Feeds

More police needed to tackle e-crime

LINX calls for extra Bobbies on the Net, rather than more legislation

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Improved enforcement of existing laws – rather than more regulations – should be a government priority in the fight against crime on the Net.

The London Internet Exchange's (LINX) call for greater police resources in the fight against cybercrime comes as MPs prepare to hold an inquiry on whether Britain’s key computer crime law - the Computer Misuse Act 1990 - needs updating. The government is shortly due to publish its Framework Strategy for e-crime.

LINX is the UK's main peering centre for ISPs, so its opinion carries considerable weight in the UK Internet industry.

Where’s a policeman when you need one?
Writing in a special Home Office edition of the magazine Public Service Review, LINX regulation officer Malcolm Hutty argues that the growing problem of e-crime is affecting public confidence in the Internet.

"In the real world, ISPs are often the only support available for individuals and small businesses who are victims of crimes such as hacking, online extortion or denial of service attacks," Hutty says.

"Sometimes ISPs are faced with customers who are victims of crime, deserving of police attention. However, there is no national body adequately resourced and willing to take complaints from members of the public. ISPs are forced to refer customers to their local police station, knowing that very often the crime is not local, it is too technical for local officers to deal with effectively, and overworked specialist units are unlikely to take substantive further action."

As a result of these problems few reports of online criminal activity actually result in a police investigation. This is turn means the problem of cybercrimes - such as online fraud - are seen as less important than they really are.

Hutty’s comments back up a call by Metropolitan Police Assistant Commissioner Tarique Ghaffur earlier this week for greater police resources in the fight against cybercrime.

Legislative tangle

It’s sometimes argued that more elaborate regulatory controls might reduce the need to go through the difficult and expensive process of investigating and prosecuting criminal activity.

Such an approach has little likelihood of success, according to Hutty

"This legislative approach is fraught with difficulty, risks producing attractive-sounding solutions of dubious practical relevance and is unable to answer the question of who is going to enforce the new rules,” he writes.

For example, Hutty notes that attendance at the Home Secretary's Taskforce on Child Protection on the Internet outnumbers the manpower at POLIT (the police group responsible for addressing online paedophilia at a national level).

“The requirement for an adequate number of appropriately-trained police officers to investigate complaints of high-tech criminal activity is inescapable,” Hutty concludes.

LINX is a founder member of the Internet Crime Forum (with participants from government, law enforcement, child protection groups and the Internet industry) and the Home Secretary's Taskforce on Child Protection on the Internet, as well as of the Internet Watch Foundation. ®

Related stories

E-crime costs UK business billions
The rise of the white collar hacker
MPs hold inquiry into UK computer crime law
My sysadmin is a special constable
UK ID theft gang jailed for £350K fraud

External Links

Malcolm Hutty's cyber-crime 'think piece' (PDF)

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.