IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Public Officials, Law Enforcement at Increased Risk of Cyberattacks and Doxing, FBI Says

In a bulletin released this week, the Internet Crime Complaint Center (IC3) warned that hacktivists are mining social media accounts to compile dossiers of personal information about law enforcement personnel and public officials, and are posting the data online.

In a bulletin released this week, the Internet Crime Complaint Center (IC3) warned that hacktivists are mining social media accounts to compile dossiers of personal information about law enforcement personnel and public officials, and are posting the data online.

The practice is known as "doxing" and may include the unauthorized release of information such as home addresses, phone numbers, email addresses and passwords.

"Law enforcement personnel and public officials need to maintain an enhanced awareness of the content they post and how it may reflect on themselves, their family, their employer or how it could be used against them in court or during online attacks," the April 21 alert said.

IC3 is partnership of the FBI and the White Collar Crime Center.

The bulletin does not mention why law enforcement and public officials are increasingly being targeted. But recent headlines about officer-involved shootings and police tactics could be one reason.

IC3 provided some guidelines for minimizing the risk of being victimized by a cyberbreach or doxing attack:

  • Turn on all privacy settings on social media sites and refrain from posting pictures showing your affiliation to law enforcement.
  • Be aware of your security settings on your home computers and wireless networks.
  • Limit your personal postings on media sites and carefully consider comments.
  • Restrict your driver’s license and vehicle registration information with the Department of Motor Vehicles.
  • Request real estate and personal property records be restricted from online searches with your specific county.
  • Routinely update hardware and software applications, including antivirus.
  • Pay close attention to all work and personal emails, especially those containing attachments or links to other websites. These suspicious or phishing emails may contain infected attachments or links.
  • Routinely conduct online searches of your name to identify what public information is already available.
  • Enable additional email security measures to include two-factor authentication on your personal email accounts. This is a security feature offered by many email providers. The feature will cause a text message to be sent to your mobile device prior to accessing your email account.
  • Closely monitor your credit and banking accounts for fraudulent activity.
  • Passwords should be changed regularly. It is recommended to use a password phrase of 15 characters or more. Example of a password phrase: Thisisthemonthofseptember,2014.
  • Be aware of pretext or suspicious phone calls or emails from people phishing for information or pretending to know you. Social engineering is a skill often used to trick you into divulging confidential information and continues to be an extremely effective method for criminals.
  • Advise family members to turn on security settings on ALL social media accounts. Family member associations are public information and family members can become online targets of opportunity.