NAVIGATING THE DIGITAL RIVER Technical Drivers of Digital Society Echoed in Law Enforcement Bandera, TX LELC 2019/09/26

LEAN TAIL LABS https://leantaillabs.com NAVIGATING THE DIGITAL RIVER Technical Drivers of Digital Society Echoed in Law Enforcement Bandera, TX LELC 2019/09/26

LEAN TAIL LABS https://leantaillabs.com A trivial life saver… The stupidest thing you will do today…I hope You can now count on your fingers in binary… What was…

■ Local machine did most of the work ■ Local machine did most of the storage ■ Took significant local processing power ■ Internet storage was on dedicated servers on the site of hosting company What is…

■ Minimal processing done locally – Allows almost anything to touch the web ■ Most Internet processing moved to virtual servers in the cloud with massive redundancy – Safer than you can make it on your own ■ Massive processing done in the cloud – Videos, music, and anything else, anywhere ■ Massive storage in the cloud What is coming…

■ Sensors – on everything – Vehicles including performance, GPS, insurance dongles, etc. – Houses include WiFi cameras, nanny cams, doorbell cams, DIY security systems – Neighborhood saturation WiFi – Smart parking – Environmental – wind, rain, lightning, pollution, sound, etc. – Flood gauge cameras ■ Pushed to the web Power/Price – in hardware

Parallel to the massive integration of software and the Internet, there has been an explosion in hardware. Current single chip processors now have 50 billion transistors. There are 100 billion neurons in the human brain.

By Max Roser - https://ourworldindata.org/uploads/2019/05/Transistor-Count-over-time-to-2018.png, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=79751151 Why it matters… ■ Why it matters – digital is the kingdom of 1s and – WiFi cams 0s – WiFi neighborhood saturation – Scale and granularity ■ LPRs ■ The two-sided scale – Handheld/cell phone-based – Size vs. cost ■ GPS data – Why size is winning – Phones ■ The power of mass production – Vehicles including post-wreck analysis – Higher granularity at a lower cost ■ Get training/provide training ■ Handheld devices – Everything on the phone ■ Hire a geek – you won't keep them for long – Or attached to the phone ■ Find a geek – retired geeks are now coming on- ■ Dash cams line – Get bigger storage – Train your people in the use (hold a – 1980 to 2020 is 40 years so they are class) hitting retirement – Store in the cloud – GrayGeeks4Good.com ■ Body cams – GrayGeeks4Good.org – Store in the cloud ■ Home security – Doorbell cams X as a service… ■ Data storage – Amazon now offers storage plans of 100 GB for $11.99, 1 TB for $59.99, and up to 30 TB for an additional $59.99 per TB…. ■ Facial recognition ■ Amazon Rekognition Image API pricing examples – 1 million Detect Faces API calls for face detection. The price for 0 – 1 million images processed per month is $1.00 per 1,000 images processed (or $1.00/1,000 = $0.001 per image processed). ■ LPRs – $2,000 per year for a 2-year contract and they do the storage in the cloud - https://www.flocksafety.com/ ■ Brains for cameras – https://www.sighthound.com/technology/ ■ Social media creation – You can schedule a 30-minute get-started phone consultation with a GoDaddy expert for around $50.00. Most companies that provide DIY website builders offer tiered pricing plans - from free to around $300 per year. ■ Social media monitoring – NodeXL FREE! – https://www.smrfoundation.org/networks/how-to- read-a-network-map/ If nothing else, get this… Alerts 1 is a free service that monitors the Internet for any topic for which you define. At a minimum you should set alerts for: ■ Your name ■ Your staff’s names ■ Your agency ■ Your neighborhood You can define the sources, the language, the region, and the depth of the alerts. Google Alerts The alerts come to your email, and you can set the notifications as they happen, or once a day. As a thought for alert words: ■ The names of schools ■ The names of churches ■ The names of malls ■ The names of gangs

It is a free service from Google. Social Media Software Social media software has 2.77 billion users (7.53 billion people on the planet) 37% https://www.statista.com/statistics/278414/number-of-worldwide-social- network-users/ ■ Social media is the largest exchange of information in human history. ■ People will see information on social media before they see it anywhere else. ■ People will report information on social media before they will anywhere else. ■ At a minimum, your agency/department should have a Facebook page, a Twitter page, and someone to maintain, monitor, and curate the material. Facebook ■ Facebook – 210 million users (327 million US pop) 64% ■ Average American spends 79 minutes a day on Facebook ■ Facebook users are 53% female and 47% male. ■ Of all the people on the internet, 83% of women & 75% of men use Facebook. ■ Average Facebook user has 155 “friends”. ■ 62% of online Seniors aged 65+ are on Facebook and 72% are between age 50-64. ■ 88% of online users of age 18-29 are on Facebook, 84% of those 30-49. ■ 82% of college graduates are on Facebook. ■ 72% of online users with income more than $75K are on Facebook. https://www.facebook.com/safety/groups/law/guidelines/ https://www.facebook.com/safety/groups/law https://www.omnicoreagency.com/facebook-statistics/ https://netzpolitik.org/wp-upload/2016/08/facebook-law-enforcement-portal-inofficial-manual.pdf Twitter Twitter – Twitter is an American online news and social networking service on which users post and interact with known as "tweets". Tweets were originally restricted to 140 characters, but on November 7, 2017, this limit was doubled for all languages except Chinese, Japanese, and Korean. ■ 96 million users in US ■ 24% of all Internet male users use Twitter, whereas 21% of All Internet Female users use Twitter. ■ There are 261 million international Twitter users which account for 79% of Twitter accounts based outside the United States. ■ There are over 69 million Twitter users in the US. ■ Roughly 46% of Twitter users are on the platform daily. ■ The total number of Twitter users in the UK is 13 million. ■ 37% of Twitter users are between the ages of 18 and 29, 25% of users are 30-49 years old. ■ 56% of Twitter users earn $50,000 and more in a year. ■ 36% of Americans aged 18 to 29 years old use Twitter. ■ 80% of Twitter users accessing the platform on a mobile device, and 93% of video views are on mobile. https://help.twitter.com/en/rules-and-policies/twitter-law-enforcement-support https://help.twitter.com/forms/lawenforcement https://www.omnicoreagency.com/twitter-statistics/ http://connectedcops.net/law-enforcement-on-twitter-five-ways-kick-it-up-a-notch/ Crime is now digital… Chicken flogging goes global…. ■ Lone chicken flogger Crime is now digital… Chicken flogging goes global…. ■ Lone chicken flogger ■ The internet of chicken floggers – Empowering other chicken floggers – Learning new chicken flogging methods – Money from chicken flogging – Crime enters chicken flogging ■ Not real chicken flogging – Deep fake video – Deep fake audio Crime is now digital… Chicken flogging goes global…. ■ Lone chicken flogger ■ The internet of chicken floggers – Empowering other chicken floggers – Learning new chicken flogging methods – Money from chicken flogging – Crime enters chicken flogging ■ Not real chicken flogging – Deep fake video – Deep fake audio ■ Manifestations – Pornography – Child pornography – Drug production/trafficking – Human trafficking – Weapons sales/production Crime is now digital… Chicken flogging goes global…. ■ Lone chicken flogger ■ The internet of chicken floggers – Empowering other chicken floggers – Learning new chicken flogging methods – Money from chicken flogging – Crime enters chicken flogging ■ Not real chicken flogging – Deep fake video – Deep fake audio ■ Manifestations – Pornography – Child pornography – Drug production/trafficking – Human trafficking – Weapons sales/production – Counter-police activity ■ We can make it look as bad as we want ■ Ferguson effect, truth no longer matters – Riot/protest – Mass shootings – Walmart terrorism Two blocks of data…

https://www.wired.com/2016/02/gun-violence-statistics/ This may be a symptom of social media awareness…

Correlation is not causality, but social media is one of the few “mass-movers” in society to match the growth of mass shootings. Hard race to win… ■ They get there first – Social media – Data encryption ■ Phone ■ Laptop/PC ■ Communication ■ Money – Countersurveillance ■ – Cyber crime ■ Hacking ■ Ransom ware ■ DO BACKUP AND DO IT NOW – Cheap – Easy – Automatic Social media is a dangerous environment for law enforcement – but do we not go to dangerous places by the definition of our work? If the people we are sworn to protect are in this dangerous environment, should we not also be? Basic safety… ■ Use strong passwords: The conventional wisdom is that a strong password is some combination of uppercase and lowercase letters, numbers, and special characters. The reality is that the longer your password is, the harder it is to crack. XKCD did a good job breaking it down. ■ Use a unique password for every site and service: This should go without saying, but it is still routine to encounter people who re-use passwords. The problem with this is that if your credentials are compromised on one site it is trivial for hackers to retry those same credentials at thousands of other sites. According to Verizon, 81 percent of data breaches are possible due to compromised, weak, or re-used passwords. ■ Use a password manager: A tool like Dashlane or LastPass is table stakes in the games of online security. According to Dashlane, the average internet user has over 200 digital accounts that require passwords. The company expects that number to double to 400 within the next five years. It is virtually impossible to manage that many strong, unique passwords without a tool. ■ Beware of public Wi-Fi: Don’t join a free public Wi-Fi network unless you are certain it is trustworthy. You could join a network set up exclusively to monitor your traffic. If you use a public or shared computer (such as to print a boarding pass when you’re on vacation), make certain you don’t allow the browser to remember your credentials. Clear the cache when you are done.

https://www.howtogeek.com/440027/how-to-protect-your-identity-online/ Passwords…

Personal favorites: • Blue1Bell2ice@cream • TilldaddytakestheT-bird@1 BaBaRaRaCuCuDaDa@2 • Sitting1by2the3dock • .357ColtPython

https://xkcd.com/936/ Better safety… ■ As the saying goes, you don’t have to run faster than the bear; you just have to outrun your buddy. If you implement these security best practices, you’ll be well ahead of the majority of the online population: ■ Never use your social media profile to sign-in to other sites: When you sign up somewhere new, you often get a “single sign-on” option to log in with your Facebook or . While this is convenient, one data breach exposes you in multiple ways. And “you risk giving the site access to the personal information contained in your sign- on account,” warned Pankaj Srivastava, chief operations officer of the privacy company FigLeaf. It’s always better to sign up with an email address. ■ Enable two-factor authentication: This effectively prevents bad actors from using a password reset to take control of your accounts. If you require two factors, they need access not just to your email account, but to your phone, as well. And you can do better than this, too (see the bunker advice below). ■ Minimize your social media footprint: Social media is an increasingly dangerous landscape. Also, don’t accept connection or friend requests from anyone you don’t know. Bad actors use that as an opportunity to research a phishing campaign, or she might use you as a jumping-off point to attack your contacts. ■ Dial back your social media sharing: “The more you post about yourself, the more a hacker can learn about you,” said Otavio Friere, chief technology officer at SafeGuard Cyber. “And the more effectively you can be targeted.” There might be enough information on your Facebook profile right now (email address, school, hometown, relationship status, occupation, interests, political affiliation, etc.) for a criminal to call your bank, pose as you, and convince a customer service rep. to reset your password. Simon Fogg, a data privacy expert at Termly, said: “As well as avoiding using your full name and date of birth on your profile, consider how all your information connects. Even if you don’t share your home address, your phone number could be used to find it. When combined with geotagged photos, you might be surprised how much of your daily life you’re revealing to strangers, and how vulnerable you have made yourself to threats.” https://www.howtogeek.com/440027/how-to-protect-your-identity-online/ Bunker level safety… There’s no end to the security precautions you can take—we didn’t even cover using a TOR browser, for example, or making sure your registrar keeps the WHOIS information on your website (if you have one) private. But if you already do everything we mentioned in the previous sections, these remaining precautions should put you in the top one percent of safe internet users: ■ Never use your phone number for two-factor authentication: “Phones can be cloned,” said Initial Coin Offering (ICO) consultant, Steve Good. That makes your second factor in two-factor authentication less secure than you might think. Thankfully, it’s easy to set up Google or Authy to consolidate all of your two-factor-authentication needs. ■ Encrypt your USB flash drives: How do you transfer between computers? With flash drives, of course. And these devices are often the weak link in your security regimen. If you lose it, anyone can pick it up and read it. You can encrypt individual files, but a better solution is to encrypt the entire device. Kingston offers a family of drives—the DT2000—that range from 8 to 64 GB. They have built-in numeric keypads, and protect your data with hardware-based, full-disk AES, 256-bit data encryption—no software required. ■ Use a Virtual Private Network (VPN): When you use this type of network, you connect to the internet (at least somewhat) anonymously. It’s especially useful when you connect to public Wi-Fi, but there could be merit in using it at home, as well. “A VPN disguises your IP address and location,” said Srivastava. “So, it looks like you’re browsing from a completely different location. You could be at a local café in Boston, but others will think you’re browsing from Sydney, Australia, or wherever you’ve chosen to virtually connect from.” However, you might want to look for a VPN that doesn’t maintain logs, as they can identify you and your online activities. ■ Monitor yourself: “Periodically reviewing your online presence will help you discover how much of your personal information is public,” said Fogg. It’s easy to create Google alerts for yourself which can help you get a sense of what the internet knows about you.

https://www.howtogeek.com/440027/how-to-protect-your-identity-online/ Ransomware, coming to your town… According to cybersecurity firm Barracuda, more than two-thirds of the 70 ransomware 2 attacks tracked in the United States in the first half of the year were directed at local or state governments or government agencies. Almost 50% of the municipalities targeted in ransomware schemes were small, with between 15,000 and 50,000 residents. Roughly 25% of the municipalities had fewer than 15,000 residents. Small towns are especially attractive targets for hackers because they often lack the resources needed to build a robust cybersecurity defense. The average ransom payment in the second quarter of the year was $36,295—nearly triple the average payment in the first quarter, and a drastic increase from the $5,973 average payment in the third quarter of 2018. While some towns refuse to make the payments, others opt to fork out the money in order to get a quick resolution to their problem. With small towns willing to make the ransom payments to free up their stolen files, hackers are increasingly emboldened to target them, and the insurance industry has seen rapid growth in a new area: cyber insurance. Get a backup system in place and make it a priority. MS One Drive and both have ransomware defenses in place. Tools…

■ Tools you should have and use – Cargo decoder – Geocam Pro – IFTTT – Weather app – Waze in the dispatch office – Excel to CSV to KML ■ Sometimes seeing is what matters ■ Watch for the doughnut effect Cargo Decoder

Cargo Decoder is the means to prevent “blue canaries.” It is the app version of the data in the Emergency Response Guidebook (ERG2016) as well as the ERG2012 and the ERG2008. Although the orange ERG books are provided free to every officer and first responder, too often they are not immediately available. Cargo Decoder solves this. By entering the 4-digit placard code on the tanker or container, the content is identified, the potential hazards are explained, and the proactive distances are provided. Geocam Pro The app is now supported and available in the store. It is an important app because it allows the capture of Lat/Long on an image, the tilt angle of the camera, the pitch angle of the camera, and the embedding of other capture locations in an image. In addition, the captured images and associated metadata can be downloaded as a KML file for inclusion on . It also provides a map overlay of the camera’s position and direction of focus. As you turn to face a direction, the indicator changes on the map. The map also shows the other sites where you have captured an image. Army Knife for Android

This app includes a flashlight, unit converter, timer, stopwatch, compass, bubble level, calculator, magnifying glass, mirror, and ruler. Although each of these elements is available as a separate app or as part of other apps, this presents all of them in one place, and each of the parts is amazingly complete. As an example, the timer allows up to ten different timers to run in parallel, and the unit converter includes almost any unit of measure. IFTTT – If This Then That… IFTTT (If This, Then That) is the easy, free way to get your apps and devices working together. ■ Each time a patrol car enters an area, send an SMS to dispatch ■ Every time dispatch receives an SMS from a patrol, log it to Excel ■ When my calendar shows I am in a meeting, silence my phone ■ When I leave the house, turn off my phone WiFi ■ When I arrive at work, turn on my phone WiFi Waze… 3 Nearly instant notification of events including: ■ Wrecks – often faster than a 911 call ■ Slow downs ■ Objects on the road ■ Speed traps ■ Construction Use an aged or out-of- service machine to display Waze in the dispatch office. Excel>CSV>KML>Google…

You can take data, such as an Excel data sheet, move it to KML, and it will load in Google. This allows you to “see” things you have never seen before about your work. How the doughnut effect theory was developed. Questions?...contact information

Joel Aud LEAN TAIL LABS https://leantaillabs.com 24/7 number (512) 818-9971