Preserving the digital crime scene poses one of the biggest challenges in the global fight against cybercrime, said participants this week at a major international conference on fighting Internet-based crime.The two-day conference, organized by the Council of Europe and held in Strasbourg, France, was meant to encourage more countries to sign the Council’s convention on cybercrime, which aims to strengthen international cooperation in combating computer-based crime and to harmonize national legislation. The conference drew more than 200 participants from government and the private sector.Law enforcement officials attending the conference stressed the importance of rapid cross-border cooperation between agencies to bring cybercriminals to justice.“Communications networks between law enforcement agencies have to be strong and rapid,” said Andy Leatherby, of the U.K.’s National Hi-Tech Crime Unit (NHTCU) in a telephone interview. Getting evidence before the tracks vanish is a major issue, he said. Dealing with computer-based crime requires officers to trace back IP packets over the Internet, but very few countries have legislation requiring ISPs to retain data and some even have laws preventing ISPs from preserving connection records, he said.Nevertheless, this is precisely the information investigators need, he argued. Normally, investigators are only interested in traffic data, not in information about content accessed, so there should be less concern about privacy protection, he said. His view is shared by Bernhard Otupal of Interpol. Greater understanding of investigators’ needs would make cooperation easier, he said, also speaking by telephone.“Data protection would not be a big problem if people knew what law enforcement actually does with it. The huge problem is identifying people by IP or telephone number,” he said.There shouldn’t necessarily be a clash between effective enforcement and data protection, said Christopher Painter, deputy chief, of computer crime at the U.S. Department of Justice.“There’s an issue of security versus privacy but if we’re doing our job properly we’re protecting privacy by stopping personal information getting into the hands of people who will misuse it,” he said.The Convention made a major contribution to this process by asking signatories to provide a round-the-clock point of access where other agencies can request data needed in an investigation, law enforcement officials said.“It requires each country to set up a 24-7 point of contact so in case of an incident, a law enforcement office can phone a contact point in another country and preserve the digital crime scene,” Leatherby said. There are currently 89 countries in the 24-hour network worldwide. Participants stressed the need for as many countries as possible to sign up, emphasizing that in fighting cybercrime it is important to avoid the mistakes made in the battle against money-laundering and to prevent the creation of places where criminals operate beyond the reach of the law. “We don’t want countries to have safe havens because it is easy for a hacker to route communication through third countries,” Painter said.While the business community is taking the problem more and more seriously because of the cost implications of failing to protect their systems, some participants said there is still work to be done raising awareness of the threat from cybercrime.According to the NHTCU, cybercriminals caused more than $350 million in financial impact on companies that said in a survey they were affected by such crimes last year, while an estimated 83% of U.K. businesses are reported to have been victims of computer-based attacks.“In terms of security implications, (businesses) still don’t understand the potential for attacks,” Leatherby said. His agency is “looking at closer working relationships with industry so law enforcement can learn from them and they can learn from us so that they can build crime prevention into their methodology.” While public awareness of the problem is growing, there is the need for greater sensitivity by users to security issues, speakers agreed.“You have to move away from a trusting society where you can be duped into going to a fake Web site to one where individuals exercise their responsibilities. You can put hundreds of locks on a door, but if you leave it open it’s not secure,” Leatherby said.The Convention agreement, which took effect July 1, requires signatories to criminalize four types of offenses: those against the confidentiality, integrity and availability of computer data and systems; computer-related offenses, including forgery and fraud; content-related offenses, including child pornography and racist and xenophobic material; and offenses related to copyright infringements. Related content news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Industry Networking news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Network Security Networking news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center news AWS and Nvidia partner on Project Ceiba, a GPU-powered AI supercomputer The companies are extending their AI partnership, and one key initiative is a supercomputer that will be integrated with AWS services and used by Nvidia’s own R&D teams. By Andy Patrizio Nov 30, 2023 3 mins CPUs and Processors Generative AI Supercomputers Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe