BEFORE YOU NOMINATE…
Before submitting your nomination, please review how the ECC defines cybercrime and make note of the terms and conditions a winning submission must agree to in order to receive their EPIC award.
The ECC has adopted the definition of cybercrime as that developed in the Royal Canadian Mounted Police’s Cybercrime Strategy published in 2015. Only nominations that fit these definitions will be considered.
Cybercrime is interpreted as a crime where cyber – the Internet and information technologies, such as computers, tablets, personal digital assistants or mobile devices – has a substantial role in the commission of a criminal offence. There are two primary forms of cybercrime:
- Technology-as-target – Crimes which were only made possible by the advent of the Internet and related digital technologies, which includes hacking and spamming banks, governments, and individual Canadians. These are sophisticated attacks against computer hardware and software that are conducted via the Internet.
- Technology-as-instrument – It’s about “old crimes committed in new ways”, such as online forums where criminals can readily, and often anonymously buy, sell and exchange illicit commodities and criminal services on an unprecedented scale. Interpol defines this as “cyber-enabled crime”: transformation of “traditional” crimes with the advent of the Internet i.e. crimes against children, financial crimes, cyberterrorism.
Examples of cybercrime
- Mischief to data such as destroying or altering data; rendering data meaningless, useless, or ineffective; obstructing, interrupting, or interfering with the lawful use of data; obstructing, interrupting, or interfering with any person in the lawful use of data or denying access to data to any person who is entitled to access that is conducted through external means via the Internet
- Unauthorized use of a computer such as fraudulently obtaining, directly or indirectly, any computer service; by means of an electro-magnetic, acoustic, mechanical or other device, intercepting or causing to be intercepted, directly or indirectly, any function of a computer system; using or causing to be used, directly or indirectly, a computer system with intent to commit an offence in relation to data or a computer system that is orchestrated via external access via the Internet
- Computer-Assisted Crimes such as drug trafficking, national security threats, smuggling of illegal immigrants, distribution of child pornography, cyberbullying, online death threats/criminal harassment; money laundering; intellectual property infringements; financial fraud that were enabled through the use of the Internet
EPIC INVESTIGATIONS Award Nomination and Rating Criteria
Please note the following before making your submission. All the following criteria must be met before a submission will be selected as the EPIC Investigation Award winner.
- There must be a Canadian law enforcement officer/ agency as either the lead or primary partner in the investigation.
- The recipient(s) must agree to have at least one partner representative from each organization nominated attend to receive the award during the award presentation ceremony taking place during the Gala Cocktail Reception on the evening of November 5.
- The recipient(s) must offer a 45-60 minute high-level case study review of their investigation in a plenary session on November 6th. The presentation need only offer whatever details can be shared of the process and techniques used and does not threaten or risk compromise to matters of confidentiality, integrity, or future prosecutorial efforts.
- Recipient(s) are invited to participate in the Innovation Den series on November 7th.
- Failure or an inability to agree to all the above conditions could see said nomination deemed non-compliant and not be considered nor assessed.
Note: Registration, travel (economy class or mileage) and accommodation costs will be covered for up to three award recipients.
There are five key areas being rated – each criterion is clearly defined in the nomination form and each must receive a valid response:
- Impact to Victim(s)
- Complexity of the Investigation
- Successful Outcome
Submissions may include separate attachments offering evidence to support the nomination, including victim impact statements, media links, commendations, etc.
The Chief of the lead organization may be contacted with respect to the submission.
Learn more about the EPIC Award processes or proceed to the Nomination Form (pdf format) using the links below: