Reggie C.
Homeland Security
Published in
5 min readDec 28, 2014

--

The Case of the Accidental Terrorist — An Internet of Things Detective Story: Part 3

As Harloe scrolled through the evidence log on his tablet, the evidence transport vehicle arrived at the scene. Harloe stopped scrolling as his attention was drawn to the three-dimensional image of the detonator. The design looked similar to one from a previous case he had worked. The detonator in that case was assembled by a freelancer who apparently hired his talents out to anyone who could pay his price. The IP address of the trigger had been spoofed from a bank of IP addresses that was registered to the Highland Corporation.

The Highland Corporation manufactured industrial control systems. System components have unique IP addresses for a greater level of communication with data acquisition systems, that when combined, provide control of industrial equipment at remote locations, such as dams, power plants and water treatment facilities.

Harloe tagged the evidence record for the detonator with a reminder note to contact the head of security and the Chief Information Security Officer at the Highland Corporation. The follow-up tag was added to his To Do list with a link back to the evidence record and the contact information for the Highland Corporation. He used a laser pointer to tagged other pieces of evidence at the scene for follow-up or examination. The laser pointer ensured that he was able to mark pieces of evidence without touching them, before they were packaged and booked.

While Harloe was examining the evidence record for the detonator, the evidence drones were tagging and packaging the evidence for secure transport by the evidence transport vehicle. Once all items of evidence were secured in the vehicle, they could not be accessed enroute by anyone. This ensured that chain of custody requirements were met. If the vehicle became disabled or if there was some other extenuating circumstance that required access in-transit, the mobile evidence vault could be accessed by the Chief only. The Chief would request a special one-time lock decryption key from the Department’s records management system. The decryption key would work only if the Chief’s IP-tagged police badge was within range and a biometric scan was conducted.

After the evidence transport vehicle was sealed, Harloe left the scene and headed to the station. The gate to the secure parking lot opened automatically as he approached, triggered by the secure handshake with his official vehicle. His badge and facial recognition biometric unlocked the door to the station as he approached and entered, barely breaking stride.

Uniformed patrol officers were just starting their shift as he walked down the hall. The idea of an in-person shift briefing was not technically necessary. The officers could view any new safety or informational bulletins from home and immediately go on patrol. The in-person shift briefing survives to this day to provide socialization and a feeling of camaraderie and team work. It also gives supervisors and managers an opportunity to visual inspect their officers to ensure they present the proper image to the public.

axon_flex_composite_horizontal_02_shot_8x11_jpg.jpg

As they file toward the back door and to their vehicles, they pick up safety and communication equipment along the way. Wrist-communication devices for two-way communications with other officers, dispatch services and to make data queries; audio and video recording devices that attach to eyewear or headgear, depending upon user preference; electric incapacitators to stun violent offenders into submission; and impact weapons for less-lethal or deadly force situations.

In years past, officers wore duty belts that weighed 20–30 pounds when fully equipped. Bad backs and pinched nerves invariably was in the future of many of these officers after spending decades wearing this heavy, unergonomic equipment. Two way radios now consisted of an ear piece or bone conductor speaker, a wrap-around microphone worn under the shirt collar and a control panel worn on the wrist or forearm. The microphone can also be activated by voice by speaking a security code aloud.

P90108162-highRes.jpg

Each of these devices is recorded as being checked out when the officer steps through the back door with the gear in tow or attached to their uniform. The unique IP address of each item, coupled with the IP address of the officer’s uniform badge and secondary authentication through a unique wearable device ensures accurate inventory control that is not prone to human error. An array of vehicles are available in the lot to serve the unique patrol needs of the officer’s assigned beat. Some officers will take semi-autonomous electric automobiles. Others will take two-wheeled conveyances or transportation devices designed to be used around pedestrians.

Back inside the station, the evidence transport vehicle arrives and its contents is moved to the evidence locker where each item is verified against the original record created by the evidence drones. Harloe heads to the evidence room to examine some of the items. As he walks through the evidence room door, the IP address in his badge is added to the log of evidence room visitors. He uses his tablet to access all cases, active and closed, that he has worked. He will be allowed access to evidence connected to his cases only. Evidence can be examined in the evidence room, but it cannot be removed unless the records management system has a court room subpoena in its file approving the item for check out, or if it is destined for destruction or has been downgraded to property that can be returned to the owner of record.

Using his tablet, Harloe requests the actual (now inert) detonator that was booked a few minutes ago. He also searches his archives and requests the detonator from a previous case he had worked last year. The evidence clerk retrieves the items and places them on the table in front of Harloe.

To be continued . . .

--

--

Reggie C.
Homeland Security

“If not you, who? If not now, when?” — Abraham Maslow