Feeds

My sysadmin is a special constable

Stop, Hacker!

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk


Parliamentary lobby group EURIM is working with MPs and industry groups to draw a blueprint for the fight against cyber-crime.

EURIM and think tank The Institute for Public Policy Research (IPPR) today published a discussion paper which aims to set the agenda for debate on e-crime. This outlines a number of easily-introduced fairly cheap measures that can be taken to stem cybercrime, along with a number of longer-term plans.

The thinking is that most cyber-criminals are opportunists who can be deterred by simple precautions. Unfortunately very few people are taking care, so easily preventable Internet crimes are on the rise.

Criminals are becoming interested in the Internet because it provides greater opportunities for crooks to automate their search for victims, achieve economies of scale and cover their traces.

Brian White, MP for North East Milton Keynes, and chair of EURIM, said Net crimes are becoming a significant source of revenue for organised criminals. Protection rackets, for example, have been reinvented for the Internet with recent attempts to extort protection money from online bookies by threatening DDoS attacks.

More such problems can be expected in the future, but e-crime is not high up the political agenda, according to White.

He said the introduction of legislation to combat e-crimes needs to come alongside education and technical solutions: "Laws on their own won't solve e-crime."

According to the EURIM - IPPR discussion paper, fighting cyber-crime depends on action in three key areas:

  • The development of a shared National E-Crime Strategy.
  • Government and industry support for educational and prevention programs designed to address e-crime risks and fears.
  • Developing the ability of law enforcement to identify and deal with threats as they emerge - rather than reacting when they are already out of control.

One of paper's main ideas is already close to reality. The paper calls for a “Green Cross Code” on safe use of computers and the Net in homes, schools and in small businesses. A draft text for such a code has been published by Britain's

National High Tech Crime Unit

.



EURIM - IPPR is also calling on steps to streamline the reporting of e-crime to the police.

My BOFH is a special constable

More ambitiously the EURIM - IPPR paper calls for frameworks for co-operation between industry and law enforcement in areas where the skills for policing and investigation are in short supply. This would involve the use of special constables, civilian volunteers and multi-disciplinary units to handling Internet crime.

In effect, sysadmins will be asked to give over their time to help the Internet community by assisting police in investigating cyber-crime. The idea is still at a preliminary stage but the thinking is that such special constables would not have arrest powers nor would they be financially rewarded for their work with the police.

The topic will be addressed in greater detail in the next phase of the EURIM - IPPR E-Crime study, which his timed to take place in the run up to a Home Office strategy document on e-crime, due next spring.

More than 40 organisations are involved in the study. These include telcos, banks and other financial services, security services, law enforcement agencies, trade associations and professional bodies as well as hardware and software suppliers such as Microsoft and Symantec (which are sponsoring the study).

The full text of the first discussion paper can be found here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.