Feeds

My sysadmin is a special constable

Stop, Hacker!

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops


Parliamentary lobby group EURIM is working with MPs and industry groups to draw a blueprint for the fight against cyber-crime.

EURIM and think tank The Institute for Public Policy Research (IPPR) today published a discussion paper which aims to set the agenda for debate on e-crime. This outlines a number of easily-introduced fairly cheap measures that can be taken to stem cybercrime, along with a number of longer-term plans.

The thinking is that most cyber-criminals are opportunists who can be deterred by simple precautions. Unfortunately very few people are taking care, so easily preventable Internet crimes are on the rise.

Criminals are becoming interested in the Internet because it provides greater opportunities for crooks to automate their search for victims, achieve economies of scale and cover their traces.

Brian White, MP for North East Milton Keynes, and chair of EURIM, said Net crimes are becoming a significant source of revenue for organised criminals. Protection rackets, for example, have been reinvented for the Internet with recent attempts to extort protection money from online bookies by threatening DDoS attacks.

More such problems can be expected in the future, but e-crime is not high up the political agenda, according to White.

He said the introduction of legislation to combat e-crimes needs to come alongside education and technical solutions: "Laws on their own won't solve e-crime."

According to the EURIM - IPPR discussion paper, fighting cyber-crime depends on action in three key areas:

  • The development of a shared National E-Crime Strategy.
  • Government and industry support for educational and prevention programs designed to address e-crime risks and fears.
  • Developing the ability of law enforcement to identify and deal with threats as they emerge - rather than reacting when they are already out of control.

One of paper's main ideas is already close to reality. The paper calls for a “Green Cross Code” on safe use of computers and the Net in homes, schools and in small businesses. A draft text for such a code has been published by Britain's

National High Tech Crime Unit

.



EURIM - IPPR is also calling on steps to streamline the reporting of e-crime to the police.

My BOFH is a special constable

More ambitiously the EURIM - IPPR paper calls for frameworks for co-operation between industry and law enforcement in areas where the skills for policing and investigation are in short supply. This would involve the use of special constables, civilian volunteers and multi-disciplinary units to handling Internet crime.

In effect, sysadmins will be asked to give over their time to help the Internet community by assisting police in investigating cyber-crime. The idea is still at a preliminary stage but the thinking is that such special constables would not have arrest powers nor would they be financially rewarded for their work with the police.

The topic will be addressed in greater detail in the next phase of the EURIM - IPPR E-Crime study, which his timed to take place in the run up to a Home Office strategy document on e-crime, due next spring.

More than 40 organisations are involved in the study. These include telcos, banks and other financial services, security services, law enforcement agencies, trade associations and professional bodies as well as hardware and software suppliers such as Microsoft and Symantec (which are sponsoring the study).

The full text of the first discussion paper can be found here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.