Posts Categorised: Cybercrime

Cyber maturity in the Asia-Pacific region

Full Moon & Orb Sydney Heads/Flickr

“The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement, military, business and social engagement with cyber policy and security issues.”

Source: Nevill, L., Hawkins, Z., Feakin, T., & Woodall, J. (2016). Australian Strategic Policy Institute (ASPI) and available from this link (open access).

The Rise and Reach of Transnational Policing

Clouds and pine trees/Flickr

“Criminologist Professor Ben Bowling explains that as globalised crime and cyber offenses ramp up, policing activities too are increasingly crossing national borders, raising problematic questions around governance and public accountability. Ben also examines issues around stop-and-search police powers in the global context.”

Source: Bowling, Ben (2017). Melbourne University Up Close podcast (40 mins) and available from this link (open access).

The Global Risks Report 2017

The washing machine/Flickr

“2016 saw a crystallization of political risks that have led to the election of populist leaders, a loss of faith in institutions and increased strain on international cooperation. We should not be surprised by this: for the past decade, the Global Risks Report has been drawing attention to persistent economic, social and political factors that have been shaping our risks landscape.”

World Economic Forum (2017). Available from this link (open access).

 

Challenges in digital forensics

The washing machine/Flickr

“It is the role of the digital investigator to bring cybercriminals to justice. Cybercrime however differs from traditional crime and presents a variety of unique challenges including the variety of electronic devices available, amount of data produced by these devices, the absence of standard practices and guidelines for analyzing that data, the lack qualified personnel to perform investigations and the lack of resources to provide on-going training. This paper examines these challenges.”

Source: Vincze, E. A. (2016). Police Practice and Research, 17(2), and available from this link (subscription journal).

Policing for a Safer Australia

Early morning light on North Head/M. Hardy

North Head/M. Hardy

“Policing always reflects, intensely and immediately, the changes and pressures at work in the wider community in which it operates. If the AFP is to understand fully the nature of criminality and the developments that facilitate crime, and to respond effectively, it needs to understand what is driving change in society and how society perceives those changes.”

Source: Australian Federal Police (2017). AFP Futures Centre and available from this link (open access).

Youth Pathways Into Cybercrime

Manly Harbour/M. Hardy

“This white paper by Europol, Middlesex University and UCD Geary Institute for Public Policy… draws together existing, recent evidence on online behaviour and associations with criminal and antisocial behaviour amongst young people. Specifically, it was designed to explore the trajectories and pathways that lead to ‘cyber-criminality’ through a series of mixed-methodological endeavours and the integration of theoretical frameworks across criminology and psychology, including cyberpsychology and computer science.”

Source: Aiken, M., Davidson, J., & Amann, P. (2016). Cybersecurity capacity portal and available from this link (open access).

Cryptocurrency and criminality

Flying surfer/Flickr

“Bitcoin has become the currency of choice for cybercriminals. Its distinctive characteristics of decentralisation and pseudo-anonymity are also attractive to criminal actors in general, and yet Bitcoin has been assessed as representing only a low money laundering risk. In many respects, cryptocurrencies are still viewed as an unfamiliar, marginal phenomenon restricted to the purview of specialists. This article seeks: to demystify the Bitcoin concept; to demonstrate that, far from being low-risk, Bitcoin constitutes a substantial danger in terms of criminal enterprise; and to promote the case for greater awareness among criminal justice professionals and law enforcement officers in particular.”

Source: Brown, S. D. (2016). The Police Journal, 89(4), and available from this link (subscription journal).

Australian Cyber Security Centre threat report 2016

AIPM1544_jpg

Collins Beach

“The ACSC Threat Report 2016  continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained.”

Source: Australian Cyber Security Centre and available from this link (open access).

Encouraging the positive use of technology through community engagement

Stones & rocks/Eva

“The purpose of this paper is to describe a seven stage community engagement process to develop and disseminate community uptake strategies which encouraged cybersafety as part of a positive transition from primary to secondary school among Australian young people.”

Source: Lester L., Cross, D., Terrelinck, D., Falconer, S., & Thomas, L. (2016).  Safer Communities, 15(3) and available from this link (subscription journal).

Human Factor 2016

Storm from North Head/Flickr

“Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor. This paper presents original field research using data gathered by Proofpoint products deployed in customer settings around the world. It covers the latest trends in in email attachments, social media posts, and URLs. The Human Factor reveals not just who is clicking what, but how threat actors are exploiting the human factor. Because as the data makes clear, the weakest link in security is all of us.”

Source: Proofpoint and available from this link (open access).