Вы находитесь на странице: 1из 11

Runninghead:CYBERCRIMETASKFORCEPLAN

CyberCrimeTaskForcePlan
Name:
HSM 435
Institution:

CyberCrimeTaskForcePlan

2
Introduction

Cyber crime is a relatively modern type of crime that evolved in the past decade. A
comprehension of cyber crime needs a detailed analysis of what it is. Crime consists of engaging
in behavior that has been considered outlawed by a society of law enforcement agencies due to
its nature of being a threat to the societys innate ability in maintaining law and order.
Irrespective of the type of crime, it involves the intent to cause a specified form of harm on its
target. Cyber crime in this case differs from conventional crime, due to the way it is committed.
Cyber criminals utilize the use of computer technology. A majority of todays cyber crime is a
representation of the migratory order of traditional crime into cyber space, with cyber space
becoming the new tool for committing the crime (Brenner, 2010, p. 10). As such, cybercrime is
crime related to computers, the internet and technology, with a vast majority of cybercrimes
being cracking, piracy, phreaking, cyber stalking, cyber-pornography, and cyber-terrorism
(Schell & Martin, 2004, Pp. 2-3). This task force plan therefore seeks to formulate and elaborate
a strategic direction that would make attempts at eliminating or reducing cyber threats, and
potential legislatives that would serve to push to stop these crimes.
Executive Summary
As an investigator for the St. Louis County cyber criminal task force, there has been an evident
surge in the number of cyber crime, necessitating the setting up of a cyber crime task force
within the jurisdiction. With this endemic state to the growing concerns of cybercrime or digital
cries, such a situation is often met with ill-equipped personnel to tackle these crimes (Taylor, et
al, 2011). The main priority for this task force will be the identification of fraudulent online
activities, identity theft, and the online exploitation of minors. The online environment continues
to pose a major challenge for both private and governmental institutions, as online criminals

CyberCrimeTaskForcePlan

continue to manipulate information to their explicit advantage. Identity theft remains a menace in
St. Louis and the globe at large, posing risk to the personal information of people, who become
bait to fraudulent online activities. In spite of the various efforts that parents take to protect their
children from online predators, their concerted efforts still remain not enough, requiring
combined efforts from the communities, government and intelligence agencies. It is on this basis
that the St. Louis Police Department is hedging forward into the development of a cyber crime
task force that would seek to help deal with the rise in cyber crime in St. Louis.
Cyber Crime Threats in St. Louis County
According to Nykodym (2005), an examination of data related to cyber related crime
over the last couple of years preceding 2005 presents a situation where about 35% of all related
cyber crime situations were related to electronic fraud, fraudulent phone calls and emails,
electronic forgery, and short message services. An additional 32% of reported cyber related crime
was associated with cyber stalking and unwanted calls, messages, and emails. Further, 17%
comprised of cyber terrorism, and intimidating messages, phone calls and emails. Again, of the
reported cyber crimes, 12% of them were protests that were associated with unwarranted data
access, spamming, spoofing, and illegal access to code. About 3% of reported complaints were
related to data and systems damage, misuse of encryption, and malicious code such as Trojans
and viruses. The final 1% of related cyber-crime reporting included the eradication of
international voice tracking systems via the illegal installation of voice over internet protocols
(VoIP) gateway exchange.
The Greatest Cyber Crime Threats that St. Louis County Faces Currently or Prone to Face
in the Near Future

CyberCrimeTaskForcePlan

Many countries have weak cyber functionalities and capabilities, with foreign cyber spies
becoming more adept at taking advantage of weaknesses within computer networks. As soon as
they are able to infiltrate a computer network, they are able to gain access to military secrets, the
government, as well as intellectual property data that can develop a states foreign firms or
entities competitive advantage. On the other hand, terrorists would usually delight at being able
to digitally sabotage a state-owned water supply or even power grid. Such a threat is viable
within the St. Louis State, as the aptitude to commit any such threat already equipped within the
open marketplace (Beaupre et al, 2000).
All over the world and not just within St. Louis, organized crime fraternities are moving
more and more from what has been a more traditionally oriented form of criminal activities that
includes physical attacks, and have gravitated into complex computer networks. In the raiding of
banks, the recent decade has seen a marked decrease in gun-related hold-ups, with modern crime
being more cyber-related with the use of computer systems and networks to breach financial and
corporate institutional networks to get away with personal information such as account numbers,
PIN numbers, and credentials in the stealing of financial resources. As a result of this unique
nature of cyber crime, the cost of conducting business has notably increased, putting firms at
distinct levels of disadvantage when conducting business; and overall, creating a huge drain on
such a states economical well-being (Lewis, 2002).
The foreseen outlook presents a rise in the formation of cyber-related crime groupings
that are determined in creating their very own structure of digital rebellion via the illegal access
of computers and information system networks for reasons including, but not limited to socially,
economically or politically motivated ends. St. Louis in this case could anticipate the fact that
cyber crime could well become amongst its highest of priority areas into the foreseeable future

CyberCrimeTaskForcePlan

due to the fact that computer attacks and network intrusions are becoming one of the largest
threats to the United States national security (Lewis, 2002).
According to Beaupre et al (2000), it is very possible that the future may well anticipate
cyber related activities that are a representation of the following characteristics: remote presence
as well as field communication technologies that have close proximities, as well as a marketplace
for mood recognition scramblers. There could also be the utilization of an extreme level of
distribution of denial-of-service assaults via the use of cloud processing, and the shifting into
cloud-based seizures from conventional devise-based attacks. Further, the creation and
advancement of an established illicit marketplace for the exchange of items that have been
virtually stolen as well as related counterfeit items, and the material assault against internet
exchanges and data centers, electronic assaults on vital infrastructure such as transport, data
services, water supply and power grids. Not surprising would also see biological hackers for
authentication or multi-factor components, an increase in cyber-squad wars, and the escalation of
illicit intelligence data collection and the utilization of intelligent data streams. The complex and
advanced reputation manipulation would also be present, as well as the meddling with, as well as
an illegal abuse of unmanned transportation element as well as robotic devices. There could
finally also be the element of micro-criminality aspects, including a fraudulent era of micropayments and theft (Beaupre et al, 2000).
Priority Cyber Crimes for the Task Force
It would be imperative for the task force to prioritize certain cyber crimes that would be
deemed most urgent and influential. Herein, such priorities would seek to both probe and indict
any such illicit activities against and on computer data and systems, as well as those offenses that
would be by way of computer systems, such as those that would have acquired in their

CyberCrimeTaskForcePlan

methodologies new quality by utilizing information and communications technology (ICT) such
as child pornography, fraud, intellectual property infringements, fraud and forgery.
At the priority levels would be cases where the actual computer element would be a
criminals target. To do this, such actions would have to be put into place and takes, such as
unauthorized network and computer access, theft, or damage. There has also be what can be
termed as true computer crime which would encompass hacking, computer and/or network
intrusions, web-site defacements, security breached, as well as electronic privacy violations.
Following the priority levels would also see a second priority area wherein computers
would be the actual object, instrument or tool in the commitment of a cyber-related crime. Such
crimes could involve child pornography, as well as any other form of sexual exploitation,
harassment and treats, embezzlement, fraud, the theft of personal information, and electronic
theft.
A third priority area would be instances where cyber-criminal use the computer and insert
in them incriminating evidence, up to illegal activities that would not necessarily have a
computer for actual criminal commission, that is, evidence that is electronically based for the
utilization in other cases. A case in point would be where drug criminals storing customer and
supplier records on cyber and digital devices, as well as chat and email logins that would aid into
the actual pointing of criminal locations of such acts as rape, murder and abduction victims.
Cyber Crime Task Force Structure
In the setting up of the task force, a couple of considerations will have to be taken into
mind: the legislation that governs national matters and from which legal foundations are hedged
on, the police units from which the task force will be associated with, the intrinsic regulations
and internal orders for the proper unit functionalities, the physical location from which

CyberCrimeTaskForcePlan

operations will function, the manpower, equipment and training to be provided, and finally, the
actual task force organizational structure.
In forming the task force structure, the following members or units will form as crucial
partners: the St; Louis Police department, the St. Louis Fire Department, the office of the
Attorney general attached to St. Louis, and the Federal Bureau of Investigation (FBI). To
facilitate accountability and audit measures, the primary source of funding for the task force
should be the St. Louis Police Department. The funding should however be sufficient enough to
cover the critical operational expenses such as training, a state task force computer forensic
laboratory, and equipment. In order to get on board the very best, the St. Louis Police
Department and the FBI should each volunteer experienced professional in forensic computer
applications and examiners. In the event that there are any sponsoring agencies, these should not
get any form of reimbursement for any services or equipment rendered as task force personnel
(Gordon et al, 2002).
In order to facilitate computer crime investigation across the state of St. Louis, the
following responsibility centers and functionalities will be set up: the conducting of computer
forensic assessments, carrying out training courses for law implementation agencies, taking
action to any requests for help from other related law facilitation agencies, and in the conduction
of cyber-safety courses for the general public. As such, the task force unit will be accountable for
any breaches to cyber security breach within the St. Louis jurisdiction, with each respective unit
member undergoing training on investigative techniques related to cyber crime, as well as each
member undergoing training in cyber crime undercover techniques. They would also be provided
with incentives so as to execute outreach on matters related to cyber-security (Gordon et al,
2002).

CyberCrimeTaskForcePlan

Organizational Structure
The organizational structure of the cyber crime unit would be set up to be an independent
but specialized complimentary unit of the St. Louis Police Department. This unit will have the
sole functionality of only dealing with cyber-related investigations and prosecution. To facilitate
efficiency, the unit will encompass a distinct legal structure, functioning purely at a pivotal level
with decision-making and representative powers. The unit would be divided around three main
sections: data and information analysis, investigations, and computer forensics. To enable
effective audit, the computer forensic unit would be able to function independently, so as to
avoid external pressures and focus on forensic investigations while reducing incidences of
incompatibilities (Combating Cyber Crime, n.d.).
Cyber Crime Task Force Personnel and skills
Combating cyber crime needs personnel with highly trained skills. Basic skills to combat
the issue of cyber crime would be investigative, the provision of legislative and legal assistance,
prosecution, and general public education and training. Cyber crime investigators would need to
be highly trained and skilled, comprehending the nature and functioning of computers and
network systems. They should be able to know how to properly coordinate their activities with
agents from other jurisdictions, and act as role models on proactive investigative procedures.
Cyber crime prosecutors should be able to liaise with investigators in effectively garnering
evidence for prosecution purposes and to ensure that proper investigation has been conducted in
the maintaining of legal credibility. Finally, computer forensic examiners should be able to
conduct detailed digital analysis, data recovery, disk mapping, systems analysis and data
extraction. They are to take charge of the forensic laboratory maintenance, ensuring its security

CyberCrimeTaskForcePlan

and in the maintenance of hardware and software components used in cyber crime investigation,
analysis and prosecution (Gordon et al, 2002).
Working Relationships with Federal Agencies in St. Louis
According to Nykodym (2005), it is crucial that in the profiling of cyber crime criminals,
that certain agencies work collaboratively with the cyber crime task force. Departments within
the police force are crucial for the exchange of information and receiving of complaints from
victims; the ministry of interior security is needed as the body through which appropriate
national security strategies are drafted, as well as the making of additional security resources
available; the collaboration with the justice department for prosecution services of apprehended
suspects; and collaboration with the intelligence special forces for investigative purposes.
Cyber Crime Task Force Equipment
To ensure the success of the task force, certain equipment is needed to make it successful.
Such components could encompass dedicated systems networks and computer systems, adequate
storage media as well as secure backup storage files and sources, and any such external items
such as DVDs, external hard drives, audio and visual recording equipment, and Wi-Fi devices
when working from remote sites and transmission of data. To compliment thee, it is imperative
to have wireless networks and signal detectors, duplicating equipment, hardware write blockers,
atomic clocks, cables, connectors and cameras, and an evidence room. For the laboratories and
forensic rooms, data recovery tools, image validation software and forensic analysis software
rooms are needed. Unmarked vehicles would also be useful for incognito movement (Beaupre et
al, 2000). Each of these equipment would serve for being able to securely and expeditiously
gather, transmit, analyze and aid in the apprehension of suspects within the soonest time possible
due to the ease of data eradication by suspects.

CyberCrimeTaskForcePlan

10
Cyber Crime Legislation

As a result of the specialized form and dynamic nature in which cyber crime is comprised
of, the arm of the Attorney Generals office would serve as a vital link in the setting up of
legislative laws and by-laws that would deter and help eliminate cyber crime. Due to the large
number of reported and prosecuted cases, the AGs office would have the essential data in
drafting up of such laws. For example the AGs office of St. Louis would recommend changes on
such aspects as penalties, as well as the period for which would be cyber offenders would have to
spend incarcerated for their crimes. This would form the much needed deterrence and punitive
structure that is needed to safeguard the states future (Broadhurst, 2006).
Conclusion
In conclusion, the countering of cyber-related crime needs in the engagement of an
unprecedented caliber of inter-governmental and inter-institutional cooperation. There is a need
to form an awareness of how to recognize and deal with cyber-related crime due to its mutating
functionality via the use of technology. A firm commitment by both the states residents and the
government needs to be in place, keeping everyone informed and educated on how to fight the
uprising of cyber-related crime.

CyberCrimeTaskForcePlan

11
References

Beaupre, D., Icove, D. J., Baker, R., Cassaday, W., & Williams, W. P. (2000). State and local law
enforcement needs to combat electronic crime. US Department of Justice, Office of
Justice Programs, National Institute of Justice.
Brenner, S.W. (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara, CA:
Greenwood Publishing Group.
Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing:
An International Journal of Police Strategies & Management, 29(3), 408-433.
Combating Cyber Crime (n.d.). University of Mississippi retrieved August 13, 2015 from
<www.olemiss.edu/depts/ncjrl/pdf/CyberCrimebooklet.pdf>.
Gordon, G. R., Hosmer, C. D., Siedsma, C., Rebovich, D. (2002). Assessing technology,
methods, and information for committing and combating cyber crime. The Computer
Forensics Research & Development Ctr (CFRDC), & WetStone Technologies, Inc.
Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats.
Center for Strategic & International Studies.
Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Digital
Investigation, 2(4), 261-267.
Schell, B.H. & Martin, C. (2004). Cybercrime: A Reference Handbook. Santa Barbara, CA:
ABC-CLIO, Inc.
Taylor,R.W.,Fritsch,E.J.,Liederbach,J.,&Holt,T.J.(2011).Digitalcrimeanddigital
terrorism(2ndEd.).UpperSaddleRiver,NJ:Pearson.

Вам также может понравиться