StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Current and Future Cybercrime Threats - Coursework Example

Cite this document
Summary
The paper "Current and Future Cybercrime Threats" highlights that the members of the task force will be required to work as a team and also partner with the public as well as other federal agencies and private organizations so that it can accomplish its mission of fighting the cybercrime menace…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Current and Future Cybercrime Threats
Read Text Preview

Extract of sample "Current and Future Cybercrime Threats"

Cyber Crime Task Force Plan and number submitted Introduction Development and progress in the information technology fields and sectors has greatly changed the way people communicate and share data. The internet has facilitated newer means and methods of sharing information and date both at family level and organizational level. Despite this well documented benefit of the internet it has also resulted in several crimes and security risks. Executive Summary Cyber crimes are criminal acts that are perpetrated from a computer or using a computer. The cyber related acts have far reaching consequences both to individuals and organizations. Any person or organization may be targeted be the cyber criminals and this therefore calls for action against these acts in St Louis County. The crimes that are conducted via the internet platform present a huge challenge to the security agencies in St Louis as well as in the entire nation. The most widespread and common cyber crime threats include theft, hacking, phishing piracy and spamming. Due to the detrimental impact of these cyber related activities there is the need to come up with a cyber crime task force plan for St Louis County. The cyber crime task force plan will help identify the investigative strategies for responding to the problem. This paper identifies the techniques, equipment and organizational structures that can be efficiently and effectively used by law enforcement agencies to combat this menace. St. Louis County Cyber Crime threats The number of cyber related crimes in St Louis County has continued to rise over the last few years. These cases have been noted to come in different forms and severity. The consequences of such computer and internet based criminal acts are very far reaching. As a result, the law enforcement in the county cannot ignore this new trend of crimes that is exponentially increasing in the county. Some of these crimes have been rated to be high profile crimes (RSA, 2012). Examples of the high profile crimes that have been witnessed include credit card frauds and data larceny. Such crimes are a big threat to the national financial health and the national security. Apart from the two stated acts, other computer and internet based activities that affect the St Louis County include hacking, computer intrusion, password trafficking, spamming and phishing (RSA, 2012). Internet scams and spam have also been gaining ground in St Louis and this is puts the residents of the county at risks. Current and Future Cybercrime Threats Studies and research has indicated that majority of these crimes mainly target property or people. A study by the US College Search revealed that in every 100 Americans about 70 have been victims or have experienced cyber related or internet based criminal acts (RSA, 2012). This shows how the widespread the crimes are. Report by the High Technology Crime Investigation Association also indicated that internet fraud has been on the rise by 60% since 2005.In addition, over the same duration cases of identity theft and child exploitation have also increased by 60%(RSA, 2012).Such an exponential increase is very alarming. These three threats: internet fraud, identity theft and child exploitation, are the three main threats that are faced by the county and will continue to been the most common threats in future owing to the exponential increase in such cases (NIST RMF, n.d). Priorities for the Taskforce Despite the fact that the various forms and types of the computer and internet based criminal acts need to be dealt with, there is need to narrow down the focus of the task force to three most common and widespread acts in the county (RSA, 2012). Cybercrimes targeted at minors like sexual exploitation and child pornography remain the most serious threat in St Louis County. This increase in cybercrimes targeted at minors has been due to the lucrative market that exists outside the county for child pornography (RSA, 2012). Such criminal acts destroy the reputation of the county and destroy the future of the young boys and girls in the St Louis County (RSA, 2012). The other top criminal acts from the cyber space that will be focused on by the task force are identity larceny and internet fraud. Internet fraud and identity theft have led to insecurity in the country as well as financial losses in various organizations and entities where such acts take place. Cyber Crime Task Force Structure To achieve its mission of combating child exploitation, intercept fraud and identity theft; a well thought structure will be required for the cyber crime task force. Organizational Structure In order to effectively respond to the top three threats that are faced by the St Louis County, the task force will consist of one central level unit e that coordinates several field officers with the mission being eradication of cyber crimes (Klimburg, 2012). The task force will be organized in a way that facilitates carry out of duties that investigation of the crimes, analysis of data and information, computer forensics examination and prosecution of culprits. The unit shall however be flexible to be able to respond to the evolution of cybercrimes and technology as well as the changes in environment where it operates (NIST RMF,n.d).The task force will be headed by the St Louis Cyber Crime Task Force Manager. He/ she will be answerable to the police commissioner and will be tasked with oversight of the entire unit. The field officers and the lab specialists shall all be answerable to the task force manager. Personnel and Skills As indicated earlier, central level coordination will be used in handling the top three cyber threats that the county faces. The personnel requirement for the task force shall be a reflection of the functions of the cyber crime unit which are investigation, prosecution, legislative assistance prosecution and public education or outreach. The personnel will therefore include: Investigators (NIST RMF, n.d). The task force will require well trained law enforcement officers who will carry out investigations on the cyber crimes (U.S. Department of Justice, 2008). The investigations will include crimes facilitated by computers and crimes in which the computer is used as an instrument. The unit will require three investigators with specialized skills. The investigators should have the ability to prepare and execute search and arrest warrants for digital evidence. They should have knowledge of the working of computers in order to be able to effectively interrogate culprits based on evidence that they find in the culprit’s computers. They should also be ready to take part in continuous specialized training on digital evidence, networks and forensic analysis. The investigators in the task force should also possess specialized skills in preservation of crime scenes and examination (U.S. Department of Justice, 2008). Internet knowledge will be paramount in addition to the ability to work with officers from other jurisdiction in the course of the investigation of cyber related activities. The investigators should also possess skills that allow them to carry out proactive investigation such as role playing and knolled of facets of popular culture (U.S. Department of Justice, 2008). The other personnel required are the prosecutors. The cyber crime prosecutors will work as a team with the investigators and computer forensic examiners in investigating and persecuting case of identity theft, internet fraud and cyber crimes targeted at minors such as child pornography (FBI News, 2013).The prosecutors will advice the investigators and computer forensic examiners on the amount of evidence that is required for arrest and prosecution. The prosecutors will also be tasked with developing forms, protocols and procedures for the writing, executing as well as returning of search and arrest warrants in the county. The will also take part in enlightening the public on ways of avoiding victimization by cyber criminals (FBI News, 2013). Three prosecutors will be required for this cyber crime task force. To qualify as a prosecutor for the task force, the individual needs to have knowledge of the cyber crime statutes. The persecutors should also be familiar with computer technology and computer forensics. Moreover, they should be ready to take part in continuous education on both technical and legal aspects of cyber crimes. In addition, they should have skills in public educations as it will be essential in helping prevent victimization among the public (FBI News, 2013). Computer Forensic Examiners will also be needed. The need to have computer forensic examiners is necessitated by the close linkage between digital evidence and the work of investigators and prosecutors. The primary duty of the examiners will be the analysis of digital evidence, disc imaging, data recovery and extractions well as system analysis (U.S. Department of Justice, 2008). They will also provide testimony on the technical aspects involved in the recovery of data. In addition to that, they will be tasked with maintaining both hardware and software that is used in the investigation and also work closely with the investigators when executing search warrants. In order to effectively carry out their duties, the computer forensic examiners will be required to have extensive experience with computers (U.S. Department of Justice, 2008). They will be required to have a degree in computer science with experience in design and maintenance of computer networks. The examiners should also have skills and training on computer forensics. Moreover, they should have the ability to testify in courts and also be committed to continuing their education and training on computer forensics (U.S. Department of Justice, 2008). Federal Agencies that the Task Force Will Partner With Fighting cyber crimes is a collective responsibility that will require the task force to work together with other federal agencies in combating the menace. The FBI remains one of the key partners with which the task force will need to forge a working relationship with through the Cyber Initiative and Resource Fusion Unit (CIRFU) (FBI, 2014).In addition the team will also work hand in hand with the National Cyber-Forensics & Training Alliance (NCFTA) Equipment and technologies required To accomplish the mission of the cyber crime task force several infrastructural resources are needed. This is in addition to the specific needs of the investigators and the prosecutors. A dedicated forensic computer system is one of the major things required by the teaks force. There should be a minimum of one workstation for each of the forensic examiners to facilitate analysis of digital evidence (NIST RMF, n.d). There task force will also require additional computers to be used in the acquisition of digital evidence. It will be important to ensure that the equipment is upgraded frequently so as to keep pace with the ever-changing technologies. Storage Media is also needed. The task force will require hard drives, DVDS, CDs and other storage media for keeping information as well as digital evidence. The forensic examiners will require equipment that facilitates working on forensically sound copies and not original one. This will therefore mean that a significant amount of storage space and storage devices will be needed. They will also need servers where they can store bit stream images (NIST RMF, n.d). Hardware Write Blockers are also required. The function of these pieces of equipment will be to help maintain integrity of the digital evidence that has been gathered. In addition, the examiners will require wireless network signal detectors as well as duplication paraphernalia which will allow them to carry out data capturing and disc imaging. Other equipment that will be required by the team include communication equipment, printers, digital camera, modems, CD and DVD burners, connectors, tape recorders, note and sketchpads ,evidence forms, crime scene tapes, markers and atomic clocks (NIST RMF, n.d). Moreover, the task force will require interrupted power supply and internet access within the investigator workspace. Several software packages are also required to aid the operations of the team. The forensic team will need data duplication software, image validation software as well as evidence extraction software. Other software and programs required will be those to be used in evidence examination and analysis, evidence organization and cross validation (NIST RMF, n.d). The Forensic Computer Lab The forensic lab should be designed and equipped for effective and secure handling and analysis of digital data and evidence. Internet access should not be provided in the forensic laboratory (U.S. Department of Justice, 2008) Due to the fact that the forensic examiners view and handle sensitive data, they need to work in an environment that is secluded and separate from the rest the workstation. The laboratory will be required to have secure access control systems with the climate inside the lab being controlled. Another physical requirement needed in the laboratory to handle the top targeted cyber threats in St Louis will include viewing room for examining digital media. Portable forensic lab will also be required to facilitate imaging at the site of crime (U.S. Department of Justice, 2008). Access to the laboratory should be limited to the examiners who work in the station. The investigators and the prosecutors may also be allowed to access the lab when working together with the forensic examiners on a particular task. This limited entry will ensure that the evidence in the laboratory is not compromised or interfered with in any manner (U.S. Department of Justice, 2008). Workspace and Furnishing To accomplish the mission of the cyber crime task force, dedicated space will be needed by the team. The team will have to be provided with appropriate office space for each officer or member, fixtures, ventilation, lighting and static controls. The wok space will have to be furnished with the requirements of each officer. The works spaces for the examiners should have flat screens for examination purposes (NIST RMF, n.d.). They should also be provided with drives containing different versions of Windows and other popular systems in the work stations In addition to the above discussed requirement the task force will have to be provided with unmarked cars, especially fir the investigators (Klimburg, 2012). Moreover, wagons and vans will also be needed to aid transportation of evidence in a forensic manner. Legislative Assistance In order to help the tax force to carry out its duties, some legislation will have to be passed at the state level to facilitate the fight against cyber crime in St Louis County. One such legislation is the requirement for sex offenders to register email addresses as well as their online identities (U.S. Department of Justice, 2008). Such legislation will enable the team track the offenders should they be involved in cyber related sexual acts that target the minors and other residents of the county. The second legislation should be changes in the laws to increased penalties for child sex predators (U.S. Department of Justice, 2008). In addition the state law should make it a requirement for the social network in platforms to get parental permission prior to allowing minors to use the sites. The three proposed legislations should be enacted at the state level. Other Considerations In addition to the discussed consideration, one other important deliberation for the task force is funding. The task force can obtain funding through three ways. The most effective way to get funding for the task force will be from legislative funding (Klimburg, 2012). This will require enlightening the members of the legislature on the functions and needs of the task force so as they are able to approve funding. The governor’s office will also be educated on the task force so that the office can help in obtaining funding for the cyber crime task force. The task force will also seek federal grants in order to be able to finance its various activities that are aimed at combating the top three cyber crimes in St Louis. Apart from the above sources the task force will obtain funds from private foundation as well as from partnerships with other state agencies and private organizations. Settlement funds from litigations shall also be used to help finance the operations (Klimburg, 2012). Conclusion For the task force to effectively achieve its objectives, the most important thing that will be required is team work and keeping up to date with the changing technologies. The members of the task force will be required to work as a team and also partner with the public as well as other federal agencies and private organizations so that it can accomplish its mission of fighting the cyber crime menace in the St Louis County. References FBI. (2014). The NCFTA: Combining forces to fight cyber crime. Retrieved on 21st June 2014, from: http://www.fbi.gov/news/stories/2011/september/cyber_091611 FBI News. (2013). The cyber threat - planning for the way ahead. Retrieved on 21st June 2014, http://www.fbi.gov/news/stories/2013/february/the-cyber-threat-planning-for-theway- ahead Klimburg, A. (2012). National cyber security framework manual. Retrieved on 21st June 2014, http://www.ccdcoe.org/publications/books/NationalCyberSecurityFrameworkManual.pdf NIST RMF (n.d.). Risk management framework overview. Retrieved on 21st June 2014, from: http://csrc.nist.gov/groups/SMA/fisma/framework.html RSA. (2012) Cybercrime trends report. Retrieved on 21st June 2014, from http://www.rsa.com/products/consumer/whitepapers/11634_CYBRC12_WP_0112.pdf U.S. Department of Justice. (2008). Law enforcement strategy to combat international organized crime. Retrieved on 21st June 2014, from: http://www.usdoj.gov/ag/speeches/2008/ioc-strategy-public-overview.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Current and Future Cybercrime Threats Coursework, n.d.)
Current and Future Cybercrime Threats Coursework. https://studentshare.org/information-technology/1834932-cyber-crime-task-force-plan
(Current and Future Cybercrime Threats Coursework)
Current and Future Cybercrime Threats Coursework. https://studentshare.org/information-technology/1834932-cyber-crime-task-force-plan.
“Current and Future Cybercrime Threats Coursework”. https://studentshare.org/information-technology/1834932-cyber-crime-task-force-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Current and Future Cybercrime Threats

Cybercrime and Privacy

Significance, scope and extent of the problem: “Undeterred by the prospect of arrest or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations' security” Marc Goodman The study of cybercrime raises several critical questions regarding the protection of privacy and more specifically the increasing loss of privacy.... The issue of cybercrime, has been growing consistently and is now known to be one of the most serious and globally recognized internet crimes in recent times, causing millions of dollars worth of losses every year in the U....
9 Pages (2250 words) Research Paper

Global Trends in Crime

his paper shall discuss the current global trends in crimes, paying particular attention to the infiltration and increased rates of internet crimes and the remedies which have been set forth by the different governments of the world.... he current global trends in crime are largely based on the current digital and the widely available electronic technologies which have infiltrated almost all aspects of our lives.... This paper shall discuss the current global trends in crimes, paying particular attention to the infiltration and increased rates of internet crimes and the remedies which have been set forth by the different governments of the world....
11 Pages (2750 words) Research Paper

Is the Fraud Act a Useful Tool in E-crime Prosecution

Another major factor that has helped to aggravate the problem of cybercrime is the anonymity that Internet offers.... Table of Contents Abstract 2 1Introduction 3 1.... Background study 3 1.... Problem statement 7 1.... Aims and objectives 10 2Computer fraud 11 3An overview of the legal scenario as related to e-crime prior to the enactment of Fraud Act 2006 in UK 22 4Fraud Act 2006 34 5Methodology 42 45 6Analysis 51 7Conclusion 55 8Recommendations 56 References 56 Abstract Internet, one of the most compelling technological innovations of the twentieth century, has recently acquired great popularity as a medium of commercial activities and a mode for transactions of a financial nature....
59 Pages (14750 words) Dissertation

Cyber Security Vulnerabilities and Associated Threats

This paper ''Cyber Security Vulnerabilities and Associated threats'' discusses that cyber threat has remained a top concern in most nations because of security concerns.... Cyber space hackers have more than often hacked and tampered with confidential government and corporate information, which they use to cause security threats targeting not only government officials but also the common man.... This shows that nobody is immune to threats caused by cyber attacks....
7 Pages (1750 words) Term Paper

The Negative Impacts of Cybercrime on Business and Society

nbsp; It can begin as something seemingly harmless, and rise to one of the gravest threats to personal and national security that exists today.... It can begin as something seemingly harmless, and rise to one of the gravest threats to personal and national security that exists today.... There are crimes being committed that involve spam, harassment, threats, child pornography, and child endangerment just to name a few (Lee, 2012, p.... This paper ''The Negative Impacts of cybercrime on Business and Society''  discusses that cybercrime can take on many shapes and forms....
7 Pages (1750 words) Research Proposal

The Negative Impacts of Cybercrime on Business and Society

There are crimes being committed that involve spam, harassment, threats, child pornography, and child endangerment just to name a few.... It can begin as something seemingly harmless, and rise to one of the gravest threats to personal and national security that exists today.... There are crimes being committed that involve spam, harassment, threats, child pornography, and child endangerment just to name a few.... oreover, Cyber threats are becoming a dominant and challenging factor for organizations, as it leverages many risks that are constantly changing as cyber-crime spread by a number of peoples acting independently and having their own varied self-interest (Hardin, 1968), every now and then, there are new security breaches resulting in stolen credit card records, stolen personal information and losses in terms of customer confidence, as well as revenue....
27 Pages (6750 words) Research Paper

Crimes Against Property

Although there is no economic theory of shoplifting, the decision to commit this crime is one that is taken rationally, weighing up the implications and advantages of this choice now and in the future.... Crimes against Property Name Institution Crimes against Property The broader use of the term crime includes both felonies and misdemeanors....
4 Pages (1000 words) Assignment

A Hierarchical, Objectives-Based Framework for the Digital Investigations Process

The paper "A Hierarchical, Objectives-Based Framework for the Digital Investigations Process" wanted to find out what kind of information is available to police officers in ferreting out and solving crimes, and how well or how poorly such available information is collected.... nbsp;… The goal is to find out the state of data collection and the state of data availability from all sources of data, as can be gleaned from a National Crime Panel study commissioned in 1973....
11 Pages (2750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us