The Future Of Policing In A Cyber World


Police and criminals are constantly trying to stay one step ahead of each other. How has the cyber threat landscape evolved over the years, and what can police officers do to fight new threats?

It is “hunt or be hunted” in the world of cybercrime,according the the Cybercrime Director at INTERPOL  Craig Jones. Jones speaking at the recent CyberCrimeCon 2019 in Singapore about the challenges police forces have to overcome to combat cyber criminals; the rising trends in cybercrime; and how INTERPOL can help.

Challenges in Policing the Cyber World

Every country faces a unique set of challenges in tackling cyber threats. “We see real regional differences in the types of cybercrimes,” Jones told GovInsider. For instance, America faces cyber threats from hackers in Russia, Pakistan and Iran, while Singapore’s attackers are mainly based in North Korea and China, reports cybersecurity company Group-IB. In their forecast, they reported that the energy sector in the Middle East can expect “heavy destruction as a result of cyber weapons”.

At least 50 percent of all crime is now committed online, but this figure is “under-reported”, says Jones. “We can’t demonstrate the true picture of solid criminality and the impact it’s having,” he notes. This means the police can’t allocate resources to tackle cybercrime effectively.

The borderless nature of cybercrime poses another challenge for the police. “The police are not set up historically to deal with the challenges” of protecting the community from crime that could have originated from any corner of the world. 
“There’s no agreement on how the police operate in a virtual environment,” says Jones. On top of that, legislation has not yet caught up with the nature of cybercrime. “In the UK, we don’t arrest people for committing a cybercrime. Instead, we charged people for a Computer Misuse Act offense, so we had to use the legislation that is available to us in the country,” says Jones.

Rising Cyber Threats

We are at the very early stages of leveraging AI in cybersecurity and operations. This will mature over time but the hacker is still mostly caught today by people. The focus of the biggest firms is on threat hunting and threat intelligence and this made possible because of the fundamentals have been put in place from a cyber and operations perspective. 
Jones pointed out three rising cyber threats that governments should pay attention to. 

New tech such as 5G and IoT have become almost the enablers for cybercrime, and the pervasiveness of such tech opens up more opportunities for cyber criminals to attack. 

Next, ransomware is becoming more targeted and has become “one of the main areas where criminals are looking to make money,” shares Jones. In a ransomware attack, hackers threaten to release confidential data or block a company’s access to crucial information until they pay a ransom. 

Cyber criminals are targeting specific companies that they know have more on the line if they are unable to access their data.
Third, business email compromise fraud has been on the rise. This occurs when criminals hack into a company’s server and send out bill notices from executive-level staff, which are linked to fake bank accounts. INTERPOL recently launched a month-long campaign to raise awareness about this type of fraud.

How INTERPOL Can Help

INTERPOL can help with tackling these pressing cyber threats by pooling together datasets from member countries and vendors to identify “investigator opportunities”, says Jones. This means INTERPOL can suggest the next steps for a country’s police force to take when a cybercrime incident occurs. The police could go after the criminals, the infrastructure, or the stolen money, for example.

INTERPOL helps with coordinating efforts amongst different countries. “Globally, when there’s a plane crash, or when a bomb goes off, INTERPOL coordinates activities with the affected member countries and supports them with experts,” explains Jones. “We can do the same in the cyber sphere as well.”

Crime can never be completely eliminated, but when it comes to bringing down virtual crime that crosses international borders, the police have a marked advantage in staying one step ahead, they work together. “Cyber criminals often work alone and in smaller groups,” said Jones.

International organisations like INTERPOL work with individual countries to piece together the big picture on cybercrime, and that can make all the difference between hunting or being hunted.

 Interpol:        Software Testing News:      GovInsider Asia:        WEF

You Might Also Read: 

Do Criminals Dream Of Electric Sheep?:

 

 

 

 

 

« What Girls Bring To Cyber Security
US Contractors Struggling With Pentagon Cyber Security Standards »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.