Feeds

EU crackdown will see tougher sentences for stupid cyber-badhats

The ones foolish enough to work from within Brussels' jurisdiction

Boost IT visibility and business value

The European Parliament has agreed to toughen criminal penalties across the EU for cyber attacks, especially any that threaten national infrastructure or are deemed to be aimed at stealing sensitive data.

The new directive forces the 28 member states to impose national maximum sentences of at least two years in prison for trying to break into any information systems. But if the attack is against a critical infrastructure network, like a power plant, transport or government network, the maximum penalty jumps to at least five years, higher than most member states currently have in force. Maximum sentences also go up to at least three years for botnet attacks or cyber intrusions that result in financial costs or loss of personal data.

"I am pleased that formal approval has been reached on new rules concerning the definition of criminal offences and the sanctions in the area of cybercrime," the EU commish for home affairs Cecilia Malmström said. "The perpetrators of increasingly sophisticated attacks and the producers of related and malicious software can now be prosecuted, and will face heavier criminal sanctions."

But security bods aren't so sure that upping the jail time is the right way to go about defeating cybercrime. Etay Maor, fraud prevention manager at security firm Trusteer, said that governments needed to be aware that the people behind cyber attacks like botnets were often nowhere near the actual attack.

"Unfortunately, in most cases the people who get caught are the money mules (that may not even be aware they are committing a crime) and not the bot masters or ring leaders," he said. "To apprehend these masterminds, law enforcement agencies will need to have cooperation with local agencies all around the world.

"This is not an easy task, and cyber-criminals know this. This is why they usually reside in a country where they will stay safe from most western governments."

The directive is also trying to improve communication and cooperation between law enforcement in European countries. According to the new rules, member states will be under an obligation to answer urgent requests from each other within eight hours and will be required to collect basic statistical data on cybercrimes.

"Together with the launch of the European Cybercrime Centre and the adoption of the EU Cyber-security Strategy, the new Directive will strengthen our overall response to cybercrime and contribute to improve cyber security for all our citizens," Malmström said.

Individual countries will have two years two years to input the decision into national law. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?