POLICE TECHNICAL to Release Controversial Tactical Hacking Book

POLICE TECHNICAL to Release Controversial Tactical Hacking Book by Brianne Hoffman:

POLICE TECHNICAL is weeks away from releasing Introduction to Tactical Hacking: A Guide for Law Enforcement on pre-sale. The road to get there, however, has been long and challenging to navigate.

Similar to its predecessors, Cell Phone Investigations and Warrantless Searches, Introduction to Tactical Hacking has a technical nexus designed to serve the LE community. Based on survey results POLICE TECHNICAL collected in Sept. 2015, overall audience response was positive because few comprehensive materials on tactical hacking exists.

Updated: Download free chapter here. The Introduction:

When it comes to the latest technology, Police are woefully behind, and efforts to catch up have been severely hampered by budgetary constraints, regulatory restrictions, and lack of training. As a result, officers, SWAT Operators, and Police Personnel at all levels of service are not making full use of the available technologies that could provide critical, life-saving intelligence.

Additionally, the Corrections component of Law Enforcement has been struggling for some time to deter unauthorized cellular phone use in their facilities by the inmates. I think that is an admirable quest, but I would also encourage them to consider how the peer-to-peer chat functions within the Wi-Fi capabilities of a Smartphone could be used to run prisons on the inside, allowing inmates to have entire communications networks between themselves without ever even activating the cellular functions of the phone.

This book is designed to introduce Law Enforcement personnel at all levels to technology available right now. Simply defined, Tactical Hacking is development and redesign of existing tools, software, and technology to access, intercept, interrupt, or utilize a suspected source of information technology to save lives. How it is being used by those around us, how it is being used against us, and how we can better use it to assist our efforts to do our jobs?

It is not intended to be used in an everyday investigation, but, rather, when a subject is armed, threatening others, and/or is barricaded in a building. The information I present in this book isn’t even secret. Civilian Penetration Testers have been using these tools, in some cases, 10 years or more. Still, Law Enforcement remains very unfamiliar with the technology or its life-saving potential uses.

What I will attempt to do here is make the technology available in a way that talks specifically about our unique perspectives, needs, tactical considerations, and mission critical functions so that Law Enforcement can protect themselves and those they serve from those who would harm or exploit us.

Remember: get permission, in writing, and always consult with your Supervisors and District/State and Attorneys General before activating any of the strategies I suggest in this book. Also, understand that you will always need a warrant at some time during the process of using this type of intelligence gathering equipment and tools. So when you get the situation stabilized, and there is time to request it, get a warrant completed and in front of a Judicial Authority as soon as possible. You have the right to use these tools, but that right hinges on authority that will wane with the passage of time without a signed Court Order to support it. It might also be a good idea to draft a policy concerning its use as well.

This entry was posted in Surveillance technology. Bookmark the permalink.

Comments are closed.