1. Cyber-security and Target Breach
Cyber-security: It can be defined as a process or software or a set of protocols required to
protect the systemand computers from virus and cyber-attacks. Cyber-security is a crime
that has no limits and can take place anywhere anytime. The criminal need not travel from
one place to another. Attacker can sit in one corner of the globe and attack a system on
other side of the world or even his own neighbour. This makes it even more dangerous as it
increases the level of complexity in tracing a criminal’s location. This is why we need to take
this topic seriously and work over it. Cyber-security is taken very much seriously these days
ranging from corporate multinationals to local markets. There is a separate department for
cyber-security in corporate as even a little bit of error on their side can gift the cyber-
criminal with millions of finances.
Target Breach: It is a cyber-crime wherein the hacker breaches into your system and can
transfer finance and secured data into his own account or impulse the system with a virus
which can create lots of problems for the user to operate. Cyber-crimes take place either for
finance or for stealing data and codes. It can even take place sometime as means of revenge
or rage.
Cyber-attacks can take place from any part of the world targeting all the major companies
and banks. It is a form of an attack that can have devastating effects. If we compare the
cyber-attacks to the arrests made, then statistics tell us that the number of attacks have
been increasing every year. This tells us how difficult it has been to catch criminals and
enforce punishment.
2. The above graph tells us about the relation between crimes committed and criminals
arrested in the past four years.
Cyber-crimes take place mainly in another country. Statistics tells us that most of the attacks
take place across borders.
3. The reason behind this is the amount of finance and the option of securing their locations.
Based on my research the main reason what I believe is the lack and variation in laws across
boundaries that vary from nation to nation. These undefined or limited set of legislatures
sometimes act against us, helping the hackers in a way. Therefore, it becomes necessary
that we need to build laws that would act like walls or laser beams that would inhibit these
hackers from attacking the systemand at the same time getting them behind bars.
4. Cyber-crime is now a global phenomenon measures need to be taken in order to put this
crisis to an end. In order to change this I have come up with an idea to putting an end or at
least inhibiting much of these attacks. As the laws and policies differ from nation to nation,
we need a firm set of laws that will be able to provide justice to the victims and punish
criminals. How I plan to do this is by assembling a response team. A group of nations much
more like G7 (earlier known as G8) but focussed only on cyber-crimes. Their objective will be
to catch and apprehend criminals to eradicate cyber-crime or nullify it as much as possible.
This team will include industrial powerhouse nations like United Kingdom, Germany, United
States, Japan, Italy, Canada, India and France. I would be calling it ICIT (International Cyber-
crime Investigation Team). This team will include a group of professional hackers and
government officials of the major countries from each continent. They will together build up
a set of rules and protocols to fight cyber-crime. These laws must be flexible even if the
criminal is from another country than the crime scene. Under no circumstances should the
criminal be getting away.
5. Components of the Policy:
ICIT will have a set of protocols that will be implied upon all the criminals around the globe.
Whenever a cyber-crime scene occurs, it will be tested on the basis of location and the
special agents of ICIT will carry out further investigation. Based on these parameters special
agents will follow the protocols and arrest the hacker for violating cyber-laws. As there will
be a set of common laws for every nation, these criminals will not be subject to any change
in law by the demands of the nation.
Current policy:
G8 follows a certain set of policies to combat cyber-crime.
United Nations
Cyber security act of 2010.
Change in current policy:
ICIT will be focussed only on combating cyber crimes and issues unlike G8 and UN. Cyber
security act of 2010 emphasizes on the combination of the government and the private
sector to fight and protect against cyber-crime. However, ICIT changes this completely, as it
is combining governments of the nations, private sectors as well as cyber expertise to form a
team against cyber-crime. It will be a wonderful combination of legislature and technology
which will bring out the best of both. Producing a rightful and clean technology which will
be played under the legislature and law.
6. Challenges addressed in mid-term:
“So the challenge here would be to make the laws more sophisticated over the international
phase to eliminate cyber-crimes globally. “ As per my statement in my mid-term research
paper, ICIT has a set of laws that will be applicable to every cyber criminal on the planet.
There will not be any kind of discrimination as per international boundaries. Rules will be
common to all irrespective of their nationality. This will cite under ‘The right to arrest at
target point’ This law will enable the ICIT official to encounter arresting criminals at any time
and place on the planet.
The right to arrest at target point:
This Law will be passed by the ICIT which will be governed and approved by the government
officials and legislatures of member nations.
As ICIT will be a team of industrialised and economically advanced nations, ICIT will be
funded by the self interest of its very own governments and authorities.
7. Implementation:
ICIT will follow a certain set of protocols which it will implement in order to combat cyber
crimes. Its laws are meant for all the criminals around the world. . For example, a criminal in
Russia attacks a bank in Japan. He will travel to Egypt after this event. However, he is still a
criminal irrespective of where he is. Once the criminal’s identity is confirmed, ICIT will have
the authority to subject him to direct arrest under the charges of violations of cyber law. So
he will be arrested in Egypt and will be subject to prison at the same place wherein the
crime was conducted i.e. Russia. Let me be clear is the crime where it is conducted from and
not where it is conducted will subject the authority to arrest. The criminal can be arrest by
the Russia authority if he is inside the borders of Russia or ICIT takes over the case. In either
of the cases an arrest and investigation can be done by ICIT. This is known as ‘The right to
arrest at target point’.
This law challenges the fact that international criminals easily change their location, identity
and activities to avoid getting arrested. However, this law will act like a stick to the muscle
for these worldwide criminals. ‘The right to arrest at target point’ gives a loud and clear
message that there’s no way to escape.
‘The right to arrest at target point’ is a bill that will be approved by the federals and
governments of member nations. Plus it acts on a global level and not domestic, therefore
there cannot be any confusion in functionalities and authorization.
8. The above graphical representation is a result obtained via statistical information regarding
the rate of decrease in cyber crime. The current systemis functioning fast but it would take
ages to cut down on cyber crime. ICIT is much faster, sharper and robust system that can be
used to combat cyber crime. It has a firm set of employees who are willing to work day in
and day out in the form of military, armed forces, investigation agencies, forensics, private
sectors, engineers, lawyers and most importantly the government. This will in return be a
much quicker response team than the earlier likes of FBI and G6 which are the best at
present but their methods can be improvised.
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
2016 2017 2018 2019 2020
No ICIT
ICIT
9. Issues solved by ICIT:
Types of computer security tools and procedures used
Wireless network information security tools and procedures
Computer security policies and procedures
Compliance with an IT security related standards, if applicable
Computer security expenditure
Computer security insurance, training and outsourcing
Evaluation of security measures
Computer security vulnerabilities
Computer security incidents during the last year
Type of most recent attack
Motive for most recent attack
Incident reporting procedure, if any
Outcomes of reported incidents
10. Conclusion:
As we have seen and experienced cases in cyber crime and target breach, we can
draw conclusion that it is a very serious issue at a global level. It is a very serious
aspect in any field. It has and can always in the future cause devastating effects.
Criminals can target any field of area ranging from education, food to business and
government. Their crime will have no limit and the extent to which it can leap is
unimaginable. Hence, we have to end this and together we can achieve this.
Together we will unite and fight them in the form of ICIT. This is our team, it’s our
side, our people who represent us in this battle. ICIT have the best government
officials and engineers who together will and can change the world upside down.
ICIT changes the face of cyber crime. International crime scenes will be permanently
prosecuted. There will be digital surveillance and mapping however safety and public
privacy will be ensured and will not be compromised. We have to fight this battle
against the odds but not at the expense of sacrificing our people’s belief in us. This
trust is our biggest treasure. ICIT with is laws and regulations will ensure safety of
wealth and rights. Our systems will be more secure. Target beach and virus attacks
will deteriorate and eventually would not exist. It will change its prior policies on
international criminals. ‘The right to arrest at target point’ will be the best weapon
against cyber criminals. It will provide justice to the people and get criminals behind
bars. Thereby, I can conclude by saying that ICIT will be an efficient response team
and our best chance to combat cyber crime. ICIT will come with an assurance that
Cyber crime will decrease and criminals will go down. Justice will be served.
12. References:
What are Cybercrime Investigations? (n.d.). Retrieved December 11, 2015, from
http://www.detectiveedu.org/cybercrimes-and-identity-theft-investigations/
Cybercrime Incidents on the Rise. (n.d.). Retrieved December 11, 2015, from
http://www.wealthandfinance-intl.com/cybercrime-incidents-on-the-rise
Krebs on Security. (n.d.). Retrieved December 11, 2015, from
http://krebsonsecurity.com/tag/target-data-breach/
Cybersecurity. (n.d.). Retrieved December 11, 2015, from
http://www.technewsworld.com/perl/section/cyber-security/
(2012, June 26). Retrieved December 11, 2015, from
https://www.fbi.gov/newyork/press-releases/2012/manhattan-u.s.-attorney-and-
fbi-assistant-director-in-charge-announce-24-arrests-in-eight-countries-as-part-
of-international-cyber-crime-takedown
(n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/Cyber-
security_regulation
(n.d.). Retrieved December 11, 2015, from
https://en.wikipedia.org/wiki/National_Cyber_Security_Division
(n.d.). Retrieved December 11, 2015, from
https://en.wikipedia.org/wiki/International_cybercrime
(n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/Cyber-
security_regulation
CCIPS Press Releases - 2015. (n.d.). Retrieved December 11, 2015, from
http://www.justice.gov/criminal-ccips/ccips-press-releases-2015