIGITAL CAMERAS. THEREā€™S IN-CAR PRINTERS AND COMPUTERS AND LAPTOPS ALL THE WAY TO OURIR A WING DIVISION THAT USES THERMAL IMAGERY DEVICES FROMHE T AIR. WE HAVE UAVS WE USE SOCIAL MEDIA TO HELP US PHUS MESSAGES IN A TIMELY MATTER. WE JUST GOT TECHNOLOGY. SEEMS LIKE EVERYWHERE OUR TECH CRIMES UNIT IN PARTICULAR DOES A LOT OF FORENSIC EXAMINATIONS OF CELL PHONES AND LAPTOPS SD CARDS ANY STORAGE DEVICES, LIKE I SAID EARLIER. THEREā€™S A TECHNOLOGICAL PIECE IN ALMOST EVERY CRIME. WE LOOK AT IF NOTHING ELSE. THEREā€™S GENERLY AAL CELL PHONE CELL PHONES THEMSELVES HAVE BECOME VERY COMPLICATED. I MEAN THE AMOUNTS OF STORAGE TH AT WE USED TO HAVE ON A FLIP PHONE, YOU KNOW, EIGHTEN YEARS AGO WAS NOTHING NOW WEā€™VE GOT, YOU KWNO TERABYTES OF STORAGE ON A MOBILE DEVICE. THOSE ARE THE CHALLENGES WE NEED TO KEEP UP WITH AND YOU HAVE CYBER CRIMES HOW TOUGH IS IT TO TRACK THEM? Iā€™M DOES LEAVE A DIGITAL FINGERPRINT? SOMEWHO TREHE IS ITā€™S DIFFICULT, BUT THERE IS A WSAY THAT WE CAN TRACK. AND SHARE COMMUNICATION ON WHERE ATTACKS ARE HAPPENING IN REGARDS TO IP ADDRESSES WHERE THEYā€™RE COMING FMRO THINGS. WE CAN BLOCK. ITā€™S REALLY WHEN IT COMES TO CYBER. IT'ā€™ A LOT ABOUT INFORMATION SHARING MAKING SURE THAT WHEN WE IDENTIFY TSEHE THRTSEA WE SHARE AT STATEWIDE NATIONWIDE, WHATEVER THE CASE MAY BE AND THAT WE'Rā€™ PARTNERING WITH OUR FEDERAL AGENCY PARTNERS TO GET THE INFORMATION OUT SO WE CAN STOPHE T AMOUNT OF VICTIMS THAT MAKE OR AND I KNOW ALSO USE DRON I MEAN DRONES ARE BECOMING INCREASINGLY MORE POPULAR IN CRIME FIGHTING HOW DO YOU USE THOSE? WELL, YOU KNOW DRONES FOR US STARTED OFF AS AN ACCIDENT RECONSTRUCTION TOOL. WE TOOK OUR OUR TIME THAT WE WERE HAVING ROAD CLOSURES ON MAJOR FATALITY TYPE ACCIDENTS AND CUT IT IN HALF BY USING DRONES. ITā€™S SAFER FOR OUR OFFICERS. ITā€™S SE FOR EVERYBODY ON SCENE. IT REDUCES THE AMOUNT OF ROAD CLOSE TIME, WHICH ULTIMATELY IS HAS A FINANCIAL IMPACT FOR THE TRUCKING IUSNDTRY IN THE STATE IS A WHOLE SO WE TOOK OUR OUR ROAD CLOSURE TIME OMFR AN URHO AND 45 MINUTES DOWN TO ABOUT 45 MINUTES WITH THE USE OF DRONES, T AS YOU SAID ITā€™S GROWING ITā€™S GROWING EVERYWHERE. WE U IT ON WILDFIRES FLOODS MISSING PEOPLE LOOKING FOR FUGITIVES TACTICAL SITUATIONS. I MEAN, THEREā€™S WEā€™RE REALLY JUST TRYING TO LEVERAGE THE TECHNOLOGY TO MAKE SURE IT KEEPS EVERYBODY SAFE AND THEN IT HELPS US BE EFFICIENT ANDFF EECTIVE WITH WHAT WEā€™RE DOING AND LOOKING AT ALL THE TECH CRIMES ATTH ARE OUT THERE DRONES USE OF DRONESSE UF O CYBER ANY ADVICE FOR SOMEONE WHOā€™S WATCHING WHAT THEY SHOULD BE WATCHING OUT FOR SCAMS. RODS ANYTHING WHAT WHAT ISHE BIGGEST CHALLENGE RIGHT NOW IT YOU KNOW, THEREā€™S A LOT OF FISHGIN SCAMS WITH REGARDS TO EMAILS. THEREā€™S A LOT OF CHILD EXPLOITATION REAY,LL ITā€™S JUST AN AWARENESS OF WHAT YOUā€™RE DOING WITH YOUR TECHNOLOGY, YOU KNOW, WHETHER ITā€™S URYO CHILD MAKE SURE THAT YOUā€™RE MONITORING THEIR ONLINE INVOLVEMENT AND WHO THEYā€™RE HAVING CONTACT WITH ALL THE WAY DOWN TO YOUR OWN PERSONAL EMAIL ACCOUNT. ITā€™S ABOUT HAVING AN AWARESSNE AND IF SOMETHING DOESNā€™T SEEM RIGHT IT PROBABLY ISNā€™TOLW F YOUR GUT ON THIS. YEAH, EXACTLY KEPT MY APPRECIATE YOU BEING HERE TODAY. THANK YOU. STILL AHEAD A LITTLE DEVICE IS CAUSING BIG CONCERNS. A WANOM SAYS SOMEONE IS USING A HIDDEN APPLE AIR TAG TO TRACK HER CAR AND SHā€™'S NOT THE ONLY ONE THIS IS HAPPENING TO YOUā€™RE WATCHING KATV NEWS WATCH SEVENS CH





Chronicle: Crime and Technology

KETV Newswatch 7's Rob McCartney talks with local law enforcement about tackling cybercrimes.

Part 2: Part 3:

Source link

Tagged with: ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢



Comments are closed.