Feeds

Cuffing darknet-dwelling cyberscum is tricky. We'll 'disrupt' crims instead, warns top cop

Hackers. If you can't beat 'em, join 'em?

Secure remote control for conventional and virtual desktops

Europe's top cyber-cop has called for a shift in focus from the prosecution of online crims to the disruption of their activities.

This comes as crooks increasingly make use of the darknet – private peer-to-peer networks such as Tor – to stay hidden and anonymous; cops find it difficult to work out suspects' true identities and proceed with prosecutions.

Troels Oerting, head of the European Cybercrime Centre (EC3) at Europol, said that 75 to 80 per cent of wrongdoing his organisation investigates is carried out by groups based in Russia. "They are out of reach and there's no extradition, so the best we can hope for is local prosecution," Oerting told delegates to the Infosec conference in London today.

"Or we need to use the good old-fashioned way and wait until they leave the country to arrest them."

"We need to move between prosecution to disruption of cybercrime," he added.

Most of the nefarious activities of the top echelon of cybercriminals is done via anonymizing darknets, and this presents particular problems for cops and g-men. "We can't just seize a computer as evidence before using EnCase to examine it. Criminals are operating from cloud services," said Oerting. "They are not using Amazon or Microsoft clouds, but their own cloud services. This makes them very difficult to trace."

Oerting called for increased information-sharing to bolster the fight against cybercrime. "When you hunt down wolves the only way is to get info from the victims in banking and retail," he said.

"But [NSA whistleblower Edward] Snowden has made it more difficult for law enforcement to hunt down the wolves," he added – implying, we assume, that crims have switched up their security to avoid the authorities following leaks on how Western intelligence operates. ®

Boost IT visibility and business value

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.