LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES
Towards Remodelling The Peel Theory of Community Policing for
Global Cyber Security
INTRODUCTION
The definition of crime from different schools of thought varies as much as there are differing perceptions of the issue in different societies.
Crime could be against persons, organizations, institutions, states and even global.
Cybercrimes are crimes committed on the cyberspace using computer and networking technology provided by Information and Communication infrastructures.
CRIME CONTROL
Crime control refers to a theory of criminal justice that places emphasize reducing crime in society through increased police and prosecutorial powers.
Use general societal condemnation of violations and the violators
Exact punishment on affront and appease the victim
Deter future violations by sanctions and new pronouncement appropriate to the instance or new instances or genre of crime
Reconcile violators and victim(s)
Characteristic of Real World Crime
Four characteristics of real-world crime shaped the way the way the Peel model approach the issue of crime and criminality. These are:
Proximity between criminals and victimsThe scale of the crimePhysical constraints that can discourage the
criminal(s)Patterns of crime with which investigator are
familiar.
Characteristic of Real World Crime
Factors that shape the Peel Model of Law Enforcement
Proximity
Crime Scale
Physical Activities Proximity
CRIME CONTROL
THE CYBERCRIME CHALLENGE
Cybercrime poses a lot of challenges to the Peel Model. These challenges are not more of adopting or creating new laws that criminalize certain cyber activities but more of law enforcements’ ability to react to cybercrime. This is because cybercrime does not share some of the characteristics of conventional crimes that shaped the current Peel model of law enforcement.
Response to crime based on the Peel model is also localized making it difficult to apply it on a global scale
THE CYBERCRIME CHALLENGE
Multiple Effect of Reach of Cybercrime
CYBER CRIMINALS
Victim (A)
Victim (B)
Victim (C)
Victim (d)
Victim (A1)
Victim (A2)
Victim (C1)
Victim (C2)
Victim (C3)
Victims reached through Victim A
Victims reached through Victim C
Localized Crime Response
R E A C T I O N S
Victim (A)
Victim (B)
Victim (C)
Events
People
Happenings
Reports
Localized Response
OUR MODEL
Our opinion is that, amongst other, in the efforts to fight cybercrimes, users must be empowered as the last line of defense as compared to the Peel model where the most responsibility rests on the Police and other law enforcement agents.
We propose a User-centric socio-technological model that employs technology, social theory, policy and education (awareness) as tools to mitigate the cybercrime problem.
OUR MODEL
This model offers an interactive real-time challenge-demand-response platform that aids identification, reporting, apprehension and prosecution.
Our model takes into consideration the fact that cyber crime does not share the common characteristics on which the Peel theory rests and that the criminals plug into the webscape through remote proxies.
The model provides valves that assist users identify malicious intentions through a multi-level access control mechanism.
OUR MODEL
Real-Time Cybercrime Response Model (RtCRM)
Global Response
Cyber Infrastructure
User (A)
User (B)
User (C)
Identification
Apprehension
Prosecution
Profiling
POLICE/LAW ENFORCEMENT
Location (A)
POLICE/LAW ENFORCEMENT
Location (B)
POLICE/LAW ENFORCEMENT
Location (C)
POLICE/LAW ENFORCEMENT
Location (D)
R E A C T I O N
Real-Time Reporting and Interraction between Law Enforcement and Users
Workability of the RtCR Model
Hypothetically, users A, B and C access the cyber infrastructure from different locations.
Law Enforcement Agencies at Locations A, B and C (not necessarily the same locations as Users A,B and C) are directly connected to the different users logging into the cyberspace from these different locations.
Mechanisms are provided in the user-domain that enables users to report any noticeable or suspected malicious activities to trained law enforcement officers.
Workability of the RtCR Model
Requests for attention and responses are Real-time where users can be directed on what to do and how to do it.
This provides a repository of user requests (commonly referred to FAQ’s or frequently asked questions) and responses that can be used to train the response engine so the system can be collaborative, adaptive and learn.
Reactions to specific instances of problems or criminal activities are exchanged and fine-tuned between or among the responding agents at the various locations to produce well-directed and fine grained output.
Responses are therefore global in nature and based on identification, profiling.
This is as opposed o the static offline Peel Model, the mechanism provided ensure prompt reporting and responses which has hitherto hindered apprehension and prosecution of cyber criminals.
RECCOMENDATIONS FOR POLICY AND PRACTICE
Cyber crime has added to the dilemma of the Peel theory for crime control.
The ubiquitous nature of the web coupled with the cloud of users presents a new form of challenge to system security and demand a paradigm shift in the perception.
To secure the internet from cyber crime and other abuses, users must not only be made aware of the existence of security flaws and vulnerabilities on the webscape, they must be empowered in a holistic manner through design, policies, practices and technology to mitigate against these risks and to understand the criminals.
CONCLUSION
The challenge in fighting cyber crimes stems from the fact that it is automated and share very few commonalities with offline crimes.
We have shown in this presentation that the Peel model of community policing suffer some inadequacies with regards to facing the challenges posed by cybercrime.
A new model is proposed that can assist law enforcement agents in their fight against cybercriminals.
The Internet community and law enforcement must engage in a collective effort to curb the Internet of the demeaning crimes that it is helping to fuel. We ignore these important issues at our own risk.