LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security.

Slides:



Advertisements
Similar presentations
Presentation by May Ikeora 6th June 2013
Advertisements

INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
EUROINTEL 99 Den Haag /The Netherlands, March 8, 1999 OPEN SOURCE INTELLIGENCE : THE INTERPOL EXPERIENCE Philippe Lejeune Crime Analyst Analytical Criminal.
Philippine Cybercrime Efforts
CRIMINAL JUSTICE POLICING IN AMERICA DUTIES OF THE POLICE  4 MAJOR DUTIES Keep the peace Apprehend violators Prevent crime Provide Social Services.
WLI Regional Knowledge Exchange Workshop on Decision- support Tools and Models September, 2013, Djerba, Tunisia Projecting Impact on Water Balance.
What Is Criminal Justice? Crime In America The Crime Picture The Search for Causes.
WMD Crime Scene Management
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Dr. Nimrod Kozlovski How we are becoming the A Paradigm shift in on-line policing.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Chapter 14 Crime and Justice in the New Millennium
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Police Technology Chapter Twelve
Criminal Violence: Patterns, Causes, and Prevention Riedel and Welsh, Ch. 1 “Violence and Criminal Violence”
Chapter 161 Information Technology For Management 4 th Edition Turban, McLean, Wetherbe John Wiley & Sons, Inc. Impacts of IT On Organizations, Individuals,
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.
BCS, The Chartered Institute for IT Mauritius 6 th November 2012.
WLE Information Management. Discussion points  What systems do we have?  Which to use for what purpose?  What information is missing and can be improved.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
Cybersecurity Governance in Ethiopia
END THE SILENCE. THE TEAM APPROACH COMMUNITY NOTIFICATION IN COLLABORATION WITH LAW ENFORCEMENT & VICTIM SERVICES.
A National approach to Cyber security/CIIP: Raising awareness.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
Best practices in combating hate crime on the ground osce.org/odihr.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
A Paradigm Shift in Policing – From Law Enforcement to CyberPolicing Nimrod Kozlovski PORTIA Project CS, Yale University April 2005.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Youth & ICT for Development Donald T. Charumbira Secretary General World Assembly of Youth.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
EDUCAUSE 2005 Annual Conference October 19, 2005.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Aim: What is Criminal Justice? Do Now: What do you think is involved in the criminal justice system?
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Software Engineering Chapter: Computer Aided Software Engineering 1 Chapter : Computer Aided Software Engineering.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Working with the police ILGA-Europe projects outcomes: Concrete tools Joël Le Déroff – Policy & Programmes Officer – 27 October 2011.
Empowerment Challenging Disability Hate Crime. Common stereotypes In terms of hate crime we only see disabled victims as those frequently considered.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Hamid Jahankhani Chapter 21 - Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
MEDIATION as a bridge between Victim and Offender? Law februari 2011 Petra Sampers Victim-Offender mediator Leuven
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
CJA 484 Entire CourseCJA 484 Week 1 DQ 1  CJA 484 Week 1 Individual Assignment Criminal Justice Trends Paper (2 Papers)  CJA 484 Week 1 DQ 1  CJA 484.
Module 3: Civic Initiatives for Judicial Reform and Countering Corruption September 16, 2005.
By Adrian Jjuuko Human Rights Lawyer and Advocate Executive Director,
8 Building Blocks of National Cyber Strategies
U.S. Department of Justice
Trafficking in Persons (TIP)
AVI AFRIQUE October 2018 Tshepo Peege
Smart Learning concepts to enhance SMART Universities in Africa
Cyber security Policy development and implementation
REGIONAL NETWORK FOR CIVIL ORGANIZATIONS ON MIGRATION – RNCOM
UNODC and CYBERCRIME October 2009.
Presentation transcript:

LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security

INTRODUCTION The definition of crime from different schools of thought varies as much as there are differing perceptions of the issue in different societies. Crime could be against persons, organizations, institutions, states and even global. Cybercrimes are crimes committed on the cyberspace using computer and networking technology provided by Information and Communication infrastructures.

CRIME CONTROL Crime control refers to a theory of criminal justice that places emphasize reducing crime in society through increased police and prosecutorial powers. Use general societal condemnation of violations and the violators Exact punishment on affront and appease the victim Deter future violations by sanctions and new pronouncement appropriate to the instance or new instances or genre of crime Reconcile violators and victim(s)

CRIME CONTROL The Peel Model of Community Policing

Characteristic of Real World Crime Four characteristics of real-world crime shaped the way the way the Peel model approach the issue of crime and criminality. These are: Proximity between criminals and victims The scale of the crime Physical constraints that can discourage the criminal(s) Patterns of crime with which investigator are familiar.

Characteristic of Real World Crime Factors that shape the Peel Model of Law Enforcement

THE CYBERCRIME CHALLENGE Cybercrime poses a lot of challenges to the Peel Model. These challenges are not more of adopting or creating new laws that criminalize certain cyber activities but more of law enforcements’ ability to react to cybercrime. This is because cybercrime does not share some of the characteristics of conventional crimes that shaped the current Peel model of law enforcement. Response to crime based on the Peel model is also localized making it difficult to apply it on a global scale

THE CYBERCRIME CHALLENGE Multiple Effect of Reach of Cybercrime

Localized Crime Response

OUR MODEL Our opinion is that, amongst other, in the efforts to fight cybercrimes, users must be empowered as the last line of defense as compared to the Peel model where the most responsibility rests on the Police and other law enforcement agents. We propose a User-centric socio-technological model that employs technology, social theory, policy and education (awareness) as tools to mitigate the cybercrime problem.

OUR MODEL This model offers an interactive real-time challenge- demand-response platform that aids identification, reporting, apprehension and prosecution. Our model takes into consideration the fact that cyber crime does not share the common characteristics on which the Peel theory rests and that the criminals plug into the webscape through remote proxies. The model provides valves that assist users identify malicious intentions through a multi-level access control mechanism.

OUR MODEL Real-Time Cybercrime Response Model (RtCRM)

Workability of the RtCR Model Hypothetically, users A, B and C access the cyber infrastructure from different locations. Law Enforcement Agencies at Locations A, B and C (not necessarily the same locations as Users A,B and C) are directly connected to the different users logging into the cyberspace from these different locations. Mechanisms are provided in the user-domain that enables users to report any noticeable or suspected malicious activities to trained law enforcement officers.

Workability of the RtCR Model Requests for attention and responses are Real-time where users can be directed on what to do and how to do it. This provides a repository of user requests (commonly referred to FAQ’s or frequently asked questions) and responses that can be used to train the response engine so the system can be collaborative, adaptive and learn. Reactions to specific instances of problems or criminal activities are exchanged and fine-tuned between or among the responding agents at the various locations to produce well-directed and fine grained output. Responses are therefore global in nature and based on identification, profiling. This is as opposed o the static offline Peel Model, the mechanism provided ensure prompt reporting and responses which has hitherto hindered apprehension and prosecution of cyber criminals.

RECCOMENDATIONS FOR POLICY AND PRACTICE Cyber crime has added to the dilemma of the Peel theory for crime control. The ubiquitous nature of the web coupled with the cloud of users presents a new form of challenge to system security and demand a paradigm shift in the perception. To secure the internet from cyber crime and other abuses, users must not only be made aware of the existence of security flaws and vulnerabilities on the webscape, they must be empowered in a holistic manner through design, policies, practices and technology to mitigate against these risks and to understand the criminals.

CONCLUSION The challenge in fighting cyber crimes stems from the fact that it is automated and share very few commonalities with offline crimes. We have shown in this presentation that the Peel model of community policing suffer some inadequacies with regards to facing the challenges posed by cybercrime. A new model is proposed that can assist law enforcement agents in their fight against cybercriminals. The Internet community and law enforcement must engage in a collective effort to curb the Internet of the demeaning crimes that it is helping to fuel. We ignore these important issues at our own risk.