The Future Of Policing In A Cyber World


Police and criminals are constantly trying to stay one step ahead of each other. How has the cyber threat landscape evolved over the years, and what can police officers do to fight new threats?

It is “hunt or be hunted” in the world of cybercrime,according the the Cybercrime Director at INTERPOL  Craig Jones. Jones speaking at the recent CyberCrimeCon 2019 in Singapore about the challenges police forces have to overcome to combat cyber criminals; the rising trends in cybercrime; and how INTERPOL can help.

Challenges in Policing the Cyber World

Every country faces a unique set of challenges in tackling cyber threats. “We see real regional differences in the types of cybercrimes,” Jones told GovInsider. For instance, America faces cyber threats from hackers in Russia, Pakistan and Iran, while Singapore’s attackers are mainly based in North Korea and China, reports cybersecurity company Group-IB. In their forecast, they reported that the energy sector in the Middle East can expect “heavy destruction as a result of cyber weapons”.

At least 50 percent of all crime is now committed online, but this figure is “under-reported”, says Jones. “We can’t demonstrate the true picture of solid criminality and the impact it’s having,” he notes. This means the police can’t allocate resources to tackle cybercrime effectively.

The borderless nature of cybercrime poses another challenge for the police. “The police are not set up historically to deal with the challenges” of protecting the community from crime that could have originated from any corner of the world. 
“There’s no agreement on how the police operate in a virtual environment,” says Jones. On top of that, legislation has not yet caught up with the nature of cybercrime. “In the UK, we don’t arrest people for committing a cybercrime. Instead, we charged people for a Computer Misuse Act offense, so we had to use the legislation that is available to us in the country,” says Jones.

Rising Cyber Threats

We are at the very early stages of leveraging AI in cybersecurity and operations. This will mature over time but the hacker is still mostly caught today by people. The focus of the biggest firms is on threat hunting and threat intelligence and this made possible because of the fundamentals have been put in place from a cyber and operations perspective. 
Jones pointed out three rising cyber threats that governments should pay attention to. 

New tech such as 5G and IoT have become almost the enablers for cybercrime, and the pervasiveness of such tech opens up more opportunities for cyber criminals to attack. 

Next, ransomware is becoming more targeted and has become “one of the main areas where criminals are looking to make money,” shares Jones. In a ransomware attack, hackers threaten to release confidential data or block a company’s access to crucial information until they pay a ransom. 

Cyber criminals are targeting specific companies that they know have more on the line if they are unable to access their data.
Third, business email compromise fraud has been on the rise. This occurs when criminals hack into a company’s server and send out bill notices from executive-level staff, which are linked to fake bank accounts. INTERPOL recently launched a month-long campaign to raise awareness about this type of fraud.

How INTERPOL Can Help

INTERPOL can help with tackling these pressing cyber threats by pooling together datasets from member countries and vendors to identify “investigator opportunities”, says Jones. This means INTERPOL can suggest the next steps for a country’s police force to take when a cybercrime incident occurs. The police could go after the criminals, the infrastructure, or the stolen money, for example.

INTERPOL helps with coordinating efforts amongst different countries. “Globally, when there’s a plane crash, or when a bomb goes off, INTERPOL coordinates activities with the affected member countries and supports them with experts,” explains Jones. “We can do the same in the cyber sphere as well.”

Crime can never be completely eliminated, but when it comes to bringing down virtual crime that crosses international borders, the police have a marked advantage in staying one step ahead, they work together. “Cyber criminals often work alone and in smaller groups,” said Jones.

International organisations like INTERPOL work with individual countries to piece together the big picture on cybercrime, and that can make all the difference between hunting or being hunted.

 Interpol:        Software Testing News:      GovInsider Asia:        WEF

You Might Also Read: 

Do Criminals Dream Of Electric Sheep?:

 

 

 

 

 

« What Girls Bring To Cyber Security
US Contractors Struggling With Pentagon Cyber Security Standards »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Blackpanda

Blackpanda

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.