Feeds

Cuffing darknet-dwelling cyberscum is tricky. We'll 'disrupt' crims instead, warns top cop

Hackers. If you can't beat 'em, join 'em?

Top 10 endpoint backup mistakes

Europe's top cyber-cop has called for a shift in focus from the prosecution of online crims to the disruption of their activities.

This comes as crooks increasingly make use of the darknet – private peer-to-peer networks such as Tor – to stay hidden and anonymous; cops find it difficult to work out suspects' true identities and proceed with prosecutions.

Troels Oerting, head of the European Cybercrime Centre (EC3) at Europol, said that 75 to 80 per cent of wrongdoing his organisation investigates is carried out by groups based in Russia. "They are out of reach and there's no extradition, so the best we can hope for is local prosecution," Oerting told delegates to the Infosec conference in London today.

"Or we need to use the good old-fashioned way and wait until they leave the country to arrest them."

"We need to move between prosecution to disruption of cybercrime," he added.

Most of the nefarious activities of the top echelon of cybercriminals is done via anonymizing darknets, and this presents particular problems for cops and g-men. "We can't just seize a computer as evidence before using EnCase to examine it. Criminals are operating from cloud services," said Oerting. "They are not using Amazon or Microsoft clouds, but their own cloud services. This makes them very difficult to trace."

Oerting called for increased information-sharing to bolster the fight against cybercrime. "When you hunt down wolves the only way is to get info from the victims in banking and retail," he said.

"But [NSA whistleblower Edward] Snowden has made it more difficult for law enforcement to hunt down the wolves," he added – implying, we assume, that crims have switched up their security to avoid the authorities following leaks on how Western intelligence operates. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Has Europe cut the UK adrift on data protection?
EU reckons we've one foot out the door anyway
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees
'Greenhouse effect is real, but as for the rest of it ...'
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
CIA super-spy so sorry spies spied on Senate's torture scrutiny PCs
That thing we swore blind we never did? About that…
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?