Chronicle: Crime and Technology
KETV Newswatch 7's Rob McCartney talks with local law enforcement about tackling cybercrimes.
Part 2: Part 3:
Published on March 6th, 2022 📆 | 3816 Views ⚑
0Chronicle: Crime and Technology
KETV Newswatch 7's Rob McCartney talks with local law enforcement about tackling cybercrimes.
OMAHAāS NEWS LEADER CHRONICLING THE STORIES AND PEOPLE MAKING A DIFFEREN ICE OUR COMMUNITY. THIS I KETV NEWSWATCH SEVENS CHRONICLE. GOOD MORNING. THANKS FOR JOINING US ONOB R MCCARTNEY, YOU KNOW TECHNOLOGY LIKE THE CELL PHONE SITTING NEAR YOU OR MAYBE IN YOUR HAND. ITāS ALWAYS ALWAYS EVOLVING SO ARE THE CRIMES AND SCAMS TARGETING YOU THROUGH EMAIL TEXT OR EVEN BY PHONE. SO TODAY WEāREET GTING A LOOK AT HOW LOCAL LAW ENFORCEMENT SOLVE THOSE CRIMES AND KEEP UP WITH ALL THE CHANGES PLUS THE BIG SCAMS CRIME FIGHTERS ARE WOREDRI ABOUT AND HOW YOU CAN KEEP YOURSELF PROTECTED. FIRSTE W HAVE A WARNING ON QR CODES. THEYāRE SUPPOSED TO MAKE LIFE EASIER, BUT CYBERSECURITY PROFESSIONALS SAY THOSE CODES CAN BE COPIED AND THEN FEDAK TO STEAL YOUR INFORMATION. THE FBIāS CYBER CRIMES TEAM SAYS THERE ARE MEOR AND MORE OF THESE FRAUDS IN KATV NEWSWIDE. SEVEN. SAHRA FEELY HAS THEIR ADVICE ON HOW TO AVOID BEING SCAMMED. YOU LIKYEL SAW THE 32ND COINBASE AD DURING THE SUPER BOWL A QR CODE DANCING ACRSOS THE SCREEN WAITING FOR VIEWERS TO SCAN IT AND BE INTRODUCED. TO BITCOIN EVERYONEāS USING THEM NOW RESTAURTAN MENUS APPS AND FINANCIAL TRANSACTIONS ALL AMONG THE NEWEREC THNOLOGY USING QR CODES. MOST EVERYONE SCANS QR CODES USING TIRHE MOBILE DEVICE THEIR PHONE FBI SPECIAL AGENT. JAKE FOILS SAYS NOW SCAMME ARE USING THEM TOO ANYWHERE THAT QR CODES ARE BEING UD.SE THEREāS THAT VULNERABILITY THERE. HE SAYS THE TECHNOLOGY CAN BE MIMICKED. SO WHEN YOU CLICK ON THE LKIN TO OPEN A WEBSITE, YOU COULD GET A PHISHINGCA S FRAUDSTER LIKE THIS COULD CREATE A WEBSITE THAT LOOKS VERY SIMILAR TO THE ONE THAT YOUāRE EXPECTING TO GO TO BUT THEN STEALS YOUR INFORMATION ESSENTIALLY ANOTHER WAY SC. AMMERS. HICKJA R STYLE AN APP FOIL SAYS THOSE APPS COULD STEAL PRIVATE INFORMATION OFF YOUR PHONE OR EVEN YOUR LOCATION AND FOR FINANALCI APPS TTHA HAVE BITCOIN FOIL SAYS USERS HAVE TO BE VERY CAREFUL WHEN USING QR EACRTING WEBSITES TO GIVE THEIR INFORMATION OUT FOR TRANSACTIONS. HE SAYS SEOM ARE MALICIOUS WHAT THESE WEBSITES WERE ACTUAYLL DOING WAS GENATERING A QR CODE. T.BITCOIN WALLET ADDRESS FOIL SA YOU MUST INSPECT A WSIEBTE BEREFO OPENING IT AFTER YOUR PHONEāS CAMERA SCANS THE QR CODE ON ANDROID SPEWI OVER TO THE GOOGLE LENS TAKE A PHOTO OF THE QR CODE AND INSPECT THE URL TO MAKE SURE ITāS LEGITIMATE ON APPLE. ITāS EVEN EASIER BOTTOM RIGHT HAND CORNER. THIS IS THEREāS THIS LITTLE QR CODE ICONND A IF YOU INSTEAD SELECT THAT ITāLL GIVE YOU MORE DETAILS AUTBO THE QR CEOD BEFORE SENDING YOU THERE FOIL SAYS THE ONLY WAY THE FBI CAN INVESTIGATE IF MADEA WEAR THROUGH THE IC3 TIPS WEBSITE. I THINK QR CODESRE A DEFINITELY HERE TO STAY AND THEYāRE NOT IN HERENTLY DANGEROUS. BUT HE SAYS AS QR CODES GROW IN POPULATYRI THE SMSCA WILL TOO SERAPHILI KETV NEWS WATCH 7. I AM JOINING US NOW TO TALK ABOUT THESE CRIMES AS CAPTAIN JASON SCOTT. HE WORKS IN SPECIAL OPERATIONS THWI THE NEBRASKA STATE PATROL CAPTAIN. THANKS VERY MUCH FOR BEING HERE TODAY. SO IF YOU COULD ROLL BRIEFLY, JUST TELL ME WHAT YOU DO. WHATāS YOUR JOB IS IN WITH THE TECH CRIMES? SURE. YEAH. IāM THE COMMANDER OF THE SPECIAL OPER. IS DIVISION AND AS A PART OF THAT OUR AIR WING DIVISION SWAT TEAM CANINEAZ HARDOUS DEVICE TECHNICIANS TECH CRIMES AND INTELLIGENCELL FALLS UNDER SPECIAL OPERATIONS. AND TECH CRIMES IS SOMETHING THAT WEāVE REALLY DOUBLED DOWN ON SINCE ABOUT 2017 AND WHY IS THAT THE THERE REALLY ISNāT A COMPONENT OF ANY CRIME THAT WE INVESTIGATE THAT DOESNāT HAV AE TECHNOLOGICAL PIECE TO IT ALL THE WAY FMRO A TRAFFIC CITATION TO FRAUD AND ASSAULTS AND DRUG TRANSACTIONS EVERYTHING WE DEAL WITH SEEMS TO HAVE A TECHNOLOGICAL PIECE TO IT, AND IT SEEMS TO BE GROWGIN EVERY DAY AND WE WANT TO STAY AHEAD OF THAT AND KEEP UP WITH IT AND YOU MENTIONED THA IT MEAN TECH IS ALWAYS CHANGING IT IS ALWAYS GROWING AND EVOLVING. HOW DO YOU KEEP UP? I MN,EA DO YOU HAVE EXPERTS JUST TO LOOK SPECIFICALLY AT WHATāS THE LATEST AND GREATEST? Iā' HALF WE CAN SEE TRENDS THAT ARE OCCURRING BUT TECHNOLYOG LIKE YOUR COMPUTER,OU Y KNOW, ITāS A VERY SHORT SHELF LIFE BEFORE ITāS OUTDATEDND A SOMETHING NEW IS OUT THERE CRIMINALS AND CRIME IS NO DIFFERENTHE T USE OF TECHNOLOGY TO FACILITATE CRIME AND WE TRY TO STAY A STEP AHEAD ON THE PUBLIC SAFETY SIDE SO THAT WE CAN INVESTIGATE AND SYTA ONLINE WITH THE SAME TECHNOLOGIES THATāS BEING USED TO PERPETRATE THE CRIMES THAT HARD TO DO. I MEAN, IT SEEMS LIKE THAT WOULD BE FRUSTRATING SOMETIMES BECAUSE SOMETHING NEW CESOM UP THAT YOU NEVER SAW COMING. IT CAN BE EXTREMELY FRUSTRATING BUT WEāVE GOT PEOPLE WHO ARE TRAINED AND THAT SPEND THEIR CAREERS DNGOI NOTNGHI BUT LOOKING AT TECHNICAL CRIMES OR THESE U OF TECHNOLOGY TO FACILITATE CRIME AND THEY HAVE AN IMMENSE AMOUNT OF TRAINING AND IMMENSE AMOUNT OF EXPERIENCE AND YOU MENTIONED USE OF TECHNOLOGY. I SAW A TWEET OF YEARS FMRO A COUPLE YEARS AGO ABOUT A YEAR AND A HALF OR SO AGO. IT WAS IN LINCOLN. AND YOU SAID HOW ARE NSP TECH CRIMES INVESTIGATORS CANNOT BE OUTSMARTED IT. IT WAS A CHILD PORNOGRAPHY CASE. I MEAN, HEREāS ACTUALLY THE TWEET THATAS W WAS OUT THERE HAS A COUPLE OF PHOTOS WITH IT SUSPECT HAD A VIRALTU SERVER SETUP. WHAT HAPPENED HERE. IS THIS COMMON? ITāS NOT COMMON. 'IāS KIND OF WHY WE TWEETED IT OUT. THIS PERSON. HAD A WORK EXPEREIE AT WORK EXPERTISE AND IT INFRASTRUCTURE TYPE STUFF.SO HIMSELF WAS VYER ADVANCED DAN USING TECHNOLOGY AND HE HAD A VERY UNIQUE SETUP DURING THE SEARCH WARNTRA THAT THAT MORNING. SO JUST MAKING NOTE OF THE FTAC THAT IT'ā ALL ITāS ALL PEOPLE IN ALL PLACES AND ALL THINGS THAT EAR UTILIZING TECHNOLOGY AND OUR PEOPLE WONāT BE OUTSMARTED. WEāRE ON T OF THE NATIONWIDE TRENDS AND WE TRY TO STAY IN FRONT OF IT TO THE BEST WE CAN BECAUSE THAT SET UP SEEMED FAIRLY SOPHISTICATED. I MEAN THE DEPTH ANDOU Y SAID THE GUY HAD A KNOWLEDGE ACKNOWLEDGE OF THIS ALREADY OUR TE CH CRIMES GETTING MORE INTRICATE. THEY ARE F SURE AND THEYāRE ALSO INTERNATIONAL IT LEAVES THE COUNTRY OFTENTIMES AND IS CONNECDTE AROUND THE WORLD. SO WE LEVERAGE OUR PARTNERSHIPS WITH FEDERAL AGENCIES LIKE FBI, WEāRE INVOLVED WITH THEIR TKAS FORCES IN THE CHILD EXPLOITATION AND THE CYBER NETWORK INTRUSION STUFF. WHAT KIND OF TECHNOLOGY DO YOU USE? WELL WITHOUT GETTING TOO SPECIFIC, LIKE I SAID, THERE'ā TECHNOLOGY EVERYWHERE IN THE DAY-TO-DAY OPERATIONS OF THE STATE PATROL FMRO THE VEHICLE. THEREāS BODY WORN CAMERAS DIGITAL CAMERAS. THEREāS IN-CAR PRINTERS AND COMPUTERS AND LAPTOPS ALL THE WAY TO OURIR A WING DIVISION THAT USES THERMAL IMAGERY DEVICES FROMHE T AIR. WE HAVE UAVS WE USE SOCIAL MEDIA TO HELP US PHUS MESSAGES IN A TIMELY MATTER. WE JUST GOT TECHNOLOGY. SEEMS LIKE EVERYWHERE OUR TECH CRIMES UNIT IN PARTICULAR DOES A LOT OF FORENSIC EXAMINATIONS OF CELL PHONES AND LAPTOPS SD CARDS ANY STORAGE DEVICES, LIKE I SAID EARLIER. THEREāS A TECHNOLOGICAL PIECE IN ALMOST EVERY CRIME. WE LOOK AT IF NOTHING ELSE. THEREāS GENERLY AAL CELL PHONE CELL PHONES THEMSELVES HAVE BECOME VERY COMPLICATED. I MEAN THE AMOUNTS OF STORAGE TH AT WE USED TO HAVE ON A FLIP PHONE, YOU KNOW, EIGHTEN YEARS AGO WAS NOTHING NOW WEāVE GOT, YOU KWNO TERABYTES OF STORAGE ON A MOBILE DEVICE. THOSE ARE THE CHALLENGES WE NEED TO KEEP UP WITH AND YOU HAVE CYBER CRIMES HOW TOUGH IS IT TO TRACK THEM? IāM DOES LEAVE A DIGITAL FINGERPRINT? SOMEWHO TREHE IS ITāS DIFFICULT, BUT THERE IS A WSAY THAT WE CAN TRACK. AND SHARE COMMUNICATION ON WHERE ATTACKS ARE HAPPENING IN REGARDS TO IP ADDRESSES WHERE THEYāRE COMING FMRO THINGS. WE CAN BLOCK. ITāS REALLY WHEN IT COMES TO CYBER. IT'ā A LOT ABOUT INFORMATION SHARING MAKING SURE THAT WHEN WE IDENTIFY TSEHE THRTSEA WE SHARE AT STATEWIDE NATIONWIDE, WHATEVER THE CASE MAY BE AND THAT WE'Rā PARTNERING WITH OUR FEDERAL AGENCY PARTNERS TO GET THE INFORMATION OUT SO WE CAN STOPHE T AMOUNT OF VICTIMS THAT MAKE OR AND I KNOW ALSO USE DRON I MEAN DRONES ARE BECOMING INCREASINGLY MORE POPULAR IN CRIME FIGHTING HOW DO YOU USE THOSE? WELL, YOU KNOW DRONES FOR US STARTED OFF AS AN ACCIDENT RECONSTRUCTION TOOL. WE TOOK OUR OUR TIME THAT WE WERE HAVING ROAD CLOSURES ON MAJOR FATALITY TYPE ACCIDENTS AND CUT IT IN HALF BY USING DRONES. ITāS SAFER FOR OUR OFFICERS. ITāS SE FOR EVERYBODY ON SCENE. IT REDUCES THE AMOUNT OF ROAD CLOSE TIME, WHICH ULTIMATELY IS HAS A FINANCIAL IMPACT FOR THE TRUCKING IUSNDTRY IN THE STATE IS A WHOLE SO WE TOOK OUR OUR ROAD CLOSURE TIME OMFR AN URHO AND 45 MINUTES DOWN TO ABOUT 45 MINUTES WITH THE USE OF DRONES, T AS YOU SAID ITāS GROWING ITāS GROWING EVERYWHERE. WE U IT ON WILDFIRES FLOODS MISSING PEOPLE LOOKING FOR FUGITIVES TACTICAL SITUATIONS. I MEAN, THEREāS WEāRE REALLY JUST TRYING TO LEVERAGE THE TECHNOLOGY TO MAKE SURE IT KEEPS EVERYBODY SAFE AND THEN IT HELPS US BE EFFICIENT ANDFF EECTIVE WITH WHAT WEāRE DOING AND LOOKING AT ALL THE TECH CRIMES ATTH ARE OUT THERE DRONES USE OF DRONESSE UF O CYBER ANY ADVICE FOR SOMEONE WHOāS WATCHING WHAT THEY SHOULD BE WATCHING OUT FOR SCAMS. RODS ANYTHING WHAT WHAT ISHE BIGGEST CHALLENGE RIGHT NOW IT YOU KNOW, THEREāS A LOT OF FISHGIN SCAMS WITH REGARDS TO EMAILS. THEREāS A LOT OF CHILD EXPLOITATION REAY,LL ITāS JUST AN AWARENESS OF WHAT YOUāRE DOING WITH YOUR TECHNOLOGY, YOU KNOW, WHETHER ITāS URYO CHILD MAKE SURE THAT YOUāRE MONITORING THEIR ONLINE INVOLVEMENT AND WHO THEYāRE HAVING CONTACT WITH ALL THE WAY DOWN TO YOUR OWN PERSONAL EMAIL ACCOUNT. ITāS ABOUT HAVING AN AWARESSNE AND IF SOMETHING DOESNāT SEEM RIGHT IT PROBABLY ISNāTOLW F YOUR GUT ON THIS. YEAH, EXACTLY KEPT MY APPRECIATE YOU BEING HERE TODAY. THANK YOU. STILL AHEAD A LITTLE DEVICE IS CAUSING BIG CONCERNS. A WANOM SAYS SOMEONE IS USING A HIDDEN APPLE AIR TAG TO TRACK HER CAR AND SHā'S NOT THE ONLY ONE THIS IS HAPPENING TO YOUāRE WATCHING KATV NEWS WATCH SEVENS CH
Chronicle: Crime and Technology
KETV Newswatch 7's Rob McCartney talks with local law enforcement about tackling cybercrimes.
Part 2: Part 3:
Gloss