A security analysis of police computer systems

@article{VanderSloot2016ASA,
  title={A security analysis of police computer systems},
  author={Benjamin VanderSloot and Stuart Wheaton and J. Alex Halderman},
  journal={2016 14th Annual Conference on Privacy, Security and Trust (PST)},
  year={2016},
  pages={714-721}
}
Every day we entrust our privacy, safety, and security to police officers sworn to protect and serve. While many critical infrastructure computer systems have been well studied, the computer infrastructure supporting these officers remains to be surveyed in public literature. We remedy this by characterizing a sample police department's systems through a security lens, discussing weak points and areas for future work. Pen-testing of the security camera and web application systems were performed… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 18 references

The most dangerous code in the world: validating SSL certificates in non-browser software

ACM Conference on Computer and Communications Security • 2012
View 6 Excerpts
Highly Influenced

Arlington CISO Dave Jordan on why we’re losing the cyber war

A. Freed
2015
View 1 Excerpt

Wandsworth prison escapee

B. News
Neil Moore faked bail email. http://www.bbc.com/news/uk-england-london-32095189, • 2015
View 1 Excerpt

Criminal justice information services (CJIS) security policy version

C.I.S. Officer
AUG • 2014
View 1 Excerpt

Hacking 911: Adventures in disruption, destruction, and death

C. Dameff, P. Hefley, J. Tully
In DEFCON • 2014
View 2 Excerpts

APT1: Exposing one of chinas cyber espionage units

M. I. Center
Technical report, Mandiant, • 2013
View 1 Excerpt

Cloud computing in law enforcement: Survey results and guiding principles

D. J. Roberts
The Police Chief, • 2013
View 1 Excerpt

Similar Papers

Loading similar papers…