McAfee released the annual Virtual Criminology Report.
Virtual Criminology Report is a study on current facts and potential trends for Computer Crime. Some interesting parts of the paper follow.
“Three Key Findings Emerged
Firstly, cybercrime isn’t yet enough of a priority for governments around the world to allow the fight against it to make real headway worldwide. Added to that, the physical threat of terrorism and economic collapse is diverting political attention elsewhere. In contrast, cybercriminals are sharpening their focus. Recession is fertile ground for criminal activity as fraudsters clamour to capitalise on rising use of the Internet and the climate of fear and anxiety. Are we in danger of irrevocably damaging consumer trust and, in effect, limiting the chances of economic recovery?
Secondly, cross border law enforcement remains a long-standing hurdle to fighting cybercrime. Local issues mean laws are difficult to enforce transnational. Cybercriminals will therefore always retain the edge unless serious resources are allocated to international efforts.
Thirdly, law enforcement at every level remains ad hoc and ill-equipped to cope. While there has been progress, there is still a significant lack of training and understanding in digital forensics and evidence collection as well as in the law courts around the world. The cyber kingpins remain at large while the minor mules are caught and brought to rights. Some governments are guilty of protecting their in-country offenders. The findings suggest there is an ever greater need to harmonise priorities and coordinate police forces across physical boundaries. The report concludes with a look at suggested steps at both the local and international level to make the fight against cybercrime more effective.”
1. Significantly more training and resourcing for cyber cops, prosecutors and judges, alongside the mainstreaming of cyber evidence gathering and prosecution.
2. Legal or co-regulatory incentives for Internet Service Providers to follow best practice in network design and operation – Incentivising ISPs in turn to work both with other service providers and their customers to improve levels of security. ISPs should also be encouraged to work closer with police as the gatekeepers of the Internet.
3. Security breach disclosure requirements – We cannot expect a market in secure products and services to develop without the information needed to allow customers to quantify security levels. The new EU rules are a start but need widening beyond the telecoms sector and scrutinised to make sure they are not implemented in a token way, and to avoid customer ‘security fatigue.’
4. In the
5. Legal responsibility for both businesses and government agencies when customers suffer Internet-related security losses, except in cases of gross negligence by customers. Banks in particular must be given strong legal and commercial incentives to introduce more secure technology and better fraud detection systems, or they will inevitably cut margins on security as they struggle to ride out the credit crunch and economic downturn. Clear bank liability would reward banks that are taking security seriously, greatly reduce the problems customers have faced, and correspondingly increase online trust and convenience – vital for e-commerce and e-government to flourish in future.
6. Continued consumer education through focused programmes. However, systems must be designed to make it difficult for users to make security mistakes – we cannot expect the average Internet user to become a security expert. Media literacy programmes for informed consumer choice are not enough to ensure users prioritise security over convenience or short term goals.
7. Limited liability for software vendors when they are not following best security practice in their system design and operation. We cannot stop the flood of malware until operating systems and key applications, especially browsers and email clients, are significantly more secure.
8. The use of government procurement power to demand significantly higher standards of security in software and services – Incentivising security enhancements that will spill over to private users. Government information assurance agencies should follow the example of the US National Security Agency in working with software companies to significantly increase software security levels.”
The study can be downloaded at McAfee Website