CORD-19:f299aafd1e2b807e8065dc83015ee4c4d8b54138 JSONTXT 8 Projects

Annnotations TAB TSV DIC JSON TextAE-old TextAE

Id Subject Object Predicate Lexical cue
T1 13-184 Epistemic_statement denotes Although the term "cloud computing" has already been used elsewhere in this publication, for ease of understanding, in this chapter I follow the model used by Quick et al.
T2 679-773 Epistemic_statement denotes Windows and Linux) and an underlying database so that they can create or acquire applications;
T3 774-890 Epistemic_statement denotes Cloud SaaS: This allows clients of the CSP to utilize software and applications running on the cloud infrastructure.
T4 1096-1232 Epistemic_statement denotes However, describing cloud computing crime in simple terms has been a challenge ever since the early days of the Internetwork revolution.
T5 1479-1582 Epistemic_statement denotes These terms tend to be used interchangeably, which makes it difficult to provide universal definitions.
T6 1841-2059 Epistemic_statement denotes For example, in most Western common law countries, if a female posts topless beach holiday "selfies" on Facebook via a smart mobile phone to share among friends, the act would be considered a harmless private activity.
T7 2060-2293 Epistemic_statement denotes In many Muslim countries, and certainly those in the Middle East, however, the act would be considered a criminal offense; the woman would be subject to criminal prosecution in court and the act would be punishable by public lashing.
T8 2294-2495 Epistemic_statement denotes Both polity and invested interests are at play, and the novelty of the "risk" or "threat" posed by new forms of technology-associated crimes can be used to support a larger share of government funding.
T9 2663-2831 Epistemic_statement denotes The growth and development of cloud computing crime has largely been a consequence of the expansion of cloud computing environments capable of facilitating criminality.
T10 3164-3476 Epistemic_statement denotes The popularity of smaller mobile computing devices such as smart phones, which have resulted from advancements in Internet technologies, has been combined with the nature of cloud computing, which provides faster, easier access to files in remote locations, to allow users to access and update files on the move.
T11 3477-3681 Epistemic_statement denotes Although cloud computing technologies offer efficiency in terms of users' hardware requirements and access barriers, they also create challenges for both law enforcement authorities and individuals alike.
T12 5367-5589 Epistemic_statement denotes These perceptions are largely dependent on the level of technology each country relies on to generate wealth, and sometimes on how much a given government sees technology as a threat to its political structure and systems.
T13 5668-5959 Epistemic_statement denotes However, the same UNITU 2012 report stressed that the digital divide had closed significantly between developed and developing nations, particularly in South East Asia and numerous African countries due to the increase in portable devices such as smart phones and the decrease in their cost.
T14 6171-6258 Epistemic_statement denotes Despite the downward trend, prices remain relatively high in many low-income countries.
T15 7037-7277 Epistemic_statement denotes The increased ownership of smart phones in these countries has not only narrowed the gap between them and traditional fixed-location devices such as desktop computers, but also shifted the information and communication technology landscape.
T16 7639-7778 Epistemic_statement denotes On the other hand, to enhance the user's smart mobile phone experience, service providers must design their services based on users' needs.
T17 7779-8044 Epistemic_statement denotes This can result in compromised safe-guards and security, which in turn create opportunities for criminal activity, and authorities have yet to catch up to these technologies, especially when perpetrators can be located overseas or in different police jurisdictions.
T18 8045-8147 Epistemic_statement denotes The increase in mobile smart phone use has also been rapid and significant in Singapore and Hong Kong.
T19 8632-8864 Epistemic_statement denotes While this growth is expected to begin levelling out, consumers' use of connected devices will continue to evolve and expand, presenting vast opportunities for organisations to engage with consumers on an almost ubiquitous platform.
T20 9060-9061 Epistemic_statement denotes 4
T21 9062-9271 Epistemic_statement denotes There has been an ample and growing opportunity for smart phone commerce in fields such as mobile banking, games and videos, and advertising in the Asia Pacific region, particularly in Hong Kong and Singapore.
T22 9272-9424 Epistemic_statement denotes However, the rapid increase in smart phone use and penetration has greatly increased the potential for corresponding growth in smart mobile phone crime.
T23 9722-9890 Epistemic_statement denotes 5 Although the actual level of smart mobile phone crime is not known, and what is known is probably just the tip of the iceberg, the potential for problems is sobering.
T24 11419-11510 Epistemic_statement denotes The device was low-tech and could be bought cheaply in the Sham Shui Po electronics market.
T25 11818-11973 Epistemic_statement denotes Smart mobile phones have become the tool of choice for cybercriminals in Singapore, as viruses can migrate from Personal Computers (PCs) to mobile devices.
T26 12736-12928 Epistemic_statement denotes He asked the woman if she would transfer 2000 Singapore dollars to a certain bank account under his name, so that when he landed in Germany the next day he could withdraw the cash from an ATM.
T27 13054-13137 Epistemic_statement denotes For some time, she did not hear from the man and could not contact him on Whatsapp.
T28 13383-13547 Epistemic_statement denotes We only know about these cloud computing-enabled smart mobile phone crimes because they were in the public domain, but the true level of such crime remains unclear.
T29 13548-13706 Epistemic_statement denotes The lack of reports on cloud computing crime is probably related to the fact that cloud computing is a relatively new concept for law enforcement authorities.
T30 13751-13975 Epistemic_statement denotes Victims of cloud computing crime might not even realize their status as such, or they may choose not to report it, as the police are sometimes unable to recognize it as such and instead record it as traditional street crime.
T31 13976-14186 Epistemic_statement denotes Even when the police recognize and record an event as cloud computing crime, they may have difficulty following up, especially if the servers and data involved are located overseas or in multiple jurisdictions.
T32 14336-14445 Epistemic_statement denotes individual files may be distributed across multiple disks and storage systems across multiple jurisdictions."
T33 14446-14715 Epistemic_statement denotes 13 Securing and preserving a chain of evidence for prosecution in court involves significant police resources, and even if the culprit is deported to face justice, the case may not pass the prosecution's test of public interest and the perpetrator could escape justice.
T34 16158-16320 Epistemic_statement denotes 14 Entrepot is a term use to describe a place where merchandise can be imported and exported without paying duties or tax, therefore the profit is being maximize.
T35 16321-16625 Epistemic_statement denotes Without other industries to generate wealth for Hong Kong, what is left is its status as an international financial center and its professional service-based industry, both of which are highly dependent on modern ICT to operate from, protect, and maintain the integrity of Hong Kong's ICT infrastructure.
T36 16776-16934 Epistemic_statement denotes This is partially due to the fact that most new technology is manufactured in Asia, and thus the closest source of production is relatively cheap to purchase.
T37 16935-17196 Epistemic_statement denotes Hong Kong's per capita income is also relatively high (at US$38,124 in 2013), and that wealth and purchasing power means the general population can afford to buy newly marketed technology rapidly, and as such they have become increasingly technologically savvy.
T38 17501-17900 Epistemic_statement denotes Although there is currently an ongoing debate in Hong Kong over the democratic election (supposedly one man, one vote) of the Chief Executive of the Hong Kong Government Special Administrative Region in 2017, things remain uncertain because Beijing is wary about democracy in Hong Kong out of a fear that it might become a base for subversion to undermine the communist party rule in mainland China.
T39 19370-19423 Epistemic_statement denotes Some events have been cause for concern in Hong Kong.
T40 19752-20031 Epistemic_statement denotes Article 23 is similar to the national security laws in many Western countries, but the very idea of such a law was new to postcolonial Hong Kong, and given the Chinese Communist Party and the Chinese government's track record, it sent chills down the spines of many in Hong Kong.
T41 20352-20572 Epistemic_statement denotes However, the "mainlandization" of Hong Kong has accelerated, especially since 2003, after a series of crises including the Asian financial crisis in 1997 and the avian flu and severe acute respiratory syndrome outbreaks.
T42 20789-20951 Epistemic_statement denotes Politically, it is in Beijing's interest to help Hong Kong, as it would be seen as a failure for Beijing if Hong Kong failed only a few years after reintegration.
T43 21398-21702 Epistemic_statement denotes The Commissioner of Police, government officials, and the Chief Executive can be called before the Legislative Council to explain their decisions on issues relating to policing, but because Hong Kong is not a democratic society, the priorities for policing in Hong Kong are not set by election manifesto.
T44 21703-21855 Epistemic_statement denotes Thus, policing priorities are more likely to reflect the interests of the officials at the highest level of government than those of the general public.
T45 22465-22582 Epistemic_statement denotes However, unlike Hong Kong, Singapore gained independence from Malaysia in the late 1960s as a fully sovereign nation.
T46 23971-23995 Epistemic_statement denotes As Connie Carter put it:
T47 23996-24106 Epistemic_statement denotes Few can doubt that Singapore is a successful example of a growth-oriented, interventionist, capitalist state .
T48 25066-25232 Epistemic_statement denotes Despite being capitalist and unlike Hong Kong, whose government is not directly involved in the economy, the Singaporean government is deeply involved in the economy.
T49 28046-28286 Epistemic_statement denotes However, unlike Hong Kong, Singapore is recognized by its government as a multiracial society with different ethnicities (Chinese is the majority at almost 70%, with the rest of the population comprising those of Malay and Indian heritage).
T50 28586-28836 Epistemic_statement denotes This has transformed Singapore from a society once characterized by sharp contrast between ethnic groups who spoke different dialects and were separated by a large wealth gap into an affluent, English-speaking, middle-class industrialized metropolis.
T51 29567-29643 Epistemic_statement denotes However, in practice, there is a similarity between Hong Kong and Singapore.
T52 29787-29931 Epistemic_statement denotes 22 Democracy in Singapore, however, is "Singapore style" or "Asian democracy" whereby political power is in the hands of few Singaporean elites.
T53 30712-30909 Epistemic_statement denotes Policymaking is largely pursuing economic growth, and anything else is a secondary consideration for the PAP government, as they believe that economic growth would benefit most segments of society.
T54 31241-31442 Epistemic_statement denotes However, the foundation of Singapore's penal code is different from that of Hong Kong's, as the former was taken from India's penal code in its exact entirety 25 and gradually developed a local flavor.
T55 32482-32602 Epistemic_statement denotes The prison system is designed to be as degrading as possible, and public caning is not a rare punishment for wrongdoers.
T56 32603-32909 Epistemic_statement denotes Although Singapore's prison system has been reformed in recent years with the introduction of concepts such as restorative justice, rehabilitation, education and training, the police, courts, and other regulatory agencies still take a hard line on crimes by "nipping them the bud" as a deterrent to others.
T57 34003-34210 Epistemic_statement denotes Businesses that worry about data integrity and that fear losing their sensitive data have questioned whether their data are protected from outsiders and from other tenants sharing the same cloud data center.
T58 34541-34684 Epistemic_statement denotes As a result, tenants might crossing the shared virtual machine segment and accessing the data of other tenants using shared physical resources.
T59 34685-34986 Epistemic_statement denotes More importantly, the same research has identified that small business is more vulnerable because they operate in highly financially constrained environment when compared with larger "global multinational" business, yet they are induced by the promise of cloud computing to save on their ICT overhead.
T60 35007-35305 Epistemic_statement denotes said "However, in adopting cloud computing, it is this distinct operating environment that also renders small businesses vulnerable to criminal and security threats [once attack happened some small businesses might not able to recover from it and the business could possibly come to abruptly end]."
T61 35446-35534 Epistemic_statement denotes Interestingly, users also wonder whether the data are protected from the cloud provider.
T62 36108-36128 Epistemic_statement denotes As Zhiyun Qian said:
T63 36129-36346 Epistemic_statement denotes The assumption has always been that these apps can't interfere with [each] other easily, but such assumption was wrong, one app can in fact significantly impact another and result in harmful consequences for the user.
T64 36347-36349 Epistemic_statement denotes 31
T65 36350-36625 Epistemic_statement denotes Although in theory Hong Kong and Singapore are exposed to similar risks and threats in the cloud, their level of readiness depends on how they perceive risk, as each individual jurisdiction interprets and responds to risk differently according to their unique policing needs.
T66 37416-37785 Epistemic_statement denotes In Nevertheless, the current setup of TCD, with limited manpower and as a division within the CCB, is not able to meet the challenges of the increasingly sophisticated technology crimes and cyber security threats, not to mention the constant support provided by TCD to other formations of the Police in various cases, such as death inquest and locating missing persons.
T67 37937-38133 Epistemic_statement denotes With a high mobile phone penetration rate of 237% which is expected to grow further, individuals, corporates, and critical infrastructure are prone to technology crimes and cyber security threats.
T68 38426-38663 Epistemic_statement denotes Given the rapid advancement in information technology and the transnational nature of technology crime, there is a pressing need to strengthen the overall capability of the HKPF in combating technology crime and cyber security incidents.
T69 38993-39230 Epistemic_statement denotes Given the rapid advancement in information technology and the transnational nature of technology crime, there is a pressing need to strengthen the overall capability of the HKPF in combating technology crime and cyber security incidents.
T70 41841-42140 Epistemic_statement denotes Singapore is a democratic and a sovereign state with self-determination, even though its democratic process is regarded as a "controlled" democracy because the PAP has been in power since the first day of independence from Malaysia more than 50 years ago, with little or no opposition in parliament.
T71 42661-42881 Epistemic_statement denotes The sensor boxes can be designed to detect air pollutants, heavy rainfall, or traffic jams, or to report how full rubbish bins are, paired with cameras that can detect litter and remind litterbugs to pick up their trash.
T72 43754-44063 Epistemic_statement denotes Therefore, if the PAP responds and wants to increase the resources provided to the Singapore police to further increase their ability to fight the growing threat of technology-related crime, doing so will be relatively easier than it would be in many other democratic societies in Western developed economies.
T73 44064-44267 Epistemic_statement denotes Singaporean voters may not necessarily agree with the PAP's decisions regarding finite public resources being transferred from other more pressing social needs, as when they voted to form the government.
T74 44268-44527 Epistemic_statement denotes However, the PAP's manifesto may not mention anything about resources being earmarked for fighting technology-related crime, rather they may prefer to say that they will tackle traditional street crime and other forms of crime important to Singaporean voters.
T75 44528-44852 Epistemic_statement denotes Even if both Hong Kong and Singapore have the resources to respond to the potential risk of surging smart mobile phone crime, cloud computing-related crime is relatively new, and what worked in the past for less mobile devices such as personal computers may not work for the constant connectivity inherent in mobile devices.
T76 45090-45107 Epistemic_statement denotes As Gray explains:
T77 45108-45217 Epistemic_statement denotes Cloud technology offers wonderful potential for users in terms of convenience, ease of obtaining updates etc.
T78 45218-45268 Epistemic_statement denotes However, it presents significant legal challenges.
T79 45269-45560 Epistemic_statement denotes Our laws, largely based on notions of territoriality, struggle to respond to technology in which lines on maps are largely irrelevant 35 Therefore, providing the financial resources is an important first step for law enforcement agencies to build up their policing capabilities in the cloud.
T80 45787-46018 Epistemic_statement denotes For example, in cloud data environments, it is often not possible to access the physical media that stores a customer's data, because cloud data are likely to be stored overseas and outside the investigating officer's jurisdiction.
T81 46036-46255 Epistemic_statement denotes noted: Even if the data is stored within jurisdiction, data distribution technologies [in cloud] may split a user's data across a number (potentially thousands) of storage devices within the cloud computing environment.
T82 46256-46459 Epistemic_statement denotes LEAs would need to rely upon the cloud technology and the cloud service provider to gain access to the data that is stored by a customer and this can introduce issues with chain-ofcustody best practices.
T83 46460-46462 Epistemic_statement denotes 36
T84 46463-46559 Epistemic_statement denotes Another problem facing the investigating officer is the preservation of the cloud data evidence.
T85 46560-46646 Epistemic_statement denotes The integrity of the data is important, so potential data evidence cannot be modified.
T86 46647-46793 Epistemic_statement denotes However, when exporting cloud data evidence for examination by the investigating officer, there is a high chance of modification, as Hooper et al.
T87 46794-46802 Epistemic_statement denotes explain:
T88 46803-46943 Epistemic_statement denotes Preserved (to ensure that the potential evidence is not modified) function which many cloud computing environments do not currently support.
T89 46944-47153 Epistemic_statement denotes Consequently, this could result in accidental modification of data as it is exported from the cloud computing environment for LEA [Law Enforcement Agency] use or intentional destruction of data by the suspect.
T90 47154-47402 Epistemic_statement denotes Once the LEA has secured access to the cloud computing data, the format of the data is still not guaranteed and most of the prevalent digital forensic analysis tools have not yet been updated to decode the major cloud computing data export formats.
T91 47403-47824 Epistemic_statement denotes While many IaaS data exports will likely mimic the data format that is currently supported as virtual machines, SaaS instances are more likely to use proprietary data formats and as such are unlikely to be supported by current tools 37 Finally, even if the police in Singapore and Hong Kong do increase their policing capabilities in smart mobile phone and cloud-related crime, the legal limitations 35 Gray (2013, p. 1).
T92 47872-47967 Epistemic_statement denotes remain a key factor in whether the perpetrator faces justice for the crime they have committed.
T93 48383-48448 Epistemic_statement denotes ), but the task remains problematic due to jurisdictional issues.
T94 48642-48806 Epistemic_statement denotes In short, it is clear from this chapter that lots of catching up need to be done for Hong Kong and Singapore in order to beef-up their policing capability on cloud.
T95 49685-50175 Epistemic_statement denotes However, at the international level, it seems there is little that Hong Kong and Singapore can do to alter the current situation, except to participate actively within the international bodies and convention on technology-related crime, and to learn from other jurisdictions around the world on what they are doing and, at the same time, tap into latest information on cloud computing crime to get a head start in fighting the emerging technology-related crime for themselves in the region.