Return-Path: <sentto-279987-3812-1005224613-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 08 Nov 2001 05:05:08 -0800 (PST) Received: (qmail 16381 invoked by uid 510); 8 Nov 2001 13:02:33 -0000 Received: from n18.groups.yahoo.com (216.115.96.68) by 204.181.12.215 with SMTP; 8 Nov 2001 13:02:33 -0000 X-eGroups-Return: sentto-279987-3812-1005224613-fc=all.net@returns.groups.yahoo.com Received: from [10.1.4.55] by n18.groups.yahoo.com with NNFMP; 08 Nov 2001 13:03:36 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 8 Nov 2001 13:03:33 -0000 Received: (qmail 24009 invoked from network); 8 Nov 2001 13:03:32 -0000 Received: from unknown (216.115.97.171) by m11.grp.snv.yahoo.com with QMQP; 8 Nov 2001 13:03:32 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 8 Nov 2001 13:03:31 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA8D3gx15495 for iwar@onelist.com; Thu, 8 Nov 2001 05:03:42 -0800 Message-Id: <200111081303.fA8D3gx15495@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 8 Nov 2001 05:03:42 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:International.Cyber-Sleuths.Demand.New.Powers] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit International Cyber-Sleuths Demand New Powers By Bernhard Warner, Reuters, 11/7/2001 <a href="http://dailynews.yahoo.com/h/nm/20011107/tc/tech_cybersecurity_policing_dc_1.html">http://dailynews.yahoo.com/h/nm/20011107/tc/tech_cybersecurity_policing_dc_1.html> It has become a familiar tactic in a criminal investigator's arsenal: the seizure of a suspect's personal computer for the purpose of dissecting the hard drive for possible clues or motives. FBI (news - web sites) agents did just that in the days after the September 11 plane hijack attacks on America, when they confiscated two computers from a Delray Beach, Florida public library that were allegedly used by suspects. A subsequent computer search revealed a host of clues from the electronic footprints left behind by hijacking suspects that pointed to a worldwide web of conspirators that stretched to Germany, Saudi Arabia and ultimately, Afghanistan (news - web sites). The suspects had downloaded a ``significant amount of information'' about crop dusting, U.S. Attorney General John Ashcroft (news - web sites) told a Congressional committee in September. The discovery prompted U.S. officials to temporarily ground all crop-dusting planes. In the world of cops and robbers, cyber-sleuthing has become an essential part of the job. Police organizations such as Spain's Guardia Civil use its official Web site to alert the public to new criminal threats and solicit tips, while governments of Japan and South Korea (news - web sites) have begun working with the business sector to crack down on hacking attacks. At the same time, the medium's global reach has created a new variety of borderless crimes, authorities say. ``What will be interesting to see is the upcoming generation,'' said an investigator at National Crime Information Center (NCIC) in London, who asked not to be named. ``Once they start going through the prison system, Internet-related crimes will get really interesting.'' But, authorities add, because so many incidents go unreported, there are no reliable statistics on cybercrime. WANTED: SUSPECT WITH MOUSE Detective work is increasingly moving from seedy back alleyways to Internet chat rooms and back onto the streets, essentially following in the footsteps of criminals who use the Internet to plan all manners of crimes -- from credit card fraud to murder, investigators say. Last year, incoming Interpol Secretary General Ronald Noble identified high-tech crime as ``one of the new security threats.'' In one of his first acts, he tripled the size of the force's cybercrime unit and increased its budget, said Michael Holstein, crime intelligence officer at Interpol. Holstein said a main function of the unit is to establish for its 179 member states a standard procedure for digital evidence collection. Investigators lament that it can be difficult to get digital evidence admitted into a court proceeding. To stay ahead of the changing face of crime, law enforcement officials and politicians are seeking greater powers to conduct online surveillance. Ashcroft, for instance, has asked a House Judiciary committee for increased authority to conduct telephone and Internet wiretaps to aid in ``the war on terrorism.'' Congress did pass a law expanding security powers, though that specific request was turned down. But civil liberties groups believe growing public sentiment to step up homeland security could result in the creation of greater police powers. EUROPE STEPS INTO GLOBAL CYBERCRIME DEBATE In September, the Council of Europe approved the Convention on Cybercrime, a historic treatise that lays the foundation for legislation allowing for a greater sharing of information between countries to combat the rise of cybercrime. The treatise isn't binding, but instead would have to be adopted into law by its 43 European member states and five outside countries including the United States, Canada and Japan. The treaty is broad, covering crimes committed on the Internet such as fraud, child pornography and violations of computer network security. It also sets up global policing procedures for conducting computer searches, interception of e-mails, and extradition of criminal suspects. ``What the treaty does is to bring together law enforcement power with defining offenses, and it adds international cooperation so that countries can assist one another,'' Peter Csonka, director general of legal affairs for the Council of Europe, told Reuters. Yaman Akdeniz, director of Cyber-rights.org, a U.K. human rights group, fears the treaty may be too broad. ``It's not balanced. It's too favorable to the law enforcement community,'' said Akdeniz. It may take years before most countries actually adopt the Council's recommendations into law. But observers point out that the effects are already evident. Since September 11, criminal investigators are sharing information with greater regularity. ``Our concept is to have as many member states get involved in an investigation as possible,'' Interpol's Holstein said. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Universal Inkjet Refill Kit $29.95 Refill any ink cartridge for less! Includes black and color ink. http://us.click.yahoo.com/1_Y1qC/MkNDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST