INTERPOL Targets Cybercrime in Asia

2015-04-14_bss-16_898858.jpg
“Cybercrime is a game changer for law enforcement. It changes the way police mount an investigation,” says Noboru Nakatani, Executive Director of the INTERPOL Global Complex for Innovation. “More than half of our 190 members don’t have digital investigation or cyber forensic capabilities. They don’t know how to investigate this new generation of crime.”

The INTERPOL Global Complex for Innovation (IGCI) is a research and development facility for the identification of cyber crimes and criminals and it provides specialist training and operational support for police jurisdictions around the world. Hosted in Singapore, it is the only other INTERPOL office in the world, outside the headquarters in Lyons in France.

Nakatani explains that the IGCI, which has been ramping up staff since November 2014 but officially opened on 13 April and is focused on providing operational support, capacity building and cybercrime research: “we have to increase the capability of our members before they can start investigating and prosecuting cybercrime.”
“When police recognise a conventional crime in the field they start to collect evidence - such as fingerprints and DNA. They will collect witness statements and check CCTV. Sometimes you will use facial recognition software, or check suspicious transactions in bank accounts,” says Nakatani. 

“But in cybercrime you first have to track the IP address - which more often than not is in another country. As the evidence is digital, and may be stored in personal devices, the data first has to be retrieved from these devices. If there is any indication that the digital information was changed after interception by the police, then it is inadmissible.”
To establish the capacity to investigate and prosecute cybercrime is expensive - and requires a level of international cooperation between police jurisdictions that only INTERPOL can provide.

Of the 120 full-time staff at IGCI, half are on secondment from police forces around the world - a clear demonstration of support from INTERPOL’s member countries: “Just as cybercriminals cooperate across international boundaries, so law enforcement needs to be able to collaborate seamlessly,” he continues.
IGCI is also working closely with the private sector - including NEC, Kaspersky, Trend Micro and Oracle - to harness their technical expertise in dealing with cybercrime.

In the first operation of its kind, information shared between the INTERPOL Digital Crime Centre (IDCC), Hong Kong Police Force, Singapore Police Force and the Philippines National Police (PNP) Anti-Cybercrime Group led to the identification of between 190 and 195 individuals working for organised crime groups operating out of the Philippines.
 

“The reality of INTERPOL is different from Hollywood. We do not have a Q, the fictional gadget man in the James Bond film series, but we do not have secret bases,” Nakatani chuckles. “But innovation comes from collaboration, and individual police agencies can’t realize the level of collaboration required to address cybercrime. IGCI understands collaboration from the standpoint of a multi-stakeholder approach. This is key for us, and how we will face the emerging threats.”

futuregovasia

 

« How Syrian Electronic Army Hacked Email Accounts of Assad’s Opponents
Baltimore Police Use ‘Stingray’ Cellphone Surveillance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!