Running head: CYBER CRIME TASK FORCE PLAN
Cyber Crime Task Force Plan Name: HSM 435 Institution:
1
Cyber Crime Task Force Plan
2
Introduction
Cyber crime is a relatively modern type of crime that evolved in the past decade. comprehension of cyber crime needs a detailed analysis of !hat it is. Crime consists of en"a"in" in behavior that has been considered outla!ed by a society of la! enforcement a"encies due to its nature of bein" a threat to the society#s innate ability in maintainin" la! and order. Irrespective of the type of crime$ it involves the intent to cause a specified form of harm on its tar"et. Cyber crime in this case differs from conventional crime$ due to the !a y it is committed. Cyber criminals utili%e the use of computer technolo"y. ma&ority of today#s cyber crime is a representation of the mi"ratory order of traditional crime into cyber space$ !ith cyber space becomin" the ne! tool for committin" the crime '(renner$ )*+*$ p. +*,. s such$ cybercrime is crime related to computers$ the internet and technolo"y$ !ith a vast ma&ority of cybercrimes bein" crac-in"$ piracy$ phrea-in"$ cyber stal-in"$ cyberporno"raphy$ and cyberterrorism 'Schell / Martin$ )**4$ 0p. )3,. 1his tas- force plan therefore see-s to formulate and elaborate a strate"ic direction that !ould ma-e attempts at eliminatin" or reducin" cyber threats$ and potential le"islatives that !ould serve to push to stop these crimes. Executive Summary
s an investi"ator for the St. 2ouis County c yber criminal tas- force$ there has been an evident sur"e in the number of cyber crime$ necessitatin" the settin" up of a cyber crime tas- force !ithin the &urisdiction. ith this endemic state to the "ro!in" concerns of cybercrime or di"ital cries$ such a situation is often met !ith illeuipped personnel to tac-le these crimes '1aylor$ et al$ )*++,. 1he main priority for this tas- force !ill be the identification of fraudulent online activities$ identity theft$ and the online eploitation of minors. 1he online env ironment continues to pose a ma&or challen"e for both private and "overnmental institutions$ as online criminals
Cyber Crime Task Force Plan
3
continue to manipulate information to their eplicit advanta"e. Identity theft remains a menace in St. 2ouis and the "lobe at lar"e$ posin" ris- to the personal information of people$ !ho become bait to fraudulent online activities. In spite of the various efforts that parents ta-e to protect their children from online predators$ their concerted efforts still remain not enou"h$ reuirin" combined efforts from the communities$ "overnment and intelli"ence a"encies. It is on this basis that the St. 2ouis 0olice 6epartment is hed"in" for!ard into the development of a cyber crime tas- force that !ould see- to help deal !ith the rise in cyber crime in St. 2ouis. Cyber Crime Threats in St. Louis County
ccordin" to Ny-odym ')**5,$ an eamination of data related to cyber related crime over the last couple of years precedin" )**5 presents a situation !here about 357 of all related cyber crime situations !ere related to electronic fraud$ fraudulent phone calls and emails$ electronic for"ery$ and short messa"e services. n additional 3)7 of reported cyber related crime !as associated !ith cyber stal-in" and un!anted calls$ messa"es$ and emails. 8urther$ +97 comprised of cyber terrorism$ and intimidatin" messa"es$ phone calls and emails. "ain$ of the reported cyber crimes$ +)7 of them !ere protests that !ere associated !ith un!arranted data access$ spammin"$ spoofin"$ and ille"al access to code. bout 37 of reported complaints !ere related to data and systems dama"e$ misuse of e ncryption$ and malicious code such as 1ro&ans and viruses. 1he final +7 of related cybercrime reportin" included the eradication of international voice trac-in" systems via the ille"al installation of voice over internet protocols 'oI0, "ate!ay echan"e. The Greatest Cyber Crime Threats that St. Louis County Faces Currently or Prone to Face in the Near Future
Cyber Crime Task Force Plan
4
Many countries have !ea- cyber functionalities and capabilities$ !ith forei"n cyber spies becomin" more adept at ta-in" advanta"e of !ea-nesses !ithin computer net!or-s. s soon as they are able to infiltrate a computer net!or-$ they are able to "ain access to military secrets$ the "overnment$ as !ell as intellectual property data that c an develop a state#s forei"n firms or entities# competitive advanta"e. ;n the other hand$ terrorists !ould usually deli"ht at bein" able to di"itally sabota"e a stateo!ned !ater supply or e ven po!er "rid. Such a threat is viable !ithin the St. 2ouis State$ as the aptitude to commit any such threat already euipped !ithin the open mar-etplace '(eaupre et al, )***,. ll over the !orld and not &ust !ithin St. 2ouis$ or"ani%ed crime fraternities are movin" more and more from !hat has been a more traditionally oriented form of criminal activities that includes physical attac-s$ and have "ravitated into comple computer net!or-s. In the raidin" of ban-s$ the recent decade has seen a mar-ed decrease in "unrelated holdups$ !ith modern crime bein" more cyberrelated !ith the use of computer systems and net!or-s to breach financial and corporate institutional net!or-s to "et a!ay !ith personal information such as acco unt numbers$ 0IN numbers$ and credentials in the stealin" of financial resources. s a result of this uniue nature of cyber crime$ the cost of conductin" business has notably increased$ puttin" firms at distinct levels of disadvanta"e !hen conductin" business< and overall$ creatin" a hu"e drain on such a state#s economical !ellbein" '2e!is$ )**),. 1he foreseen outloo- presents a rise in the formation of cyberrelated crime "roupin"s that are determined in creatin" their very o!n structure of di"ital rebellion via the ille"al access of computers and information system net!or-s for reasons includin"$ but not limited to socially$ economically or politically motivated ends. St. 2ouis in this case could anticipate the fact that cyber crime could !ell become amon"st its hi"hest of priority areas into the foreseeable future
Cyber Crime Task Force Plan
5
due to the fact that computer attac-s and net!or- intrusions are becomin" one of the lar"est threats to the =nited State#s national security '2e!is$ )**),. ccordin" to (eaupre et al ')***,$ it is very possible that the future may !ell anticipate cyber related activities that are a representation of the follo!in" characteristics: remote presence as !ell as field communication technolo"ies that have close proimities$ as !ell as a mar-etplace for mood reco"nition scramblers. 1here could also be the utili%ation of an etreme level of distribution of denialofservice assaults via the use of cloud processin"$ and the shiftin" into cloudbased sei%ures from conventional devisebased attac-s. 8urther$ the creation and advancement of an established illicit mar-etplace for the echan"e of items that have been virtually stolen as !ell as related counterfeit items$ and the material assault a"ainst internet echan"es and data centers$ electronic assaults on vital infrastructure such as transport$ data services$ !ater supply and po!er "rids. Not surprisin" !ould also see biolo"ical hac-ers for authentication or multifactor components$ an increase in cybersuad !ars$ and the escalation of illicit intelli"ence data collection and the utili%ation of intelli"ent data streams. 1he comple and advanced reputation manipulation !ould also be present$ as !ell as the meddlin" !ith$ as !ell as an ille"al abuse of unmanned transportation element as !ell as robotic devices. 1here could finally also be the element of microcriminality aspects$ includin" a fraudulent era of micro payments and theft '(eaupre et al $ )***,. Priority Cyber Crimes for the Tas Force
It !ould be imperative for the tas- force to prioriti%e certain cyber crimes that !ould be deemed most ur"ent and influential. Herein$ such priorities !ould see- to both probe and indict any such illicit activities a"ainst and on computer d ata and systems$ as !ell as those offenses that !ould be by !ay of computer systems$ such as those that !ould have acuired in their
Cyber Crime Task Force Plan
6
methodolo"ies ne! uality by utili%in" information and communications techno lo"y 'IC1, such as child porno"raphy$ fraud$ intellectual property infrin"ements$ fraud and for"ery. t the priority levels !ould be cases !here the actual computer element !ould be a criminal#s tar"et. 1o do this$ such actions !ould have to be put into place and ta-es$ such as unauthori%ed net!or- and computer access$ theft$ or dama"e. 1here has also be !hat can be termed as >true computer crime# !hich !ould encompass hac-in"$ computer and?or net!orintrusions$ !ebsite defacements$ security breached$ as !ell as electronic privacy violations. 8ollo!in" the priority levels !ould also see a secon d priority area !herein computers !ould be the actual ob&ect$ instrument or tool in the commitment of a cyberrelated crime. Such crimes could involve child porno"raphy$ as !ell as any other form of seual e ploitation$ harassment and treats$ embe%%lement$ fraud$ the theft of personal information$ and electronic theft. third priority area !ould be instances !here cybercriminal use the computer and insert in them incriminatin" evidence$ up to ille"al activities that !ould not necessarily have a computer for actual criminal commission$ that is$ evidence that is electronically b ased for the utili%ation in other cases. case in point !ould be !here dru" criminals storin" customer and supplier records on cyber and di"ital devices$ as !ell as chat and email lo"ins that !ould aid into the actual pointin" of criminal locations of such acts as rape$ murder and abduction victims. Cyber Crime Tas Force Structure
In the settin" up of the tas- force$ a couple of considerations !ill have to be ta-en into mind: the le"islation that "overns national matters and from !hich le"al foundations are hed"ed on$ the police units from !hich the tas- force !ill be associated !ith$ the intrinsic re"ulations and internal orders for the proper unit functionalities$ the physical location from !hich
Cyber Crime Task Force Plan
7
operations !ill function$ the manpo!er$ euipment and trainin" to be p rovided$ and finally$ the actual tas- force or"ani%ational structure. In formin" the tas- force structure$ the follo!in" members or units !ill form as crucial partners: the St< 2ouis 0olice department$ the St. 2ouis 8ire 6epartment$ the office of the ttorney "eneral attached to St. 2ouis$ and the 8ederal (ureau of Investi"ation '8(I,. 1o facilitate accountability and audit measures$ the primary source of fundin" for the tas- force should be the St. 2ouis 0olice 6epartment. 1he fundin" should ho!ever be sufficient enou"h to cover the critical operational epenses such as trainin"$ a state tas- force computer forensic laboratory$ and euipment. In order to "et on board the v ery best$ the St. 2ouis 0olice 6epartment and the 8(I should each volunteer eperienced professional in forensic computer applications and eaminers. In the event that there are any sponsorin" a"encies$ these should not "et any form of reimbursement for any services or e uipment rendered as tas- force personnel '@ordon et al, )**),. In order to facilitate computer crime investi"ation across the state of St. 2ouis$ the follo!in" responsibility centers and functionalities !ill be set up: the conductin" of co mputer forensic assessments$ carryin" out trainin" courses for la! implementation a"encies$ ta-in" action to any reuests for help from other related la! facilitation a"encies$ and in the cond uction of cybersafety courses for the "eneral public. s such$ the tas- force unit !ill be accountable for any breaches to cyber security breach !ithin the St. 2ouis &urisdiction$ !ith each respective unit member under"oin" trainin" on investi"ative techniues related to c yber crime$ as !ell as each member under"oin" trainin" in cyber crime undercover techniues. 1hey !ould also be provided !ith incentives so as to eecute outreach on matters related to cybersecurity '@ordon et al, )**),.
Cyber Crime Task Force Plan
8
!r"ani#ational Structure
1he or"ani%ational structure of the cyber crime unit !ould be set up to be an independent but speciali%ed complimentary unit of the St. 2ouis 0olice 6epartment. 1his unit !ill have the sole functionality of only dealin" !ith cyberrelated investi"ations and prosecution. 1o facilitate efficiency$ the unit !ill encompass a distinct le"al structure$ functionin" purely at a pivotal level !ith decisionma-in" and representative po!ers. 1he unit !ould be divided around three main sections: data and information analysis$ investi"ations$ and computer forensics. 1o enable effective audit$ the computer forensic unit !ould be able to function independently$ so as to avoid eternal pressures and focus on forensic investi"ations !hile reducin" incidences of incompatibilities 'Combatin" Cyber Crime$ n.d.,. Cyber Crime Tas Force Personnel and sills
Combatin" cyber crime needs personnel !ith hi"hly trained s-ills. (asic s-ills to combat the issue of cyber crime !ould be investi"ative$ the provision of le"islative and le"al assistance$ prosecution$ and "eneral public education and trainin". Cyber crime investi"ators !ould need to be hi"hly trained and s-illed$ comprehendin" the nature and functionin" of computers and net!or- systems. 1hey should be able to -no! ho! to properly coordinate their activities !ith a"ents from other &urisdictions$ and act as role models on proactive investi"ative procedures. Cyber crime prosecutors should be able to liaise !ith investi"ators in effectively "arnerin" evidence for prosecution purposes and to ensure that proper investi"ation has been conducted in the maintainin" of le"al credibility. 8inally$ computer forensic eaminers should be able to conduct detailed di"ital analysis$ data recovery$ dis- mappin"$ systems analysis and data etraction. 1hey are to ta-e char"e of the forensic laboratory maintenance$ ensurin" its security
Cyber Crime Task Force Plan
9
and in the maintenance of hard!are and soft!are components used in cyber crime investi"ation$ analysis and prosecution '@ordon et al, )**),. $orin" %elationshi&s 'ith Federal ("encies in St. Louis
ccordin" to Ny-odym ')**5,$ it is crucial that in the profilin" of cyber crime criminals$ that certain a"encies !or- collaboratively !ith the cyber crime tas- force. 6epartments !ithin the police force are crucial for the echan"e of information and receivin" of complaints from victims< the ministry of interior security is needed as the body throu"h !hich appropriate national security strate"ies are drafted$ as !ell as the ma-in" o f additional security resources available< the collaboration !ith the &ustice department for prosecution services of apprehended suspects< and collaboration !ith the intelli"ence special forces for investi"ative purposes. Cyber Crime Tas Force E)ui&ment
1o ensure the success of the tas- force$ certain euipment is needed to ma-e it successful. Such components could encompass dedicated systems net!or-s and computer systems$ adeuate stora"e media as !ell as secure bac-up stora"e files and sources$ and any such eternal items such as 66s$ eternal hard drives$ audio a nd visual recordin" euipment$ and i8i devices !hen !or-in" from remote sites and transmission of data. 1o compliment thee$ it is imperative to have !ireless net!or-s and si"nal detectors$ duplicatin" euipment$ hard!are !rite bloc-ers$ atomic cloc-s$ cables$ connectors and cameras$ and an evidence room. 8or the laboratories and forensic rooms$ data recovery tools$ ima"e validation soft!are and forensic analysis soft!are rooms are needed. =nmar-ed vehicles !ould also be useful for inco"nito movement '(eaupreet al $ )***,. Aach of these euipment !ould serve for bein" able to securely and epeditiously "ather$ transmit$ analy%e and aid in the apprehension of suspects !ithin the soonest time possible due to the ease of data eradication by suspects.
Cyber Crime Task Force Plan
10
Cyber Crime Le"islation
s a result of the speciali%ed form and dynamic nature in !hich cyber crime is comprised of$ the arm of the ttorney @eneral#s office !ould serve as a vital lin- in the settin" up of le"islative la!s and byla!s that !ould deter and help eliminate cyber crime. 6ue to the lar"e number of reported and prosecuted cases$ the @s office !ould have the essential data in draftin" up of such la!s. 8or eample the @#s office of St. 2ouis !ould recommend chan"es on such aspects as penalties$ as !ell as the period for !hich !ould be cyber offenders !ould have to spend incarcerated for their crimes. 1his !ould form the much needed deterrence and punitive structure that is needed to safe"uard the state#s future '(roadhurst$ )**B,. Conclusion
In conclusion$ the counterin" of cyberrelated crime needs in the en"a"ement of an unprecedented caliber of inter"overnmental and interinstitutional cooperation. 1here is a need to form an a!areness of ho! to reco"ni%e and deal !ith cyberrelated crime due to its mutatin" functionality via the use of technolo"y. firm commitment by both the state#s residents and the "overnment needs to be in place$ -eepin" everyone informed and educated on ho! to fi"ht the uprisin" of cyberrelated crime.
Cyber Crime Task Force Plan
11
%eferences
(eaupre$ 6.$ Icove$ 6. .$ (a-er$ D.$ Cassaday$ .$ / illiams$ . 0. ')***,. State and local law enforcement needs to combat electronic crime. =S 6epartment of ustice$ ;ffice of ustice 0ro"rams$ National Institute of ustice. (renner$ S.. ')*+*,. Cybercrime: Criminal Threats from Cyberspace. Santa (arbara$ C: @reen!ood 0ublishin" @roup. (roadhurst$ D. ')**B,. 6evelopments in the "lobal la! enforcement of cybercrime. Policing: An International Journal of Police Strategies !anagement $ "#'3,$ 4*E433. Combating Cyber Crime 'n.d.,. =niversity of Mississippi retrieved u"ust +3$ )*+5 from F!!!.olemiss.edu?depts?nc&rl?pdf?CyberCrimeboo-let.pdfG. @ordon$ @. D.$ Hosmer$ C. 6.$ Siedsma$ C.$ Debovich$ 6. ')**),. Assessing technology, methods, and information for committing and combating cyb er crime. 1he Computer 8orensics Desearch / 6evelopment Ctr 'C8D6C,$ / etStone 1echnolo"ies$ Inc. 2e!is$ . . ')**),. Assessing the ris$s of cyber terrorism, cyber war and other cyber threats. Center for Strate"ic / International Studies. Ny-odym$ N.$ 1aylor$ D.$ / ilela$ . ')**5,. Criminal profilin" and insider cyber crime. %igital In&estigation$ "'4,$ )B+)B9. Schell$ (.H. / Martin$ C. ')**4,. Cybercrime: A 'eference (andboo$. Santa (arbara$ C: (CC2I;$ Inc. Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital crime and digital terrorism (2nd Ed.). Upper Saddle River, NJ: Pearson.