The Future Of Policing In A Cyber World


Police and criminals are constantly trying to stay one step ahead of each other. How has the cyber threat landscape evolved over the years, and what can police officers do to fight new threats?

It is “hunt or be hunted” in the world of cybercrime,according the the Cybercrime Director at INTERPOL  Craig Jones. Jones speaking at the recent CyberCrimeCon 2019 in Singapore about the challenges police forces have to overcome to combat cyber criminals; the rising trends in cybercrime; and how INTERPOL can help.

Challenges in Policing the Cyber World

Every country faces a unique set of challenges in tackling cyber threats. “We see real regional differences in the types of cybercrimes,” Jones told GovInsider. For instance, America faces cyber threats from hackers in Russia, Pakistan and Iran, while Singapore’s attackers are mainly based in North Korea and China, reports cybersecurity company Group-IB. In their forecast, they reported that the energy sector in the Middle East can expect “heavy destruction as a result of cyber weapons”.

At least 50 percent of all crime is now committed online, but this figure is “under-reported”, says Jones. “We can’t demonstrate the true picture of solid criminality and the impact it’s having,” he notes. This means the police can’t allocate resources to tackle cybercrime effectively.

The borderless nature of cybercrime poses another challenge for the police. “The police are not set up historically to deal with the challenges” of protecting the community from crime that could have originated from any corner of the world. 
“There’s no agreement on how the police operate in a virtual environment,” says Jones. On top of that, legislation has not yet caught up with the nature of cybercrime. “In the UK, we don’t arrest people for committing a cybercrime. Instead, we charged people for a Computer Misuse Act offense, so we had to use the legislation that is available to us in the country,” says Jones.

Rising Cyber Threats

We are at the very early stages of leveraging AI in cybersecurity and operations. This will mature over time but the hacker is still mostly caught today by people. The focus of the biggest firms is on threat hunting and threat intelligence and this made possible because of the fundamentals have been put in place from a cyber and operations perspective. 
Jones pointed out three rising cyber threats that governments should pay attention to. 

New tech such as 5G and IoT have become almost the enablers for cybercrime, and the pervasiveness of such tech opens up more opportunities for cyber criminals to attack. 

Next, ransomware is becoming more targeted and has become “one of the main areas where criminals are looking to make money,” shares Jones. In a ransomware attack, hackers threaten to release confidential data or block a company’s access to crucial information until they pay a ransom. 

Cyber criminals are targeting specific companies that they know have more on the line if they are unable to access their data.
Third, business email compromise fraud has been on the rise. This occurs when criminals hack into a company’s server and send out bill notices from executive-level staff, which are linked to fake bank accounts. INTERPOL recently launched a month-long campaign to raise awareness about this type of fraud.

How INTERPOL Can Help

INTERPOL can help with tackling these pressing cyber threats by pooling together datasets from member countries and vendors to identify “investigator opportunities”, says Jones. This means INTERPOL can suggest the next steps for a country’s police force to take when a cybercrime incident occurs. The police could go after the criminals, the infrastructure, or the stolen money, for example.

INTERPOL helps with coordinating efforts amongst different countries. “Globally, when there’s a plane crash, or when a bomb goes off, INTERPOL coordinates activities with the affected member countries and supports them with experts,” explains Jones. “We can do the same in the cyber sphere as well.”

Crime can never be completely eliminated, but when it comes to bringing down virtual crime that crosses international borders, the police have a marked advantage in staying one step ahead, they work together. “Cyber criminals often work alone and in smaller groups,” said Jones.

International organisations like INTERPOL work with individual countries to piece together the big picture on cybercrime, and that can make all the difference between hunting or being hunted.

 Interpol:        Software Testing News:      GovInsider Asia:        WEF

You Might Also Read: 

Do Criminals Dream Of Electric Sheep?:

 

 

 

 

 

« What Girls Bring To Cyber Security
US Contractors Struggling With Pentagon Cyber Security Standards »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

Secure Domains

Secure Domains

Secure Domains is the first company in the GCC to offer cloud-based DNS firewall services and security through its flagship SaaS product, DNS Armor.