“The last year has again demonstrated the growing public appetite to understand and defend against the evolving cyber threats facing Australia. High profile incidents of cybercrime have exemplified the speed with which cyber threats can propagate globally, how rapidly adversaries can adapt to security responses, and how easily a compromise can impact an organisation’s core functions or services.”
Source: Australian Cyber Security Centre (2017) and available from this link (open access).
Full Moon & Orb Sydney Heads/Flickr
“The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement, military, business and social engagement with cyber policy and security issues.”
Source: Nevill, L., Hawkins, Z., Feakin, T., & Woodall, J. (2016). Australian Strategic Policy Institute (ASPI) and available from this link (open access).
Clouds and pine trees/Flickr
“Criminologist Professor Ben Bowling explains that as globalised crime and cyber offenses ramp up, policing activities too are increasingly crossing national borders, raising problematic questions around governance and public accountability. Ben also examines issues around stop-and-search police powers in the global context.”
Source: Bowling, Ben (2017). Melbourne University Up Close podcast (40 mins) and available from this link (open access).
The washing machine/Flickr
“2016 saw a crystallization of political risks that have led to the election of populist leaders, a loss of faith in institutions and increased strain on international cooperation. We should not be surprised by this: for the past decade, the Global Risks Report has been drawing attention to persistent economic, social and political factors that have been shaping our risks landscape.”
World Economic Forum (2017). Available from this link (open access).
“This report provides an accessible and critical appraisal of the government’s implementation of the strategy over the past 12 months. It addresses each of the strategy’s five themes, highlighting achievements and areas of weakness; evaluates issues of execution; and suggests ways to evolve the delivery and initiatives of the strategy to achieve its objectives.”
Source: Hawkins, Z. & Nevill, L. (2017). Australian Strategic Policy Institute and available from this link (open access).
The washing machine/Flickr
“It is the role of the digital investigator to bring cybercriminals to justice. Cybercrime however differs from traditional crime and presents a variety of unique challenges including the variety of electronic devices available, amount of data produced by these devices, the absence of standard practices and guidelines for analyzing that data, the lack qualified personnel to perform investigations and the lack of resources to provide on-going training. This paper examines these challenges.”
Source: Vincze, E. A. (2016). Police Practice and Research, 17(2), and available from this link (subscription journal).
“Sharing information on the cyber landscape is a necessary and efficient way to benefit from mutual exposure to cyber threats and boost collective defensive capacity. The US has been pursuing cyber information sharing since the late 1990s, when the federal government directed the creation of public–private partnerships for critical infrastructure protection. The now decades-long development of a variety of information sharing models in the US provide case studies and lessons for the Australian cybersecurity community as it pursues deeper information sharing mechanisms.”
Source: Nevill, L. (2017). ASPI Policy brief and available from this link (open access).
North Head/M. Hardy
“Policing always reflects, intensely and immediately, the changes and pressures at work in the wider community in which it operates. If the AFP is to understand fully the nature of criminality and the developments that facilitate crime, and to respond effectively, it needs to understand what is driving change in society and how society perceives those changes.”
Source: Australian Federal Police (2017). AFP Futures Centre and available from this link (open access).
Manly Harbour/M. Hardy
“This white paper by Europol, Middlesex University and UCD Geary Institute for Public Policy… draws together existing, recent evidence on online behaviour and associations with criminal and antisocial behaviour amongst young people. Specifically, it was designed to explore the trajectories and pathways that lead to ‘cyber-criminality’ through a series of mixed-methodological endeavours and the integration of theoretical frameworks across criminology and psychology, including cyberpsychology and computer science.”
Source: Aiken, M., Davidson, J., & Amann, P. (2016). Cybersecurity capacity portal and available from this link (open access).
“Bitcoin has become the currency of choice for cybercriminals. Its distinctive characteristics of decentralisation and pseudo-anonymity are also attractive to criminal actors in general, and yet Bitcoin has been assessed as representing only a low money laundering risk. In many respects, cryptocurrencies are still viewed as an unfamiliar, marginal phenomenon restricted to the purview of specialists. This article seeks: to demystify the Bitcoin concept; to demonstrate that, far from being low-risk, Bitcoin constitutes a substantial danger in terms of criminal enterprise; and to promote the case for greater awareness among criminal justice professionals and law enforcement officers in particular.”
Source: Brown, S. D. (2016). The Police Journal, 89(4), and available from this link (subscription journal).