16
LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security

LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security

Embed Size (px)

Citation preview

LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES

Towards Remodelling The Peel Theory of Community Policing for

Global Cyber Security

INTRODUCTION

The definition of crime from different schools of thought varies as much as there are differing perceptions of the issue in different societies.

Crime could be against persons, organizations, institutions, states and even global.

Cybercrimes are crimes committed on the cyberspace using computer and networking technology provided by Information and Communication infrastructures.

CRIME CONTROL

Crime control refers to a theory of criminal justice that places emphasize reducing crime in society through increased police and prosecutorial powers.

Use general societal condemnation of violations and the violators

Exact punishment on affront and appease the victim

Deter future violations by sanctions and new pronouncement appropriate to the instance or new instances or genre of crime

Reconcile violators and victim(s)

CRIME CONTROL

The Peel Model of Community Policing

CRIMINALS

POLICE

VICTIMS

Characteristic of Real World Crime

Four characteristics of real-world crime shaped the way the way the Peel model approach the issue of crime and criminality. These are:

Proximity between criminals and victimsThe scale of the crimePhysical constraints that can discourage the

criminal(s)Patterns of crime with which investigator are

familiar.

Characteristic of Real World Crime

Factors that shape the Peel Model of Law Enforcement

Proximity

Crime Scale

Physical Activities Proximity

CRIME CONTROL

THE CYBERCRIME CHALLENGE

Cybercrime poses a lot of challenges to the Peel Model. These challenges are not more of adopting or creating new laws that criminalize certain cyber activities but more of law enforcements’ ability to react to cybercrime. This is because cybercrime does not share some of the characteristics of conventional crimes that shaped the current Peel model of law enforcement.

Response to crime based on the Peel model is also localized making it difficult to apply it on a global scale

THE CYBERCRIME CHALLENGE

Multiple Effect of Reach of Cybercrime

CYBER CRIMINALS

Victim (A)

Victim (B)

Victim (C)

Victim (d)

Victim (A1)

Victim (A2)

Victim (C1)

Victim (C2)

Victim (C3)

Victims reached through Victim A

Victims reached through Victim C

Localized Crime Response

R E A C T I O N S

Victim (A)

Victim (B)

Victim (C)

Events

People

Happenings

Reports

Localized Response

OUR MODEL

Our opinion is that, amongst other, in the efforts to fight cybercrimes, users must be empowered as the last line of defense as compared to the Peel model where the most responsibility rests on the Police and other law enforcement agents.

We propose a User-centric socio-technological model that employs technology, social theory, policy and education (awareness) as tools to mitigate the cybercrime problem.

OUR MODEL

This model offers an interactive real-time challenge-demand-response platform that aids identification, reporting, apprehension and prosecution.

Our model takes into consideration the fact that cyber crime does not share the common characteristics on which the Peel theory rests and that the criminals plug into the webscape through remote proxies.

The model provides valves that assist users identify malicious intentions through a multi-level access control mechanism.

OUR MODEL

Real-Time Cybercrime Response Model (RtCRM)

Global Response

Cyber Infrastructure

User (A)

User (B)

User (C)

Identification

Apprehension

Prosecution

Profiling

POLICE/LAW ENFORCEMENT

Location (A)

POLICE/LAW ENFORCEMENT

Location (B)

POLICE/LAW ENFORCEMENT

Location (C)

POLICE/LAW ENFORCEMENT

Location (D)

R E A C T I O N

Real-Time Reporting and Interraction between Law Enforcement and Users

Workability of the RtCR Model

Hypothetically, users A, B and C access the cyber infrastructure from different locations.

Law Enforcement Agencies at Locations A, B and C (not necessarily the same locations as Users A,B and C) are directly connected to the different users logging into the cyberspace from these different locations.

Mechanisms are provided in the user-domain that enables users to report any noticeable or suspected malicious activities to trained law enforcement officers.

Workability of the RtCR Model

Requests for attention and responses are Real-time where users can be directed on what to do and how to do it.

This provides a repository of user requests (commonly referred to FAQ’s or frequently asked questions) and responses that can be used to train the response engine so the system can be collaborative, adaptive and learn.

Reactions to specific instances of problems or criminal activities are exchanged and fine-tuned between or among the responding agents at the various locations to produce well-directed and fine grained output.

Responses are therefore global in nature and based on identification, profiling.

This is as opposed o the static offline Peel Model, the mechanism provided ensure prompt reporting and responses which has hitherto hindered apprehension and prosecution of cyber criminals.

 

RECCOMENDATIONS FOR POLICY AND PRACTICE

Cyber crime has added to the dilemma of the Peel theory for crime control.

The ubiquitous nature of the web coupled with the cloud of users presents a new form of challenge to system security and demand a paradigm shift in the perception.

To secure the internet from cyber crime and other abuses, users must not only be made aware of the existence of security flaws and vulnerabilities on the webscape, they must be empowered in a holistic manner through design, policies, practices and technology to mitigate against these risks and to understand the criminals.

CONCLUSION

The challenge in fighting cyber crimes stems from the fact that it is automated and share very few commonalities with offline crimes.

We have shown in this presentation that the Peel model of community policing suffer some inadequacies with regards to facing the challenges posed by cybercrime.

A new model is proposed that can assist law enforcement agents in their fight against cybercriminals.

The Internet community and law enforcement must engage in a collective effort to curb the Internet of the demeaning crimes that it is helping to fuel. We ignore these important issues at our own risk.