NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Responses are required at all the levels identified above. As individuals we need to<br />
retrain ourselves to make our personal IT systems more secure, although there is little<br />
incentive if banks make good cybercrime losses in such an efficient way, creating<br />
minimal inconvenience for the customer.<br />
The private sector responses should be reviewed and analysed in search <strong>of</strong> best practice.<br />
The security forces should work together in areas currently defined by insularity. The<br />
international system must pool resources and information. Cybercriminals operating in<br />
weak states require a major effort as effective responses cannot be expected to occur<br />
without help from multilateral agencies and the more capable law enforcement bodies.<br />
Research initiatives should also be genuinely multidisciplinary, to include, for example,<br />
criminology, development studies, economics (finance, micro-, macro-), IT studies,<br />
innovation studies and, even, strategic studies.<br />
Additional resources will be increasingly difficult to secure given the state <strong>of</strong> the public<br />
finances; yet levels <strong>of</strong> funding to address cybercrime in the UK and elsewhere are<br />
already derisory. However, this is not a lost cause. The relatively cash rich development<br />
sector should be brought in as a major stakeholder, not just for resources but also for<br />
expertise. When the banking system recovers, it should be asked to provide more<br />
resources, which should presumably be easier now that so many are all but nationalised.<br />
The challenges are to seek a reorientation <strong>of</strong> existing resources and capacity and to<br />
begin with initiatives that are less resource intensive – transparency is mainly a result <strong>of</strong><br />
attitude and good practice. As such, the UK government has a leading and major role to<br />
play, which should be cross departmental in scope to include the Home Office, FCO, DfID<br />
and even the MoD – combating cybercrime in all its forms is a compelling argument to<br />
revisit the need for ‘joined-up-government’. The Cabinet Office should take the lead in<br />
co-ordinating strategy and policy across government.<br />
There are many worrying estimates over just how extensively cybercrime has already<br />
accessed financial information and possibly not all are exaggerations. If even a small<br />
percentage <strong>of</strong> the estimates turn out to be correct, there are more serious problems on<br />
the horizon. At present, a ‘band-aid’ response has prevailed but nobody has really taken<br />
on the task <strong>of</strong> working through what might be the implications if the patient becomes<br />
too ill for band-aids to work. Against a backdrop <strong>of</strong> recent financial meltdown, the effects<br />
<strong>of</strong> which will weaken the overall system for many years to come, lower levels <strong>of</strong><br />
Page 90