A Multi-level Evidence-based Cyber Crime Prosecution Information System

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameters in addition to username and password before granting access. The system was tested and implemented in a real time cyber security website www.ganamos.org.  The results showed that it is possible to divulge the identity of cyber users and associate their activities with the devices they use, the date, time and location of operation. These can provide real-time evidences to law enforcement agencies to track down and prosecute cyber criminals.

     


  • Keywords


    Cyber, Crime, Identity, Prosecution, Evidence.

  • References


      [1]Hutchinson, S.E. & Sawyer, S.C. (2000). Computers, Communication and Information: A User’s Introduction. New York: DP Publications.

      [2] Decker, F. (2015). Business Risks of Insecure Networks. Hearst Newspapers, LLC. Accessed online from http://smallbusiness.chron.com/business-risks-insecure-networks-41202.html on 20-12-2017

      [3] Halder, D. and Jaishankar, K. (2011). Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global.

      [4] Obama, B. (2014). Presidential Proclamation – National Cybersecurity Awareness Month, 2014. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2014/09/30/presidential-proclamation-national-cybersecurity-awareness-month-2014 on 23-12-2017.

      [5] Williams, T.D. (2016, 27 September). Top 3 Cloud Security Risks & What to Do?. Retrieved from https://www.linkedin.com/pulse/top-3-cloud-security-risks-what-do-tim-d-williams on 04/01/2018.

      [6] Evan, P. and Shimon, P. (2015). How the U.S. thinks Russians hacked the White House.CNN News, April 8. Retrieved from http://edition.cnn.com/2015/04/07/politics/how-russians-hacked-the-wh/index.html on 09-11-2016.

      [7] Broadhurst, R., Grabosky, P., Alazab, M. and Chon, S. (2014). Organizations and Cyber Crime: AnAnalysis of the Nature of Groups engaged in Cyber Crime. International Journal of Cyber Criminology, 8(1), 1-20.

      [8] Clay, W. (2005). Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues forCongress. Congressional Research Service Report for Congress. Retrieved from http://www.dtic.mil/dtic/tr/fulltext/u2/a444799.pdf on 27-12-2017.

      [9] Graham, J., Howard, R., and Olson, R. (Eds.) (2011). Cyber Security Essentials. Boca Raton: Taylor and Francis Group.

      [10] Morris, S. (2004). The future of netcrime now: Part 1 – threats and challenges. Home Office Online Report 62/04. Retrieved from http://globalinitiative.net/wp-content/uploads/2017/01/the-future-of-netcrime-now-part-1- threats-and-challenges.pdf on 02/01/2018.

      [11] McQuade, S. (2005). Technology-enabled Crime, Policing and Security. The Journal of Technology Studies, 32(1), 32-42, ISSN 1071-6084. Retrieved from

      http://scholar.lib.vt.edu/ejournals/JOTS/v32/v32n1/pdf/mcquade.pdf on 10-12-2017.

      [12] Cohen L. E., and Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44: 588-608

      [13] Longe,O. B., Wada, F. and Danquah, P., (2012). Action Speaks Louder Than Words – Understanding Cyber Criminal Behavior using Criminological Theories. Journal of Internet Banking and Commerce 17(1), 1-12.

      [14] Roger, A.G. (2016). Why it’s so hard to prosecute Cyber Criminals. A CSO column available at https://www.csoonline.com/article/3147398, retrieved on 20/12/2017.

      [15] Patel, A. Taghavi, M., Bakhtiyari, K. and Celestino J. J. (2013). An Intrusion Detection and Prevention System in Cloud Computing: A systematic Review, Journal of Network and Computer Applications, Elsevier, 36, 25–41.

      [16] Baniak, K. (2007). Intelligent Agents in Support of Internet Security. Annales UMC Informatica AI (7), 117-125. Available online at https://journals.umcs.pl/ai/article/view/3190/2386 Accessed on 10-11-2017. DOI: 10.17951/ai.2007.7.1.117-125

      [17] Pikoulas, J., Buchanan, W., Mannion, M. and Triantafyllopoulos, K. (2002). An Intelligent Agent Security Intrusion System. Available online at http://www.soc.napier.ac.uk/~bill/pdf/ecbs2002_agents_revised.pdf. Accessed on 11-12-2017.

      [18] Miller, J. (2009). "Cell Phone Tracking Can Locate Terrorists - But Only Where It's Legal". FOX News. http://www.foxnews.com/story/0,2933,509211,00.html. Retrieved on 14-09-2017.

      [19] O'Harrow, R. (2003). "U.S. Backs Florida's New Counterterrorism Database". Washington Post, Aug. 6, p. A01.

      [20] Low, C. (2005). Understanding Wireless Attacks and Detection. © SANS Institute InfoSec Reading Room. Retrieved from https://www.sans.org/reading room/whitepapers/detection/understanding-wireless-attacks-detection-1633 on 10-06-2017.


 

View

Download

Article ID: 16985
 
DOI: 10.14419/ijet.v7i3.19.16985




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.