IACP New Cyber Center
The IACP, in partnership with the Bureau of Justice Assistance (BJA), is developing the Law Enforcement Cyber Center, which will build upon the substantive initiatives that address emerging challenges associated with cyber threats and cybercrime. This Cyber Center will be a collaborative effort that leverages the expertise of a multidisciplinary working group of federal, state, and local government organizations, public and private industry, and academia.
The IACP has been actively engaged in a host of activities over the past 12 months to better assist law enforcement counter cyber threats and address cybercrime. A report has been posted on the IACP Website, outlining some of these activities. To read the report click here.
Cyber-attacks on the Rise
The frequent occurrence of Cyber-attacks is raising national security concerns as law enforcement work to address this problem and how to solve it. In March, Director of National Intelligence James R. Clapper testified to the Senate Select Committee on Intelligence that cyber was the number one identified threat to the United States. For the first time, the cyber threat surpassed the terrorism threat. 1 According to a new data application “Threat Watch” that was developed by the Honeynet Project, thousands of cyber-attacks are carried out every day.
See the latest threats
Honeynet Project is an international non-profit security research organization dedicated to investigating the latest attacks and developing open source tools to improve Internet security.2
ThreatWatch is a snapshot of the data breaches hitting organizations and individuals, globally, on a daily basis. It is not an authoritative list, since many compromises are never reported or even discovered. The information is displayed on global map and is updated every minute. The global map visualizes real-time malicious activity data captured by sensors. The green dots indicate the geographic locations of outgoing malicious activity. The map represents only some of the activity detected at any given time because not all of the project's sensors push their data.
For more information on how this map tracks attacks, visit: http://www.nextgov.com/cybersecurity/threatwatch/?oref=TW_article_module