Read CyberCrime Page 3


  Chapter 3 : 3. The challenges of fighting cybercrime

  3.1 Opportunities

  Law-enforcement agencies can now use the increasing power of computer systems and complex forensic software to

  speed up investigations and automate search procedures. It can prove difficult to automate investigation processes.

  While a keyword-based search for illegal content can be carried out easily, the identification of illegal pictures is

  more problematic. Hash-value based approaches are only successful if pictures have been rated previously, the hash

  value is stored in a database and the picture that was analysed has not been modified.

  Forensic software is able to search automatically for child-pornography images by comparing the files on the hard

  disk of suspects with information about known images. For example, in late 2007, authorities found a number of

  pictures of the sexual abuse of children. In order to prevent identification the offender had digitally modified the

  part of the pictures showing his face before publishing the pictures over the Internet. Computer forensic experts

  were able to unpick the modifications and reconstruct the suspect’s face. Although the successful investigation

  clearly demonstrates the potential of computer forensics, this case is no proof of a breakthrough in childpornography

  investigation. If the offender had simply covered his face with a white spot, identification would have

  been impossible.

  3.2 General challenges

  3.2.1 Reliance on ICTs

  Many everyday communications depend on ICTs and Internet-based services, including VoIP calls or e- mail

  communications.ICTs are now responsible for the control and management functions in buildings, cars and aviation

  services. The supply of energy, water and communication services depend on ICTs. The further integration of ICTs

  into everyday life is likely to continue. Growing reliance on ICTs makes systems and services more vulnerable to

  attacks against critical infrastructures. Even short interruptions to services could cause huge financial damages to

  e-commerce businesses. It is not only civil communications that could be interrupted by attacks; the dependence on

  ICTs is a major risk for military communications.

  Existing technical infrastructure has a number of weaknesses, such as the monoculture or homogeneity of operating

  systems. Many private users and SMEs use Microsoft’s operating system, so offenders can design effective attacks

  by concentrating on this single target.

  The dependence of society on ICTs is not limited to the western countries. Developing countries also face challenges

  in preventing attacks against their infrastructure and users. The development of cheaper infrastructure

  technologies such as WiMAX has enabled developing countries to offer Internet services to more people. Developing

  countries can avoid the mistakes of some western countries, which have concentrated mainly on maximizing

  accessibility, without investing significantly in protection. US experts have explained that successful attacks against

  the official website of governmental organizations in Estonia could only take place due to inadequate protection

  measures. Developing countries have a unique opportunity to integrate security measures early on. This may

  require greater upfront investments, but the integration of security measures at a later point may prove more

  expensive in the long run.

  Strategies must be formulated to prevent such attacks and develop countermeasures, including the development

  and promotion of technical means of protection, as well as adequate and sufficient laws enabling law-enforcement

  agencies to fight cybercrime effectively.

  3.2.2 Number of users

  The popularity of the Internet and its services is growing fast, with over 2 billion Internet users worldwide by 2010.

  Computer companies and ISPs are focusing on developing countries with the greatest potential for further growth.

  In 2005, the number of Internet users in developing countries surpassed the number in industrial nations, while the

  development of cheap hardware and wireless access will enable even more people to access the Internet.

  With the growing number of people connected to the Internet, the number of targets and offenders increases. It is

  difficult to estimate how many people use the Internet for illegal activities. Even if only 0.1 per cent of users

  committed crimes, the total number of offenders would be more than one million. Although Internet usage rates are

  lower in developing countries, promoting cybersecurity is not easier, as offenders can commit offences from around

  the world.

  The increasing number of Internet users causes difficulties for the law-enforcement agencies because it is relatively

  Cyber Crime

  10

  difficult to automate investigation processes. While a keyword-based search for illegal content can be carried out

  rather easily, the identification of illegal pictures is more problematic. Hash-value based approaches are for

  example only successful if the pictures were rated previously, the hash value was stored in a data base, and the

  picture that was analysed has not been modified.

  3.3 Legal challenges

  3.3.1 Challenges in drafting national criminal laws

  Proper legislation is the foundation for the investigation and prosecution of cybercrime. However, law- makers must

  continuously respond to Internet developments and monitor the effectiveness of existing provisions, especially given

  the speed of developments in network technology.

  Cyber Crime

  11

  Historically, the introduction of computer-related services or Internet-related technologies has given rise to new

  forms of crime, soon after the technology was introduced. One example is the development of computer networks in

  the 1970s – the first unauthorized access to computer networks occurred shortly afterwards. Similarly, the first

  software offences appeared soon after the introduction of personal computers in the 1980s, when these systems

  were used to copy software products.

  It takes time to update national criminal law to prosecute new forms of online cybercrime. Indeed, some countries

  have not yet finished with this adjustment process. Offences that have been criminalized under national criminal law

  need to be reviewed and updated. For example, digital information must have equivalent status as traditional

  signatures and printouts.

  Without the integration of cybercrime-related offences, violations cannot be prosecuted.

  The main challenge for national criminal legal systems is the delay between the recognition of potential abuses of

  new technologies and necessary amendments to the national criminal law. This challenge remains as relevant and

  topical as ever as the speed of network innovation accelerates. Many countries are working hard to catch up with

  legislative adjustments. In general, the adjustment process has three steps: adjustment to national law,

  identification of gaps in the penal code, and drafting of new legislation.

  Adjustments to national law must start with the recognition of an abuse of new technology

  Specific departments are needed within national law-enforcement agencies, which are qualified to investigate

  potential cybercrimes. The development of computer emergency response teams (CERTs), computer incident

  response teams (CIRTs), computer security incident response teams (CSIRTs) and other research facilities have

  improved the situation.

  Cyber Crime

>   12