This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape. Said landscape is both dynamic and intricate, emanating as it does from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have significant impacts on societies around the world. This necessitates a reassessment of what crime, national security and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats and terrorist activities underscore the vulnerabilities of our current security and digital policing posture.
This book presents concepts, theories and digital policing applications, offering a comprehensive analysis of current and emerging trends in digital policing. Pursuing an evidence-based approach, it offers an extraordinarily perceptive and detailed view of issues and solutions regarding the crime and digital policing landscape. To this end, it highlights current technological and methodological solutions as well as advances concerning integrated computational and analytical solutions deployed in digital policing. It also provides a comprehensive analysis of the technical, ethical, legal, privacy and civil liberty challenges stemming from the aforementioned advances in the field of digital policing; and accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical and legal approaches when conducting digital policing.The research gathered here fits well into the larger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime and law. It provides a valuable reference for law enforcement, policymakers, cybersecurity experts, digital forensic practitioners, researchers, graduates and advanced undergraduates, and other stakeholders with an interest in counter-terrorism. In addition to this target audience, it offers a valuable tool for lawyers, criminologist and technology enthusiasts.
Author(s): Reza Montasari, Victoria Carpenter, Anthony J. Masys
Series: Advanced Sciences and Technologies for Security Applications
Publisher: Springer
Year: 2023
Language: English
Pages: 169
City: Cham
Contents
Digitizing Policing: From Disruption to Innovation Through Futures Thinking and Anticipatory Innovation
1 Introduction
2 Disruption
3 Futures Thinking
4 Discussion
5 Anticipatory Innovation
6 Anticipatory Innovation Mindset and Methodologies
7 Futures Thinking
8 Systems Thinking
9 Design Thinking
10 Conclusion
References
The Use of Counter Narratives to Combat Violent Extremism Online
1 Introduction
2 Extremism
2.1 Violent Extremism
2.2 Aims of Extremist Narratives
3 Narratives
3.1 Online Narratives
3.2 Narrative Persuasion
3.3 Call for Counter Narratives
3.4 Counter Narratives Defined
3.5 Elaboration Likelihood Model of Persuasion
4 Characteristics
4.1 Target Characteristics
4.2 Message Characteristics
4.3 Source Characteristics
5 Assessing the Success of Counter Narratives
6 Alternatives to Counter Narratives
7 Conclusion
References
Ethical Challenges in the Use of Digital Technologies: AI and Big Data
1 Introduction
2 Previous Work
2.1 Normative Ethics
2.2 Applied Ethics
2.3 Big Data Analytics
2.4 Artificial Intelligence (AI)
2.5 Summary
3 Research Challenges and Open Problems
3.1 Case 1: Cyberstalking
3.2 Case 2: Racism and Bias
3.3 Case 3: Sharenting
3.4 Summary
4 Research Actions and Possible Solutions
4.1 Case 1: Cyberstalking
4.2 Case 2: Racism and Bias
4.3 Case 3: Sharenting
4.4 Summary
5 Discussion and Conclusion
5.1 Case Challenges: UI and Data Pipeline
5.2 Pipeline Metrics—Measurement and Enforcement
5.3 Responsibility and Accountability: File Access Permissions
5.4 Lawful and Explainable: Integrity and Severity
5.5 Enforcement and Fairness: Identification and Mitigation
6 Conclusion
7 Recommendations
References
Law Enforcement and the Policing of Cyberspace
1 Introduction
2 The Non-technical Challenges
2.1 The Global Reach
2.2 Hybrid Cybercrimes
2.3 Jurisdictional Issues
2.4 Lack of Technology and Stepping Away from Usual Practice
2.5 Under-Reporting of Cybercrimes
3 The Technical Challenges
3.1 Anonymity
3.2 Resources and Abilities of Cyber Units
3.3 Loss of Location Data and Data Retention Issues
3.4 The Dark Web
3.5 Data Protection Legislation—The National Legal Framework
4 The Legal and Ethical Challenges
4.1 Police and Ethical Challenges
4.2 Personal Privacy
4.3 Police and Legal Barriers
4.4 The Computer Misuse Act 1990
4.5 RIPA 2000
4.6 The Dark Web
5 Possible Avenues for Future Research
5.1 International Networks
5.2 Increased Digital Literacy
5.3 Open Source Intelligence
5.4 A Social Media Presence by Police and Threat of Regulation
6 Conclusion
References
Contemporary Issues in Child Protection: Police Use of Artificial Intelligence for Online Child Protection in the UK
1 Introduction
1.1 Big Data Uses
1.2 AI Use in the Modern World
1.3 What Is Child Protection/Online Abuses
1.4 Government Policies
1.5 How Often Do the UK Police Use Information from the Internet for Policing (Police Intelligence) and for Child Protection Purposes
2 Rising Demand for Police Tasks and Child Protection
2.1 The Core Duties of the Police
2.2 Police Duties in Child Protection
3 Police Ill-Equipped for the Role
4 Rising Population of Children Affected Whilst Online
5 Data on Children Coming to Police Attention via Online
5.1 Use of CCTV
5.2 Use of Body Cameras
6 Police Use of AI—Cost-Effective/Mistakes and Challenges
6.1 Challenges and Mistakes
7 Conclusion
References
Beyond the Surface Web: How Criminals Are Utilising the Internet to Commit Crimes
1 Introduction
2 Background
2.1 The Layout and Purpose of the Web
2.2 The Layout and Purpose of the Web
3 Challenges
3.1 Ethical Hacking or Blatant Computer Misuse?
3.2 When Cybertrespass Is a Crime
3.3 Ethical Considerations of Police Using the Dark Web
3.4 Bitcoin and the Illicit Use of Cyber Currencies
3.5 Digital Forensics and Criminals
4 Recommendations
4.1 Rectifying the Mistakes of the Playpen Operation
4.2 The Next Steps of Digital Forensics
4.3 The Standardisation of Law for Cryptocurrencies
5 Discussion
6 Conclusion
References
The Role of the Internet in Radicalisation to Violent Extremism
1 Introduction
2 Terrorism as a Process
3 Phases of Radicalisation
4 Phases of Online Terrorism
5 Social Media Platforms and Terrorism
6 Social Media Platforms and Terrorism
7 The Internet of Things Moderating Online Terrorism
8 The Internet of Things Moderating Online Terrorism
References
Exploring the Extent to Which Extremism and Terrorism Have Changed Since the Advent of the Internet
1 Introduction
1.1 Defining Terrorism
1.2 Defining Extremism
2 The Internet as an Extremist and Terrorist Facilitator
2.1 Recruitment
2.2 Propaganda
2.3 Funding and Logistics
2.4 Anonymity, Accessible Information, Cheap Communication
3 The Internet Not Facilitating Extremism and Terrorism
3.1 Government Superiority on the Internet
3.2 The Internet’s Anonymity Not Being Standard
3.3 Online Extremist Information
4 Conclusion
References
Zero Trust Security Strategies and Guideline
1 Introduction
2 What Is Zero Trust?
3 Enhancing Physical Security with Zero Trust
4 Network Architecture Design
4.1 Art. 25 GDPR: Data Protection by Design and by Default [16]
5 Zero Trust in the Cold War Era
6 Implementing a Zero Trust Approach
7 Conclusion
References