[iwar] [fc:International.Cyber-Sleuths.Demand.New.Powers]

From: Fred Cohen (fc@all.net)
Date: 2001-11-08 05:03:42


Return-Path: <sentto-279987-3812-1005224613-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 08 Nov 2001 05:05:08 -0800 (PST)
Received: (qmail 16381 invoked by uid 510); 8 Nov 2001 13:02:33 -0000
Received: from n18.groups.yahoo.com (216.115.96.68) by 204.181.12.215 with SMTP; 8 Nov 2001 13:02:33 -0000
X-eGroups-Return: sentto-279987-3812-1005224613-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.55] by n18.groups.yahoo.com with NNFMP; 08 Nov 2001 13:03:36 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 8 Nov 2001 13:03:33 -0000
Received: (qmail 24009 invoked from network); 8 Nov 2001 13:03:32 -0000
Received: from unknown (216.115.97.171) by m11.grp.snv.yahoo.com with QMQP; 8 Nov 2001 13:03:32 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 8 Nov 2001 13:03:31 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA8D3gx15495 for iwar@onelist.com; Thu, 8 Nov 2001 05:03:42 -0800
Message-Id: <200111081303.fA8D3gx15495@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 8 Nov 2001 05:03:42 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:International.Cyber-Sleuths.Demand.New.Powers]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

International Cyber-Sleuths Demand New Powers

By Bernhard Warner, Reuters, 11/7/2001
<a href="http://dailynews.yahoo.com/h/nm/20011107/tc/tech_cybersecurity_policing_dc_1.html">http://dailynews.yahoo.com/h/nm/20011107/tc/tech_cybersecurity_policing_dc_1.html>

It has become a familiar tactic in a criminal investigator's arsenal:
the seizure of a suspect's personal computer for the purpose of
dissecting the hard drive for possible clues or motives.

FBI (news - web sites) agents did just that in the days after the
September 11 plane hijack attacks on America, when they confiscated two
computers from a Delray Beach, Florida public library that were
allegedly used by suspects.

A subsequent computer search revealed a host of clues from the
electronic footprints left behind by hijacking suspects that pointed to
a worldwide web of conspirators that stretched to Germany, Saudi Arabia
and ultimately, Afghanistan (news - web sites).

The suspects had downloaded a ``significant amount of information''
about crop dusting, U.S. Attorney General John Ashcroft (news - web
sites) told a Congressional committee in September. The discovery
prompted U.S. officials to temporarily ground all crop-dusting planes.

In the world of cops and robbers, cyber-sleuthing has become an
essential part of the job. Police organizations such as Spain's Guardia
Civil use its official Web site to alert the public to new criminal
threats and solicit tips, while governments of Japan and South Korea
(news - web sites) have begun working with the business sector to crack
down on hacking attacks. At the same time, the medium's global reach has
created a new variety of borderless crimes, authorities say.

``What will be interesting to see is the upcoming generation,'' said an
investigator at National Crime Information Center (NCIC) in London, who
asked not to be named. ``Once they start going through the prison
system, Internet-related crimes will get really interesting.''

But, authorities add, because so many incidents go unreported, there are
no reliable statistics on cybercrime.

WANTED: SUSPECT WITH MOUSE

Detective work is increasingly moving from seedy back alleyways to
Internet chat rooms and back onto the streets, essentially following in
the footsteps of criminals who use the Internet to plan all manners of
crimes -- from credit card fraud to murder, investigators say.

Last year, incoming Interpol Secretary General Ronald Noble identified
high-tech crime as ``one of the new security threats.'' In one of his
first acts, he tripled the size of the force's cybercrime unit and
increased its budget, said Michael Holstein, crime intelligence officer
at Interpol.

Holstein said a main function of the unit is to establish for its 179
member states a standard procedure for digital evidence collection.
Investigators lament that it can be difficult to get digital evidence
admitted into a court proceeding.

To stay ahead of the changing face of crime, law enforcement officials
and politicians are seeking greater powers to conduct online
surveillance. Ashcroft, for instance, has asked a House Judiciary
committee for increased authority to conduct telephone and Internet
wiretaps to aid in ``the war on terrorism.''

Congress did pass a law expanding security powers, though that specific
request was turned down. But civil liberties groups believe growing
public sentiment to step up homeland security could result in the
creation of greater police powers.

EUROPE STEPS INTO GLOBAL CYBERCRIME DEBATE

In September, the Council of Europe approved the Convention on
Cybercrime, a historic treatise that lays the foundation for legislation
allowing for a greater sharing of information between countries to
combat the rise of cybercrime.

The treatise isn't binding, but instead would have to be adopted into
law by its 43 European member states and five outside countries
including the United States, Canada and Japan.

The treaty is broad, covering crimes committed on the Internet such as
fraud, child pornography and violations of computer network security. It
also sets up global policing procedures for conducting computer
searches, interception of e-mails, and extradition of criminal suspects.

``What the treaty does is to bring together law enforcement power with
defining offenses, and it adds international cooperation so that
countries can assist one another,'' Peter Csonka, director general of
legal affairs for the Council of Europe, told Reuters.

Yaman Akdeniz, director of Cyber-rights.org, a U.K. human rights group,
fears the treaty may be too broad. ``It's not balanced. It's too
favorable to the law enforcement community,'' said Akdeniz.

It may take years before most countries actually adopt the Council's
recommendations into law. But observers point out that the effects are
already evident. Since September 11, criminal investigators are sharing
information with greater regularity.

``Our concept is to have as many member states get involved in an
investigation as possible,'' Interpol's Holstein said.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Universal Inkjet Refill Kit $29.95
Refill any ink cartridge for less!
Includes black and color ink.
http://us.click.yahoo.com/1_Y1qC/MkNDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST