Policing Digital Crime


Directors Report: This Premium article is exclusive to premium subscribers. For unrestricted website access please Subscribe: £5 monthly / £50 annual.


Cyber crime is a growing issue, still not fully understood by researchers or policing/law enforcement communities. UK Government reports assert that victims of cyber crime were unlikely to report crimes immediately due to the perception that police were ill-equipped to deal with these offences. 

The use of digital media, digital devices and social media has exploded in the past two decades. And twenty years ago, few people imagined how pervasive digital technology would become in our lives.

Many of us now take for granted mobile phones that are like pocket computers, electronic devices that can be activated from across the world. And we now live in a digital world where the divisions between physical and virtual are becoming blurred as we are now quite accustomed to making payments via our computer network. With the advent of new technology there have been unexpected consequences of criminal exploitation and theft and as many cyber operations attack countries at a distance it means that local police services can’t easily act against them. 

This new electronic criminal engagement has similarities to the past’s technological changes. For example, eight hundred years ago in the 1300s, the metal working techniques used for making genuine currency were rapidly adopted by criminals for making imitation coins for criminal use and financial gain. In the 19th century the invention of typewriters provided increased anonymity for those writing blackmail letters, and by the 1920s the FBI had developed the forensic examination of typewriters and text. When motor cars became available for public use, bank robbers soon began to use them, as later portrayed in Hollywood movies such as Bonnie and Clyde.

Now approximately 30 years old, the field of digital forensics is arguably facing some of its greatest challenges to date. 

Whilst currently supporting law enforcement in numerous criminal cases annually, questions are beginning to emerge regarding whether it can sustain this contribution, with digital crime remaining prevalent. Now criminals employ digital technology and fast digital networks and soon it might even be the case that traditional forms of volume crime, such as shoplifting, will soon be overtaken by cyber-crime as the new crime. 

When crime rates unexpectedly fell in England and Wales in 2010 one academic commentator said that this is the result of conventional property crime developing into new digital forms that are less likely to be reported, such as the use of eBay to sell stolen goods.

More organised forms of criminality would also appear to be exploiting the opportunities provided by increasing digitalisation. 

The conclusion of a report Detica with the John Grieve Centre for Policing and Security, claimed that we are entering a fourth great era of organised crime, called the age of digital crime.  Digital crime is also considered a threat to the further deployment of e-government and e-business services and police forces in the UK are unable to keep pace with technology when it comes to digital forensics, and currently there is a backlog of more than 25,000 devices waiting to be examined.

A significant number of nations around the world have enacted cybe rcrime laws for the purpose of controlling the occurrence of cyber crimes and mitigating its ill effects. However, in spite of enacting such cyber crime laws, available data show that the incidence of cyber crime is rapidly increasing.

Cyber crime has experienced an ascending position in national security agendas world-wide. It has become a part of the national security strategies of a growing number of countries, including the UK, Australia, the Netherlands, the USA and many others, becoming a Tier One threat, above organised crime and fraud generally. Cyber crime is now the typical high-volume property crime in the UK, impacting upon more of the public than traditional acquisitive crimes such as burglary and car theft.

Due to perceptions of anonymity and distance from the offline world, Internet users experience a false sense of security, and online offenders are psychologically, socially and physically further removed from their offences and victims, encounter fewer and, or less severe consequences for their behaviours and are likely to repeat these offences, emboldened by their experience. 

In response, the international community is taking action to improve national law enforcement capabilities and facilitate international cooperation on cyber crime.  Cyber crime cannot be systemically curbed without confronting the source of cyber criminal activity, reducing the payoff and making the risk of prosecution real to offenders. 
With government efforts alone proving insufficient, successful approaches require a convergence of transnational public-private efforts and resources. 

So far government co-operation with the private-sector, both locally and globally, has been fragmented. And cyber criminals are exploiting these gaps with near impunity.

Careful cyber criminals will go to great lengths to hide their identity and their location. As well as using online pseudonyms known as ‘handles’, they will often do business on the Dark Web, which makes it hard to track them. 
Furthermore, they might use VPNs and proxies to hide their true IP address, which makes it extremely difficult to find out where they’re really located. 

The company that provides the proxy or VPN will usually have the real IP address in their records, but if it’s not willing to voluntarily share this information, the authorities will need to get a court order to compel it to do so, but if the company is based abroad, currently that could be next to impossible to achieve.

References: 

Robin Bryant / Academia:    Robin Bryant

Tees University:   HM Justice Inspectorate:  

TechMonitor:       Ajoy Pb / Research Gate:

Davis Wall & Matthew Williams

Joanna Curtis & Gavin Oxburgh

WEF:     TMB

You Might Also Read: 

A Short History Of Cyber Crime - Part 1- Its Motivations:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Businesses Need To Prioritise Cybersecurity In 2023
Making A Success Of Hybrid Working »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Intrepid Solutions and Services

Intrepid Solutions and Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Solvere One

Solvere One

Solvere One is a managed service provider (MSP) focused on corporate consulting and partnership.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.