Constitutes Cyber Criminal Activity The Ohio Stat

Constitutes Cyber Criminal Activity The Ohio Stat

# 1 (Need 250 Word response 1 Reference)

Cyber crime, like traditional forms of crime, requires a multi-stakeholder environment of individuals, criminal justice personnel and other organization to catch cyber criminals, and to deter them from committing future crimes. There is no centralized governance of the Internet itself, which means criminals can often take advantage of the lack of oversight or uniform code of behavior to commit cyber crime. The Internet, along with the network and systems attached to it, are often not properly secured, either through system mis-configuration or poorly-designed software that can allow unauthorized access (Goyal & Goyal, 2017). The lack of jurisdiction boundaries and reach of the Internet across international borders also makes it easier for cyber criminals to commit crimes from one country to another, often into countries that do not have extradition treaties in place with each other (Yar, 2006). However, individuals, criminal justice personnel and other third-party organizations can work individually and in concert to prevent and deter cyber crime.

Individuals are often targeted by cyber criminals for their personally identifiable information or financial information that is stored online. Cyber criminals can either perform a social engineering or phishing attack to extract online credentials from individuals, or they can attack the financial or personally identifiable information on an individual by breaking into the system directly and extracting the data (Singh Brar & Gulshan, 2018). Individuals can prevent cyber attacks by educating themselves on how cyber criminals operate, and how to protect themselves from being a victim. Examples of this include not clicking on links in emails, changing passwords frequently using a password generator, or investing in encryption or other technology solutions such as virtual private network (VPN) to protect their Internet sessions and data. Keeping computing devices up to date with the latest manufacturer’s security patches and updates along with anti-virus software also helps to prevent cyber criminals from finding ways to break into an individual’s system and stealing information (Goyal & Goyal, 2017).

In the United States, there are several law enforcement organizations at the Federal government level to combat cyber crime, including the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). CISA’s mission is to protect the Federal Government’s critical systems and networks, and to inform individuals and organization about cyber threats and vulnerabilities (CISA, 2019). CISA also works closely with the Federal Bureau of Investigation (FBI), Secret Service and the U.S. Immigration and Customs Enforcement(ICE) Homeland Security Investigations(HSI) Cyber Crimes Center (C3). ICE HSI C3 provides technical assistance to law enforcement investigations, including computer forensics and training for law enforcement in computer investigative and forensic skills (Combating Cyber Crime, 2019). Third party watchdog groups such as Perverted Justice assist law enforcement by gathering information on cyber crimes, reducing the amount of labor needed by investigators.

Even with increased public awareness and law enforcement resources, cyber crime is not likely to go away any time soon. In 2018, the FBI’s Internet Crime Complaint Center (IC3) received 351, 937 complaints, a 15% increase from 2017 (2018 IC3 Annual Report, 2018). Cyber criminals, like any criminals, tend to commit crimes when they have opportunity and motive, which usually equates to a lucrative target, weak protection and the belief that they can get away with it (Goyal & Goyal, 2017). Individuals and law enforcement would benefit from understanding how cyber criminals operate in order to prevent a cyber attack. A globally-recognized legal framework to deter cyber crime, along with education on what constitutes cyber criminal activity would also help reduce cyber crime.

References

2018 IC3 Annual Report. (2018). Retrieved from Federal Bureau of Investigation: https://pdf.ic3.gov/2018_IC3Report.pdf

CISA. (2019). Retrieved from Department of Homeland Security: https://www.us-cert.gov/about-us

Combating Cyber Crime. (2019). Retrieved from Department of Homeland Security: https://www.cisa.gov/combating-cyber-crime

Goyal, N., & Goyal, D. (2017). Cyber crime in the society: Security issues, preventions and challenges. Retrieved from Research Journal of Engineering and Technology: http://dx.doi.org.ezproxy1.apus.edu/10.5958/2321-5…

Singh Brar, H., & Gulshan, K. (2018). Cybercrimes: A Proposed Taxonomy and Challenges. Retrieved from Journal of Computer Networks and Communications: https://doi.org/10.1155/2018/1798659

Yar, M. (2006). Cybercrime and Society. London: Sage Publications.

# 2 (Need 250 Word response 1 Reference)

Stakeholders such as individuals, criminal justice personnel, and organizations have significant implications and mandates towards the elimination of illicit activities. Cybersecurity is among the factors that affect many companies and governments globally. According to Saini, Rao, and Panda (2012, p.203), this vice causes a loss of sensitive details that harms individuals’ privacy. That said, people must protect their information by carefully choosing who they share it with. It also impacts the criminal justice personnel since it exposes their inabilities to handle and curb these illicit activities. Criminal and justice institutions have to deal with the rising cases of malicious activities associated with stolen details. Lastly, cybersecurity issues have many negative implications for organizations. Often, these incidents are linked with system failures and errors that hold them responsible. Consequently, firms must apply and update their security measures to protect the data. Thus, cybersecurity stakeholders have individual and collective responsibilities towards curbing cybercrime issues.

A truly multi-stakeholder environment can be created to mitigate cybercrimes. According to Bauer and Eeten (2009, p.710), decentralized decisions from ICT players are the primary source of different levels of cybersecurity. That said, the approaches employed to make these decisions and the factors that affect them are equally imperative. A multi-stakeholder environment reduces people’s interdependency within the system, thereby assisting to eliminate possible “blame g<wbr>ames”between them. Bauer and Eeten (2009, p.711) argue that this phenomenon should be used to correct inaccurate claims, eliminate imperfect mechanisms, and align social and private benefits as well as costs. A multi-stakeholder environment c<wbr>reates higher interconnectedness between stakeholders at different phases of the value chain and encourages innovatio<wbr>ns. Bauer and Eeten (2009, p.711) note that this approach shapes the decisions made by ICT participates. Therefore, it is a great decision-making tool that brings forth the necessity of cybersecurity technologies.

The cybercrime issues above are not the only one’s people and corporations have to handle. According to Siahaan and Nasution (2018, p.1587), the rapid changes in technology and habits lead to the emergence of new cybercrime problems. For instance, the use of mobile devices, which often times are less protected than computers, is increasing each day (Siahaan & Nasution, 2018, p.1587). These trends suggest that hackers will develop new attack strategies to keep up with the new devices and thus commit more <wbr>cybercrimes. The concerned institutions need to discern appropriate protection mechanisms that can prevent the extension of these issues. However, organizations must also handle the current problems effectively to ensure that they do not persist or worsen in the future. Thus, other possible cybercrime issue will emerge due to technological advancements and changing habits.

I would consider place-based crime as well as safety and sustainability prevention theories to mitigate cybercrimes. According to Marzbali, Abdullah, Razak, and Tilaki (2011, p.161), the former framework suggests that urban areas require more attention in terms of cybercrime as compared to rural places. The authors recognize that environmental conditions are inevitably connected with human health because both cultures and humans are crucial components of the ecosystem. Marzbali et al. (2011, p.161) state that safety and sustainability are crucial concepts as they can enhance the quality of human life. Therefore, I would consider the place-based concept and the possible ways that I can use to create long-term protection measures to prevent cybercrimes.

References

Bauer, J. M., & Van Eeten, M. J. (2009). Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy, 33(10-11), 706-719.

Marzbali, M. H., Abdullah, A., Razak, N. A., & Tilaki, M. J. M. (2011). A review of the effectiveness of crime prevention by design approaches towards sustainable development. Journal of Sustainable Development, 4(1), 161.

Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), 202-209.

Siahaan, A. P. U., & Nasution, M. D. T. P. (2018). The Phenomenon of Cyber-crime and Fraud Victimization in Online Shop, 1583-1588.

# 3 (Need 250 Word response 1 Reference)

Adversaries place great emphasis on becoming intimately familiar with a potential target’s routines, behaviors, lifestyle, profession, and personal life. The more information gleaned about a potential target, the greater the chances an adversary will be able to carry out a successful operation against his target.

Surveillance is an operation used by adversaries to obtain that information and may take form in a myriad of ways. Surveillance can be conducted by simply observing a target, either mobile or static. Surveillance techniques can also involve social networking, electronic intercepts, telephone monitoring, GPS devices, or gathering information from related third parties. The many ways in which surveillance operations can be carried out by adversaries requires a wide breadth of knowledge from the security professionals, requiring them to be well versed in countermeasures to identify those surveillance techniques. Executive Protection professionals need to be well versed in the attack methodology of potential adversaries. Oatman (2006, p. 85) described this attack methodology with a discerning pattern:

  • Target selection
  • Initial surveillance
  • Final target selection
  • Plan (final surveillance)
  • Attack team deployment
  • Target arrival
  • Action

For the Executive Protection professional, identifying surveillance operations is known as counter-surveillance operations. Counter-surveillance, as described by Oatman (2006, p. 84) are “measures taken by individuals or groups under surveillance to monitor the activities of persons who are watching them.” To put it simply, counter-surveillance operations involve active efforts to identify surveillance against an Executive Protection professional’s principal. Counter-surveillance operations may take the form of identifying and tracking surveillance, both from a mobile and static position as well as conducting a thorough investigation into suspicious persons in or about the principal’s home or office.

Oatman (p.89) noted that counter-surveillance operators should hone their skill set to ensure they are gathering information relevant to those conducting the surveillance. Accordingly, counter-surveillance practitioners are alert and security conscious; they are detailed in their descriptions; they are able to accurately estimate times, directions, and distances; and they are able to accurately memorize key features of individuals and objects. These skills should be practiced outside actual counter-surveillance operations so they are honed for an actual counter-surveillance operation.

Counter-surveillance is critically important as it enables Executive Protection professionals to thwart an attack before it happens. Being able to influence adversaries away from your principal is a much better scenario than dealing with an active attack against your principal. The lack of coherent counter-surveillance operations does a principal a disservice and could lead to a “surprise” attack against the principal, his family members or others close to the principal.

Counter-surveillance is a critical tool for the security professional and should play an active role in the overall security platform. Adversaries look for routines and vulnerabilities in their targets so they can exploit them in future attacks. Counter-surveillance enables Executive Protection professionals to proactively thwart that action by identifying the surveillance, mitigating principal vulnerabilities and fully investigating the surveillance, leading to the exposure of the adversary.

Reference:

Oatman, Robert L., (2006). Executive protection: New solutions for a new era. Arnold, MD: Nobel HouseHouseH

# 4 (Need 250 Word response 1 Reference)

Surveillance is the act of observing or watching someone or something very closely to gather information. Typically, surveillance is used to prevent a criminal act or terrorist act from occurring but it can also be used for means to cause harm or destruction. In today’s society, there are many methods of surveillance that range from physically sitting and observing from a location, taking photographs and video recordings, to observing from long distance or even from a remote location via online capabilities on a computer. As time goes by, new surveillance methods and technology are discovered and introduced making it more difficult for protective services and protection teams to do their job; protecting the principle. Defending against these surveillance tactics used by criminals or terrorists requires strong counter surveillance methods.

“Counter surveillance is the practice of avoiding surveillance or, at the very least, of making surveillance difficult.” (Donlon-Cotton, 2007) Protection services and teams need to be trained and proficient in the art of counter surveillance. Agents should be able to quickly identify someone or something that is out of place and could potentially be a threat to the principal. Excellent agents or teams are able to identify and quickly emplace counter measures to remove the principle from the area and situation all together or quarantine the threat and subdue. Some threats may take different approaches than the traditional approach of gathering information and compiling a plan of attack to eliminate a principal. Surveillance can differ in the amount of time spent to gather information as well. This is why agents and teams need to be alert of their surroundings and always on guard to prevent an enemy from gathering as much intelligence as they can. Teams should be trained in various surveillance methods so that they can identify someone or something attempting to gather intelligence.

Most planned attacks in history have required the use of surveillance over a period of time. Individuals who plan the attack to either eliminate a principle or cause destruction on property usually spend months planning. Simply observing a trend in the route that a team or target takes on a daily basis is valuable in planning a precise and lethal attack. Assassination attempts use these methods to find weaknesses where they can successfully strike and strike with lethal force. One attempt is usually all that is given because once an attempt is made to terminate a target and it is unsuccessful, security for that target will be greatly increased making it nearly impossible for a second attempt to take place. This is why counter surveillance is so important to thwart the first attack and identify what needs to be implemented to prevent another attempt from taking place.

With technology growing ever so rapidly, new ways of surveillance are being used to throw off protection agents and teams from identifying an incoming attack. Training in surveillance, counter surveillance and methods to prevent both from happening is vital to make a team successful in the protection of their principle.

References:

Donlon-Cotton, C. (2007). COUNTER SURVEILLANCE: Someone is watching. Law & Order, 55(5), 72–75. Retrieved from http://search.proquest.com/docview/197244734/