SlideShare a Scribd company logo
INTERNATION
AL ASSOCIATION OF CH
IEFSOFPOLICE
Law Enforcement

Cyber Incident Reporting

A Unified Message for State, Local, Tribal, and Territorial Law Enforcement
Cyber threats from malicious actors are a growing concern across the United States. Voluntary sharing of incident information
between state, local, tribal, and territorial (SLTT) law enforcement and the federal government is important to ensuring a safe and
secure cyberspace. This document details different ways SLTT law enforcement partners can report suspected or confirmed cyber
incidents to the federal government. No matter which“door”SLTT law enforcement uses, information is shared within the federal
government to provide an appropriate response while protecting citizens’privacy and civil liberties under the law.
When to Report to the
Federal Government
A cyber incident is a past, ongoing, or threatened intrusion,
disruption, or other event that impairs or is likely to impair
the confidentiality, integrity, or availability of electronic
information, information systems, services, or networks. SLTT
partners are encouraged to voluntarily report suspected or
confirmed cyber incidents to a federal entity. In particular, a
cyber incident should be reported if it:
 May impact national security, economic security, or public
health and safety.
 Affects core government or critical infrastructure functions.
 Results in a significant loss of data, system availability, or
control of systems.
 Involves a large number of victims.
 Indicates unauthorized access to, or malicious software
present on, critical information technology systems.
 Violates federal or SLTT law.
What to Report
Cyber incidents may be reported at various stages, including
when complete information is not available. Gathering as
much information as possible will help expedite assistance to
your agency and your community.
 Your name, organization, address, and phone number.
 What entity experienced the incident? Who owns the
affected systems? Who is the appropriate point of contact?
 What type of incident occurred?
 What was the initial entry vector or vulnerability exploited
(if known)?
 How was the incident initially detected or discovered?
 What specific assets appear to be impacted (e.g., systems,
networks, data)?
 Provide a synopsis of impacts (business, mission, and
operational), including prioritization factors:
• 	 Did the incident impact critical infrastructure essential
functions?
• 	 Was a control system compromised or manipulated?
 What response actions have already been performed by the
affected entity?
• 	 Are they requesting federal technical assistance?
• 	 Have they contacted or retained a managed security
service provider for mitigation/investigation?
• 	 Has your agency opened a law enforcement
investigation? Have other law enforcement agencies
been asked to investigate? Can you share the other
agency’s point of contact information?
 If you have them, please share:
• 	 Logs, including destination IP and port and destination
URL
• 	 Operating software of the affected system(s)
• 	 Source ports involved in the attack
• 	 Indications (current or historical) of sophisticated tactics,
techniques, and procedures (TTPs)
• 	 Indications (current or historical) that the attack 

specifically targeted the asset owner

• 	 Status change data and time stamps (including time
zone)
How to Report
The federal government has several different ways for
individuals, businesses, law enforcement partners, and others
to report cyber incidents. SLTT law enforcement can report
to the federal government in person, by e-mail, by phone,
or via online tools. Reports are appropriately shared among
relevant federal stakeholders in order to help mitigate the
consequences of the incident, evaluate the impact on critical
infrastructure, and investigate any potential criminal violations.
The table on the next page summarizes these resources.
®
SINCE 1893
Law Enforcement Cyber Incident Reporting
A Unified Message for State, Local, Tribal, and Territorial Law Enforcement
Key Contacts for SLTT Law Enforcement Cyber Incident Reporting
Organization and Key Points of Contact
U.S. Department of Homeland Security (DHS)
National Protection and Programs Directorate (NPPD)
What to Report?
National Cybersecurity and Communications Integration Center
(NCCIC) (http://www.dhs.gov/about-national-cybersecurity­
communications-integration-center)
NCCIC@hq.dhs.gov or (888) 282-0870
Suspected or confirmed cyber incidents that may impact
critical infrastructure and require technical response and
mitigation assistance
United States Secret Service
Secret Service Field Offices
(http://www.secretservice.gov/field_offices.shtml)
Electronic Crimes Task Forces (ECTFs)
(http://www.secretservice.gov/ectf.shtml)
Cybercrime, including computer intrusions or attacks,
transmission of malicious code, password trafficking,
or theft of payment card or other financial payment
information
Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI)
ICE HSI Field Offices (http://www.ice.gov/contact/inv/)
ICE HSI Cyber Crimes Center (http://www.ice.gov/cyber-crimes/)
Cyber-based domestic or international cross-border
crime, including child exploitation, money laundering,
smuggling, and violations of intellectual property rights
U.S. Department of Justice (DOJ)
Federal Bureau of Investigation (FBI)
FBI Field Offices ( )
Cyber Task Forces (
http://www.fbi.gov/contact-us/field
http://www.fbi.gov/about-us/investigate/
cyber/cyber-task-forces-building-alliances-to-improve-the­
nations-cybersecurity-1)
Law Enforcement Online Portal
(https://www.cjis.gov/CJISEAI/EAIController) or (888) 334-4536
Cybercrime, including computer intrusions or attacks,
fraud, intellectual property theft, identity theft, theft
of trade secrets, criminal hacking, terrorist activity,
espionage, sabotage, or other foreign intelligence
activity
Cyber Training and Other Resources for Law Enforcement Personnel
 The FBI’s Cyber Shield Alliance (https://www.cjis.gov/CJISEAI/EAIController) provides extensive resources for SLTT partners,
including eGuardian (https://www.cjis.gov/CJISEAI/EAIController) access, intelligence sharing, federally sponsored training,
and fellowships at the National Cyber Investigative Joint Task Force (http://www.fbi.gov/about-us/investigate/cyber/ncijtf).
The FBI also supports the InfraGard (https://www.infragard.org/) partnership with the private sector.
 The U.S. Secret Service operates the National Computer Forensics Institute (https://www.ncfi.usss.gov) to provide federally
sponsored training for SLTT partners, including law enforcement, prosecutors, and judges.
 The ICE HSI Cyber Crimes Center offers a variety of technical training courses related to cyber investigations and digital
forensics on a request basis.
 The Computer Crime and Intellectual Property Section (CCIPS) manuals Searching and Seizing Computers and Electronic
Evidence and Prosecuting Computer Crimes are available online at http://www.justice.gov/criminal/cybercrime/documents.
html.
 SLTT partners can also advise the public to file a complaint online (http://www.ic3.gov/default.aspx) with the Internet Crime
Complaint Center (http://www.ic3.gov/default.aspx).
If there is an immediate threat to public health or safety,
the public should always call 9-1-1.

More Related Content

PDF
Cyber Threat Intelligence Integration Center -- ONDI
PDF
Insa cyber intelligence 2011
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
Building an Effective Cyber Intelligence Program
PDF
Cyber Threat Intelligence
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPTX
How To Turbo-Charge Incident Response With Threat Intelligence
PDF
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence Integration Center -- ONDI
Insa cyber intelligence 2011
Cyber Incident Response Team - NIMS - Public Comment
Building an Effective Cyber Intelligence Program
Cyber Threat Intelligence
Threat Intelligence 101 - Steve Lodin - Submitted
How To Turbo-Charge Incident Response With Threat Intelligence
Cyber Threat Intelligence - It's not just about the feeds

What's hot (19)

PPTX
Cyber Threat Intelligence
PPTX
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
PDF
Data Leak Protection Using Text Mining and Social Network Analysis
PPTX
How to Build a Successful Incident Response Program
PPTX
How to build a cyber threat intelligence program
PDF
Cyber Threat Intelligence
PPTX
6 Steps for Operationalizing Threat Intelligence
PDF
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
PDF
How To Turbo-Charge Incident Response With Threat Intelligence
PPT
Eidws 111 opsec
PPTX
Practical and Actionable Threat Intelligence Collection
PDF
Cyber Threat Intelligence
PPTX
Threat intelligence in security
PDF
Is Cyber Resilience Really That Difficult?
PPT
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
PDF
Cyber threat intelligence ppt
PDF
Global Cyber Threat Intelligence
PPTX
Cyber Threat Intelligence | Information to Insight
PPTX
The Economics of Cyber Security
Cyber Threat Intelligence
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
Data Leak Protection Using Text Mining and Social Network Analysis
How to Build a Successful Incident Response Program
How to build a cyber threat intelligence program
Cyber Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
How To Turbo-Charge Incident Response With Threat Intelligence
Eidws 111 opsec
Practical and Actionable Threat Intelligence Collection
Cyber Threat Intelligence
Threat intelligence in security
Is Cyber Resilience Really That Difficult?
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
Cyber threat intelligence ppt
Global Cyber Threat Intelligence
Cyber Threat Intelligence | Information to Insight
The Economics of Cyber Security
Ad

Similar to Law Enforcement Cyber Incident Reporting (20)

PDF
American Bar Association guidelines on Cyber Security standards
PDF
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
PPTX
Module 1.pptx
PPSX
Cyber crime
PDF
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
PDF
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
PDF
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
PDF
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
PDF
Cybercrime in government
PPTX
Event: George Washington University -- National Security Threat Convergence: ...
PDF
Branney-Gant Research Paper
PDF
Government Notification of Data Breach
PDF
Why Hackers Win Power And Disruption In The Network Society Patrick Burkart T...
PPT
28658043 cyber-terrorism
PDF
wp-us-cities-exposed
PPT
TSCM Overview for Stakeholders
PPT
Cyber(in)security: systemic risks and responses
PPT
Systemic cybersecurity risk
PPTX
Online security – an assessment of the new
PPT
Cyber Risks
American Bar Association guidelines on Cyber Security standards
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Module 1.pptx
Cyber crime
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Cybercrime in government
Event: George Washington University -- National Security Threat Convergence: ...
Branney-Gant Research Paper
Government Notification of Data Breach
Why Hackers Win Power And Disruption In The Network Society Patrick Burkart T...
28658043 cyber-terrorism
wp-us-cities-exposed
TSCM Overview for Stakeholders
Cyber(in)security: systemic risks and responses
Systemic cybersecurity risk
Online security – an assessment of the new
Cyber Risks
Ad

More from David Sweigert (20)

PDF
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
PDF
Sample Network Analysis Report based on Wireshark Analysis
PDF
National Cyber Security Awareness Month poster
PDF
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
PDF
National Cyber Security Awareness Month - October 2017
PDF
California Attorney General Notification Penal Code 646.9
PDF
Congressional support of Ethical Hacking and Cyber Security
PDF
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
PDF
Application of Racketeering Law to Suppress CrowdStalking Threats
PDF
Canada Communications Security Establishment - Threat Vector Chart
DOCX
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
PDF
Cyber Incident Response Team NIMS Public Comment
PDF
National Incident Management System (NIMS) NQS DRAFT
PDF
National Incident Management System - NQS Public Feedback
DOCX
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
PDF
National Preparedness Goals 2015 2nd edition
PDF
Healthcare Sector-wide Disaster Prepardness Plan
PDF
Cyber Risk Assessment for the Emergency Services Sector - DHS
DOCX
Exam notes for the Certified in Homeland Security -- Level II
PDF
NIST Cybersecurity Event Recovery Guide 800-184
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
Sample Network Analysis Report based on Wireshark Analysis
National Cyber Security Awareness Month poster
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
National Cyber Security Awareness Month - October 2017
California Attorney General Notification Penal Code 646.9
Congressional support of Ethical Hacking and Cyber Security
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
Application of Racketeering Law to Suppress CrowdStalking Threats
Canada Communications Security Establishment - Threat Vector Chart
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Cyber Incident Response Team NIMS Public Comment
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System - NQS Public Feedback
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
National Preparedness Goals 2015 2nd edition
Healthcare Sector-wide Disaster Prepardness Plan
Cyber Risk Assessment for the Emergency Services Sector - DHS
Exam notes for the Certified in Homeland Security -- Level II
NIST Cybersecurity Event Recovery Guide 800-184

Recently uploaded (20)

PPT
genitourinary-cancers_1.ppt Nursing care of clients with GU cancer
PPTX
Electromyography (EMG) in Physiotherapy: Principles, Procedure & Clinical App...
PPTX
1 General Principles of Radiotherapy.pptx
PDF
CT Anatomy for Radiotherapy.pdf eryuioooop
PPTX
Gastroschisis- Clinical Overview 18112311
PPTX
Pathophysiology And Clinical Features Of Peripheral Nervous System .pptx
PPTX
Respiratory drugs, drugs acting on the respi system
PPT
ASRH Presentation for students and teachers 2770633.ppt
PPTX
NEET PG 2025 Pharmacology Recall | Real Exam Questions from 3rd August with D...
PPTX
Neuropathic pain.ppt treatment managment
PPTX
Acid Base Disorders educational power point.pptx
PPT
Obstructive sleep apnea in orthodontics treatment
PDF
Human Health And Disease hggyutgghg .pdf
PPT
Management of Acute Kidney Injury at LAUTECH
PPTX
Chapter-1-The-Human-Body-Orientation-Edited-55-slides.pptx
PPTX
Imaging of parasitic D. Case Discussions.pptx
PPTX
surgery guide for USMLE step 2-part 1.pptx
PPT
OPIOID ANALGESICS AND THEIR IMPLICATIONS
PPTX
Important Obstetric Emergency that must be recognised
PPT
MENTAL HEALTH - NOTES.ppt for nursing students
genitourinary-cancers_1.ppt Nursing care of clients with GU cancer
Electromyography (EMG) in Physiotherapy: Principles, Procedure & Clinical App...
1 General Principles of Radiotherapy.pptx
CT Anatomy for Radiotherapy.pdf eryuioooop
Gastroschisis- Clinical Overview 18112311
Pathophysiology And Clinical Features Of Peripheral Nervous System .pptx
Respiratory drugs, drugs acting on the respi system
ASRH Presentation for students and teachers 2770633.ppt
NEET PG 2025 Pharmacology Recall | Real Exam Questions from 3rd August with D...
Neuropathic pain.ppt treatment managment
Acid Base Disorders educational power point.pptx
Obstructive sleep apnea in orthodontics treatment
Human Health And Disease hggyutgghg .pdf
Management of Acute Kidney Injury at LAUTECH
Chapter-1-The-Human-Body-Orientation-Edited-55-slides.pptx
Imaging of parasitic D. Case Discussions.pptx
surgery guide for USMLE step 2-part 1.pptx
OPIOID ANALGESICS AND THEIR IMPLICATIONS
Important Obstetric Emergency that must be recognised
MENTAL HEALTH - NOTES.ppt for nursing students

Law Enforcement Cyber Incident Reporting

  • 1. INTERNATION AL ASSOCIATION OF CH IEFSOFPOLICE Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement Cyber threats from malicious actors are a growing concern across the United States. Voluntary sharing of incident information between state, local, tribal, and territorial (SLTT) law enforcement and the federal government is important to ensuring a safe and secure cyberspace. This document details different ways SLTT law enforcement partners can report suspected or confirmed cyber incidents to the federal government. No matter which“door”SLTT law enforcement uses, information is shared within the federal government to provide an appropriate response while protecting citizens’privacy and civil liberties under the law. When to Report to the Federal Government A cyber incident is a past, ongoing, or threatened intrusion, disruption, or other event that impairs or is likely to impair the confidentiality, integrity, or availability of electronic information, information systems, services, or networks. SLTT partners are encouraged to voluntarily report suspected or confirmed cyber incidents to a federal entity. In particular, a cyber incident should be reported if it: May impact national security, economic security, or public health and safety. Affects core government or critical infrastructure functions. Results in a significant loss of data, system availability, or control of systems. Involves a large number of victims. Indicates unauthorized access to, or malicious software present on, critical information technology systems. Violates federal or SLTT law. What to Report Cyber incidents may be reported at various stages, including when complete information is not available. Gathering as much information as possible will help expedite assistance to your agency and your community. Your name, organization, address, and phone number. What entity experienced the incident? Who owns the affected systems? Who is the appropriate point of contact? What type of incident occurred? What was the initial entry vector or vulnerability exploited (if known)? How was the incident initially detected or discovered? What specific assets appear to be impacted (e.g., systems, networks, data)? Provide a synopsis of impacts (business, mission, and operational), including prioritization factors: • Did the incident impact critical infrastructure essential functions? • Was a control system compromised or manipulated? What response actions have already been performed by the affected entity? • Are they requesting federal technical assistance? • Have they contacted or retained a managed security service provider for mitigation/investigation? • Has your agency opened a law enforcement investigation? Have other law enforcement agencies been asked to investigate? Can you share the other agency’s point of contact information? If you have them, please share: • Logs, including destination IP and port and destination URL • Operating software of the affected system(s) • Source ports involved in the attack • Indications (current or historical) of sophisticated tactics, techniques, and procedures (TTPs) • Indications (current or historical) that the attack specifically targeted the asset owner • Status change data and time stamps (including time zone) How to Report The federal government has several different ways for individuals, businesses, law enforcement partners, and others to report cyber incidents. SLTT law enforcement can report to the federal government in person, by e-mail, by phone, or via online tools. Reports are appropriately shared among relevant federal stakeholders in order to help mitigate the consequences of the incident, evaluate the impact on critical infrastructure, and investigate any potential criminal violations. The table on the next page summarizes these resources. ® SINCE 1893
  • 2. Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement Key Contacts for SLTT Law Enforcement Cyber Incident Reporting Organization and Key Points of Contact U.S. Department of Homeland Security (DHS) National Protection and Programs Directorate (NPPD) What to Report? National Cybersecurity and Communications Integration Center (NCCIC) (http://www.dhs.gov/about-national-cybersecurity­ communications-integration-center) [email protected] or (888) 282-0870 Suspected or confirmed cyber incidents that may impact critical infrastructure and require technical response and mitigation assistance United States Secret Service Secret Service Field Offices (http://www.secretservice.gov/field_offices.shtml) Electronic Crimes Task Forces (ECTFs) (http://www.secretservice.gov/ectf.shtml) Cybercrime, including computer intrusions or attacks, transmission of malicious code, password trafficking, or theft of payment card or other financial payment information Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) ICE HSI Field Offices (http://www.ice.gov/contact/inv/) ICE HSI Cyber Crimes Center (http://www.ice.gov/cyber-crimes/) Cyber-based domestic or international cross-border crime, including child exploitation, money laundering, smuggling, and violations of intellectual property rights U.S. Department of Justice (DOJ) Federal Bureau of Investigation (FBI) FBI Field Offices ( ) Cyber Task Forces ( http://www.fbi.gov/contact-us/field http://www.fbi.gov/about-us/investigate/ cyber/cyber-task-forces-building-alliances-to-improve-the­ nations-cybersecurity-1) Law Enforcement Online Portal (https://www.cjis.gov/CJISEAI/EAIController) or (888) 334-4536 Cybercrime, including computer intrusions or attacks, fraud, intellectual property theft, identity theft, theft of trade secrets, criminal hacking, terrorist activity, espionage, sabotage, or other foreign intelligence activity Cyber Training and Other Resources for Law Enforcement Personnel The FBI’s Cyber Shield Alliance (https://www.cjis.gov/CJISEAI/EAIController) provides extensive resources for SLTT partners, including eGuardian (https://www.cjis.gov/CJISEAI/EAIController) access, intelligence sharing, federally sponsored training, and fellowships at the National Cyber Investigative Joint Task Force (http://www.fbi.gov/about-us/investigate/cyber/ncijtf). The FBI also supports the InfraGard (https://www.infragard.org/) partnership with the private sector. The U.S. Secret Service operates the National Computer Forensics Institute (https://www.ncfi.usss.gov) to provide federally sponsored training for SLTT partners, including law enforcement, prosecutors, and judges. The ICE HSI Cyber Crimes Center offers a variety of technical training courses related to cyber investigations and digital forensics on a request basis. The Computer Crime and Intellectual Property Section (CCIPS) manuals Searching and Seizing Computers and Electronic Evidence and Prosecuting Computer Crimes are available online at http://www.justice.gov/criminal/cybercrime/documents. html. SLTT partners can also advise the public to file a complaint online (http://www.ic3.gov/default.aspx) with the Internet Crime Complaint Center (http://www.ic3.gov/default.aspx). If there is an immediate threat to public health or safety, the public should always call 9-1-1.