Company Details
dc-metropolitan-police-department
1,319
7,584
92212
dc.gov
0
DC _6508416
In-progress

DC Metropolitan Police Department Company CyberSecurity Posture
dc.govAs one of the top 10 largest police departments in the country, the Washington, DC Metropolitan Police Department offers opportunities you won’t find anywhere else. From leading motorcades for the President of the United States and world leaders - to joining elite investigative units, our officers are at the forefront of policing in the nation’s capital. We routinely collaborate with federal agencies and are committed to impactful community policing. Here, you’ll be part of a department that is supported by the community and driven by service.
Company Details
dc-metropolitan-police-department
1,319
7,584
92212
dc.gov
0
DC _6508416
In-progress
Between 650 and 699

DMPD Global Score (TPRM)XXXX

Description: Metropolitan Police Department suffered a cyber attack by Babuk Locker that led to a breach of its server. An unauthorized accessed on its server compromised the DC Police’s networks and stole 250 GB of unencrypted files. The ransomware gang also posted screenshots of various folders allegedly stolen in the attack, with the folder names looking like they are containing a lot of files related to operations, disciplinary records, and files related to gang members and ‘crews’ operating in DC
Description: **UK Lawmakers Press Apple and Google Over Stolen Smartphone Protections** UK legislators grilled Apple and Google in a House of Commons hearing over their failure to implement measures that would allow stolen smartphones to be remotely locked, reset, or blocked from accessing cloud services—a request repeatedly made by the Metropolitan Police. During the session, MPs expressed frustration over what they perceived as resistance from the tech giants, suggesting commercial incentives may be influencing their stance. Apple and Google, however, argued that such measures could introduce new fraud risks, including account takeovers and blackmail attempts. **The Scale of the Problem** The Met Police reported a sharp rise in smartphone thefts, with 80,000 devices stolen in London in 2024—up from 64,000 in 2023. Apple devices account for roughly 80% of stolen phones, with an estimated annual replacement value of £50 million ($67 million). Most stolen devices are funneled through criminal networks and resold abroad, primarily in Algeria, China, and Hong Kong. **Current Limitations** While the GSMA industry association allows stolen phones to be blocked at a network level using their IMEI (International Mobile Equipment Identity) numbers, this only covers about 10% of global networks. The Met Police has proposed an international cloud-level block, where reported stolen devices would be barred from accessing Apple or Google services. Security experts argue this could drastically reduce resale value and theft incentives. **Industry Responses** Apple’s Gary Davis acknowledged the risks of IMEI-based blocking, citing concerns over fraud vectors, including impersonation attacks that could lead to account deletions or blackmail. Google’s Simon Wingrove noted that Android devices can already be locked or wiped via the *Find My Device* app, but it remains unclear whether this prevents stolen phones from being reused with new accounts. **Potential Solutions** Dion Price, CEO of Trustonic—a company that provides remote locking for supply chain distributors—suggested a government-regulated system using IMEI data already collected for trade and tax purposes. Such a system could enable near-instant global locking of stolen devices, but only if phones are registered at first activation. The debate highlights the tension between security, user protection, and commercial interests as lawmakers push for stronger anti-theft measures.
Description: DC Metropolitan Police Department was affected by a cyber attack on may 2021. Twenty-two officers’ applicant files were in an archive that was 165 MB compressed. This was in addition to the first small dump the threat actors made with 5 other officers’ applicant files. It was revealed that the ransom demand was $4 million USD, and that the police department’s supposedly final offer was $100,000.00 which was rejected by the hacker group. They also uploaded a new archive of files that appears to be 22.7 GB in size, hackers indicated that they had downloaded 250 GB of data, so this is allegedly another partial dump.


DC Metropolitan Police Department has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.
DC Metropolitan Police Department has 28.21% more incidents than the average of all companies with at least one recorded incident.
DC Metropolitan Police Department reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
DMPD cyber incidents detection timeline including parent company and subsidiaries

As one of the top 10 largest police departments in the country, the Washington, DC Metropolitan Police Department offers opportunities you won’t find anywhere else. From leading motorcades for the President of the United States and world leaders - to joining elite investigative units, our officers are at the forefront of policing in the nation’s capital. We routinely collaborate with federal agencies and are committed to impactful community policing. Here, you’ll be part of a department that is supported by the community and driven by service.


he Government of India, officially known as the Union Government, and also known as the Central Government, was established by the Constitution of India, and is the governing authority of a union of 28 states and seven union territories, collectively called the Republic of India. It is seated in New

Vi gör hela Sverige tryggt och säkert! Att arbeta inom polisen är ett av de finaste uppdrag man kan ha. Du bidrar till samhället genom att göra hela Sverige tryggt och säkert. Oavsett om du jobbar i en civil roll eller som polis, är möjligheterna att växa med en större uppgift många. Vi är Sverig

Gendarmería Nacional Argentina (GNA) es una Fuerza de Seguridad de naturaleza militar, que cumple funciones en la seguridad interior, defensa nacional, auxilio a la Justicia Federal y apoyo a la Política Exterior de la RA. Es una de las cuatro Fuerzas que integran el Ministerio de Seguridad de l

Welcome to the Official NYPD LinkedIn Page. For emergencies, dial 911. To submit crime tips & information, visit www.NYPDcrimestoppers.com or call 800-577-TIPS. The mission of the New York City Police Department is to enhance the quality of life in New York City by working in partnership with the c

Policing in South Africa. I am attached to the newly formed Directorate for Priority Crime Investigations. Formally I was attached to the Detecitve Service and have been conduction investigations for over 25 years. I have also been attached to the National Inspectorate Division of the SAPS for soem

The Metropolitan Police Service is famed around the world and has a unique place in the history of policing. Our headquarters at New Scotland Yard - and its iconic revolving sign - has provided the backdrop to some of the most high profile and complex law enforcement investigations the world has e

Politiemensen staan midden in de maatschappij, dicht op het nieuws. De politie is daar waar het gebeurt. Het optreden van agenten ligt altijd onder een vergrootglas. Bij de politie ben je 24 uur per dag en voor iedereen in onze diverse samenleving. Integer, moedig, betrouwbaar en verbindend zijn daa
.png)
Mayor Bowser's team is promoting safe online shopping, offering cyber vigilance tips, and free cybersecurity workshops.
Washington, D.C., police on Sunday arrested a person outside of a local cathedral before a high-profile Red Mass. “Metropolitan Police...
An unspecified amount of guardsmen will head to the city, while the Pentagon draws up plans for 1000 guardsmen to deploy to Louisiana.
WASHINGTON, Aug 27 (Reuters) - One night last week, police officers in Washington stopped a man carrying a designer handbag after spotting a...
In the seven days since Trump deployed 800 National Guard troops in DC, violent crime is down 22% comapred to previous seven days.
A majority of residents in the nation's capital are opposed to President Trump's takeover of the city's police department, according to a...
DC Metropolitan Police detain a person after an altercation between members of the public, August 14. Hundreds of additional National Guard...
Aug 16 (Reuters) - The Republican governors of three states are deploying hundreds of National Guard troops to Washington, D.C.,...
Washington policing: Under pressure from a federal judge, the Justice Department clarified that Washington's police chief will, for now,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DC Metropolitan Police Department is https://joinmpd.dc.gov.
According to Rankiteo, DC Metropolitan Police Department’s AI-generated cybersecurity score is 654, reflecting their Weak security posture.
According to Rankiteo, DC Metropolitan Police Department currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DC Metropolitan Police Department is not certified under SOC 2 Type 1.
According to Rankiteo, DC Metropolitan Police Department does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DC Metropolitan Police Department is not listed as GDPR compliant.
According to Rankiteo, DC Metropolitan Police Department does not currently maintain PCI DSS compliance.
According to Rankiteo, DC Metropolitan Police Department is not compliant with HIPAA regulations.
According to Rankiteo,DC Metropolitan Police Department is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DC Metropolitan Police Department operates primarily in the Law Enforcement industry.
DC Metropolitan Police Department employs approximately 1,319 people worldwide.
DC Metropolitan Police Department presently has no subsidiaries across any sectors.
DC Metropolitan Police Department’s official LinkedIn profile has approximately 7,584 followers.
DC Metropolitan Police Department is classified under the NAICS code 92212, which corresponds to Police Protection.
No, DC Metropolitan Police Department does not have a profile on Crunchbase.
Yes, DC Metropolitan Police Department maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dc-metropolitan-police-department.
As of December 23, 2025, Rankiteo reports that DC Metropolitan Police Department has experienced 3 cybersecurity incidents.
DC Metropolitan Police Department has an estimated 1,520 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Ransomware and Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $50 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with trustonic (provides locking technology for smartphones), and law enforcement notified with metropolitan police engaged with apple and google, and communication strategy with public statements by apple and google to uk parliament..
Title: Metropolitan Police Department Cyber Attack
Description: Metropolitan Police Department suffered a cyber attack by Babuk Locker that led to a breach of its server. An unauthorized access on its server compromised the DC Police’s networks and stole 250 GB of unencrypted files. The ransomware gang also posted screenshots of various folders allegedly stolen in the attack, with the folder names looking like they are containing a lot of files related to operations, disciplinary records, and files related to gang members and ‘crews’ operating in DC.
Type: Ransomware
Attack Vector: Unauthorized Access
Threat Actor: Babuk Locker
Motivation: Financial Gain, Data Theft
Title: Cyber Attack on DC Metropolitan Police Department
Description: DC Metropolitan Police Department was affected by a cyber attack in May 2021. Twenty-two officers’ applicant files were in an archive that was 165 MB compressed. This was in addition to the first small dump the threat actors made with 5 other officers’ applicant files. It was revealed that the ransom demand was $4 million USD, and that the police department’s supposedly final offer was $100,000.00 which was rejected by the hacker group. They also uploaded a new archive of files that appears to be 22.7 GB in size, hackers indicated that they had downloaded 250 GB of data, so this is allegedly another partial dump.
Date Detected: May 2021
Type: Ransomware
Motivation: Financial
Title: UK Legislators Question Apple and Google Over Lack of Smartphone Theft Protections
Description: UK Members of Parliament expressed concerns that Apple and Google have not implemented measures to remotely lock, reset, and block stolen smartphones from accessing cloud services, as requested by the Metropolitan Police. The tech companies cited potential fraud vectors and commercial incentives as reasons for their reluctance.
Type: Policy and Compliance Issue
Threat Actor: Criminal gangs
Motivation: Financial gain through resale of stolen devices
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Operational files, Disciplinary records, Gang-related files
Systems Affected: Servers

Data Compromised: Applicant files, Other sensitive data

Financial Loss: £50 million ($67 million) annual replacement value of stolen phones in London
Systems Affected: Smartphones (primarily Apple iPhones)
Operational Impact: Traumatic disconnection for users, potential data access by criminals
Brand Reputation Impact: Potential reputational damage to Apple and Google due to perceived inaction
Identity Theft Risk: Potential risk if data is accessed by criminals
Average Financial Loss: The average financial loss per incident is $16.67 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Operational Files, Disciplinary Records, Gang-Related Files, , Applicant Files, Other Sensitive Data and .

Entity Name: Metropolitan Police Department
Entity Type: Government
Industry: Law Enforcement
Location: Washington D.C.

Entity Name: DC Metropolitan Police Department
Entity Type: Government
Industry: Law Enforcement
Location: Washington D.C.

Entity Name: Apple
Entity Type: Technology Company
Industry: Consumer Electronics and Software
Location: Global (UK affected)
Size: Large
Customers Affected: Approximately 64,000-80,000 stolen Apple phones in London (2023-2024)

Entity Name: Google
Entity Type: Technology Company
Industry: Consumer Electronics and Software
Location: Global (UK affected)
Size: Large
Customers Affected: Unknown number of stolen Android phones in London

Third Party Assistance: Trustonic (provides locking technology for smartphones)
Law Enforcement Notified: Metropolitan Police engaged with Apple and Google
Communication Strategy: Public statements by Apple and Google to UK Parliament
Third-Party Assistance: The company involves third-party assistance in incident response through Trustonic (provides locking technology for smartphones).

Type of Data Compromised: Operational files, Disciplinary records, Gang-related files
Sensitivity of Data: High

Type of Data Compromised: Applicant files, Other sensitive data
Sensitivity of Data: High
File Types Exposed: Application files

Sensitivity of Data: Potential access to cloud services (e.g., Google Photos, Drive, Gmail, Apple iCloud)
Personally Identifiable Information: Potential risk if cloud data is accessed

Lessons Learned: Need for collaboration between tech companies, law enforcement, and regulators to address smartphone theft and resale. Potential for IMEI-based blocking systems to reduce theft incentives.

Recommendations: Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.
Key Lessons Learned: The key lessons learned from past incidents are Need for collaboration between tech companies, law enforcement, and regulators to address smartphone theft and resale. Potential for IMEI-based blocking systems to reduce theft incentives.

Source: The Register

Source: UK House of Commons Science, Innovation and Technology Committee
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register, and Source: UK House of Commons Science, Innovation and Technology Committee.

Investigation Status: Ongoing (policy discussion and technical evaluation)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public statements by Apple and Google to UK Parliament.

Stakeholder Advisories: UK Parliament committee urging Apple and Google to implement IMEI-based blocking for stolen devices.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was UK Parliament committee urging Apple and Google to implement IMEI-based blocking for stolen devices..

Root Causes: Lack Of Standardized Imei-Based Blocking System For Cloud Services, Potential Commercial Incentives For Tech Companies (E.G., Revenue From Cloud Services And Replacement Devices), Fraud Risks Associated With Imei Spoofing Or Misuse,
Corrective Actions: Evaluate Feasibility Of Imei-Based Cloud Blocking With Fraud Prevention Measures, Explore Regulatory Or Government-Led Solutions For Smartphone Registration And Locking, Improve Collaboration Between Tech Companies, Law Enforcement, And Telecom Providers,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Trustonic (provides locking technology for smartphones).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Evaluate Feasibility Of Imei-Based Cloud Blocking With Fraud Prevention Measures, Explore Regulatory Or Government-Led Solutions For Smartphone Registration And Locking, Improve Collaboration Between Tech Companies, Law Enforcement, And Telecom Providers, .
Last Ransom Demanded: The amount of the last ransom demanded was $4 million USD.
Last Attacking Group: The attacking group in the last incident were an Babuk Locker and Criminal gangs.
Most Recent Incident Detected: The most recent incident detected was on May 2021.
Highest Financial Loss: The highest financial loss from an incident was £50 million ($67 million) annual replacement value of stolen phones in London.
Most Significant Data Compromised: The most significant data compromised in an incident were Operational files, Disciplinary records, Gang-related files, , Applicant files, Other sensitive data and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Trustonic (provides locking technology for smartphones).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Operational files, Applicant files, Disciplinary records, Other sensitive data and Gang-related files.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $4 million USD.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Need for collaboration between tech companies, law enforcement, and regulators to address smartphone theft and resale. Potential for IMEI-based blocking systems to reduce theft incentives.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices. and Enhance fraud detection to prevent misuse of IMEI-based blocking systems..
Most Recent Source: The most recent source of information about an incident are The Register, UK House of Commons Science and Innovation and Technology Committee.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (policy discussion and technical evaluation).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was UK Parliament committee urging Apple and Google to implement IMEI-based blocking for stolen devices., .
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.