429 research outputs found

    Organised Crime and the Internet: Implications for National Security

    Get PDF
    Before being able to establish whether certain kinds of organised cyber-crime constitute a security threat, it is important to consider the wide variation in structure and targets of cyber-criminal organisations, some of which are state agencies or state

    Technology and the Police

    Get PDF
    “Technology and the Police” primarily seeks to underline the importance of the role technology plays when it comes to law enforcement. As agents of law enforcement, police are needed to protect and defend society. From the use of DNA to video surveillance and tracking tools, technology helps police officers achieve their goal. Furthermore, technology may also serve as a means of control to make sure police are doing their job effectively. Another purpose of “Technology and the Police” is to show that unlike popular belief, the study of history does not start and ends in the past. It is a continuous process from which many lessons can be learnt and understood, it is timeless. Hence, this thesis also attempts to challenge ideas that history and technology cannot blend together because one represents the past and the other represents the present and the future

    Cybersecurity and Cyber Defence: Nationwide Level Strategic Method

    Get PDF
    Data working knowledge OT and an extensive range of other practices tools and concepts are all comprised under the canopy term of cybersecurity The aggressive use of info skill to bout opponents is a characteristic eye of cyberse-curity Clienteles and security doctors are misinformed and the significant changes between these sentences are hidden by the use of the term cybersecurity as a key challenge and a substitute for info security or IT security The period cybersecurity should only be used to mention to security practices related to self-justifying actions involving or relying on info skill and or working knowledge surroundings and schemes according to the orientation of security leaders In this paper we define cyberse-curity and thoughtful how info securit

    What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground

    Get PDF
    The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber-criminology currently also suffers from the scarcity of available data. As a result, scientific answers to crucial questions, such as who exactly the attackers are and why they engage in hacking activities, remain largely fragmentary. The present study begins to fill this remaining gap in the literature. It examines survey data about hackers, their involvement in hacking, their motivations to hack, and their hacking careers. The data for this study was collected during a large hacking convention in Washington D.C. in February 2008. The theoretical framework guiding the analyses is the rational choice perspective (Clarke & Cornish, 1985). Several hypotheses about hackers are derived from the theory and some of its models are transposed into the context of hackers. Results suggest that the rational choice perspective is a viable theory when applied to cyber-criminals. Findings also demonstrate that the creation of more effective countermeasures requires adjustments to our understanding of who hackers really are and why they hack

    Cyber-Conflict, Cyber-Crime, and Cyber-Espionage

    Get PDF
    Computers and the Internet have changed and are continuing to change the way governments, militaries, businesses, and other organs of society manage their activities. While computers can improve efficiency, they are vulnerable to cyber-attack, cyber-crime, and cyber-espionage. 1 The international community, states, and businesses are still adapting to the unique set of challenges posed by cyber-attack, cyber-crime, and cyber-espionage. States are creating military operations that specialize in cyber-attack and defense to adapt to these relatively new threats to national security operations.

    An Explanatory Model of Motivation for Cyber-Attacks Drawn from Criminological Theories

    Get PDF
    A new influence model for Cyber Security is presented that deals with security attacks and implementation of security measures from an attacker's perspective. The underlying hypothesis of this model is that Criminological theories of Rational Choice, Desire for Control, and Low Self-Control are relevant to cybercrime and thereby aid in the understanding its basic Motivation. The model includes the roles of Consequences, Moral Beliefs such as Shame and Embarrassment together with Formal Sanctions in deterring cybercrime, as well as role of Defense Posture to limit the Opportunity to attack and increase the likelihood that an attacker will be detected and exposed. One of the motivations of the study was the observation that few attempts have been made to understand cybercrime, in the context of typical crime because: (a) an attacker may consider his actions as victimless due to remoteness of the victim; (b) ease to commit cybercrimes due to opportunities afforded by the Internet and its accessibility, and readily available tools and knowledge for an attack; and (c) vagueness of cybercrime laws that makes prosecution difficult. In developing the model, information from studies in classical crime was related to Cybercrime allowing for analysis of past cyber-attacks, and subsequently preventing future IS attacks, or mitigating their effects. The influence model's applicability is demonstrated by applying it to case studies of actual information attacks which were prosecuted through the United States Courts, and whose judges' opinions are used for statements of facts. Additional, demonstration of the use and face validity of the model is through the mapping of the model to major annual surveys' and reports' results of computer crime. The model is useful in qualitatively explaining "best practices" in protecting information assets and in suggesting emphasis on security practices based on similar results in general criminology

    Cyber Responsibility to Protect: Legal Obligations of States Directly Affected by Cyber-Incidents

    Get PDF

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
    corecore