The Future Of Policing In A Cyber World


Police and criminals are constantly trying to stay one step ahead of each other. How has the cyber threat landscape evolved over the years, and what can police officers do to fight new threats?

It is “hunt or be hunted” in the world of cybercrime,according the the Cybercrime Director at INTERPOL  Craig Jones. Jones speaking at the recent CyberCrimeCon 2019 in Singapore about the challenges police forces have to overcome to combat cyber criminals; the rising trends in cybercrime; and how INTERPOL can help.

Challenges in Policing the Cyber World

Every country faces a unique set of challenges in tackling cyber threats. “We see real regional differences in the types of cybercrimes,” Jones told GovInsider. For instance, America faces cyber threats from hackers in Russia, Pakistan and Iran, while Singapore’s attackers are mainly based in North Korea and China, reports cybersecurity company Group-IB. In their forecast, they reported that the energy sector in the Middle East can expect “heavy destruction as a result of cyber weapons”.

At least 50 percent of all crime is now committed online, but this figure is “under-reported”, says Jones. “We can’t demonstrate the true picture of solid criminality and the impact it’s having,” he notes. This means the police can’t allocate resources to tackle cybercrime effectively.

The borderless nature of cybercrime poses another challenge for the police. “The police are not set up historically to deal with the challenges” of protecting the community from crime that could have originated from any corner of the world. 
“There’s no agreement on how the police operate in a virtual environment,” says Jones. On top of that, legislation has not yet caught up with the nature of cybercrime. “In the UK, we don’t arrest people for committing a cybercrime. Instead, we charged people for a Computer Misuse Act offense, so we had to use the legislation that is available to us in the country,” says Jones.

Rising Cyber Threats

We are at the very early stages of leveraging AI in cybersecurity and operations. This will mature over time but the hacker is still mostly caught today by people. The focus of the biggest firms is on threat hunting and threat intelligence and this made possible because of the fundamentals have been put in place from a cyber and operations perspective. 
Jones pointed out three rising cyber threats that governments should pay attention to. 

New tech such as 5G and IoT have become almost the enablers for cybercrime, and the pervasiveness of such tech opens up more opportunities for cyber criminals to attack. 

Next, ransomware is becoming more targeted and has become “one of the main areas where criminals are looking to make money,” shares Jones. In a ransomware attack, hackers threaten to release confidential data or block a company’s access to crucial information until they pay a ransom. 

Cyber criminals are targeting specific companies that they know have more on the line if they are unable to access their data.
Third, business email compromise fraud has been on the rise. This occurs when criminals hack into a company’s server and send out bill notices from executive-level staff, which are linked to fake bank accounts. INTERPOL recently launched a month-long campaign to raise awareness about this type of fraud.

How INTERPOL Can Help

INTERPOL can help with tackling these pressing cyber threats by pooling together datasets from member countries and vendors to identify “investigator opportunities”, says Jones. This means INTERPOL can suggest the next steps for a country’s police force to take when a cybercrime incident occurs. The police could go after the criminals, the infrastructure, or the stolen money, for example.

INTERPOL helps with coordinating efforts amongst different countries. “Globally, when there’s a plane crash, or when a bomb goes off, INTERPOL coordinates activities with the affected member countries and supports them with experts,” explains Jones. “We can do the same in the cyber sphere as well.”

Crime can never be completely eliminated, but when it comes to bringing down virtual crime that crosses international borders, the police have a marked advantage in staying one step ahead, they work together. “Cyber criminals often work alone and in smaller groups,” said Jones.

International organisations like INTERPOL work with individual countries to piece together the big picture on cybercrime, and that can make all the difference between hunting or being hunted.

 Interpol:        Software Testing News:      GovInsider Asia:        WEF

You Might Also Read: 

Do Criminals Dream Of Electric Sheep?:

 

 

 

 

 

« What Girls Bring To Cyber Security
US Contractors Struggling With Pentagon Cyber Security Standards »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.