O.P. Mishra
- Published in print:
- 2012
- Published Online:
- September 2012
- ISBN:
- 9780198075950
- eISBN:
- 9780199080892
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780198075950.003.0008
- Subject:
- Sociology, Urban and Rural Studies
This chapter studies the impact of technology on policing in Delhi. It shows that technology has affected both the methodology of crime and the law enforcing agencies. The chapter first looks at ...
More
This chapter studies the impact of technology on policing in Delhi. It shows that technology has affected both the methodology of crime and the law enforcing agencies. The chapter first looks at technology as a facilitator for criminals; cell phones are used as a means for communication among criminals, and the Internet provides ways for criminals to commit sophisticated crimes. It then views technology as a facilitator for better policing, which allow the police to counter criminal activities. Close circuit television cameras (CCTVs) are used as agents of silent policing, the Zonal Integrated Police Net allows police to access and exchange information among police forces, and the Crime and Criminal Tracking Network and System (CCTNS) helps provide an integrated and comprehensive system that enhances the effectiveness of policing.Less
This chapter studies the impact of technology on policing in Delhi. It shows that technology has affected both the methodology of crime and the law enforcing agencies. The chapter first looks at technology as a facilitator for criminals; cell phones are used as a means for communication among criminals, and the Internet provides ways for criminals to commit sophisticated crimes. It then views technology as a facilitator for better policing, which allow the police to counter criminal activities. Close circuit television cameras (CCTVs) are used as agents of silent policing, the Zonal Integrated Police Net allows police to access and exchange information among police forces, and the Crime and Criminal Tracking Network and System (CCTNS) helps provide an integrated and comprehensive system that enhances the effectiveness of policing.
D. Frank Hsu and Dorothy Marinucci (eds)
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- book
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.001.0001
- Subject:
- Information Science, Information Science
In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ...
More
In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. It collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries. It provides readers with the information they need to secure and sustain the cyberspace ecosystem and to defend themselves against all kinds of adversaries and attacks. It provides critical intelligence on cyber crime and security—including details of real-life operations. Among the many important topics it covers are: building a secure cyberspace ecosystem; public-private partnerships to secure cyberspace; law enforcement to protect cyber citizens and to safeguard cyber infrastructure; and strategy and policy issues relating to the security of the cyberecosystem.Less
In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. It collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries. It provides readers with the information they need to secure and sustain the cyberspace ecosystem and to defend themselves against all kinds of adversaries and attacks. It provides critical intelligence on cyber crime and security—including details of real-life operations. Among the many important topics it covers are: building a secure cyberspace ecosystem; public-private partnerships to secure cyberspace; law enforcement to protect cyber citizens and to safeguard cyber infrastructure; and strategy and policy issues relating to the security of the cyberecosystem.
Preet Bharara
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0014
- Subject:
- Information Science, Information Science
This chapter begins with a discussion of the threat of cyber crime. These threats can range from individual phishing emails that trick victims into disclosing personal and financial information, to ...
More
This chapter begins with a discussion of the threat of cyber crime. These threats can range from individual phishing emails that trick victims into disclosing personal and financial information, to computer viruses and keystroke loggers that steal victims' passwords, to the theft of valuable intellectual property over the Internet. A cyber attack could have an enormous, possibly devastating, impact on the economy as well as to cripple individual businesses and services. The chapter describes the some of the work that assistant U.S. attorneys in the Southern District of New York have been doing to combat cyber crime. This includes working with law enforcement partners in the United States and abroad, which has translated into a string of successes in the war on cyber crime. The discussion then turns to the importance of collaboration in cyber crime cases, not only among law enforcement agencies, but also between government and industry.Less
This chapter begins with a discussion of the threat of cyber crime. These threats can range from individual phishing emails that trick victims into disclosing personal and financial information, to computer viruses and keystroke loggers that steal victims' passwords, to the theft of valuable intellectual property over the Internet. A cyber attack could have an enormous, possibly devastating, impact on the economy as well as to cripple individual businesses and services. The chapter describes the some of the work that assistant U.S. attorneys in the Southern District of New York have been doing to combat cyber crime. This includes working with law enforcement partners in the United States and abroad, which has translated into a string of successes in the war on cyber crime. The discussion then turns to the importance of collaboration in cyber crime cases, not only among law enforcement agencies, but also between government and industry.
Howard A. Schmidt
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0016
- Subject:
- Information Science, Information Science
This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's ...
More
This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's Cyberspace Policy Review. The strategy calls for the creation of an Identity Ecosystem. The ecosystem's core is for the key components of a cyber transaction—namely the individual and organization identities, along with the identities of the infrastructure that handles transactions—to operate in a streamlined and safe manner, moving away from the culture of having different user names and passwords for each website. In its place, individuals voluntarily choose a secure privacy-enhancing credential to verify themselves for all types of online transactions from online banking, sending email, maintaining health records, or for any other personal cyber uses. The chapter goes on to describe the Comprehensive National Cyberspace Initiative (CNCI), which outlines a plan for sharing situational awareness among federal, state, and local governments, and private industry partners.Less
This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's Cyberspace Policy Review. The strategy calls for the creation of an Identity Ecosystem. The ecosystem's core is for the key components of a cyber transaction—namely the individual and organization identities, along with the identities of the infrastructure that handles transactions—to operate in a streamlined and safe manner, moving away from the culture of having different user names and passwords for each website. In its place, individuals voluntarily choose a secure privacy-enhancing credential to verify themselves for all types of online transactions from online banking, sending email, maintaining health records, or for any other personal cyber uses. The chapter goes on to describe the Comprehensive National Cyberspace Initiative (CNCI), which outlines a plan for sharing situational awareness among federal, state, and local governments, and private industry partners.
Robert S. Mueller
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0015
- Subject:
- Information Science, Information Science
This chapter deals with the evolving nature of cyber threats, what the FBI is doing to combat them, and how we can work together to keep them at bay. It first considers cyber threats to national ...
More
This chapter deals with the evolving nature of cyber threats, what the FBI is doing to combat them, and how we can work together to keep them at bay. It first considers cyber threats to national security and counterintelligence intrusions and economic espionage. It then details how the FBI pursues cyber threats through the cyber squads in each of its fifty-six field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Together, they run complex undercover operations and examine digital evidence; share information with law enforcement and intelligence partners; and teach their counterparts—both at home and abroad—how best to investigate cyber threats. The chapter also highlights the role of the private sector in helping the FBI stem the rising tide of cyber crime and terrorism.Less
This chapter deals with the evolving nature of cyber threats, what the FBI is doing to combat them, and how we can work together to keep them at bay. It first considers cyber threats to national security and counterintelligence intrusions and economic espionage. It then details how the FBI pursues cyber threats through the cyber squads in each of its fifty-six field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Together, they run complex undercover operations and examine digital evidence; share information with law enforcement and intelligence partners; and teach their counterparts—both at home and abroad—how best to investigate cyber threats. The chapter also highlights the role of the private sector in helping the FBI stem the rising tide of cyber crime and terrorism.
Neil Brodie, Morag M. Kersel, and Kathryn Walker Tubb
- Published in print:
- 2006
- Published Online:
- September 2011
- ISBN:
- 9780813029726
- eISBN:
- 9780813039145
- Item type:
- chapter
- Publisher:
- University Press of Florida
- DOI:
- 10.5744/florida/9780813029726.003.0013
- Subject:
- Archaeology, Archaeological Methodology and Techniques
This chapter discusses some of the tribulations faced by a source country, in this case India, when infiltrated by the antiquities trade. It first introduces the new problem of cyber-crime and the ...
More
This chapter discusses some of the tribulations faced by a source country, in this case India, when infiltrated by the antiquities trade. It first introduces the new problem of cyber-crime and the prevention of crime against written heritage. It also deals with the recovery of archaeological heritage illegally removed from India. In addition, the Bodh Gaya Buddha, the sculpture of Lakulisa, and the sculpture of Krishnajanma are described. One new aspect of the trade is that the national government's policy of opening the Indian market and making its economy more internationally responsive has brought about new threats to the Indian subcontinent. As more and more tourists visit India, with their foreign exchange that helps boost the economy, the danger to cultural heritage has increased, as there are many who would like to acquire cultural objects at any price, whether legally or illegally.Less
This chapter discusses some of the tribulations faced by a source country, in this case India, when infiltrated by the antiquities trade. It first introduces the new problem of cyber-crime and the prevention of crime against written heritage. It also deals with the recovery of archaeological heritage illegally removed from India. In addition, the Bodh Gaya Buddha, the sculpture of Lakulisa, and the sculpture of Krishnajanma are described. One new aspect of the trade is that the national government's policy of opening the Indian market and making its economy more internationally responsive has brought about new threats to the Indian subcontinent. As more and more tourists visit India, with their foreign exchange that helps boost the economy, the danger to cultural heritage has increased, as there are many who would like to acquire cultural objects at any price, whether legally or illegally.
Ronald Deibert and Rafal Rohozinski
- Published in print:
- 2011
- Published Online:
- August 2013
- ISBN:
- 9780262016780
- eISBN:
- 9780262298919
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262016780.003.0002
- Subject:
- Society and Culture, Media Studies
This chapter focuses on the competition for power and control of the factors defining cyberspace contestation. Driving forces of cyberspace contests including the evolution of the cyberspace ...
More
This chapter focuses on the competition for power and control of the factors defining cyberspace contestation. Driving forces of cyberspace contests including the evolution of the cyberspace ecosystem, demographic shift, cyber crime, and the political economy of cyber security. The expansion of cyberspace throughout society’s every aspect is discussed, as is the increase in the use of mobile access devices. The chapter discusses measures undertaken by authoritarian states to counter anti-regime mobilization, for which cyberspace is a major factor. It highlights the issue of authority crisis in cyberspace caused by contestation and lays out issues—including political jurisdictions regarding cyberspace, responsibilities of people who control the cyberspace, and appropriate behavior for the cyberspace—which need to be discussed comprehensively to avoid the authority crisis issue.Less
This chapter focuses on the competition for power and control of the factors defining cyberspace contestation. Driving forces of cyberspace contests including the evolution of the cyberspace ecosystem, demographic shift, cyber crime, and the political economy of cyber security. The expansion of cyberspace throughout society’s every aspect is discussed, as is the increase in the use of mobile access devices. The chapter discusses measures undertaken by authoritarian states to counter anti-regime mobilization, for which cyberspace is a major factor. It highlights the issue of authority crisis in cyberspace caused by contestation and lays out issues—including political jurisdictions regarding cyberspace, responsibilities of people who control the cyberspace, and appropriate behavior for the cyberspace—which need to be discussed comprehensively to avoid the authority crisis issue.
Eileen Monsma, Vincent Buskens, Melvin Soudijn, and Paul Nieuwbeerta
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0008
- Subject:
- Information Science, Information Science
This chapter looks at cyber crime by analyzing social networks used by cybercriminals. Because a social network is defined as a set of actors (usually individuals) connected by ties (usually the ...
More
This chapter looks at cyber crime by analyzing social networks used by cybercriminals. Because a social network is defined as a set of actors (usually individuals) connected by ties (usually the personal relationships between them), a cyber crime network is defined as a set of cybercriminals and their collaborative relationships. Centrality measures have been widely used to quantify the importance of individual actors in networks. The chapter shows that there is considerable variation in individual centrality in the cyber crime network. Carders, for instance, are more likely to actively contact many members, probably because they need to be involved in many ties to pursue their interests. In addition, carders are more often on the shortest path between two individuals than others, probably between data thieves and people who offer cash services. Forum members who offer services on the forum's marketplace are also popular relations, especially those who offer web and security services such as spam and so called bulletproof hosting. Moreover, the results show that a better reputation and a higher status make members more popular partners. It seems that reputation and status indeed can assist members in selecting partners.Less
This chapter looks at cyber crime by analyzing social networks used by cybercriminals. Because a social network is defined as a set of actors (usually individuals) connected by ties (usually the personal relationships between them), a cyber crime network is defined as a set of cybercriminals and their collaborative relationships. Centrality measures have been widely used to quantify the importance of individual actors in networks. The chapter shows that there is considerable variation in individual centrality in the cyber crime network. Carders, for instance, are more likely to actively contact many members, probably because they need to be involved in many ties to pursue their interests. In addition, carders are more often on the shortest path between two individuals than others, probably between data thieves and people who offer cash services. Forum members who offer services on the forum's marketplace are also popular relations, especially those who offer web and security services such as spam and so called bulletproof hosting. Moreover, the results show that a better reputation and a higher status make members more popular partners. It seems that reputation and status indeed can assist members in selecting partners.
Inge Kaul and Pedro Conceiçāo
- Published in print:
- 2006
- Published Online:
- October 2011
- ISBN:
- 9780195179972
- eISBN:
- 9780199850709
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195179972.001.0001
- Subject:
- Economics and Finance, International
The world's agenda of international cooperation has changed. The conventional concerns of foreign affairs, international trade, and development assistance, are increasingly sharing the political ...
More
The world's agenda of international cooperation has changed. The conventional concerns of foreign affairs, international trade, and development assistance, are increasingly sharing the political center stage with a new set of issues. These include trans-border concerns such as global financial stability and market efficiency, risk of global climate change, bio-diversity conservation, control of resurgent and new communicable diseases, food safety, cyber crime and e-commerce, control of drug trafficking, and international terrorism and weapons of mass destruction. Globalization and increasing porosity of national borders have been key driving forces that have led to growing interdependence and interlocking of the public domains — and therefore, public policy concerns — of countries, governments, private businesses, civil society, and people at large. Thus, new and different issues are now occupying top places on national policy agendas, and consequently, on the agendas of international negotiating forums. The policy approaches to global challenges are also changing. A proliferation and diversification of international cooperation efforts include focus on financing arrangements. Financing of international cooperation in most instances is a haphazard and non-transparent process and often seems to run parallel to international negotiations. There are many unfunded mandates and many-non-mandatory funds. To agree on and to achieve international economic goals, we need to understand how financing of international cooperation efforts actually works. Our understanding is hampered by two gaps: 1) lack of an integrated and cohesive theoretical framework; 2) lack of consolidated empirical and operational knowledge in the form of a comprehensive inventory of past, current and possible future (i.e. currently deliberated) financing mechanisms. This book reduces these two gaps and provides a guide to improve our ability to finance international cooperation.Less
The world's agenda of international cooperation has changed. The conventional concerns of foreign affairs, international trade, and development assistance, are increasingly sharing the political center stage with a new set of issues. These include trans-border concerns such as global financial stability and market efficiency, risk of global climate change, bio-diversity conservation, control of resurgent and new communicable diseases, food safety, cyber crime and e-commerce, control of drug trafficking, and international terrorism and weapons of mass destruction. Globalization and increasing porosity of national borders have been key driving forces that have led to growing interdependence and interlocking of the public domains — and therefore, public policy concerns — of countries, governments, private businesses, civil society, and people at large. Thus, new and different issues are now occupying top places on national policy agendas, and consequently, on the agendas of international negotiating forums. The policy approaches to global challenges are also changing. A proliferation and diversification of international cooperation efforts include focus on financing arrangements. Financing of international cooperation in most instances is a haphazard and non-transparent process and often seems to run parallel to international negotiations. There are many unfunded mandates and many-non-mandatory funds. To agree on and to achieve international economic goals, we need to understand how financing of international cooperation efforts actually works. Our understanding is hampered by two gaps: 1) lack of an integrated and cohesive theoretical framework; 2) lack of consolidated empirical and operational knowledge in the form of a comprehensive inventory of past, current and possible future (i.e. currently deliberated) financing mechanisms. This book reduces these two gaps and provides a guide to improve our ability to finance international cooperation.
Misha Glenny
- Published in print:
- 2013
- Published Online:
- November 2015
- ISBN:
- 9780231156868
- eISBN:
- 9780231527651
- Item type:
- chapter
- Publisher:
- Columbia University Press
- DOI:
- 10.7312/columbia/9780231156868.003.0006
- Subject:
- Political Science, Security Studies
This chapter traces the evolution of organized crime since the 1990s. Organized crime dramatically rose in the 1990s as a result of systemic change brought about by the collapse of communism in ...
More
This chapter traces the evolution of organized crime since the 1990s. Organized crime dramatically rose in the 1990s as a result of systemic change brought about by the collapse of communism in Eastern Europe and the former Soviet Union on the one hand, and the rapid liberalization of markets in various territories characterized by an equally eclectic spread of political strategies and ideologies. After reaching a high point from 1995 to 1997, criminal activity leveled out before becoming a more predictable and even integrated part of the global economy. Since the millennium, the main sectors of criminal activity have fallen into a more predictable pattern largely in line with the growth rates of G8 countries. There has been one significant deviation from this—the organized use of the Internet and other cyber instruments to commit serious economic crimes.Less
This chapter traces the evolution of organized crime since the 1990s. Organized crime dramatically rose in the 1990s as a result of systemic change brought about by the collapse of communism in Eastern Europe and the former Soviet Union on the one hand, and the rapid liberalization of markets in various territories characterized by an equally eclectic spread of political strategies and ideologies. After reaching a high point from 1995 to 1997, criminal activity leveled out before becoming a more predictable and even integrated part of the global economy. Since the millennium, the main sectors of criminal activity have fallen into a more predictable pattern largely in line with the growth rates of G8 countries. There has been one significant deviation from this—the organized use of the Internet and other cyber instruments to commit serious economic crimes.
Christopher Pollitt
- Published in print:
- 2012
- Published Online:
- April 2015
- ISBN:
- 9780199603831
- eISBN:
- 9780191806797
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:osobl/9780199603831.003.0008
- Subject:
- Business and Management, Public Management
This chapter discusses policing, how it shapes localities, and how different localities affect it. Various cities and towns need customized and localized police approaches and procedures when they ...
More
This chapter discusses policing, how it shapes localities, and how different localities affect it. Various cities and towns need customized and localized police approaches and procedures when they employ technology (for example, a mountainous area needs stronger radio reception). Or the local police can incorporate local citizen radio operators and transform itself to an efficient organization. Besides specialized functions that involve equipment such as those used for DNA profiling and forensic analysis and its spontaneous retrieval of information through real time access to databases anywhere, the police has also changed in appearance with sophisticated weaponry such as thinner bullet proof vests and camera equipped helmets. While policing is shaped by topography — the social and cultural mix — it is also becoming less bounded by place. The Internet has uprooted the police and deposited it to patrol the web for cyber crimes. The availability of cheap international transportation and easing of borders between countries have also transformed public-service placemaking, in which policing is the organization most deeply involved.Less
This chapter discusses policing, how it shapes localities, and how different localities affect it. Various cities and towns need customized and localized police approaches and procedures when they employ technology (for example, a mountainous area needs stronger radio reception). Or the local police can incorporate local citizen radio operators and transform itself to an efficient organization. Besides specialized functions that involve equipment such as those used for DNA profiling and forensic analysis and its spontaneous retrieval of information through real time access to databases anywhere, the police has also changed in appearance with sophisticated weaponry such as thinner bullet proof vests and camera equipped helmets. While policing is shaped by topography — the social and cultural mix — it is also becoming less bounded by place. The Internet has uprooted the police and deposited it to patrol the web for cyber crimes. The availability of cheap international transportation and easing of borders between countries have also transformed public-service placemaking, in which policing is the organization most deeply involved.