You are here: Home Knowledge Base Polity Cybercrime, Cybersecurity and the Future of the Internet
Symposium 2010

Cybercrime, Cybersecurity and the Future of the Internet

The Challenge

In the past decade, advances in communications technologies and the “informatization” of society have converged as never before in human history. This has given rise to the industrialization of a type of crime where the commodity—personal information—moves far too quickly for conventional law enforcement methods to keep pace.

The unprecedented scale of the problem threatens the ability of the authorities to respond—with more than 150,000 viruses and other types of malicious code in global circulation and 148,000 computers compromised per day. At the same time, the authorities have more data on criminal activity at their disposal than ever before and now have an opportunity to harness this information in ways that make intelligence development and investigation more streamlined and cost-effective.

But cybercrime rates continue to increase in line with internet adoption: mobile internet access and the continuing deployment of broadband internet infrastructure throughout the world introduces new levels of vulnerability, with potential victims online for longer periods of time and capable of transmitting much more data than before. The adoption of these internet technologies in developing countries poses a potential external threat to the EU and other developed regions; and the increasing trend for outsourcing data management to third parties presents imminent risks to information security and data protection.

In the US but increasingly in Europe too, governments are establishing institutions to deal with critical infrastructure vulnerabilities and programs to engage both business and individual users on the issue of cybercrime and cybersecurity. This strategy is in its infancy but attracting ever greater attention and funding.

At the same time, the organic development of internet technology has resulted in the existence of myriad actors in the information security field. By way of illustration, the ENISA directory of network and information security stakeholders in the EU alone already stretches to over 400 pages.

What should be the roles of the private sector, information security organizations, financial institutions and the public authorities in tackling cybercrime? How can global cooperation of government policies and law enforcement actions on cybercrime and internet security be initiated and pushed forward? And how can the growing numbers of internet users be made more aware of the threats to their cybersecurity?

    Solutions

    Solution
    Symposium 2010

    Establish an efficient online self-reporting system for cybercrime victims to enable widespread gathering and analysis of cybercrime statistics.

    Establish an efficient online self-reporting system for cybercrime victims to enable widespread gathering and analysis of cybercrime statistics.

    Establish an efficient online self-reporting system for cybercrime victims to enable widespread gathering and analysis of cybercrime statistics.

    Polity, Academia, Business, Civil Society
    Solution
    Symposium 2010

    Create an international treaty to promote global cooperation on the detection, investigation and prosecution of cybercrime.

    Create an international treaty to promote global cooperation on the detection, investigation and prosecution of cybercrime.

    Create an international treaty to promote global cooperation on the detection, investigation and prosecution of cybercrime.

    Polity, Civil Society
    Solution
    Symposium 2010

    To tackle cybercrime effectively, establish multidimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, internet companies and financial institutions.

    To tackle cybercrime effectively, establish multidimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, in ...

    To tackle cybercrime effectively, establish multidimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, internet companies and financial institutions.

    Polity, Business
    Solution
    Symposium 2010

    Intensify research into cyber attackers’ psychological and developmental profiles, motives and behavior—and develop efficient identification and rehabilitation mechanisms based on the related research results.

    Intensify research into cyber attackers’ psychological and developmental profiles, motives and behavior—and develop efficient identification and rehabilitation mechanisms based on the related rese ...

    Intensify research into cyber attackers’ psychological and developmental profiles, motives and behavior—and develop efficient identification and rehabilitation mechanisms based on the related research results.

    Academia
    Solution
    Symposium 2010

    Improve public education systems for all potential internet users about the threat of cybercrime, and teach them ways of detecting potential cyber attackers and protecting themselves.

    Improve public education systems for all potential internet users about the threat of cybercrime, and teach them ways of detecting potential cyber attackers and protecting themselves.

    Improve public education systems for all potential internet users about the threat of cybercrime, and teach them ways of detecting potential cyber attackers and protecting themselves.

    Polity, Academia, Business, Civil Society
    Solution
    Symposium 2010

    To foster incentives for the development of products less likely to be attacked, initiate producer liability of software and other internet applications.

    To foster incentives for the development of products less likely to be attacked, initiate producer liability of software and other internet applications.

    To foster incentives for the development of products less likely to be attacked, initiate producer liability of software and other internet applications.

    Polity, Academia, Business
    Solution
    Symposium 2010

    Establish virtual taskforces to promote better international coordination between interregional law enforcement and governmental cybersecurity agencies.

    Establish virtual taskforces to promote better international coordination between interregional law enforcement and governmental cybersecurity agencies.

    Establish virtual taskforces to promote better international coordination between interregional law enforcement and governmental cybersecurity agencies.

    Polity

    Proposals

    Proposal
    Symposium 2010

    Cybercrime, Cybersecurity and the Future of the Internet

    What is international crime? Ten years ago it was smuggling, drug trade and money laundering. But over the last ten years, we've seen an explosion of online crime. And online crime is always internati ...

    What is international crime? Ten years ago it was smuggling, drug trade and money laundering. But over the last ten years, we've seen an explosion of online crime. And online crime is always international because the internet has no borders.Local law enforcement has limited resources and expertise to investigate online crime. The victims, police, prosecutors and judges rarely uncover the full scope of these crimes. Action against online criminals is too slow, the arrests are few and far between, and too often the penalties are very lenient, especially compared to real-world crimes.That’s why I’m calling for the establishment of Internetpol

    Polity
    Proposal
    Symposium 2010

    Five concerns and five solutions for cybersecurity

    Internet security doesn’t just touch on government, big business and law enforcers. It is an increasingly important concern for the average personal technology user, many of whom have little underst ...

    Internet security doesn’t just touch on government, big business and law enforcers. It is an increasingly important concern for the average personal technology user, many of whom have little understanding of the issues and even less knowledge of the technical solutions. They just want to know that if they follow a few simple ground rules, they will be safe. I would highlight five particular areas of concern that require appropriate solutions:   Data protection and privacy On the web, personal information can be as valuable a currency as cash. Citizen’s attitudes towards the privacy of their personal information are evolving

    Polity, Academia, Business, Civil Society
    Proposal
    Symposium 2010

    Dealing with Cyber crime – Challenges and Solutions

    The threat from cyber crime is multi-dimensional, targeting citizens, businesses, and governments at a rapidly growing rate. Cyber criminal tools pose a direct threat to security and play an increasin ...

    The threat from cyber crime is multi-dimensional, targeting citizens, businesses, and governments at a rapidly growing rate. Cyber criminal tools pose a direct threat to security and play an increasingly important role in facilitating most forms of organised crime and terrorism. Challenge 1 There is now a sophisticated and self-sufficient digital underground economy in which data is the illicit commodity. Stolen personal and financial data – used, for example, to gain access to existing bank accounts and credit cards, or to fraudulently establish new lines of credit – has a monetary value. This drives a range of criminal activities, including

    Polity, Academia, Business, Civil Society
    Proposal
    Symposium 2010

    Cybercrime, Cybersecurity and the Future of the Internet

    There are three broad threats to internet security: cyber crime, cyber industrial espionage and cyber warfare. They represent a useful rule of thumb but are not fixed categories - they bleed into one ...

    There are three broad threats to internet security: cyber crime, cyber industrial espionage and cyber warfare. They represent a useful rule of thumb but are not fixed categories - they bleed into one another of necessity. The one common element that straddles the three threats is that at some point they involve a computer user with advanced hacking ability. Already the role of these people may be quite far removed from the action. This is due to the industrialisation of hacking tools which are now easily available: from viruses which buyers may deploy themselves through to operational botnets which can

    Academia