Feeds

European conference sets agenda for cybercrime fight

Talking shop calls for tougher domain registration checks

The Power of One eBook: Top reasons to choose HP BladeSystem

The Council of Europe has called for a worldwide implementation of its Convention on Cybercrime to fight the growing problem of economic crime on the web.

During the fifth annual CoE conference on cybrecrime in Strasburg this week, participants spoke in favour of greater international cooperation in sharing existing tools, instruments, best practices and initiatives. The conference also heard calls for improved co-operation between law enforcement and industry (ISPs, IT firm and national CETS).

Delegates also backed requests for ICANN to tighten up domain name registration processes to make life more difficult for spammers and other riff-raff. It was suggested that police ought to able to use the WHOIS database to fight cybercrime, while protecting the privacy of individual registrants - arguably a competing goal.

Russia and China both recently tightened up their domain registration process, requiring photo ID before authorities allocate new domains, for example. The measures have been welcomed by security watchers, even though rumours suggests ID-forging services designed to circumvent the new checks have already emerged in the digital underground.

The conference also considered the security and privacy implications of greater use of cloud-based technology, making a number of recommendations.

In order to meet the law enforcement and privacy challenges related to cloud computing existing instruments on international cooperation – such as the Data Protection Convention (CETS 108) and the Budapest Convention – need to be applied more widely and efficiently.

Additional international standards on law enforcement access to data stored in the “clouds” may need to be considered.

Globally trusted privacy and data protection standards and policies addressing those issues need to be put in place and the Council of Europe is encouraged to continue addressing these issues in its standard- setting activities as well as by the Global Project on Cybercrime.

Eurocrats called for an upcoming UN convention on cybercrime in Salvador, Brazil to adopt Europe's approach as a globally-applied action plan for fighting cybercrime, electronic espionage and related threats.

Council of Europe Deputy Secretary General Maud de Boer-Buquicchio told delegates: “The UN Crime Congress in April 2010 will be an opportunity to reinforce our global response to the global threat of cybercrime and cyberterrorism.

"I think we will have the best chance to succeed if we unite around one international instrument which already exists – namely the Council of Europe Cybercrime Convention.”

A total of 29 countries, mostly European but also including the USA, have ratified the Budapest Convention since its adoption in 2001. Portugal and Montenegro announced the ratification of the Convention at the conference this week while Argentina made a request for adopt the treaty.

Nineteen countries have signed but not ratified the Treaty, including the UK and Spain. The convention provides guideline for any country developing comprehensive national legislation against cybercrime as well as framework for international cooperation.

Around 300 cybercrime experts from some 60 countries took part in the CoE cybercrime conference this week. Topics on the agenda included mapping networks and combating online child pornography, as well as training for judges and prosecutors. Human rights and privacy have already been pencilled into the agenda of next year's conference.

A summary of the main conclusions of the conference and background information on the Council of Europe's cybercrime busting efforts can be found here. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.