Feeds

The rise of the white collar hacker

Revolving doors fuel cybercrime

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

IT pros - not spotty teenagers - are now the most usual suspects in cybercrime investigations, a senior Metropolitan Police officer said today.

A new breed of white collar criminal is coming to the fore, Assistant Commissioner Tarique Ghaffur, the head of Scotland Yard’s specialist crime directorate, told delegates at the Computer and Internet Crime Conference in London: "We're seeing more mature offenders, often with a background in the IT industry carrying out malicious attacks and infiltration. Attacks, especially in the banking sector, have been motivated by organised crime groups."

However, companies often simply sack employees guilty of fraud or misuse or their computer systems, when they should be reporting them to the police.

This approach is short-sighted, Ghaffur said, citing investigations where his officers have arrested suspects who were fired several times before facing prosecution for fraud. Scotland Yard wants to make it easier for firms to report computer crimes and share information on losses - anonymously, if necessary.

Out come the sleazeballs

According to Ghaffur, traditional offences are increasingly conducted in cyberspace. He singled out the trade of paedophile pictures online, cyber blackmail and ID theft as priorities in Scotland Yard’s fight against cybercrime. Of these, ID theft crimes (which are associated with huge financial loses) are the highest priority.

Cybercrime should be higher up the political agenda, according to Ghaffur, who said the area currently receives "insufficient funding and resources". He called for cybercrime to be reported as a separate category in crime statistics so that its true scope would be more clear.

The Serious and Organised Crime Agency (SOCA), an FBI-style police force which begins operation in the UK in 2006, will take the lead in the fight against Britain’s organised criminals.

The force will combine the roles of the National Crime Squad, National Intelligence Service, Immigration and Customs and Excise. It will target drug trafficking, people smuggling and fraud cases.

The agency will co-ordinate intelligence and resources at a national and will take a "problem-centric" approach to the fight against crime, according to Ghaffur. Cybercrime – because of its international dimension – should be one of SOCA’s priorities, he said.

SOCA should not operate in isolation from other law enforcement agencies, such as Scotland Yard’s Computer Crime Unit (CCU), according to Ghaffur. He praised the work of officers in the Met’s Computer Crime Unit and cited a joint intelligence cell comprisng the Metropolitan Police, the FBI and the Royal Canadian Mounted Police (Mounties) as a model for collaboration among law enforcement agencies. ®

Related stories

UK.gov announces hi-tech elite police squad
E-crime costs UK business billions
My sysadmin is a special constable
UK ID theft gang jailed for £350K fraud

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.