Brexit Threatens Cybercrime Detection

Speedy European evidence-sharing about cyber-crime may be endangered by a no-deal Brexit, a police officer in Northern Ireland has warned. European Investigation Orders (EIOs) allow the Police Service of Northern Ireland (PSNI) to access material within 90 days.

The number of internet-related crimes has increased significantly in recent years but the amount of resources devoted to tackling it is being outstripped, Detective Sergeant Darren McCracken said. He added: “If we leave as a result of Brexit we no longer have access to EIOs to obtain information within 90 days.”

He said that was a fast turnaround in the world of law enforcement. Investigators can contact firms directly for intelligence-gathering but for court action the official channel is essential, he said. 

“If Brexit happens we are no longer part of a European treaty. We may not have access to that.”

He was part of a panel at the first UK Finance Festival organised at the Titanic Belfast visitor centre.
Det Sgt McCracken said there was a lack of willingness to engage with law enforcement by companies because of fears of publicity causing reputational damage.

He noted willingness to report for information purposes but evidence-gathering for criminal action was more difficult, adding that a lot of people feared an investigation would enter the public domain.

“We focus on businesses that will engage with ourselves.” He said crime types are changing and become more complex when they include suspects based in North America. “The demand is massively outstripping (supply), there is a huge volume of demand on our service.”

Companies often contact police after they have been the victims of an attack, he said, which can be too late. If they can educate people to prevent the crime then officers could focus resources on criminals better, he added. 

DS McCracken reiterated the importance of good cyber-security for businesses: “There is a huge volume of business email compromises that could be prevented.”

Shropshire Star

You Might Also Read:

A Snapshot Of Cybercrime In The UK:

 

 

« IoT Connected Devices Need Better Cybersecurity
Cybersecurity And IoT Suffering From The Skills Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

Lastline

Lastline

Lastline is the leader in advanced malware protection.

Zurich

Zurich

Zurich is a leading multi-line insurer providing a wide range of property and casualty, and life insurance products and services in more than 210 countries and territories.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Boltonshield

Boltonshield

Boltonshield provide a unique and proactive approach to cyber defence with managed security services, integrated technologies, and a team of security experts, ethical hackers and analysts.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

GIS Consulting (GISPL)

GIS Consulting (GISPL)

From General Data Protection Regulations to advanced Network Infrastructure Audits, GIS Consulting has established a reputation as one the leading cyber security companies in the industry.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.