Cybercrime: Law Enforcement Must Get Serious

When someone breaks into your home, you don’t hesitate to call the police and report the crime. But, when someone plants a virus on your computer, do you still call the police? How do you even determine what was stolen?

Major cyber-attacks and crimes like the Equifax and Sony breaches receive a ton of news coverage and spawn extensive investigations by law enforcement. But what about the small businesses and individuals who have crimes committed against them? What do they do, and who investigates those crimes?

We need to ensure the public understands that a crime is crime, whether the bad actor is throwing a brick or wielding a keypad.

In today’s environment, we treat cybercrime differently than traditional crimes. Police departments don’t have adequate training or resources to deal with a robbery where the perpetrator could be anywhere and the evidence is lost in echoes of ones and zeros. 

If you call the police to tell them your PC has a virus and you can’t get access your files, they would likely tell you to take it back to the store and wonder why you called 911. But if someone broke into your home filing cabinet and stole your financial information, there would be an investigation.

Cyber criminals realise that most crimes will get little engagement from law enforcement, if they are reported at all, unless the event reaches large global companies or governments. As a result, cyber-crime remains a lucrative enterprise. According to Juniper Research, the global cost of cyber-crime will reach $2 trillion by 2019. That marks a threefold increase from a $500 billion estimate in 2015.

“There are so many cases that federal agencies skim off the high-loss cases, leaving local agencies with smaller things like forged tickets to sports or music events, losses of less than $1,000, or other relatively small scams,” Los Angeles County Sheriff’s Department Chief Bill McSweeney said in a 2014 report by the Police Executive Research Forum. 

“The volume of these cases would be way too much for federal agencies to handle. We need to either decide that we’re going to empower and properly equip local police to take on these crimes, or decide that we’re going to ignore them, which, for the most part, is what we’re doing now.”

Here are a few ideas on ways to make our criminal justice priorities keep up with our technological changes.

Engaging Law Enforcement
We must develop a system of tools to help people more easily report cyber-crimes and, importantly, share evidence in a trustworthy manner with law enforcement. While the FBI’s Internet Crime Complaint Center(IC3) currently collects complaints, we must take this system a few steps further. 

This system should be automated; help victims understand what has happened to them; direct them to assistance; and facilitate the sharing of criminal activity and their indicators across government agencies and law enforcement.
Increasing Resources

We cannot wait for cyber-crimes to shut down a Fortune 500 company or cause a failure in the electrical power grid or lock up critical medical equipment in a hospital. To combat this threat effectively, we need to look to the “broken windows” theory. 
This criminology theory from the 1980s recommends that law enforcement pay attention to small incidents like vandalism in order to eliminate the trend before larger crimes are committed.

It is similar with cyber-crime, but even more impactful. By tracking smaller incidents and bringing the perpetrators to justice, we will not only discourage people from committing the lesser cyber-crimes, but, critically, we will also disrupt the infrastructure used by criminals to stage more significant attacks. To accomplish this, our law enforcement needs new resources and support. As a society, we have prioritised parking violations and invested in meter monitors and the infrastructure to enforce behaviors. We need to create cyber units and ensure that those officers have access to the tools needed to fight crime online. 

Fighting cyber-crime has to be a partnership between government and the private sector. This partnership will help law enforcement scale with the rising tide of cyber-crime and use the latest technologies possible to get control of this epidemic.
There are now emerging experiments in public-private partnerships that facilitate not just the sharing of information but collaboration in identifying vulnerabilities, threats, and adversarial activity. The private sector should embrace these partnerships in critical infrastructure sectors.

Digital Safe Zones
As more and more technologies rely on the internet, its size grows and the security requirements involved have to increase with it. It’s time to restructure the Internet to enhance security. We need to apply greater segmentation, creating “slices” of the Internet that serve different functions. Segmentation is about compartmentalising transactions, not people.

Right now when you’re online, it’s your computer against the world. It can be attacked by anyone from anywhere at any time. You can’t be expected to defend yourself against the whole planet. 

We need to start establishing safe zones for different engagements online. Security requirements for financial data differ from the security needed to read news, play videogames, or stream movies. We have to stop pretending like we can protect against every threat and that all security requirements are created equal.

New technologies such as Software Defined Networking could be the root of a solution, allowing us to create the slices that give us safe zones for important transactions, where participants are known and the noise of the Internet is mitigated. 
Cross-Domain Solutions, adapted from military applications, could allow us to more securely interconnect the slices with a higher level of trust and introspection.

The Internet is the greatest invention in modern history. But if we don’t stand-up and protect it, it will continue to become a hunting ground for cyber predators.

Venturebeat:       Image: Nick Youngson

You Might Also Read: 

The Impact Of Cybercrime On UK Business:

UK Police Cybercrime Training:

Dark Web Fraud Undetectable By Police:
 

 

« Playing Catch-Up With GDPR
Digital Shock (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.