SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
The effectiveness of policing cybercrime
Dr Paul Stephens
Director of Computing, Digital Forensics & Cybersecurity
paul.stephens@canterbury.ac.uk
http://www.canterbury.ac.uk/computing
Focus of teaching
Real lives, real crimes: A study of digital
crime and policing
 HMIC(FRS) Report
 https://www.justiceinspectorat
es.gov.uk/hmicfrs/our-
work/article/digital-crime-and-
policing/real-lives-real-crimes-
study-digital/
Can we continue to effectively police
digital crime?
 Graeme Horsman
 https://doi.org/10.1016/j.scijus
.2017.06.001
Could we be facing an era where digital
crime can no longer be effectively policed?
 Increasing computer usage and volume of digital crime
 Conviction rates not following suit
 High profile cases with digital forensics elements (Michael Jackson’s
death, Dr Harold Shipman, Iain Watkins, Oscar Pistorius)
 Case backlogs, cyber-dependent, cyber-enabled, supporting
evidence
 Privacy aware, digital natives, encryption, Deep Web, Prism Break
Could we be facing an era where digital
crime can no longer be effectively policed?
 Locard’s exchange principle not applying so strictly to
digital traces
 Detection is difficult – time-based, competency-based
 Scale – Internet, multiple jurisdictions and devices, size of
storage media, non-cooperation of many countries
 Lack of reporting – feeling of stupidity, embarrassment
factor
Conclusions of HMIC Report – Police Service
 Establish scale and impact of digital crime
National and local level
How to respond to it
 Create effective leadership, and governance arrangements
and strategies at all levels to manage the threat digital
crime poses
Engaging with those in police service and private sector
who are able to provide expertise
Conclusions of HMIC Report – Chief Constables
 Appropriate and continuing training and guidance for all
likely to deal with digital crime and its victims
 Officers and staff understand the significance of online
anti-social behaviour
Able to provide effective support and advice to those
that are its victims
Conclusions of HMIC Report – Chief Constables
 Capability to examine digital devices appropriately,
effectively, and speedily
 Appoint chief officer responsible for ensuring staff
understand which cases should be referred to Action
Fraud and which require an immediate response
 Referrals from National Fraud Intelligence Bureau are
dealt with effectively
Other responses
 Prevention and awareness training from an early age
 Improvements in digital investigation technology, tools
and techniques
 Pushing of responsibilities for policing onto companies
hosting activity
Facebook and fake news
Google and the right to be forgotten
Target advertisers rather than hosts (bad publicity)
Other responses
 Legislation, e.g., Regulation of Investigatory Powers Act
(RIPA)
Criminal offence to refuse to decrypt encrypted data if
requested as part of a criminal investigation
Penalty two years or five years for terrorism
British police are on the brink of a
totally avoidable cybercrime crisis
 https://www.wired.co.uk/article/british-police-cybercrime-
hacking
 Legislation for ‘offensive policing’
 Technology platforms to start doing the some of the
policing
 More resources…
Live Data Forensics
 How do we handle encrypted/network/volatile data?
 Critique and rewrite ACPO Guidelines?
 Automation, is it possible?
 How do we measure the effect we have on a system?
Dealing with Encryption and Complexity
Dealing with Better Encryption
Discussion, Ideas and Questions?
paul.stephens@canterbury.ac.uk

Weitere ähnliche Inhalte

Was ist angesagt?

Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020rhedges
 
Lawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us DollarsLawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us DollarsMaximumHit Ltd
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Technology & The Law
Technology & The LawTechnology & The Law
Technology & The Law34734
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice InnovatieMarga van Rijssel
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebeccaBoston Global Forum
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 

Was ist angesagt? (20)

Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Explaining Cybercrime in Nevada
Explaining Cybercrime in NevadaExplaining Cybercrime in Nevada
Explaining Cybercrime in Nevada
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Lawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us DollarsLawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us Dollars
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Technology & The Law
Technology & The LawTechnology & The Law
Technology & The Law
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice Innovatie
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 

Ähnlich wie The effectiveness of policing cybercrime

Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.pptHODCSEKncet
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportJames Fisher
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Professor Mary Aiken
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)JIEMS Akkalkuwa
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 

Ähnlich wie The effectiveness of policing cybercrime (20)

Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
Cybercrime Surveillance.docx
Cybercrime Surveillance.docxCybercrime Surveillance.docx
Cybercrime Surveillance.docx
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 

Mehr von Roel Palmaers

Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaignsRoel Palmaers
 
Hoe ontwerp ik een agile organisatie
Hoe ontwerp ik een agile organisatieHoe ontwerp ik een agile organisatie
Hoe ontwerp ik een agile organisatieRoel Palmaers
 
Evaluating law enforcement_bradford_9_24
Evaluating law enforcement_bradford_9_24Evaluating law enforcement_bradford_9_24
Evaluating law enforcement_bradford_9_24Roel Palmaers
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
Irish travelers presentatie
Irish travelers presentatieIrish travelers presentatie
Irish travelers presentatieRoel Palmaers
 
Food for thought_29 feb 2016
Food for thought_29 feb 2016Food for thought_29 feb 2016
Food for thought_29 feb 2016Roel Palmaers
 
Straathoekwerk en politie
Straathoekwerk en politieStraathoekwerk en politie
Straathoekwerk en politieRoel Palmaers
 
Cahiers politiestudies presentatie rva 03 12 2009
Cahiers politiestudies presentatie rva 03 12 2009Cahiers politiestudies presentatie rva 03 12 2009
Cahiers politiestudies presentatie rva 03 12 2009Roel Palmaers
 
Financiële risico’s participatiewet
Financiële risico’s participatiewetFinanciële risico’s participatiewet
Financiële risico’s participatiewetRoel Palmaers
 
Electronics reference sheet
Electronics reference sheetElectronics reference sheet
Electronics reference sheetRoel Palmaers
 
Google cheat-sheet-nederlands
Google cheat-sheet-nederlandsGoogle cheat-sheet-nederlands
Google cheat-sheet-nederlandsRoel Palmaers
 
Google cheat-sheet-english
Google cheat-sheet-englishGoogle cheat-sheet-english
Google cheat-sheet-englishRoel Palmaers
 
Working with facebook graph presentation
Working with facebook graph presentationWorking with facebook graph presentation
Working with facebook graph presentationRoel Palmaers
 
Ips pearls in policing factsheet en
Ips pearls in policing factsheet enIps pearls in policing factsheet en
Ips pearls in policing factsheet enRoel Palmaers
 
Financiële problematiek en de impact daarvan
Financiële problematiek en de impact daarvanFinanciële problematiek en de impact daarvan
Financiële problematiek en de impact daarvanRoel Palmaers
 
Een goede nacht nachtarbeid
Een goede nacht nachtarbeidEen goede nacht nachtarbeid
Een goede nacht nachtarbeidRoel Palmaers
 
10 tips voor gezonde ogen
10 tips voor gezonde ogen10 tips voor gezonde ogen
10 tips voor gezonde ogenRoel Palmaers
 

Mehr von Roel Palmaers (20)

Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaigns
 
Hoe ontwerp ik een agile organisatie
Hoe ontwerp ik een agile organisatieHoe ontwerp ik een agile organisatie
Hoe ontwerp ik een agile organisatie
 
Evaluating law enforcement_bradford_9_24
Evaluating law enforcement_bradford_9_24Evaluating law enforcement_bradford_9_24
Evaluating law enforcement_bradford_9_24
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Ipv6 evolution
Ipv6 evolutionIpv6 evolution
Ipv6 evolution
 
Irish travelers presentatie
Irish travelers presentatieIrish travelers presentatie
Irish travelers presentatie
 
Food for thought_29 feb 2016
Food for thought_29 feb 2016Food for thought_29 feb 2016
Food for thought_29 feb 2016
 
Straathoekwerk en politie
Straathoekwerk en politieStraathoekwerk en politie
Straathoekwerk en politie
 
Cahiers politiestudies presentatie rva 03 12 2009
Cahiers politiestudies presentatie rva 03 12 2009Cahiers politiestudies presentatie rva 03 12 2009
Cahiers politiestudies presentatie rva 03 12 2009
 
Financiële risico’s participatiewet
Financiële risico’s participatiewetFinanciële risico’s participatiewet
Financiële risico’s participatiewet
 
Afval=grondstof
Afval=grondstofAfval=grondstof
Afval=grondstof
 
Electronics reference sheet
Electronics reference sheetElectronics reference sheet
Electronics reference sheet
 
Digging into google
Digging into googleDigging into google
Digging into google
 
Google cheat-sheet-nederlands
Google cheat-sheet-nederlandsGoogle cheat-sheet-nederlands
Google cheat-sheet-nederlands
 
Google cheat-sheet-english
Google cheat-sheet-englishGoogle cheat-sheet-english
Google cheat-sheet-english
 
Working with facebook graph presentation
Working with facebook graph presentationWorking with facebook graph presentation
Working with facebook graph presentation
 
Ips pearls in policing factsheet en
Ips pearls in policing factsheet enIps pearls in policing factsheet en
Ips pearls in policing factsheet en
 
Financiële problematiek en de impact daarvan
Financiële problematiek en de impact daarvanFinanciële problematiek en de impact daarvan
Financiële problematiek en de impact daarvan
 
Een goede nacht nachtarbeid
Een goede nacht nachtarbeidEen goede nacht nachtarbeid
Een goede nacht nachtarbeid
 
10 tips voor gezonde ogen
10 tips voor gezonde ogen10 tips voor gezonde ogen
10 tips voor gezonde ogen
 

Kürzlich hochgeladen

WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...PsychicRuben LoveSpells
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 

Kürzlich hochgeladen (20)

WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 

The effectiveness of policing cybercrime

  • 1. The effectiveness of policing cybercrime Dr Paul Stephens Director of Computing, Digital Forensics & Cybersecurity paul.stephens@canterbury.ac.uk http://www.canterbury.ac.uk/computing
  • 2.
  • 4. Real lives, real crimes: A study of digital crime and policing  HMIC(FRS) Report  https://www.justiceinspectorat es.gov.uk/hmicfrs/our- work/article/digital-crime-and- policing/real-lives-real-crimes- study-digital/
  • 5.
  • 6. Can we continue to effectively police digital crime?  Graeme Horsman  https://doi.org/10.1016/j.scijus .2017.06.001
  • 7. Could we be facing an era where digital crime can no longer be effectively policed?  Increasing computer usage and volume of digital crime  Conviction rates not following suit  High profile cases with digital forensics elements (Michael Jackson’s death, Dr Harold Shipman, Iain Watkins, Oscar Pistorius)  Case backlogs, cyber-dependent, cyber-enabled, supporting evidence  Privacy aware, digital natives, encryption, Deep Web, Prism Break
  • 8. Could we be facing an era where digital crime can no longer be effectively policed?  Locard’s exchange principle not applying so strictly to digital traces  Detection is difficult – time-based, competency-based  Scale – Internet, multiple jurisdictions and devices, size of storage media, non-cooperation of many countries  Lack of reporting – feeling of stupidity, embarrassment factor
  • 9. Conclusions of HMIC Report – Police Service  Establish scale and impact of digital crime National and local level How to respond to it  Create effective leadership, and governance arrangements and strategies at all levels to manage the threat digital crime poses Engaging with those in police service and private sector who are able to provide expertise
  • 10. Conclusions of HMIC Report – Chief Constables  Appropriate and continuing training and guidance for all likely to deal with digital crime and its victims  Officers and staff understand the significance of online anti-social behaviour Able to provide effective support and advice to those that are its victims
  • 11. Conclusions of HMIC Report – Chief Constables  Capability to examine digital devices appropriately, effectively, and speedily  Appoint chief officer responsible for ensuring staff understand which cases should be referred to Action Fraud and which require an immediate response  Referrals from National Fraud Intelligence Bureau are dealt with effectively
  • 12. Other responses  Prevention and awareness training from an early age  Improvements in digital investigation technology, tools and techniques  Pushing of responsibilities for policing onto companies hosting activity Facebook and fake news Google and the right to be forgotten Target advertisers rather than hosts (bad publicity)
  • 13. Other responses  Legislation, e.g., Regulation of Investigatory Powers Act (RIPA) Criminal offence to refuse to decrypt encrypted data if requested as part of a criminal investigation Penalty two years or five years for terrorism
  • 14. British police are on the brink of a totally avoidable cybercrime crisis  https://www.wired.co.uk/article/british-police-cybercrime- hacking  Legislation for ‘offensive policing’  Technology platforms to start doing the some of the policing  More resources…
  • 15. Live Data Forensics  How do we handle encrypted/network/volatile data?  Critique and rewrite ACPO Guidelines?  Automation, is it possible?  How do we measure the effect we have on a system?
  • 16. Dealing with Encryption and Complexity
  • 17. Dealing with Better Encryption
  • 18. Discussion, Ideas and Questions? paul.stephens@canterbury.ac.uk