This paper addressed the current state of police officers’ capabilities,
skills, and their readiness to deal with the developments
of cybercrime. This study discussed
definition of cybercrime, cybercrime categories as well as comparison
between traditional criminal techniques and cybercrime. As the abilities and skills required for detectives to investigate
cybercrime have been discussed. Additionally, literature review and
related work, was addressed challenges role of the police in combating
cybercrime and facing cybercrime policing. Weproposed the main tool in the study which is “Checklist
of essential skills for a cybercrime investigator”. Thus, to gain the ability
to Identify technical and practical
requirements in terms of skills, programs, and equipment to achieve
effective and professional results in fight cybercrimes.
References
[1]
Kaur, A.M. (2017) A Study on Awareness of Cyber Crime and Security. Research Journal of Humanities and Social Sciences, 8, 459-464. https://doi.org/10.5958/2321-5828.2017.00067.5
[2]
Bossler, A.M. and Berenblum, T. (2019) Introduction: New Directions in Cybercrime Research. Journal of Crime and Justice, 42, 495-499. https://doi.org/10.1080/0735648X.2019.1692426 https://www.tandfonline.com/doi/pdf/10.1080/0735648X.2019.1692426?needAccess=true
[3]
Furnell, S. (2003) Cybercrime: Vandalizing the Information Society. Proceedings of the International Conference on Web Engineering, ICWE 2003, Oviedo, 14-18 July 2003, 8-16. https://link.springer.com/content/pdf/10.1007/3-540-45068-8_2.pdf
[4]
McGuire, M. and Dowling, S. (2013) Cyber Crime: A Review of the Evidence. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/246749/horr75-summary.pdf
[5]
Brenner, S.W. (2001) Is There Such a Thing as ‘Virtual Crime’? California Criminal Law Review, 4, Article 1. https://www.researchgate.net/publication/228199325_Is_There_Such_a_Thing_as_%27Virtual_Crime%27
[6]
Brenner, S.W. (2004) Cybercrime Metrics: Old Wine, New Bottles? Virginia Journal of Law & Technology, 9, 1-52.
[7]
Black, A., Lumsden, K. and Hadlington, L. (2019) ‘Why Don’t You Block Them?’ Police Officers’ Constructions of the Ideal Victim when Responding to Reports of Interpersonal Cybercrime. http://shura.shu.ac.uk/27803/3/Black-WhyDon%27tYou%28AM%29.pdf
[8]
Viano, E.C. (2017) Cybercrime: Definition, Typology, and Criminalization. In: Viano, E.C., Ed., Cybercrime, Organized Crime and Societal Responses, Springer International Publishing, Cham, 3-22. https://www.mdpi.com/2673-6756/2/2/28 https://doi.org/10.1007/978-3-319-44501-4_1
[9]
Paoli, L., Visschers, J., Verstraete, C. and Van Hellemont, E. (2018) The Impact of Cybercrime on Belgian Businesses. Intersentia, Cambridge. https://doi.org/10.1017/9781780687742 https://intersentia.com/en/the-impact-of-cybercrime-on-belgian-businesses.html
[10]
Sarre, R., Lau, L.Y.C. and Chang, L.Y. (2018) Responding to Cybercrime: Current Trends. Police Practice and Research, 19, 515-518. https://doi.org/10.1080/15614263.2018.1507888
[11]
Donalds, C. and Osei-Bryson, K.-M. (2019) Toward a Cybercrime Classification Ontology: A Knowledge-Based Approach. Computers in Human Behavior, 92, 403-418. https://doi.org/10.1016/j.chb.2018.11.039
[12]
Broadhead, S. (2018) The Contemporary Cybercrime Ecosystem: A Multi-Disciplinary Overview of the State of Affairs and Developments. Computer Law & Security Review, 34, 1180-1196. https://doi.org/10.1016/j.clsr.2018.08.005
[13]
Akdemir, N., Sungur, B. and Başaranel, B.U. (2020) Examining the Challenges of Policing Economic Cybercrime in the UK. Güvenlik Bilimleri Dergisi, UGK Özel Sayısı, 113-134. http://fr.jsga.edu.tr/kurumlar/fr.jsga/IcSite/sciencesdesecurite/GuvenlikBilimleriDergisi/Arsiv/2020/Mayis/8makale-_6--_.pdf
[14]
Gillespie, A.A. (2015) Cybercrime: Key Issues and Debates. Routledge, New York. https://doi.org/10.4324/9781315884202
[15]
UN Congress Crimes Related to Computer Networks (2017) 10th United Nations Congress on the Prevention of Crime and the Treatment of Offenders; United Nations: Vienna, Austria, 2000. https://www.unodc.org/documents/congress/Previous_Congresses/10th_Congress_2000/017_ACONF.187.10_Crimes_Related_to_Computer_Networks.pdf
[16]
Council of Europe (2001) Convention on Cybercrime. European Treaty Series-No. 185, Council of Europe, 1-22. https://rm.coe.int/1680081561
[17]
Commission of the European Communities (2007) Communication from the Commission to the European Parliament, the Council and the Committee of the Regions: Towards a General Policy on the Fight against Cyber Crime. Commission of the European Communities, Brussels. https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2007:0267:FIN:EN:PDF
[18]
European Commission (2013) Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. European Commission, Brussels. https://edps.europa.eu/data-protection/our-work/publications/opinions/cyber-security-strategy-european-union-open-safe-and_en
[19]
Akhgar, B., Choraś, M., Brewster, B., Bosco, F., Veermeersch, E., Luda, V., Puchalski, D. and Wells, D. (2016) Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. In: Akhgar, B. and Brewster, B., Eds., Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities, Advanced Sciences and Technologies for Security Applications, Springer, Cham, 295-321. https://nottingham-repository.worktribe.com/output/3774756 https://doi.org/10.1007/978-3-319-38930-1_16
[20]
US Government Accountability Office (2007) Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats. US Government Accountability Office, Washington, DC. https://www.gao.gov/new.items/d07705.pdf
[21]
Perera, P. and Mahanamahewa, P. (2017) Analysis of Dependencies & Legal Barriers on Digital Forensic Investigations in Sri Lanka. http://ir.kdu.ac.lk/bitstream/handle/345/1733/028.pdf?sequence=1&isAllowed=y
[22]
HMIC (2015) Real Lives, Real Crimes: A Study of Digital Crime and Policing. Technical Report, Her Majesty’s Inspectorate of Constabulary, London. https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/real-lives-real-crimes-a-study-of-digital-crime-and-policing.pdf
[23]
Hunton, P. (2012) Managing the Technical Resource Capability of Cybercrime Investigation: A UK Law Enforcement Perspective. Public Money & Management, 32, 225-232. https://www.tandfonline.com/doi/abs/10.1080/09540962.2012.676281 https://doi.org/10.1080/09540962.2012.676281
[24]
Harichandran, V.S., Breitinger, F., Baggili, I. and Marrington, A. (2016) A Cyber Forensics Needs Analysis Survey: Revisiting the Domain’s Needs a Decade Later. Computers & Security, 57, 1-13. https://doi.org/10.1016/j.cose.2015.10.007 https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?referer=& httpsredir=1&article=1036&context=electricalcomputerengineering-facpubs
[25]
Bossler, A.M. and Holt, T.J. (2012) Patrol Officers’ Perceived Role in Responding to Cybercrime. Policing, 35, 165-181. https://doi.org/10.1108/13639511211215504 https://www.emerald.com/insight/content/doi/10.1108/13639511211215504/full/html
[26]
Holt, T.J. and Bossler, A.M. (2012) Predictors of Patrol Officer Interest in Cybercrime Training and Investigation in Selected United States Police Departments. Cyberpsychology, Behavior and Social Networking, 15, 464-472. https://pubmed.ncbi.nlm.nih.gov/22817769/ https://doi.org/10.1089/cyber.2011.0625
[27]
Senjo, S.R. (2004) An Analysis of Computer-Related Crime: Comparing Police Officer Perceptions with Empirical Data. Security Journal, 17, 55-71. https://doi.org/10.1057/palgrave.sj.8340168 https://www.ojp.gov/ncjrs/virtual-library/abstracts/analysis-computer-related-crime-comparing-police-officer
[28]
Button, M. (2020) Editorial: Economic and Industrial Espionage. Security Journal, 33, 1-5. https://link.springer.com/content/pdf/10.1057/s41284-019-00195-5.pdf https://doi.org/10.1057/s41284-019-00195-5
[29]
Luciano, L., Baggili, I., Topor, M., Casey, P. and Breitinger, F. (2018) Digital Forensics in the Next Five Years. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, 27-30 August 2018, 1-14. https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1080&context=electricalcomputerengineering-facpubs https://doi.org/10.1145/3230833.3232813
[30]
Federal Bureau of Investigation (2019) 2019 Internet Crime Report. https://www.ic3.gov/Media/PDF/AnnualReport/2019_IC3Report.pdf
[31]
Tcherni-Buzzeo, M., Davies, A., Lopes, G. and Lizotte, A. (2016) The Dark Figure of Online Property Crime: Is Cyberspace Hiding a Crime Wave? Justice Quarterly, 33, 890-911. https://doi.org/10.1080/07418825.2014.994658 https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1045&context=criminaljustice-facpubs
[32]
Hinduja, S. (2004) Perceptions of Local and State Law Enforcement Concerning the Role of Computer Crime Investigative Teams. Policing, 27, 341-357. https://doi.org/10.1108/13639510410553103 https://www.researchgate.net/profile/Sameer-Hinduja/publication/240602047_Percetions_of_local_and_state_law_enforcement_concerning_the_role_of_computer_crime_investigative_teams/links/55dddbcb08ae45e825d39208/Perceptions-of-local-and-state-law-enforcement-concerning-the-role-of-computer-crime-investigative-teams.pdf
[33]
Lee, J.R., Holt, T.J., Burruss, G.W. and Bossler, A.M. (2021) Examining English and Welsh Detectives’ Views of Online Crime. International Criminal Justice Review, 31, 20-39. https://doi.org/10.1177/1057567719846224 https://journals.sagepub.com/doi/epub/10.1177/1057567719846224
[34]
Skogan, W.G. and Hartnett, S.M. (1997) Community Policing, Chicago Style. Oxford University Press, New York. https://www.ojp.gov/ncjrs/virtual-library/abstracts/community-policing-chicago-style.
[35]
(2022) Global Digital Population as of October. https://www.statista.com/statistics/617136/digital-populationworldwide/
[36]
Cohen, L.E. and Felson, M. (1979) Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44, 588-608. http://faculty.washington.edu/matsueda/courses/587/readings/Cohen%20and%20Felson%201979%20Routine%20Activities.pdf https://doi.org/10.2307/2094589
[37]
Grabosky, P.N. (2001) Virtual Criminality: Old Wine in New Bottles? Social & Legal Studies, 10, 243-249. https://journals.sagepub.com/doi/10.1177/a017405 https://doi.org/10.1177/a017405
[38]
Wall, D.S. (1998) Policing and the Regulation of the Internet. In: Walker, C. and Ashworth, A., Eds., Criminal Law Review, Sweet & Maxwell, London, 79-91.
[39]
Navarro, J.N. and Jasinski, J.L. (2012) Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences. Sociology Spectrum, 32, 81-94. https://stars.library.ucf.edu/facultybib2010/3072/ https://doi.org/10.1080/02732173.2012.628560
[40]
Kennedy, J., Holt, T. and Cheng, B. (2019) Automotive Cybersecurity: Assessing a New Platform for Cybercrime and Malicious Hacking. Journal of Crime and Justice, 42, 632-645. https://www.tandfonline.com/doi/full/10.1080/0735648X.2019.1692425 https://doi.org/10.1080/0735648X.2019.1692425
[41]
Goodman, M.D. (1997) Why the Police Don’t Care About Computer Crime. Harvard Journal of Law & Technology, 10, 465-494. http://jolt.law.harvard.edu/articles/pdf/v10/10HarvJLTech465.pdf
[42]
Hadlington, L., Lumsden, K., Black, A. and Ferra, F. (2018) A Qualitative Exploration of Police Officers’ Experiences, Challenges, and Perceptions of Cybercrime. Policing, 15, 34-43. https://doi.org/10.1093/police/pay090 https://shura.shu.ac.uk/23755/3/Black_qualitative_exploration_police_%28AM%29.pdf
[43]
Holt, T.J., Blevins, K.R. and Burkert, N. (2010) Considering the Pedophile Subculture Online. Sexual Abuse, 22, 3-24. https://doi.org/10.1177/1079063209344979 https://journals.sagepub.com/doi/10.1177/1079063209344979
[44]
Bond, E. and Tyrrell, K. (2018) Understanding Revenge Pornography: A National Survey of Police Officers and Staff in England and Wales. Journal of Interpersonal Violence, 36, 2166-2181. https://doi.org/10.1177/0886260518760011 https://journals.sagepub.com/doi/abs/10.1177/0886260518760011
[45]
Hou, T. and Wang, V. (2020) Industrial Espionage—A Systematic Literature Review (SLR). Computers & Security, 98, Article ID: 102019. https://www.sciencedirect.com/science/article/pii/S0167404820302923 https://doi.org/10.1016/j.cose.2020.102019
[46]
Dupont, B. (2004) Security in the Age of Networks. Policing and Society, 14, 76-91. https://www.tandfonline.com/doi/abs/10.1080/1043946042000181575 https://doi.org/10.1080/1043946042000181575
[47]
Etzioni, A. (2011) Cybersecurity in the Private Sector. Issues in Science and Technology, 28, 58-62. https://cspri.seas.gwu.edu/sites/g/files/zaxdzs4106/f/downloads/etzioni_0.pdf
[48]
Holt, T.J. and Bossler, A.M. (2012) Police Perceptions of Computer Crimes in Two Southeastern Cities: An Examination from the Viewpoint of Patrol Officers. American Journal of Criminal Justice, 37, 396-412. https://doi.org/10.1007/s12103-011-9131-5 https://www.academia.edu/23673247/Police_Perceptions_of_Computer_Crimes_in_Two_Southeastern_Cities_An_Examination_from_the_Viewpoint_of_Patrol_Officers
[49]
Bossler, A.M., Holt, T.J., Cross, C. and Burruss, G.W. (2020) Policing Fraud in England and Wales: Examining Constables’ and Sergeants’ Online Fraud Preparedness. Security Journal, 33, 311-328. https://doi.org/10.1057/s41284-019-00187-5 https://link.springer.com/article/10.1057/s41284-019-00187-5
[50]
Burruss, G., Howell, C.J., Bossler, A. and Holt, T.J. (2019) Self-Perceptions of English and Welsh Constables and Sergeants Preparedness for Online Crime: A Latent Class Analysis. Policing, 43, 105-119. https://ouci.dntb.gov.ua/works/9Go8QAx9/ https://doi.org/10.1108/PIJPSM-08-2019-0142