reedom from fear
FreedomfromFear-July2010-Issuen°7-MagazinePublishedbyUNICRI,MaxPlanckInstitute,BaselInstituteonGovernance-EditorialBoard:ViaMaestridelLavoro,10,10127,Turin,Italy
Hackers Profiling:
Who Are the
Attackers?
Raoul Chiesa
Cyberwar:
Myth or Reality?
Bruce Schneier
MAX-PLANCK-GESELLSCHAFT
7
www.freedomfromfearmagazine.org
SPECIAL ISSUE
Terrorist use of
the Internet and
Legal Response
Marco Gercke
Daniel Thelesklaf
Looking for
Safer Spaces?
CYBERCRIMES
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
UNICRI
United Nations
Interregional Crime and Justice Research
Institute
Viale Maestri del Lavoro, 10
10127 Turin, Italy
Telephone
(+39) 011 653 71 11
Telefax
(+39) 011 631 33 68
E-Mail
unicri@unicri.it
Web
www.unicri.it
MAX PLANCK INSTITUTE
for Foreign and International Criminal Law
(MPI)
Guenterstalstrasse 73,
79100 Freiburg, Germany
Teleph one
(+49) 761 708 10
Telefax
(+49) 761 7081 294
E-Mail
info@mpicc.de
Web
www.mpicc.de
BASEL INSTITUTE
ON GOVERNANCE
Steinenring 60
4052 Basel, Switzerland
Telephone
+41 (0)61 205 55 11
Telefax
+41 (0)61 205 55 19
E-Mail
info@baselgovernance.org
Web
www.baselgovernance.org
The views and opinions expressed in the Magazine do not necessarily reflect those of the United Nations, UNICRI, and the
Max Planck Institute. The designations and terminology employed may not conform to United Nations practice and do not
imply the expression of any opinion whatsoever on the part of the publishing institutions.
Award notification
Congratulations your identity has been sold!
All our lauded technological progress -- our very civilization -
is like the axe in the hand of the pathological criminal.
(Albert Einstein)
Over the last years we have witnessed changes as we analyzed criminal trends and elaborated
new strategies to confront crime. New scenarios have emerged, which have obliged us to improve
knowledge and to rethink strategies. These changes are the direct consequences of a wired world
driven by global markets where frontiers are abolished mainly in the name of economics. This new
world, dominated by new information and communication technologies, has also redefined the
criminals’ profile and their modus operandi.
Most of the criminal phenomena we are fighting today are transnational. The network woven by organized
crime has also become part of our daily life, it has infiltrated the new information and communication
technologies (ICT) and, the more we depend on these, the more we are potential victims. ICTs have
expanded our possibilities, but they have also enabled a wide spectrum of offences, and the magnitude
of these violations can reach impressive levels through the Internet.
Nowadays, security is no longer just an issue in the real world: it is a virtual matter as well. Therefore,
trying to be on the safe side today also means having a good firewall, a strong program to detect viruses,
avoid answering messages from unknown senders or sharing sensitive information on unprotected
channels, and so on.
As it turns out, the likelihood of suffering from a real crime, like being robbed in the street, is actually
smaller than the possibility of suffering a virtual crime, such as an on-line identity theft or a credit card
fraud. Committing cybercrimes is much more profitable, significantly less risky and strictly linked to market
logic and trends. Moreover, many of them no longer require a high level of expertise or sophisticated
techniques.
Internet abuses may originate anywhere in the world, no matter where the target happens to be. How
we defend ourselves from crime has changed, but we should consider that organized crime is becoming
faster and more aggressive in exploiting new technologies and in sharing their know-how with the hacker
community.
However, none of us can deny that the impressive changes that information technology has brought
to our societies have also allowed for the development of countries and democracies, and for the
improvement of people’s life standards.
According to the International Telecommunication Union (ITU), in 2009 an estimated 26 percent of the
world’s population (or 1.7 billion people) were using Internet. This means that one out of four persons
Freedom from Fear
www.freedomfromfearmagazine.org
2 FREEDOM FROM FEAR - July 2010
has opened a window to the rest of the world: they can avail themselves of the amazing opportunities
offered by the Internet, but, at the same time, they can also become a victim of cybercrime.
We can now exchange data, information and know-how from one side of the world to another in just
a few seconds. The accessibility of information combined with the fact that all aspects of our life are
electronically stored are the two aspects that contribute to our socio-economic development, our
possibility to enjoy the freedom of a world simultaneously connected to us, but also to our vulnerability
to cybercrime. The Internet breakthrough and its widespread accessibility are the technical factors
that have allowed the emergence of cybercrime: phishing, pharming, credit card fraud, identity theft,
computer espionage, hacking, the elaboration and diffusion of viruses and worms, just to mention a few,
are now part of our common dictionary.
Think about it. One of the articles here included mentions that, considering 1995 as “year 0” (the last
year before the Internet boom erupted in many countries), Interpol knew of only 4,000 child abuse
images; today it totals around 1,000,000, and the number of children abused to make them runs in the
tens of thousands. And this is but one of the many facets of crime in the Internet Era. A bot herder can
remotely control thousands of victim computers at once, including yours, and launch a systematic and
widespread attack with just the click of a mouse. The UN estimates that identity theft alone can account
for around 1.5 million victims, with an estimated annual value of 1 billion USD.
Furthermore, we are speaking about a world that right now is still only partially connected. Africa: is
going to be the latest Internet-connected continent, also thanks to the recent FIFA World Cup, which this
year has doubled the continent’s Internet links capacities. In a region where the hardware platforms and
the operating systems are outdated, security issues, mass-worms and botnets could spread through
Africa. This could mean a new wave of targeted attacks that may have a serious impact on African
financial institutions and national critical infrastructures, such as oil and gas pipelines.
In this landscape, cybercrime represents a real challenge to governments’ security: militaries have
been working for years on issues like cyber espionage and cyber war scenarios, just to mention few.
Let’s imagine the consequences of a cyber attack to a crucial infrastructure: the outbreaks of violence,
looting, plunder and destruction that occurred during the 1977 blackout in New York would fade in
comparison.
From the evolution of cybercrimes, to terrorist use of information technology, to the main offences
committed through the Internet, this issue of the Magazine aims to improve our knowledge of phenomena
that could potentially affect or are already having an effect on each of us: cybercrime. This issue includes
several perspectives on cybercrimes and suggestions to reduce our vulnerability and on how to prevent
them.
The fight against cybercrime is not a journey towards the unknown (although it is almost impossible to
identify the offenders): it is actually a matter of creating a collective strategy to avoid criminals from taking
advantage of the weakest links of the chain (lack of legislation, of technical expertise and statistics, poor
coordination across borders and sectors) and to exploit to its utmost the global market opportunities
driven by new technologies.
The world we know today is not capable of surviving a collapse of the system of information technology.
But, on the other side of the coin, our increased vulnerability should not be neglected.
Doris Buddenberg
UNICRI Officer-in-Charge
1FREEDOM FROM FEAR - July 2010
Contents2 That Was then, This Is Now:
A Concise Look Back on the Hacker Subculture
Ioan Landry
4 Hackers Profiling: Who Are the Attackers?
Raoul Chiesa
5 Interview with a Hacker: Chronicles of a Black Hat
Interview conducted by Raoul Chiesa
8 The State of Cybercrimes
Levi Gundert
16 Cyber Crime and Organized Crime
Tatiana Tropina
18 Terrorist Use of the Internet and Legal Response
Marco Gercke, Daniel Thelesklaf
22 Defending Quality of Life through
Critical Infrastructure Protection
Marco Carbonelli, Luisa Franchina, Laura Gratta,
Fabio Guasconi, Daniele Perucchini
26 Online Crimes against Children
John Carr
32 Avoid Becoming a Victim of Cybercrime
Scot Huntsberry
35
From Encryption to Failure of Traditional Investigation
Instruments: the Challenges of Fighting Cybercrime
Marco Gercke
38
Global Cybersecurity Agenda
ITU (International Telecommunication Union)
43
The Internet: Anonymous Forever
Bruce Schneier
46
Privacy vs. Security? A Dilemma of the Digital Era
Giuseppe Vaciago
49
Cyberwar: Myth or Reality?
Bruce Schneier
52
Crime and Policing in Virtual Worlds:
On the Ever-Evolving Nature of Cybercrime
Marc Goodman
Estimating and Interpreting the Prevalence of E-fraud
across the World29
Jan Van Dijk
Editorial board
UNICRI
Doris Buddenberg
Kristiina Kangaspunta
Amaury Aubrée-Dauchez
Marina Mazzini
Max-Planck Institute
Hans-Joerg Albrecht
Ulrike Auerbach
Michael Kilchling
Basel Institute
on Governance
Daniel Thelesklaf
Editorial team
Olivia Jung
Fatima Zahra Habib Eddine
Proofreading & translation
Olivia Jung
Graphics and layout
Manuela Flamini
70 On the International Agenda
72 Challenging Ideas for Challenging Times
Columns
68 Humankind’s: Suffering is Not Something One
Can Get Used to
Laura Boldrini - Op-ed
In the Spotlight
64 The New Convergence between International
Criminal Law, Nuclear Non-Proliferation
and Maritime Security
Stefano Betti
Insight
60 Cybernetics and Law
Javier Livas
Focus on
66 Reporting in Times of War
Francesca Caferri
Close up
2 FREEDOM FROM FEAR - July 2010
T
here is no argument that since the Internet’s widespread commercialization roughly twenty years ago, it
has exponentially improved, automated and streamlined much of our lifestyle with every passing year. The
advantages of living in a wired (or, wireless) world are apparent, but not without risks: the media is rife with
speculation on hackers and every week a new phishing ring is busted or a massive data breach is reported. But
who are these much-maligned hackers, and where do they come from?
The Hacker Profiling Project has successfully identified the generations of the hacker subculture, but we are going
to focus here on the tentative links between criminal or “cybercriminal” links to this world. An understanding of
what is unique or overlapping in each of them is crucial to understand where we are headed, and why criminal
elements are going digital.
The first generation of hacking - comprising the 1960 all the way to the 1980s - was very much academic, with
students at universities putting together various programs for the new mainframes being installed on campus, as
well as early forays into the telephony system. The ethics of this era focused on shared ownership of data and
information, as well as promoting the contribution of all those involved in the hacker culture.
The second “hacker era” characterizing the early ‘80s, was driven by curiosity, and the motivation to hack
into external targets was often driven by the scarcity of technology: the mainframes and the unique operating
systems running on them would cost vast sums of money and technology was not yet a common utility: even a
PC was beyond reach for many, and dialling into modems half-way across the globe could result in exorbitant
monthly phone bills.
The next wave of hacking covers a larger timeframe - from 1985 until the mid to late ‘90s - and was a very active
period, especially with the commoditization of the Internet in the later half. This was an extremely prolific period
for the culture and many “hacker periodicals,” such as 2600 (1984) and Phrack (1985), began their publication
in these years. The motives of hackers from this era were as eclectic as their geographical distribution and
background, but even in this period there were very few economically motivated black-hat-hackers. Interestingly,
the diffusion of “crimeware” and increases in frauds both rose as the ‘90s progressed, leading us to the next era
of hacking.
The current wave of hacking is just as convoluted as the previous, but it is marked by a worrying trend: the
monetization of hacking. In the past couple of decades, there has been a shift from hobbyist hacking primarily
driven by ego and “the thrill of the chase” to malicious and financially motivated crime conducted over the
Internet. One only needs to research the stark contrast between the early hacker crew known as L0pht Heavy
Industries (1992-2000) and the recent cases of the Russian Business Network (RBN), Innovative Marketing
Ukraine, or the Shadowcrew fraudster forums (2002-2004) to see the devolution of ethics and ideals in the
hacker subculture.
The “infiltration” or usurpation of hobbyist hacking by outright criminal elements is a relatively recent phenomenon,
but one all too natural given the open-nature and naivety of the subculture, as well as the adoption en masse of
the Internet for key sectors such as finance or the management of PII (Personally Identifiable Information). In fact,
some early hackers were prophetic enough to predict a hijacking of their beloved lifestyle by organized crime or
loosely affiliated criminal bands.
But when did we reach the threshold or boiling point, which led to the rise in financially motivated attacks
launched over the Internet? It is difficult to say exactly when online criminals organized themselves for profit-
driven attacks, but we began spotting large-scale attacks against financial institutions and gambling websites
just before the turn of the Millennium. Not coincidentally, this is also the same period when so-called “crimeware”
became marketable among the cybercriminal underground. These kits are sold to aspiring black-hats to automate
and streamline their criminal operations, allowing them to work with corporate-like efficiency.
That Was Then, This Is Now
a Concise Look Back on the Hacker Subculture
* Ioan Landry
3FREEDOM FROM FEAR - July 2010
The purpose of distinguishing between the modes and motives of hackers throughout the years is not to
whitewash the second and third abovementioned waves of hacking as purely innocent or without consequence:
crimes were in fact being committed, and even as early as 1991 there were cases of individuals peripherally
related to the then-booming hacker scene being investigated and arrested for toll fraud or “carding” (using stolen
credit card information to purchase items or services). However, even a cursory glance at the literature and
archived timelines of those days would show us that the majority of the players involved tended to be uniform in
their disdain of the outright criminal elements in their midst, such as virus writers and carders.
However, even today the monetization of hacking is being pursued by small, flexible and tight-knit criminal
bands which, despite their size, have a considerable impact on the online ecosphere: an Anti-Phishing Working
Group report states that 66% of all phishing attacks in the second half of 2009 were perpetrated by a single
group known as “Avalanche.” The only good news one could possibly extrapolate from this statistic would be
that the skilled criminal groups operating online are perhaps less numerous than previously anticipated, but, as
always, there is no lack of “script kiddies” and newcomers to the “underground economy” waiting for their turn
at the table.
And where are the black-hat hackers going now? Wherever the money is. It is no secret that since the dawn
of civilization criminals have sought out the “low-hanging fruit,” and we have already seen them shift away
from targeted attacks on financial institutions or e-commerce with server-side attacks, to phishing scams and
particularly virulent blended threats targeting end-users and consumers who don’t have the luxury of an annual
security budget ranging in the millions of dollars.
We speculate that the prime target will remain the end-user for the near future, with an increase in sophisticated
XSS (Cross-Site Scripting) attacks targeting social networking sites and a constant focus on subverting the web
browser. An example of this, offering a glimpse of the next generation of phishing attacks, would be the devious
tabnabbing exploit: it subverts an open, idle and otherwise innocent browser tab to redirect itself to a hostile
page of the attacker’s choice once the user’s attention is elsewhere, fooling the user into providing sensitive data
in the fraudulent page (i.e. a spoof page of Gmail or Facebook asking for log-in and password).
As always, there is no technological or legislative “silver-bullet” solution to tackling the increase in cybercrime:
these criminals conducting online abuses and frauds have already shown their capacity to defeat IT security
measures, and an indifference to national or international laws focusing on them. As long as their activities
remain profitable the miscreants will continue, and as long as technology advances they will keep on adapting.
THEN NOW
L0pht Heavy Industries (1992-2000)
L0pht Heavy Industries was the original “hacker think tank.”
They initially supported themselves by selling used hardware
at local flea markets, offering UNIX shell accounts and
archives of files and texts. They eventually created the famous
password recovery suite “L0phtCrack,” and they offered their
skills as developers of secure code to the corporate sector.
The origin of the name, pronounced “loft,” most likely relates
to the fact that many members shared a common apartment
in Boston.
After years of unique contributions to the hacker subculture
(and years of barely breaking even), L0pht merged with
security firm @stake in 2000, which was subsequently
purchased by Symantec in 2004.
Russian Business Network (2006 - ?)
The RBN is, or was, based in Saint Petersburg (Russia) and
operated as a host or Internet Service Provider for illicit
services such as child pornography, malware distribution, etc.
Their 2006-2007 revenue is estimated at $150 million. Their
main areas of criminal activities include spam (estimated to
have been actively involved with up to 50% of worldwide
spam distribution at their height), malware, phishing scams
(estimated to have been behind up to 50% of phishing spams
throughout 2007), all the while providing hosting services for
other criminal activities, such as the dissemination of child
pornography, identity theft, credit card fraud, etc. The RBN is
alleged to have dispersed (but not suspended) its activities as
of 2008, due to increasing attention from international security
vendors, media, and law enforcement.
* Ioan Landry is a UNICRI consultant on cybercrimes.
4 FREEDOM FROM FEAR - July 2010
Hackers Profiling
Who Are the Attackers?
Who is attacking you? “We don’t know...”
When talking about attackers and hacking it often
happens that I ask people working at customer’s sites “who
is scaring you?” Most of the time the answer I hear is not
“Well, you know… I’m scared by script kids, playing with
those couple of unpatched machines I have,” nor is it “I’m
really scared about industrial spies.” Rather, 98% of the
time the answer is “I don’t know.”
These answers possibly mean that the company, feeling as a
potential target, has not developed a proper IT Security Risk
Analysis, while trying to figure out who may want to attack
its IT infrastructure and gain access to its information.
This mistake probably happens because every time people
hear “hackers profiling,” the word “profiling” automatically
makes them think about something that has already hap-
pened, rather than something that may happen.
The hacking world has changed dramatically in the last thir-
ty years, and the somehow “romantic” figure of the hacker of
the ‘80s is far from today’s.
At the very beginning, “hackers” were computer researchers
in places like MIT and Berkley; they wore long, white lab
coats and gloves while working in big aseptic data rooms.
* Raoul Chiesa
The hacking world has changed
dramatically in the last 30 years, and the
somehow “romantic” figure of the hacker
of the ‘80s is far from today’s
5FREEDOM FROM FEAR - July 2010
1. How you would define
yourself with respect to the
hacking activities you are
conducting?
I’m a Black Hat. This means that
hacking is my job and gives me
salary. I run black-ops for those
hiring me. I’m quite expensive.
2. How did you learn hacking
techniques?
Mainly at school. At the University
we also used to have a couple of
cybercafés at the very beginning
(around 1999-2000), which
is basically where most of us
started.
3. What led you to become a
hacker?
I’d say it was a mix of friends
and free time. I was a teenager
hanging out at that cybercafé
and... everything began there,
ya know. I was impressed by the
things those guys were doing,
I just fell in love with hacking...
it was that much easier to
accomplish goals, hacking into
servers, stealing information,
pictures... a lot of fun. Then I went
into other things, meaning money.
4. What were/are your aims?
Right now it’s just money. People
can hire me, I do the job, get the
money, and disappear.
5. Have your motivations for
hacking ever changed over
time?
I would say yes. At the very
beginning it was all about curiosity
and learning. Then I decided to
step forward into the real world,
where people pay you money
because they don’t know how to
play as I do.
6. Are you part of a group or do
you act alone?
I was initially part of a group. Then
some people left, others stayed,
although they lacked real skills;
in the meanwhile I grew up and
updated myself. That’s why right
now I’m working mainly alone. I may
buy 0day from some friends, but I
prefer to run all jobs alone.
7. What criminal offenses
have you committed with a
computer?
I guess they would include gaining
unauthorized access to computer
systems and networks; stealing
accounts, personal information,
and selling them out. And I guess
also industrial espionage and
money laundering.
8. Have you ever been arrested
or convicted for computer
crimes?
No.
9. Have laws and penalties
against cybercrimes had a
deterrent effect on you?
Sort of... but I’ve decided to take
the risk.
10. Have technical difficulties
encountered when penetrating
a system represented a
deterrent or a challenge?
They are basically a challenge.
Whenever the target can’t be
hacked well... ya know, there’s
plenty of other targets out there :)
11. What is your main
aspiration?
Stop working in 2 or 3 years,
retiring, giving money to my
family, buy my own house.
12. Can you describe the impact
and results of the hacking
activities you have conducted?
I don’t understand the question.
13. Have you aver considered
the negative effects of your
hacking activities on people?
Are you talking about identity theft
and this kind of things? Yes I did
consider the effects, but... it’s not my
fault if the victim is an idiot, I’m sorry.
Interview conducted by Raoul Chiesa in
coordination with the UNICRI Management
and External Relations team.
INTERVIEW WITH A HACKER
Chronicles of a Black Hat
6 FREEDOM FROM FEAR - July 2010
Hacking used to mean “building something” while thinking
outside the box, in a different manner, applying new views
and problem-solving approaches.
The reason why the hacking phenomenon spread at the begin-
ning of the ‘80s is simple: because of the business. Companies
went on the market with the very first home computers, mod-
els like Commodore VIC-20 and C-64 or Sinclair ZX-Spec-
trum, and with the grandparents of today’s Internet routers,
the “modems,” running as slow as 300 baud-bits per second!
It was the beginning of the second hacker’s generation, and
the most known to the public too. It is not by chance that
the general cliché image of a hacker that most people have
in mind is that of a teenager, sitting at his desk in his room,
typing at the keyboard of his PC, sending commands to the
other side of the world... In reality, those kids who were hack-
ing in the ‘80s are probably your IT Security Managers today,
and the world of hacking has been replenished with differ-
ent players. Most of these new players may attack the same
targets, but their motivations and goals will probably differ
from each others, and substantially so.
Applying the same approach used above, when analyzing the
digital evidences left from the attacker on a computer system
(meaning, while running a Digital Forensics analysis) we may
ask ourselves what the overall goals of the attacker were and
why he/she would run that kind of attack on our machine.
The Hackers Profiling Project (HPP) started in 2004 at
UNICRI to answer these and many other questions.
And, even if we do not have all the answers yet (since the
project is still on-going), we can nonetheless surely address
the question raised above: who are the attackers?
As a matter of fact, the HPP research team has been able to
identify nine different main categories of attackers. We use
the word “attacker” and not “hacker” simply because the
evolution of the hacking world and of cybercrime itself has
merged together different actors, who do not always belong
to the category of “hackers” in a strict sense, at least as we
were used to know.
The 9 main attacker categories
Wannabe (Lamer)
The “wannabe,” often labelled a “lamer,” is the “I would love
to be a hacker” kind. They use hacker techniques without
neither knowing nor having the curiosity to learn how they
actually function. They use “hacker toolkits,” which can be
downloaded for free from Internet; these toolkits automate
processes otherwise made manually and in a “creative” way
by more experienced hackers (and that often include mis-
takes and backdoors). They post a huge amount of messages
on forums and BBSs (Bulletin Board Systems), asking other
hackers to teach them how to become a real hacker. They
want to learn to be hacker without really being one, and of-
ten their actions result in huge damages to some computer
system or network.
Script kiddie
The “script kid” term stands for “the boy from the scripts,”
meaning those hackers relaying on UNIX/Linux shell scripts
written by others. They lack technical skills and sophistication,
and the ones least capable are called “point-and-clickers,” since
their attacks are called “point-and-click attacks.” They are in-
terested only in the result and not in learning how computer
and hacking techniques work. They simply download from In-
ternet (or from the “crews” they belong to) software and hacker
tools, and follow the related instructions. A very good example
of this profile was “Mafia Boy”, a 14 years-old kid arrested on
Montreal, Canada, after running DDoS (Distributed Denial-of-
Service) attacks to e-Bay, Amazon, Yahoo! back in 2000.
Cracker
The term “cracker” was created around the beginning of the
‘90s, when the hacker community wanted to somehow dif-
ferentiate the malicious (or lame) actions highlighted by the
media, from the serious hacker research done by many un-
derground groups such as CCC, L0pht, THC and so on.
Generally speaking, crackers have good technical skills,
which allow them to pursue their purposes; in the last years,
nevertheless, due to the different players in the cybercrime
arena (particularly when referring to skimming and phishing
activities), we have also found crackers with poor or aver-
age technical background and field skills. Note also that they
are different from the so called “software crackers” who crack
software protection to reproduce it illegally (a.k.a. software
cracking): this was something very in vogue back in the ‘90s,
and it is still employed in many Asian and African countries.
Ethical Hacker
“Ethical hacker” is not just a term, but it designates an en-
tire debate both in the underground community and in the
information security market. An ethical hacker is somebody
with excellent hacking skills, whose “past life” may have been
with the bad or with the good guys, who decides to help the
community, digging with software and discovering bugs and
mistakes in widely (or poorly) used IT infrastructures (i.e.
social networks), protocols or applications.
They are creative hackers, since they try not to use software
created by others and they prefer creating it by themselves
(scripts, exploits and/or 0-days) or improving it when there
are no useful programmes for their attacks. They would pre-
fer a manual attack rather than an automated one, and this is
something to carefully note and a rule to apply to your IDS (In-
trusion Detection System)! Ethical hackers are also highly so-
phisticated and specialised in different operating systems, net-
works and attack techniques: this means they can range from
Sun Solaris, HP/UX or OpenVMS to Microsoft Windows.
The Hackers Profiling Project (HPP) started
in 2004 at UNICRI to answer these and
many other questions
7FREEDOM FROM FEAR - July 2010
QPS (Quiet, Paranoid, Skilled Hacker)
If this type of attacker are on a system, and if they have just a
remote feeling that they may be caught, they will disappear.
This kind of hackers attack IT systems not because they are
looking for information, but perhaps because they just love
that particular release of HP/UX that one is running, or loves
a SS7 backbone.
The QPS are creative hackers, using as little as possible soft-
ware made by others, since they prefer creating them by them-
selves. They are similar to Ethical hackers on a lot of issues.
Cyber-warrior/Mercenary
This is one of those categories that appeared in the last few
years because of Internet’s globalization and of the “hacktiv-
ism” phenomenon. Cyber-warriors feel like heroes from their
own environment (i.e. an extremist group with political or
religious background). Their skills may vary substantially,
from basic ones of a script kid to good or excellent ones, espe-
cially when specialized on focused areas (i.e. DDoS, or Web
Defacing, or Wi-Fi).
Not being “exposed” in the business environment like the
Industrial Spy profile, the Mercenary hacker works on com-
mission, getting money to attack specific targets. A lot of the
well-known Russian mobs (such as the RBN, the Russian
Business Network) use this kind of elements to support their
illegal activities
Industrial Spy Hacker
The practice of industrial espionage had existed as long as
business itself, infiltrating spies in companies throughout
the years, and walking out of them with information stored
on paper files, microfilms, floppy disks, cd-roms and, today,
USB keys or emails.
Nevertheless, the recent scandals of industrial espionage that
have emerged in the last years surely involve Industrial Spy
Hackers, which modernized this practice taking advantage of
the new opportunities brought in by Information technology.
Government Agent Hacker
Nowadays the existing information technology and the gran-
ularity itself of information allow external attackers from
governments to run highly-sophisticated attacks, specifically
focused towards nations’ know-how in different business
markets.
Military Hacker
When the HPP research team introduced this kind of profile
back in 2004, the reactions we received were doubtful: it ap-
peared we had gone “too far.” Unfortunately, history seems
to confirm our assumptions, given the latest waves of “infor-
mation warfare” highlighted in the newspapers from all over
the world.
This profile is also often associated with the term “state-
sponsored attack,” which effectively represents the logic and
the approach behind those attacks run by Military hackers.
Conclusions
While this list of profiles is not to be considered a complete
one or a golden rule to follow blindly, it is nevertheless a
very good first step. In order to apply it to your own com-
pany or institution’s environment, keep these profiles in
mind when trying to figure out the W4s: Who, Where, Why,
When. As for the “How,” refer to the Honeynet Project, an
excellent program created by Lance Spitzner (www.honey-
net.org) to figure out how malicious hackers act. But that’s
another story.
* Raoul Chiesa, UNICRI Senior Advisor, Strategic Alliances &
Cybercrime Issues.
Profiling Hackers: The Science of Criminal
Profiling as Applied to the World of Hacking
(2008)
by Raoul Chiesa,
Stefania Ducci,
Silvio Ciappi
Profiling Hackers is
an exploration of an
underground world
where people “next-
door” try to prove
their invincibility
and power by test-
ing their intelligence
through cyber-
space, and where
curiosity fits together with profitable motiva-
tions, in a world often criticised and criminal-
ised but apparently not sufficiently understood.
Constantly interested in Emerging Crimes and
actively involved in Cybercrime, UNICRI col-
laborated with Raoul Chiesa, Stefania Ducci
and Silvio Ciappi to produce a work with the
purpose of serving as a trustworthy reference
on this issue in the long run.
UNICRI editorial review
In order to apply it to your own company
or institution’s environment, keep these
profiles in mind when trying to figure out
the W4s: Who, Where, Why, When
8 FREEDOM FROM FEAR - July 2010
Your computer may be “pwned.”1
While you’re reading
this article a miscreant might be virtually peering over
your shoulder, or worse. Then again, perhaps you follow best
practices for securing your computer: you patch your operat-
ing system, you maintain a current anti-virus software sub-
scription, and your Web surfing habits are fastidiously cau-
tious. Unfortunately your computer may still be pwned.
Depending on whom you ask, approximately 1.8 billion peo-
ple are connected to the Internet.2
Team Cymru3
conserva-
tively estimates that over 5 million unique computers are
compromised at any given time. In dispensing with the FUD
(Fear, Uncertainty, and Doubt) that often plagues the cyber
security industry, the realistic global compromise rate is ap-
proximately 0.003%. An issue that plagues less than 1%4
of
the world’s computers may not appear to be an issue at all,
but context is everything. When a new worm begins spread-
ing, the cost of repairing millions of computers and interrup-
tions to business can be staggering. When bank accounts are
drained and e-mail accounts compromised, the victim is of-
ten left feeling helpless. When mothers are social engineered
out of their life savings by a faceless criminal thousands of
miles away, all of a sudden the impact of technology used for
malevolent purposes becomes important. When a network
responsible for processing 100 million debit/credit cards
daily is breached, or the control systems for a city’s electric
grid are disabled the fallout is beyond unpleasant.
Over the past decade cybercrime has continuously evolved,
motivated by profit, ideology, and nationalism.5
The Internet
has enabled criminals to ply their trade in new and innova-
tive ways. The physical elements of crime have been replaced
by digital trails that are becoming increasingly difficult for
law enforcement to follow. Attribution for cybercrime is rare,
and prosecution is even rarer. Yet, the fight continues as in-
vestigators work harder toward criminal attribution. In this
article, Team Cymru explores the nuances of today’s most
insidious cybercrimes.
The State of Cybercrimes
* Levi Gundert
9FREEDOM FROM FEAR - July 2010
The term “Underground Economy” has
historically been used to denote business
that occurs outside of regulatory
channels. Around the turn of the 21st
century, Team Cymru adapted the term
to the cyber locations and individuals
who buy, sell, and trade criminal goods
and services. Today the Underground
Economy can be found in IRC6
networks,
HTTP forums (web boards), various
Instant Messaging services, and any
other communications platform that lends
itself to anonymous collaboration.
Today, the publicly available
Underground Economy is a shell of its
former self. The undercover operations
targeting and subsequently arresting
criminals involved in web forums like
Shadow Crew,7
Carders Market,8
and
Dark Market9
have pushed the fraud
trade further underground.
The Underground Economy is comprised
of criminals who typically specialize in
a specific criminal commodity. A few
of the more common commodities
include credit/debit cards, personal
identities, hacked servers, hacked
network equipment, malware (malicious
code), Internet vulnerability scanners,
e-mail spam lists, fictitious identification
documents, and fraudulent money
movement services.
Like any economy, this one involves
various strata of criminal proficiency
and experience. Participation in the
Underground Economy requires
only minimal technical ability, and
many criminals’ strategy is to defraud
other criminals. The higher levels of
the Underground Economy involve
technically talented actors who work
with other criminals through private
communication methods often involving
encryption. The public criminal market
place is contracting, but the criminal
activity itself is increasing in both volume
and sophistication.
The Underground Economy
One of the latest trends in cybercrime
profiteering involves “scareware,” also
known as fake anti-virus software. The
scam is maximized during a global event,
such as the recent earthquake in Haiti.
Criminals understand that a large event
such as Haiti creates millions of queries
on popular search engines like Google.
Savvy criminals research key words
linked to the event in question and then
use those terms to create a new website
that is pushed to Google for indexing.
Often within hours of an event occurring
(Michael Jackson’s death was another
of these large global events), the newly
created website appears in Google’s
top 10 page rankings. Now millions of
people may be visiting this newly created
website in search of information related
to the global event in question. Once the
public accesses the website, a message
is displayed informing the user that his/her
computer is infected with malicious code.
The webpage encourages the user to
download an application that will clean the
current infection and also locate additional
malicious code that may be residing
on the victim’s computer. Before this
theoretical activity occurs, the program
solicits credit card information. Typically
the price for this scareware is twice what
legitimate anti-virus companies charge
for their product. The victim’s credit card
is then charged and the user is left with
a piece of software that is deliberately
spurious at worst, and marginally
legitimate at best. Either way, the victim is
scared into believing a threat exists and
the fraudster’s software package is the
only way to resolve the issue.
Scareware/“Fake Anti-Virus”
Criminals understand that
a large event such as Haiti
creates millions of queries
on popular search engines
like Google
The Underground Economy
is comprised of criminals
who typically specialize in a
specific criminal commodity
10 FREEDOM FROM FEAR - July 2010
Phishing
Phishing is the digital representation
of social engineering tactics. The ploy
involves tricking Internet users into
providing confidential information,
believing that the website requesting the
information is legitimate. In fact, these
Phishing sites are cleverly designed
forgeries. The sophistication of these
attacks continues to increase and the
line between malware and phishing is
blurring.
One of the largest criminal platforms for
phishing and spam has been labelled
by anti-virus software companies as
“Avalanche.” It is believed that Avalanche
is operated by a group of miscreants
who run their criminal enterprise like any
legitimate software company. Avalanche
uses a technology that is specifically
known in the security community as a
“fast flux botnet.” The botnet is large
and compromised of geographically
diverse “zombies” (infected computers).
The botnet also possesses powerful
functionality (known as “fast flux”) that
allows phishing websites to avoid take
down efforts much longer by constantly
migrating the website’s address to a
different zombie in the botnet. The
Avalanche owners generate revenue
by leasing their expansive botnet
platform to criminal customers for a
wide array of wickedness. The flexibility
of this particular botnet ensures owner
attribution efforts are especially difficult.
Phishing has given birth to Pharming and
Smishing.
Pharming typically involves changing the
internal settings on a victim’s computer
thereby bypassing a victim’s legitimate
address query functionality. For example,
a victim may open a web browser and
request hsbc.com. The website loads
and while the page appears to be hsbc.
com, it is in fact a Phishing site. The user
is seamlessly delivered to a spurious
website because the victim computer’s
internal settings were changed to redirect
specific website requests to malicious
websites that appear legitimate.
Smishing is Phishing across mobile phones. Smishing involves
spamming SMS (mobile phone text messages) messages to a
large pool of mobile phone numbers with a social engineering
message and a corresponding website link to visit. Fortunately
consumers appear to be much more wary of unknown mobile
phone message senders vs. unknown e-mail senders. If mobile
phone identity becomes a future challenge, then Smishing will
become more interesting to criminals.
Banks protect their customers by campaigning to have phishing
sites disconnected from the Internet as soon as the site is
detected. Typically a bank will petition a website hosting
provider to take down a phishing site within four hours of
detection.
Phishing is the digital
representation of social
engineering tactics
11FREEDOM FROM FEAR - July 2010
Cybercrime and Fraud
Recently the author of this article
was on a trip to Chicago when he
was notified that his credit card was
used in Philadelphia. The spurious
credit card was presented in person to
purchase physical goods. The thieves
had managed to capture the data
contained on the credit card’s magnetic
stripe before replicating the data to
the magnetic stripe of a blank “white
plastic” card. The swiftness between card
compromise and physical exploitation
was amazing. Unfortunately this scene
occurs daily all over the world.10
A credit
card compromised in Britain, may be
used within 24 hours in India. Criminals
involved in physical world fraud are
constantly leveraging technology to
increase their profits.
Victim debit/credit cards can be used or
sold as “cvv” or “dumps.” The criminal
colloquial “cvv” represents the data
embossed on the front of a card such as
name, card number, expiration date, and
the 3-digit security code printed on the
rear of the card. “Dumps” describe the
track1 and/or track 2 data encoded to the
card’s magnetic stripe. A criminal is able
to monetize “cvv” through online or phone
purchases of legitimate goods. “Dumps”
are monetized through duplication
of the physical card and subsequent
purchases of goods in person. Typically
criminals resell the fraudulently obtained
merchandise on auction type websites for
competitive prices.
Stolen credit/debit card details remain
especially lucrative for criminals. When
PIN numbers can be tangentially obtained
with a victim’s card details, criminals
will monetize cash very quickly at ATM
locations.
Team Cymru has observed groups
of criminals operating in disparate
geographic locations to maximize
profit. Attacks on ATMs have been well
coordinated, as have groups buying
physical goods. Criminal groups can
compromise and monetize their own
credit cards, but typically criminals seek
to purchase credit cards details from
quality suppliers. The lure of easy profits
creates a constant demand for quality
dumps.
The source of stolen cards continues to
originate through two primary methods:
skimmers and network breaches. A
hardware skimmer is a device placed
over a card port on an ATM or gas pump.
The skimmer is designed to capture the
data on the card’s magnetic strip as it
is inserted for payment or to withdraw
cash. This physical attack on the card
previously required a criminal to retrieve
the skimmer in order to download the
captured data. Today, most skimmers
sold in the Underground Economy
are equipped with GSM or Bluetooth
functionality thereby allowing criminals
to remotely retrieve the stolen data and
reduce the risk of capture. Generally
these skimmers are equipped with
enough memory to store a few hundred
credit card numbers. Additionally,
skimmers are sold to specifically match
the manufacturer and model of ATM
being targeted. Since ATM manufacturers
publicly release new bank contracts,
criminals are able to plan skimmer
placement before new ATMs are even
installed.
A soft skimmer is a device placed on a
POTS (Plain Old Telephone Service)
circuit in order to intercept the data in
transit. Stand-alone ATMs in convenience
stores or hotel lobbies may rely on
modems for communication with a
merchant network. After recording the
tones on these phone lines, criminals use
widely available software to convert the
tones to digital data, specifically credit
card numbers. Skimmers continue to be a
threat to consumers in countries that rely
on magnetic stripe cards.
Unauthorized access to computers and
networks containing credit card track
data has proven especially disastrous
for merchants and banks. The breaches
of Heartland Payment Systems,11
RBS
WorldPay,12
and TJX13
illustrate the
determination of criminals to find and
secure large databases of credit card
track data. In the past, Point of Sale
(POS) terminals used in retail outlets
were exploited through vulnerabilities
in the underlying operating system that
these terminals use. Failure to patch
the operating system has led to remote
exploitation via freely available hacker
tools. Data exfiltration has occurred
for months before the merchant
discovered or was alerted to the tainted
POS terminal. Criminals continue to
aggressively hunt for large amounts of
card track data either in storage or in
transit. Once a target is identified, the
compromise is only a matter of time and
resources. Today, financial databases
and networks continue to fall victim to
the most motivated and talented hackers.
Previously, compromises have existed
for over a year before the breach was
discovered. The purveyors of this data
will quickly become rich, as will the
end users who purchase the data for
coordinated exploitation.
The payment card industry (PCI) is in
the final stages of implementing an
updated version of the Data Security
Standard (DSS).14
DSS is a collection
of policies and procedures designed to
establish a best practices document for
organizations involved in transferring or
storing payment card details. While DSS
is absolutely necessary and obligatory for
merchants, it merely acts as a stopgap
for an outdated magnetic stripe card
technology. Multiple European countries
have fully implemented EMV (also known
as “Chip + PIN”), which has significantly
reduced the criminal demand for “chipped
cards” in these respective countries.
In this framework, debit/credit cards store
data on an encrypted chip embedded
in the card. While the implementation
of the technical EMV specification may
be different at various banks, overall
the adoption has been very successful
from a fraud perspective. Unfortunately
this evolution has increased demand
for monetization schemes in countries
that do not use EMV. A global bank
movement to the EMV standard would
significantly raise the bar on criminals
specializing in this trade. In the realm
of “Card Not Present” fraud (telephone
and Internet purchases), Visa and
MasterCard implemented “Verified by
Visa” and “SecureCode” respectively,
which require an additional password
before a transaction is successfully
completed. Unfortunately, a substantial
number of “cvv” sold in the Underground
Economy today are accompanied by
the corresponding Verified by Visa or
SecureCode password. This is the result
of criminals slightly modifying Phishing
and malware attacks.
The source of stolen cards
continues to originate
through two primary
methods: skimmers and
network breaches
12 FREEDOM FROM FEAR - July 2010
13FREEDOM FROM FEAR - July 2010
Malware
EMV also acts as a specification for secure
online banking. Securing online banking
access via a username and password
in concert with security questions is a
failed model. The financial services sector
obviously defines failure on an annual
rolling metric basis, but consumers and
businesses feel the failure effects daily.
Multi-factor authentication is a security term
used to describe authentication procedures
that require additional criteria be validated
before access is granted. This usually
means producing something you have in
your possession in concert with something
you know like a password or PIN.
Multi-factor authentication certainly
increases the difficultly of bank account
compromise, but in its current form it is far
from a solution for preventing fraud. Most
two-factor deployments involve a hardware
“token” issued by a bank to a customer.
The digits displayed on the token change
at regular time intervals. These digits are
required in tandem with a customer’s
password in order to successfully
authenticate online.
The criminal response to two-factor
authentication has been a continual
stream of malicious code (also known as
“malware”). Some of the more malevolent
malware families are labelled by anti-virus
software companies as “Sinowal,” Zeus,”
“Silent Banker Trojan,” etc. The malware
itself is programmed to execute clever
functions while remaining as undetectable
on the victim’s computer as possible. The
malware typically turns off any anti-virus
software present on the computer and
then silently waits. It waits for the victim to
open a web browser and login into their
bank or other financial account(s). The
malware then typically conducts a “Man
in the Middle”15
or “Man in the Browser”16
attack. Skipping the technical minutiae, the
malware is capable of initiating an account
transfer that looks legitimate to the victim’s
financial institution as well as manipulating
returning data in the webpage to hide the
fraudulent activity from the user. Both sides
of the transaction are unaware of the digital
thievery occurring in real time. Additionally,
different malware families are able to
extend the authenticated online banking
session even after the victim believes
they logged off or closed their browser.
Regardless of the two-factor authentication
banks are currently employing, malware
authors continue to devise clever
countermeasures. The technical arms race
has no apparent end in sight.
The current situation is particularly harmful
to small businesses and financial accounts
that are not rigorously checked17
by
their owner(s). Criminals are performing
online reconnaissance about specific
businesses that appear to lack sufficient
information security safeguards. Once a
target is identified, malware placement is
strategized, and then unauthorized bank
account transfers or international wires
begin occurring daily.
Of course online banking interception is
only one small facet of modern malware.
Today, the functionality embedded in
malicious code is as diverse as the criminal
population who utilizes it. Victim computers
may be participating in spamming, DDoS18
(Distributed Denial of Service) attacks,
proxy points for cyber criminals, data theft,
extortion (via encrypting the victim’s hard
drive), key logging, advertising, and more.
As Internet users’ habits evolve, malware
authors take notice and develop new
malicious features both for infection and
monetization.
Then again, malware’s objective is not always
revenue. Consider “Operation Aurora”19
and
the intended purpose of an apparent attack
on Google’s network for the purpose of
collecting data about human rights activists.
On the surface it certainly appears the attack
was not motivated by greed. Therein lies the
differentiator between malware: purpose.
Custom malware is typically only written
when the surfeit of available malware or
hacking tools will not suffice. Often, this is the
case where stealth is paramount, such as
in the case of “GhostNet,”20
which appeared
to be exfiltrating data from the Dalai Lama’s
network for over a year before anyone
discovered the breach.
Malware is a scourge upon the Internet,
and a particularly nasty subset of that
malware is botnets. A botnet is a
collection of infected computers (also
known as “zombies”) that are typically
centrally controlled by a remote entity.
Ten years ago a bot was a piece of code
that automated some activity, typically in
Internet Relay Chat (IRC). Today, the term
bot usually implies a malicious persistent
connection from an infected computer to
a Command & Control (CnC) interface.21
This has created the problem of exporting
real criminal tools to the criminal masses
for a small fee. A handful of malware
authors create botnet code that is then sold
to the criminal public, typically for a few
hundred dollars. These “crimeware” kits
are delivered with meticulous instructions
for use and a scale of fees for updated
functionality and/or upgrades that prevent
anti-virus detection. In fact the escalating
game of cat and mouse between malware
authors and anti-virus companies has
become so extreme that over the past
five years Team Cymru has observed 30
million unique malware samples22
and a
very small percentage of those samples
are actually new pieces of computer code.
The difference represents the by-product
of polymorphism, encryption, and other
obfuscation techniques (known in the
security industry as “stubs”). Since anti-
virus companies largely depend on exact
signatures to identify malicious code and
malware authors create malware that
mutates (or is “packed” differently) every
time it runs, thus producing a completely
different signature for detection. Other
obfuscation techniques attempt to hide the
malicious code in a virtual shell (a stub)
and anti-virus software only scans the
benign shell.
Botnets are particularly sinister because
they exponentially increase a criminal’s
capabilities and malicious schemes. Instead
of infecting and controlling one victim’s
computer, a bot herder (an individual who
controls a botnet) is capable of centrally
controlling thousands, sometimes even
hundreds of thousands, of victim computers
at once. Presently, criminals who have no
technical ability can purchase a botnet and
further their criminality online. Regrettably,
the purveyors of these botnets are now
publicly advertising and marketing in
order to differentiate their product in the
market place. In Underground web forums
and Twitter feeds,23
botnet authors are
actively attempting to increase revenue
despite raising their risk profile with law
enforcement.
Given the geographic disparities between
victim’s computers, CnC nodes, and the
bot herder(s), law enforcement’s attribution
efforts are increasingly protracted and
frustrating affairs. Until national cybercrime
legislation enjoys global reciprocity,24
law enforcement’s efforts will continually
be stymied. The picture, however, is
not completely bleak. Law enforcement
continues to pursue malware/botnet cases
across international boundaries with
occasional success.25
Presently, the problem is in scope.
The current number of cyber-trained
investigators is a pittance in relation to the
number of criminals currently writing or
using malware. The other impediment to
quick criminal case disposition is the nature
of the Internet itself. Technologies like
TOR26
and VPN networks allow criminals
to move about the Internet anonymously.
Internet privacy is certainly a noble value
to support and uphold, but when law
enforcement is unable to acquire required
data in a timely fashion, cybercrime will
continue to increase because the risk/
reward equation is fundamentally skewed
in their favour.
The criminal response to
two-factor authentication
has been a continual stream
of malicious code (also
known as “malware”)
14 FREEDOM FROM FEAR - July 2010
The World Wide Web
A confluence of malevolence is affecting
the Web today. While “Web 2.0”
represents an exciting new structure
for ideas and opportunity, criminals are
mirroring the optimism. Websites like
Twitter and Facebook have become de
facto communication tools, and criminals
are leveraging the communication
streams with innovative schemes. The
trust models built into social media
networks allow criminals to commandeer
a victim’s account and subsequently
communicate with all of the victim’s
friends and associates. This equates to
a new infection vector for bot herders.
Additionally, groups specializing in
criminal money movement used to
create fictitious businesses online and
then post reshipping and bank funds
forwarding employment advertisements
on employment search websites. Now
these operations are migrating to
social networking sites to recruit those
desperate for work to participate in their
ever-expanding criminal operations.27
Additionally, new web application
vulnerabilities are announced almost
daily with corresponding “point and
click” exploit code28
and accompanied
by informative tutorial videos. Vulnerable
websites are easily found via Google or
other search engines by searching for
specific text combinations (also known as
“strings”). Once a vulnerable website is
identified, typically it then becomes a race
to steal sensitive data first.29
Hackers
understand that websites are increasingly
powered by databases containing
valuable data that could include customer
lists, e-mail addresses, personal
identifiers, credit/debit card data, etc. If a
hacker is able to establish unauthorized
communications with a database through
a web browser, then the entire integrity of
the website may be in jeopardy. Technical
labels for these attacks include SQL
Injection, Cross Site Scripting, Buffer
Overflows, Remote File Include, etc.
Many of the current web applications
in development use new frameworks
such as Rails and Django to simplify the
development process, and history has
shown that is it only a matter of time
before vulnerabilities are discovered in
even the newest frameworks. Miscreants
use freely available “friendly use” tools
to exploit vulnerable websites. Black-hat
hackers may hunt for new vulnerabilities
in web application source code to keep
for themselves, but eventually the new
information will trickle down to the
malicious masses.
Small business owners realize the need
for a web presence and e-commerce
solutions, but unfortunately security is
often an afterthought, if it is considered
at all. Web security also suffers because
of cost. Knowledgeable web penetration
testers are in demand and their services
are typically out of reach for a small
business. These professionals think like
hackers and hunt for insecure code and
configurations.
Speaking of infection vectors, do you
ever wonder how all of this malware
actually infects a victim’s computer in the
first place? Malicious e-mail attachments
were once the main threat that required
wariness, along with self propagating
worms that exploited unpatched
operating systems; and while those
threats still remain, by and large the
favourite infection vectors include “drive
by downloads,” Peer-to-Peer network file
distribution, and social network social
engineering.
Criminals discovered that it was
becoming increasing difficult to push
malware to victims so they decided to
post the malware in locations where
victims would naturally infect themselves
on the Web. By hacking popular websites
or incentivating visits to a lesser known
website that hosts malicious code,
criminals entice victims to download a
“component” or “control” that is required
for content functionality. Since many
Internet users are conditioned to click
through the successive dialogue boxes
on these types of prompts, the malware
installation occurs effortlessly.
When direct e-mails are the infection
vector of choice (known as “Spear
Phishing”), sophisticated actors will use
vulnerabilities in prolific applications such
as Adobe Acrobat.30
A PDF attachment
appears much more innocuous to the
end user than a zip or executable file.
Past attacks of this nature against US
government contractors31
have started
with the receipt of an e-mail from a free
web e-mail account like Gmail or Hotmail
where the sender’s name is that of a co-
worker or superior within the company.
This social engineering coupled with the
latest software vulnerability is effective
and difficult to prevent from a human
behaviour perspective.
Currently, social networks are being
used to spam malicious web links that
purport to originate from “friends,” when
in fact the link originates with the “friends
account.” Who is controlling that account
is the rub. A decade of cyber security
incidents has taught a level of mistrust for
content received from unknown entities.
When the content originates within an
established trust model, often times the
miscreants win.
Lastly, Peer-to-Peer networks can
quickly become hazardous if they are
used to locate and download pirated
media/software. Criminals routinely
insert malware into various Peer-to-
Peer networks mislabelled as frequently
requested content. Peer-to-Peer
networks can be especially disastrous
for business computers not only because
of the malicious files they are exposed
to, but also because of the information
shared on the computer with the rest of
the network.
The good news is that ISPs (Internet
Service Providers) are implementing
“walled gardens” in an effort to help
protect their customers. Working with
cyber security researchers, ISPs
integrate daily lists of known CnC servers
across the Internet. When a customer’s
computer is observed communicating
with a known CnC server, the computer
is “quarantined” from the larger network
and the customer is alerted. Once the
customer’s computer has been cleaned
of the malicious infection then the
computer is reconnected to the Internet.
This approach has proven effective
to minimize a customer’s potential
vulnerability after becoming infected.
A PDF attachment appears
much more innocuous to
the end user than a zip or
executable file
Peer-to-Peer networks can
be especially disastrous for
business computers
15FREEDOM FROM FEAR - July 2010
The future
While it is difficult to accurately predict the future cy-
ber threat landscape, Team Cymru believes the continued
adoption of smart phones represents an increasingly lu-
crative target for criminals. Mobile malware that creates
a “backdoor”32
or is able to perform “man in the applica-
tion” functions will be able to compromise33
victims’ mobile
banking activities. Additionally, maintaining secure code
in mobile phone applications will remain a challenge34
for
the companies providing the application storefronts such
as Google, RIM, and Apple. Since thousands of applica-
tions are submitted for approval on different mobile phone
platforms, storeowners must continue to rigorously check
each application’s code for maliciousness and ensure the
company in question authorizes the application being rep-
resented.
Conclusion
At one end of the spectrum, cybercrime appears to be in-
creasing in scope and complexity, but the vexing concern is
that decade old attacks still enjoy success. Well known vul-
nerabilities continue to exist on the Internet and informa-
tion security best practices are continually ignored. Informa-
tion assurance is still regarded as a niche field of study for
students and professionals who labour in back rooms. For-
tunately, large cybercrime events are garnering additional
publicity, and government policy makers are beginning to
appreciate the constant threat to governments, businesses,
and individuals constantly at risk of being victimized.
The issue is crime. Fundamentally we are discussing people
and their behaviours. Cybercrime is not a technical prob-
lem and technology will never solve crime regardless of
whether it occurs in the cyber realm or not. The incentives
must be removed. The risk of attribution for cybercrime
must increase through global legislative reciprocity and a
substantial increase in technical law enforcement staffing
and training.
The good news is that law enforcement is forging partner-
ships with the cyber security industry, researchers, and
academics that are on the front lines in the cybercrime
war. Often these individuals provide the keenest insights
into particular cybercrime groups and criminal cases. The
proactive partnerships are leading to noticeable arrests and
that is good for the world’s 1.8 billion Internet users who
hope their computer is not pwned.
* Levi Gundert is a Southern California native with a background
in business, technology, and security.
Mr. Gundert is a former Secret Service Agent who specialized in
economic and cyber crimes. He led multiple proactive cybercrime
initiatives within the Electronic Crimes Task Force which resulted in
world-wide arrests in cybercrimes.
Mr. Gundert currently supports Team Cymru’s business intelligence
group. He is a Certified Ethical Hacker (CEH), Systems Security
Certified Professional (SSCP), and Certified Information Systems
Security Professional (CISSP).
1	 “Pwned” is criminal parlance for the act of compromising a computer or
network device and gaining unauthorized access to the resources within.
The term is a derivation of “owned”.
2	 http://www.internetworldstats.com/stats.htm
3	 Team Cymru Research NFP is a specialized Internet security research
firm and 501(c)3 non-profit dedicated to making the Internet more
secure. By researching the ‘who’ and ‘why’ of malicious Internet activity
worldwide, Team Cymru helps organizations identify and eradicate
problems in their networks.
Much of Team Cymru’s time is spent identifying emerging trends
within the Underground related to the monetization of compromised
information. Team Cymru works with various organizations and industries
affected by the Underground Economy. Many of Team Cymru’s efforts
are for the benefit of Internet users, and at no cost to their partners. Team
Cymru also works with Law Enforcement, where appropriate, from over
60 countries around the world.
4	 On a rolling basis, over 25% of the world’s computers have probably
been infected at some point.
5	 http://www.paltelegraph.com/latest/6288-1000-israeli-websites-hacked-
since-flotilla-attack
6	 Internet Relay Chat was an early Internet protocol that allows multiple
clients to connect to a server or network of servers. Channels are created
within an IRC server that are akin to.
7	 http://www.consumeraffairs.com/news04/2005/shadowcrew.html
8	 http://news.softpedia.com/news/Former-CardersMarket-Admin-
Sentenced-to-13-Years-in-Prison-134900.shtml
9	 http://www.fbi.gov/page2/oct08/darkmarket_102008.html
10	http://www.msnbc.msn.com/id/37701078/ns/world_news-europe/
11	http://datalossdb.org/incidents/1518-malicious-software-hack-
compromises-unknown-number-of-credit-cards-at-fifth-largest-credit-
card-processor
12	http://www.wired.com/threatlevel/2010/03/alleged-rbs-hacker-arrested/
13	http://www.computerworld.com/s/article/9014782/TJX_data_breach_
At_45.6M_card_numbers_it_s_the_biggest_ever
14	https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml
15	http://www.owasp.org/index.php/Man-in-the-middle_attack.
16	http://www.owasp.org/index.php/Man-in-the-browser_attack
17	http://www.theregister.co.uk/2010/06/07/electronic_account_raided/
18	http://en.wikipedia.org/wiki/Denial-of-service_attack
19	http://www.wired.com/threatlevel/2010/01/operation-aurora/
20	http://en.wikipedia.org/wiki/GhostNet
21	A bot may poll a CnC server at different time intervals, but the bot herder
maintains control of the infected computer.
22	This number includes code embedded in HTML (webpages) which tends
to contain a high level of similarity to other malicious web samples.
23	http://www.infoworld.com/t/hacking/your-favorite-malware-authors-now-
twitter-651
24	http://www.hurriyetdailynews.com/n.php?n=turkey-to-ink-cybercrime-
treaty-2010-06-03
25	http://www.silicon.com/technology/security/2007/02/01/toxbot-hackers-
sentenced-by-dutch-court-39165572/
26	http://www.torproject.org/
27	http://www.thenewnewinternet.com/2010/06/01/facebook-used-to-find-
money-mules/
28	http://www.theregister.co.uk/2010/06/08/padding_oracle_attack_tool/
29	http://www.physorg.com/news194849560.html
30	http://www.adobe.com/support/security/advisories/apsa10-01.html
31	http://www.businessweek.com/magazine/content/08_16/
b4080032218430.htm
32	http://www.net-security.org/secworld.php?id=9371
http://marienfeldt.wordpress.com/2010/03/22/iphone-business-security-
framework/
33	http://www.itpro.co.uk/624025/hackers-target-windows-based-phones
34	http://online.wsj.com/article/
SB100014240527487033409045752845321ttoWhatsNewsFifth
16 FREEDOM FROM FEAR - July 2010
Cyber Crime and
Organized Crime
The current era of cybercrime is no longer dominated
by hackers accessing computer systems just for fun
or notoriety. The development and growth of the digital
economy has changed the criminal landscape dramati-
cally. High rewards combined with low risks have made
digital networks an attractive environment for various
types of criminal groups. In the non-digital era, organised
crime sought after the safe havens offered by countries
with weak governments and unstable political regimes. To-
day’s organised criminal groups can benefit from national
jurisdictions that do not have proper legal frameworks and
technical capabilities to fight cybercrime. The easiness of
communication, anonymity, and the accessibility of tools
for illegal operations have transformed cybercrime into a
global, fast-expanding and profit-driven industry with or-
ganised criminal groups thriving behind it.
Organised crime in cyberspace:
changing structure
Organised criminal groups are gradually moving from
traditional criminal activities to more rewarding and less
risky operations in cyberspace. While some traditional
criminal organisations are seeking the cooperation of e-
criminals with the necessary technical skills, newer types
of criminal networks operating only in the area of e-crime
have already emerged.
The structure of these criminal organizations is different
from traditional organised crime organisations. Crimi-
nal activities are usually conducted within multi-skilled,
multifaceted virtual criminal networks centred on online
meetings. These networks are structured on “stand alone”
basis, as members rarely meet each other in person and
sometimes do not even have a virtual contact with other col-
leagues. This sophisticated structure, together with access
to the core operations granted only to trusted associates,
prevents organised cybercrime groups from being detected
and infiltrated by law enforcement.
The networks themselves could involve from ten to several
thousand members and could include affiliated networks
in their structure. Regardless of the number of members
and affiliates, virtual criminal networks are usually run by
a small number of experienced online criminals who do not
commit crimes themselves, but act rather as entrepreneurs.
The leading members of the networks divide the different
segments of responsibility (spamming, controlling compro-
mised machines, trading data) among themselves. Some
“elite” criminal groups act as closed organisations and do
not participate in online forums because they have enough
resources to create and maintain the value chains for the
whole cycle of cyber-offences, and therefore have no need to
outsource or to be engaged as outsiders into other groups.
Tools and models for criminal activity
Organised crime borrows and copies business models from
the legitimate economy sector. Cybercriminals employ
models similar to the B2B (business-to-business) for their
operations, such as the highly sophisticated C2C (criminal-
* Tatiana Tropina
Organised criminal groups are gradually
moving from traditional criminal activities to
more rewarding and less risky operations in
cyberspace
17FREEDOM FROM FEAR - July 2010
to-criminal) models, which use very effective crime tools
available through digital networks. The computer systems’
vulnerabilities and software are exploited to create crime-
ware such as viruses, Trojans, keyloggers. These crimeware
tools offer criminal groups the flexibility of controlling,
stealing and trading data.
The development of botnets, networks of compromised
computers running programs under external control, trans-
formed some types of cybercrimes such as phishing into the
worldwide underground ecosystem run by organised crime.
The estimated financial gain of these criminal groups rang-
es from tens of thousands to tens of millions of dollars. The
trade of botnets has also become a high-revenue activity
that could be also linked to organised crime. The botnets’
costs are relatively low compared to the criminals’ finan-
cial gain and to the damage to individual consumers and
businesses, as well as to the financial health, reputation and
trust in online transactions as a whole.
Crimeware is also used to deploy Crime-as-a-Service busi-
ness models that represent the system of trading and deliv-
ering crimeware tools. Data supplying models are also used
to share the tools to commit cybercrimes. For instance, by
creating “customer” systems where instruments are avail-
able on demand, “users” just log into the server and choose
from the range of tools suitable for fraud, phishing, and data
stealing and then download them. When user data is stolen,
criminals can use crimeware servers to commit organised
attacks. Crimeware servers allow to control compromised
computers and manage the stolen data.
Addressing the problem
Fighting cybercrime has always been a complex problem
due to the number of ICT network users, the transnational
nature of the Internet and its decentralised architecture.
Cybercriminals, and especially organised criminal groups,
have been and probably would always remain several steps
ahead of legislators and law enforcement agencies. C2C
networks benefit from anonymous communications, auto-
mation of attacks and the difficulties that law enforcement
agencies experience in determining the location: servers
with crimeware could be in one country, while members
of the network could be in another one, targeting victims
across the world.
In addition to strengthening the current legal frameworks,
updating old legislation, harmonising laws on an interna-
tional level, what is needed is also the cross-sector coopera-
tion on national level as well as international cooperation in
detecting, investigating and preventing e-crimes committed
by organised criminal groups. The development of a com-
prehensive understanding and a forward-looking approach
are required since fighting organised cybercrime seems to
have a moving target.
Countries face the problem of addressing this international
problem collectively. Some States just do not have the nec-
essary tools to respond to the activities of the organised cy-
bercriminals, they may lack the technical skills or have legal
drawbacks. The development of a common understanding
that no country could be safe alone in the global ICT net-
work is very important.
Future trends and responses
With the absence of a global strategy to counter organised
cybercrime, the problem is very likely to deepen in the fore-
seeable future. With the development of ICT networks and
of the opportunities they offer, criminal groups will benefit
from the entire range of the tools and models available to
the legitimate economy sectors. The information’s avail-
ability would make it not only more accessible to organised
groups, but also more easy for them to foster and automate
their fraud-committing activity. It would also probably
link more opportunistic criminals to existing criminal net-
works.
Cybercrime is transforming itself into an illegal industry,
where syndicates are highly sophisticated and are very hard
to identify. Some cybercrime industries would be run solely
by organised criminal groups, constantly seeking the new-
est technical solutions and for the creations of new markets.
As a result, it would be likely for the cybercrime ecosystem
to be soon dominated by criminal organisations, as cyber-
crime networks that have already become international
would multiply opportunities and reach the global scale by
exploiting the legal frameworks’ weakness and searching
for safe havens in countries with less capability to detect
and fight them. This will make fighting cybercrime a more
difficult task for law enforcement agencies.
As markets and trading itself have always attracted organ-
ised criminal groups seeking benefits from illegal activities,
the growth of digital operations and services in legitimate
markets are a key enabler for organised cybercriminals,
both for committing traditional crimes and for developing
new types of illegal activities. Using business models that
have proved their effectiveness for the legal business sector,
organised cybercrime groups deploy highly sophisticated
tools of online criminal activities. The risk for individuals,
businesses, and governments grows with the further digi-
talisation of their economy. E-activity is conducted as long-
term sustainable criminal operations. Due to the borderless
nature of the Internet, the problem of organised cybercrime
has truly global consequences when no country can ensure
safety only within its borders. The sole way to address the
problem is to develop long-term responses that would in-
clude coordination and harmonisation of efforts on both
national and international levels.
* Dr. Tatiana Tropina is Senior Researcher at the Cybercrime
Institute in Cologne, Germany.
The sole way to address the problem is to
develop long-term responses that would
include coordination and harmonisation of
efforts on both national and international levels
18 FREEDOM FROM FEAR - July 2010
Terrorist Use of the Internet
and Legal Response
Without doubt terrorist organisations today are using
the Internet for various purposes. Unlike the early
debate when the focus was on potential terrorist-related
network-based attacks against critical infrastructure and
the use of information technology in armed conflicts (cy-
berwarfare), it is widely recognised that the range of activi-
ties is more complex.1
Terrorist use of the Internet includes
research, training, propaganda and communication.2
But
despite more intensive research many aspects are still un-
certain as reports about concrete incidents often remain
classified. The following article provides an overview of the
different areas of terrorist use of the Internet and the con-
cept of legal response.
I. Terrorist Use of the Internet
1. Propaganda
While ten years ago only 12 of the 30 foreign terrorist
organisations listed by the U.S. State Department main-
tained websites,3
in 2004 the United States Institute of
Peace reported that almost all terrorist organisations have
websites.4
The Internet-related propaganda activities in-
clude the distribution of video messages5
and the descrip-
tions and justifications of activities.6
The Internet has sub-
stituted traditional channels of distribution, particularly
with regard to video messages.7
2. Collection of information
The Internet has proven to be highly useful for collecting
information. Millions of websites provide information that
can be used for legitimate as well as illegal purposes. One
example are satellite pictures. High-resolution satellite
pictures, previously available only to a handful of military
institutions, are today made available by various Internet
services.8
Other examples include instructions on how to
build bombs, and even virtual training camps, providing
information on the use of weapons in an e-learning ap-
proach.9
Such instructions are available on a large-scale
online.10
In 2008, Western secret services discovered an Internet
server that allowed for the exchange of training material
and communications.11
Several websites were reported to
be operated by terrorist organisations to coordinate ac-
tivities.12
In addition, sensitive or confidential information
that is not adequately protected from search robots can be
found via search engines.13
Terrorist organizations have
started to explore this technology. In 2003, the U.S. De-
partment of Defense was informed about a training manu-
al linked to al-Qaida providing information on how to use
public sources to find details about potential targets.14
In
2005, the German press reported that investigators had
found downloaded manuals on how to build explosives on
the computer of two suspects, who then attempted to at-
tack the German public transportation system with home-
made bombs.15
3. Communication
In the investigations following 9/11, it was reported that the
terrorists used e-mail communication to coordinate their at-
tacks.16
The press reported that detailed instructions about
the targets and the number of attackers had been exchanged
via e-mail.17
The threats related to a technology shift are also
accentuated by the fact that the interception of Voice-over-IP
calls is going along with significantly more challenge than the
interception of regular phone calls.18
4. Use of information technology to prepare for “real
world” attacks19
It has been reported that terrorists are using online vid-
eogames as part of their preparation for attacks. Various
online games simulate the “real world” by allowing the
user to manipulate characters (avatars) in a virtual world.
Theoretically, those online games could be used to simu-
late attacks, though it is not yet certain to what extent they
have been used to do so.20
* Marco Gercke, Daniel Thelesklaf
The Internet-related propaganda activities
include the distribution of video messages
and the descriptions and justifications of
activities
19FREEDOM FROM FEAR - July 2010
5. Attacks against critical infrastructure
Over the past decades, more and more countries have turned
into information societies.21
Services such as online banking
and telephone communications using Voice-over-Internet-
Protocol (VoIP) are very popular.22
But it is not only the
communication sector that has shifted its services online:
information technology and Internet services are today
used to control and manage many functions in buildings,
transportation systems, waterways and energy grids.23
Critical infrastructure is widely recognised as a potential
target for terrorist attacks, as it is, by definition, vital for
the stability of the State.24
Infrastructure is considered to
be frail, and its incapacity or destruction could have a de-
bilitating impact on a State’s defence or economic securi-
ty.25
This concerns, in particular, electrical power systems,
telecommunication systems, gas and oil storage and trans-
portation, banking and finance, transportation, water sup-
ply systems and emergency services. The civil disturbance
caused by Hurricane Katrina highlights the dependence of
developed societies on those services.26
Both the new means of communication and the use of in-
formation technology to control critical infrastructure have
influenced terrorist organisations’ ability to use the Inter-
net for attacks against critical infrastructure and to make it
more vulnerable to attacks.27
Interconnected systems that
are linked by computer and communication networks are
especially attractive targets.28
A network-based attack would
do more than cause a single system to fail. Rather, it would
bring down an entire network of systems and their related
infrastructure. Even short interruptions of services would
cause huge financial damage to e-commerce businesses,
government service providers and the security sector.29
II. Legal Response
The recognition of the threat associated with terrorist use of
the Internet and the related challenges has led to various le-
gal approaches to address the issue. The ones on a national
level in particular show significant differences. With regard
to systematic aspects, there are three different approaches
of how countries are addressing the specific challenges of
terrorist use of the Internet:
1.	 Applying existing cybercrime legislation, developed to cover
non-terrorist related acts, to terrorist use of the Internet;
2.	Applying existing legislation, developed to cover non-Inter-
net related terrorist acts, to Internet-related acts as well;
3.	Enacting specific legislation on terrorist use of the Internet.
1. Application of Cybercrime legislation
Some countries are using existing cybercrime legislation
that was developed to cover non-terrorist related acts to
criminalize terrorist use of the Internet. One example for
such provision is Art. 2 of the Council of Europe Convention
on Cybercrime,30
which was developed to cover traditional
cybercrime, but not specifically designed to address terror-
ist related acts:
Article 2 –Illegal access
Each Party shall adopt such legislative and other meas-
ures as may be necessary to establish as criminal offences
under its domestic law, when committed intentionally, the
access to the whole or any part of a computer system with-
out right. A Party may require that the offence be com-
mitted by infringing security measures, with the intent of
obtaining computer data or other dishonest intent, or in
relation to a computer system that is connected to another
computer system.
Based on the experiences with this approach, three aspects
ought to be taken into consideration. Substantive criminal
law provisions that were implemented to cover non-terror-
ist related acts (such as illegal access31
or system interfer-
ence32
) might be applicable in terrorist-related cases, but
very often the range for sentencing will differ from specific
terrorism legislation. Depending on the dogmatic structure
of procedural law this could influence the ability to use so-
phisticated investigation instruments that are restricted to
terrorist or organised crime related investigation.
Secondly, and with regard to procedural instruments, the
situation is slightly different. The application of cybercrime
specific investigation instruments in cases of terrorist use
of the Internet (such as the expedited preservation of com-
puter data33
) is going along with less challenges, since most
countries do not limit the application to traditional cyber-
crime offences but to any offence involving computer da-
ta.34
Finally, regional instruments developed to address the
challenge of cybercrime, but not specifically terrorist use of
the Internet, often contain exemptions for international co-
operation with regard to political offences. One example is
Art. 27, paragraph 4.a of the Council of Europe Convention
on Cybercrime.35
Article 27 – Procedures pertaining to mutual assist-
ance requests in the absence of applicable interna-
tional agreements
[...] 3. Mutual assistance requests under this article shall be
executed in accordance with the procedures specified by the
requesting Party, except where incompatible with the law of
the requested Party.
4. The requested Party may, in addition to the grounds for
refusal established in Article 25, paragraph 4, refuse assist-
ance if:
a) the request concerns an offence which the requested Par-
ty considers a political offence or an offence connected with
a political offence, or
b) it considers that execution of the request is likely to preju-
dice its sovereignty, security, ordre public or other essential
interests. [...]
In 2008, Western secret services
discovered an Internet server that allowed
for the exchange of training material and
communications
20 FREEDOM FROM FEAR - July 2010
The provision authorizes parties to the
Convention to refuse mutual assist-
ance if it concerns an offence which
the requested Party considers a politi-
cal offence, or connected with a politi-
cal offence.36
As this is often the case
when it comes to terrorist use of the
Internet, such approach can hinder the
investigation. To improve the situation
the terrorist-specific legal frameworks,
such as the 2005 Council of Europe
Convention on the Prevention of Ter-
rorism37
contains an exclusion of the
political exception clause in Art. 20.38
With regard to the Convention on Cy-
bercrime, the issue is only solved with
regard to those countries that have
signed and ratified both Conventions.
2.Applicationofexisting(nonInter-
net specific) terrorism legislation
Another approach is to use existing
terrorism legislation to criminalise and
prosecute terrorist use of the Internet.
On example for a traditional instru-
ment is the aforementioned Council of
Europe Convention on the Prevention
of Terrorism.39
Article 5 – Public provocation to
commit a terrorist offence
1 For the purposes of this Convention,
public provocation to commit a ter-
rorist offence means the distribution,
or otherwise making available, of a
message to the public, with the intent
to incite the commission of a terrorist
offence, where such conduct, whether
or not directly advocating terrorist
offences, causes a danger that one or
more such offences may be committed.
2 Each Party shall adopt such meas-
ures as may be necessary to estab-
lish public provocation to commit a
terrorist offence, as defined in para-
graph 1, when committed unlawfully
and intentionally, as a criminal of-
fence under its domestic law.
The Convention defines several of-
fences, such as the above-mentioned
public provocation to commit a ter-
rorist offence: however, it does not
contain provisions criminalising
terrorist-related attacks against com-
puter systems or specific data-related
procedural instruments. However,
especially with regard to investigat-
ing Internet-related offences, specific
procedural instruments are required
as the investigation process differs sig-
nificantly from traditional ones, and
traditional instruments would there-
fore often fail.
3. Development of specific legisla-
tion dealing with terrorist use of
the Internet
The third approach is the development
of specific legislation addressing ter-
rorist use of the Internet. One example
is Section 4.f of the Draft ITU Cyber-
crime Legislation Toolkit.
Section 4. Interference and Dis-
ruption
[...] (f) Intent to Cause Interference or
Disruption for Purposes of Terrorism.
Whoever commits interference and/
or disruption pursuant to paragraphs
(a) and (b) of this Section with the in-
tent of developing, formulating, plan-
ning, facilitating, assisting, inform-
ing, conspiring, or committing acts
of terrorism, not limited to acts of cy-
berterrorism, shall have committed a
criminal offense punishable by a fine
of [amount] and imprisonment for a
period of [duration].
The International Telecommunica-
tion Union (ITU) is the UN organisa-
tion that has most responsibility for
practical aspects of cybersecurity.40
The aim41
of the Draft Toolkit is to give
countries the possibility of using sam-
ple language and reference material in
the process of national cybercrime leg-
islation development, that can assist,
according to the Toolkit’s developers,
the “establishment of harmonized cy-
bercrime laws and procedural rules.”42
The Toolkit was developed by the
American Bar Association on the ba-
sis of a comprehensive analysis of the
Council of Europe (CoE) Convention
on Cybercrime and the cybercrime
legislation developed by countries. It
aims to be a fundamental resource for
legislators, policy experts, and indus-
try representatives, providing them
with the framework to develop consist-
ent cybercrime legislation. Moreover,
in addition to traditional approaches,
the Toolkit also contains several spe-
cific terrorist-related offences.43
* Dr. Marco Gercke is the Director of the
Cybercrime Research Institute.
Mr. Daniel Thelesklaf is the Executive
Director of the Basel Institute on
Governance.
1	 Gercke, ‘Cyberterrorism, How Terrorists Use the Internet’, Computer und
Recht, 2007, page 62 et seq.
2	 For an overview see Sieber/Brunst, Cyberterrorism – The Use of the
Internet for Terrorist Purposes, Council of Europe Publication, 2007;
Gercke, ‘Cyberterrorism, How Terrorists Use the Internet’, Computer und
Recht, 2007, page 62 et seq.
3	 ADL, Terrorism Update 1998, available at http://www.adl.org/terror/focus/	
16_focus_a.asp
4	 Weimann in USIP Report, How Terrorists Use the Internet, 2004, page 3.
Regarding the use of the Internet for propaganda purposes see as well:
Crilley, ‘Information Warfare: New Battlefields – Terrorists, Propaganda
and the Internet’, Aslib Proceedings, Vol. 53, No. 7 (2001), page 253.
5	 Regarding the use of YouTube by terrorist organisations, see Heise Online
News, 11 October 2006, available at http://www.heise.de/newsticker/
meldung/79311; Staud in Sueddeutsche Zeitung, 05.10.2006
6	 Regarding the justification see Brandon, ‘Virtual Caliphate: Islamic
Extremists and the Internet’, 2008, available at http://www.
socialcohesion.co.uk/pdf/VirtualCaliphateExecutiveSummary.pdf
7	 So Weimann in USIP Report, How Terrorists Use the Internet, 2004,
page 5.
It has been reported that
terrorists are using online
videogames as part of their
preparation for attacks
Critical infrastructure
is widely recognised as
a potential target for
terrorist attacks, as it is,
by definition, vital for the
stability of the State
21FREEDOM FROM FEAR - July 2010
8	 Levine, ‘Global Security’, 27.06.2006, available at http://www.
globalsecurity.org/org/news/2006/060627-google-earth.htm; regarding
the discovery of a secret submarine on a satellite picture provided by a
free of charge Internet Service see Der Standard Online, ‘Google Earth:
Neues chinesisches Kampf-Uboot entdeckt’, 11.07.2007, available at
http://www.derstandard.at/?url/?id=2952935
9	 For further reference see Gercke, ‘The Challenge of Fighting Cybercrime’,
Multimedia und Recht, 2008, page 292.
10	Brunst in Sieber/Brunst, ‘Cyberterrorism – the use of the Internet for
terrorist purposes’, Council of Europe Publication, 2007; US Homeland
Security Advisory Council, Report of the Future of Terrorism Task Force,
January 2008, page 5; Stenersen, ‘The Internet: A Virtual Training
Camp?’, Terrorism and Political Violence, 2008, page 215 et seq.
11	Musharbash, ‘Bin Ladens Intranet’, Der Spiegel, Vol. 39, 2008, page 127.
12	Weimann, ‘How Modern Terrorism Uses the Internet’, 116 Special Report
of the US Institute of Peace, 2004, page 10.
13	For more information regarding the search for secret information with the
help of search engines, see Long, Skoudis and van Eijkelenborg, Google
Hacking for Penetration Testers.
14	‘Using public sources openly and without resorting to illegal means, it
is possible to gather at least eighty per cent of information about the
enemy.’ For further information, see Conway, ‘Terrorist Use of the Internet
and Fighting Back’, Information & Security, 2006, page 17.
15	See Sueddeutsche Zeitung Online, ‘BKA findet Anleitung zum
Sprengsatzbau’, 07.03.2007, available at http://www.sueddeutsche.de/
deutschland/artikel/766/104662/print.html
16	The 9/11 Commission Report, Final Report of the National Commission
on Terrorist Attacks Upon the United States, 2007, page 249.
17	The text of the final message was reported to be: ‘The semester begins
in three more weeks. We’ve obtained 19 confirmations for studies in the
faculty of law, the faculty of urban planning, the faculty of fine arts, and
the faculty of engineering.’ The name of the faculties was apparently the
code for different targets. For more detail see Weimann, ‘How Modern
Terrorism Uses the Internet’, Journal of International Security Affairs,
Spring 2005, No. 8; Thomas, ‘Al Qaeda and the Internet: The Danger of
“Cyberplanning”’, 2003, available at http://findarticles.com/p/articles/
mi_m0IBR/is_1_33/ai_99233031/pg_6; Zeller, On the Open Internet, a
Web of Dark Alleys, The New York Times, 20.12.2004, available at http://
www.nytimes.com/2004/12/20/technology/20covert.html?pagewanted=p
rint&position=;
18	Regarding the interception of VoIP to assist law enforcement agencies,
see Bellovin and others, “Security Implications of Applying the
Communications Assistance to Law Enforcement Act to Voice over
IP”, available at http://www.itaa.org/news/docs/CALEAVOIPreport.pdf;
Simon/Slay, “Voice over IP: Forensic Computing Implications”, 2006,
available at: http://scissec.scis.ecu.edu.au/wordpress/conference_
proceedings/2006/forensics/Simon%20Slay%20-%20Voice%20
over%20IP-%20Forensic%20Computing%20Implications.pdf
19	See US Commission on Security and Cooperation in Europe
Briefing, 15.05.2008, available at http://csce.gov/index.
cfm?FuseAction=ContentRecords. ViewTranscript&ContentRecord_id=4
26&ContentType=H,B&ContentRecordType=B&CFID=18849146&CFTO
KEN=53; O’Brian, Virtual Terrorists, The Australian, 31.07.2007, available
at http://www.theaustralian.news.com.au/story/0,25197,22161037-
28737,00.html
20	Regarding other terrorist-related activities in online games see Chen/
Thoms, ‘Cyber Extremism in Web 2.0 – An Exploratory Study of
International Jihadist Groups’, Intelligence and Security Informatics,
2008, page 98 et seq.
21	For more information on the information society see Masuda, The
Information Society as Post-Industrial Society; Dutta/De Meyer/Jain/
Richter, The Information Society in an Enlarged Europe; Maldoom/
Marsden/Sidak/Singer, Broadband in Europe: How Brussels can wire
the Information Society; Salzburg Center for International Legal Studies,
Legal Issues in the Global Information Society; Hornby/Clarke, Challenge
and Change in the Information Society.
22	Regarding the new opportunities see for example: Communication
From The Commission To The Council, The European Parliament, The
European Economic And Social Committee And The Committee Of
The Regions, Challenges for the European Information Society beyond
2005, page 3, available at http://ec.europa.eu/information_society/
eeurope/i2010/docs/communications/new_chall_en_adopted.pdf.
Regarding the extend of integration of ICTs into the daily lives and the
related threats see Goodman, ‘The Civil Aviation Analogy – International
Cooperation to Protect Civil Aviation Against Cyber Crime and Terrorism’
in Sofaer/Goodman, The Transnational Dimension of Cyber Crime
and Terrorism, 2001, page 69, available at http://media.hoover.org/
documents/0817999825_69.pdf
23	Bohn/Coroama/Langheinrich/Mattern/Rohs, ‘Living in a World of Smart
Everyday Objects – Social, Economic & Ethical Implications’, Journal
of Human and Ecological Risk Assessment, Vol. 10, page 763 et seq.,
available at http://www.vs.inf.ethz.ch/res/papers/hera.pdf
24	Brunst in Sieber/Brunst, ‘Cyberterrorism – The Use of the Internet for
Terrorist Purposes’, Council of Europe Publication, 2007.
25	US Executive Order 13010—Critical Infrastructure Protection. Federal
Register, July 17, 1996. Vol. 61, No. 138.
26	Critical Infrastructure Protection: Sector Plans and Sector Councils
Continue to Evolve, GAO communication, July 2007, available at http://
www.gao.gov/new.items/d07706r.pdf
27	Sofaer/Goodman, ‘Cybercrime and Security – The Transnational
Dimension’ in Sofaer/Goodman, The Transnational Dimension of
Cyber Crime and Terrorism, 2001, available at http://media.hoover.org/
documents/0817999825_1.pdf
28	Lewis, ‘Assessing the Risks of Cyber Terrorism, Cyber War and Other
Cyber Threats’, Center for Strategic and International Studies, December
2002.
29	Shimeall/Williams/Dunlevy, Countering Cyber War, NATO Review,
winter 2001/2002, available at http://www.cert.org/archive/pdf/counter_
cyberwar.pdf
30	Council of Europe Convention on Cybercrime (CETS No. 185). For more
details see: Sofaer, Toward an International Convention on Cyber in
Seymour/Goodman, The Transnational Dimension of Cyber Crime and
Terror, page 225, Gercke, The Slow Awake of a Global Approach Against
Cybercrime, Computer Law Review International, 2006, 140 et seq.;
Gercke, National, Regional and International Approaches in the Fight
Against Cybercrime, Computer Law Review International 2008, page 7
et. seq; Aldesco, The Demise of Anonymity: A Constitutional Challenge
to the Convention on Cybercrime, Entertainment Law Review, 2002, No.
1; Jones, The Council of Europe Convention on Cybercrime, Themes and
Critiques, 2005; Broadhurst, Development in the global law enforcement
of cyber-crime, in Policing: An International Journal of Police Strategies
and Management, 29(2), 2006, page 408 et seq.
31	 See for example Art. 2 Convention on Cybercrime.
32	 See for example Art. 5 Convention on Cybercrime.
33	 Art. 16 Convention on Cybercrime.
34	 See in this context for example Art. 14 Convention on Cybercrime:
Article 14 –Scope of procedural provisions
1. Each Party shall adopt such legislative and other measures as may be
necessary to establish the powers and procedures provided for in this
section for the purpose of specific criminal investigations or proceedings.
2. Except as specifically provided otherwise in Article 21, each Party
shall apply the powers and procedures referred to in paragraph 1 of this
article to:
a. the criminal offences established in accordance with Articles 2 through
11 of this Convention;
b. other criminal offences committed by means of a computer system;
and
c. the collection of evidence in electronic form of a criminal offence. [...]
35	 Convention on Cybercrime, ETS 185.
36	 The requested Party may, in addition to the grounds for refusal
established in Article 25, paragraph 4, refuse assistance if:
a. the request concerns an offence which the requested Party considers
a political offence or an offence connected with a political offence, or
b. it considers that execution of the request is likely to prejudice its
sovereignty, security, ordre public or other essential interests.
37	 Council of Europe Convention on the Prevention of Terrorism, ETS 196.
38	 Article 20 – Exclusion of the political exception clause
1 None of the offences referred to in Articles 5 to 7 and 9 of this
Convention, shall be regarded, for the purposes of extradition or
mutual legal assistance, as a political offence, an offence connected
with a political offence, or as an offence inspired by political motives.
Accordingly, a request for extradition or for mutual legal assistance
based on such an offence may not be refused on the sole ground that
it concerns a political offence or an offence connected with a political
offence or an offence inspired by political motives. […]
39	 Council of Europe Convention on the Prevention of Terrorism, ETS 196.
40	 Cyber Security and Politically, Socially and Religiously Motivated Cyber
Attacks, European Union, Policy Department External Policies, 2009,
page 17.
41	 For more information see Gercke/Tropina, From Telecommunicaiton
Standardisation to Cybercrime Harmonisation? ITU Toolkit for
Cybercrime Legislation, Computer Law Review International, Issue 5,
2009, page 136 et seq.
42	 ITU Toolkit for Cybercrime Legislation. Draft April, 2009, page 8.
Available at: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-
cybercrime-legislation.pdf
43	 Sec. 2 d) (Unauthorized Access for Purposes of Terrorism), Sec. 3 f)
(Unauthorized Access to or Acquisition of Computer Programs or Data
for Purposes of Terrorism), Sec. 4 f) (Intent to Cause Interference or
Disruption for Purposes of Terrorism), Sec. 6 h) (Intent to Furtherance of
Terrorism).
22 FREEDOM FROM FEAR - July 2010
Foreword
In the last decades the most developed countries of the
world have realized a social model characterized by a
high “quality of life” of their citizens. There are, in fact,
many services and opportunities available to every citizen,
which contribute to satisfying their needs or expressing
their attitudes.
Energy provision, healthcare, transportation and financial
systems represent some of the fundamental pillars of this
“quality of life” model. The availability of those services is
perceived as a natural fact, to the extent that if they were
no longer accessible, most of us wouldn’t know what to do
in many circumstances.
The current situation has changed profoundly since the
beginning of 20th Century, when every family heated its
house with lumber collected by the family members and
possessed autonomous transportation means (horses,
mules etc.), or when an entrepreneur would have to install
autonomous power generation mechanisms for its manu-
facture.
Moreover, in the last years there has been an increasing
attention to the dependence on those infrastructures al-
lowing the provision of services, and whose unavailability
would unacceptably compromise the quality of our lives.
Those infrastructures have been dubbed as “critical,” and
the need to protect their existence and enduring function-
ing became a synonym of the need of protecting our “qual-
ity of life.”
CI Protection Initiatives
Following the terrorist attacks that shocked the world
in the first years of the new Millennium, both in North
America and in Europe, many advanced countries started
to consider the protection of their critical infrastructures
(CI) in a more organic way, taking into account potential
intentional attacks against them.
* Marco Carbonelli, Luisa Franchina, Laura Gratta, Fabio Guasconi, Daniele Perucchini
Defending Quality of
Life through Critical
Infrastructure Protection
©NASA
23FREEDOM FROM FEAR - July 2010
Among the first countries to take action, the U.S.A. estab-
lished the Department of Homeland Security (DHS) right
after the attacks of 11 September 2001. This entity imme-
diately outlined the protection of critical infrastructures
and key assets among its critical mission areas, drafting
the National Infrastructures Protection Plan (NIPP), which
provides a unified nation-wide strategy for its national pro-
tection.
The DHS is also mandated to guide, integrate and coordi-
nate the national efforts for improving the protection of
critical infrastructures, developing and implementing pro-
grammes and methodologies of risk assessment, inter-sec-
tor guidelines and metrics.
By the end of 2004 the European Union followed this rising
interest and launched the European Programme for Criti-
cal Infrastructure Protection (EPCIP). Such programme
also addresses prevention, preparedness and response to
terrorist attacks, and it is still supporting many initiatives
promoting critical infrastructures’ security.
The directive 114/2008 of the European Commission repre-
sents instead a first step for harmonizing the protection of
European critical infrastructures (ECI) around a common
baseline of measures. The first step of this baseline is the
identification of the critical infrastructures, applying cross-
cutting criteria based on the ex ante assessment of human
casualties, economic consequences and public effects due to
a possible outage of candidate infrastructures.
After identifying and designating the ECIs, each of these
must provide a liaison officer and complete an “operator
security plan” based on the most widely accepted risk man-
agement concepts. Every EU country must also designate a
national contact point on the matter and periodically report
to the Commission. This directive initially applies to criti-
cal infrastructures in the energy and transportation sectors,
and will be extended to other sectors in the near future.
CI Threats and Impacts
Critical infrastructures are managed by a constellation of
private and public organizations which are naturally prone
to a wide variety of threats that can impact the citizens’
“quality of life,” depending on their own characteristics in
terms of processes, assets etc.
Some of those organizations, for example, might rely more
on information systems than others and will thus be more
susceptible to cyber attacks, as in the cases where SCADA
(Supervisory Control And Data Acquisition) systems are
involved. In this latter situation, constantly growing in
number, the continuous functioning of large infrastruc-
tures (power plants, oil sewage, air traffic sensors etc.) can
be consistently assigned to automated or semi-automated
systems interconnected by distributed networks. Nowa-
days, many industrial processes (like automobile construc-
tion, food production and even goods’ distribution) are also
being progressively controlled by SCADA or ICT (Informa-
tion and Communication Technology) systems, which help
cutting operational costs and increasing efficiency. In all of
these contexts, a cyber attack could not only have the same
consequences as a physical sabotage, but it could prove to
be even tougher because of the possibility of reaching a
large number of similar systems via remote links.
Since the ultimate goal is to protect the frequently cited
“quality of life,” critical infrastructure must be protected
not only against all types of intentional attacks. These may
range from retaliation sabotage by a disgruntled employee
up to terrorists attacks aimed at waging fear and damage in
a region or country, but also from natural events and dis-
asters to mechanical failures and the omnipresent human
errors.
Every one of those threat families is composed by a vast
number of possible actions performed by different actors
(threat agents), which, as a part of the risk management
discipline, are then connected to specific impacts. Those
impacts are related to the simple question “what would
happen if,” and are thus strongly coupled with threats. In
any case, most of the approaches used worldwide to identify
critical infrastructures are “all hazard;” this means that the
criticality assessment is based on the impact of a breakdown
of the infrastructure leading to the interruption of the serv-
ice provision, irrespectively of the specific threat scenario
that would lead to the breakdown itself.
The most widely recognized high-level impact is the loss of
human lives, but the “quality of life” goes well beyond the
“survival” concept, thus bringing into consideration other
impacts like social and political stability, economic losses,
pollution, confidence in institutions, psychological suffer-
ing and many others, which, in turn, may be generated by a
large number of possible threats.
CI Protection Solutions
Prevention is a key factor and, in fact, all modern critical
infrastructure protection programmes mandate in their
very core some kind of risk assessment activity, identifying
the critical assets, evaluating the threats to which they are
prone and the effectiveness of the adopted protecting coun-
termeasures. If the results of this activity show an insuffi-
cient protection, it must be remedied through the adoption
of additional countermeasures.
Indeed, most operators of major critical infrastructures al-
ready implement effective risk management and business
Critical infrastructures are managed
by a constellation of private and public
organizations which are naturally prone to
a wide variety of threats
Every one of those threat families is
composed by a vast number of possible
actions performed by different actors
(threat agents)
24 FREEDOM FROM FEAR - July 2010
Figure 1
Combined approach to CI protection
Time and costs behind those words are really
not negligible but it must be considered that
resources spent in the correct preventive
measures have a proven favorable return of
investment with respect to those spent to
recover from an incident and to sustain its
consequences.
continuity plans. In many sectors, specific rules are in place
to guarantee operational continuity. Nevertheless, due to
the highly interconnected nature of critical infrastructures,
a fault in a “minor” infrastructure, perhaps not properly se-
cured, could cause an unexpected cascading affect, leading
to the progressive breakdown of other infrastructures. This
circumstance calls for an enhancement of the overall level
of security, guaranteeing a “basic” operational continuity
for all the infrastructures contributing, even indirectly, to
the citizens’ “quality of life.”
Since the impacts to the life quality are so wide-ranging and
different, conducting a realistic risk assessment is neither
an easy task nor is it something that many organizations
are used to doing. Luckily there are some contexts in which
those topics are adequately addressed, as within “manage-
ment systems.” Those organizational frameworks are sets of
requirements, established by some national or international
standard, aimed at correctly managing a specific topic in a
documented and improvement-oriented way. Some exam-
ples of management systems relevant for critical infrastruc-
tures include:
•	 ISO 22399 on incident preparedness and operational
continuity;
•	 ISO/IEC 27001 on information security;
•	 OHSAS 18001 on occupational health and safety;
•	 ISO 14000 on environment.
All those management systems are based on risk assess-
ment concepts and they are interoperable between them.
Moreover, they are mature objects supported by competent
communities, dedicated tools and they even offer control
and certification capabilities. Most importantly, every one
of them separately addresses some of the relevant impacts
to the “quality of life.”
Rather than inventing new solutions to already addressed
problems, the correct joint application of those sound meth-
odologies could be a huge step forward in the protection of
critical infrastructures. This fact, opportunely coordinated
in its application by local and interstate governments, even
in a gradual step-by-step way, should ultimately be able to
bring our society to a more stable and sustainable state of
“quality of life.”
* Marco Carbonelli, Laura Gratta work in the Interministerial
Coordination Secretariat for Critical Infrastructure Protection,
within the Italian Presidency of the Council of the Ministers, and
are in charge of the Critical Infrastructure modelling and the
Directive 114/08 CE national implementation areas, respectively.
Luisa Franchina is Director General of the Team on CBRN attack
risk of the Italian Department of National Civil Protection, and is
the Head of the Interministerial Coordination Secretariat for Critical
Infrastructure Protection, within Italian Presidency of the Council of
the Ministers.
Fabio Guasconi is a Team Manager for @ Mediaservice.net S.r.l., a
Security Advisory firm and is the chairperson of the Italian ISO/IEC
JTC1/SC27 committee.
Daniele Perucchini is the Leader of the Critical Infrastructure
Protection Area within Fondazione Ugo Bordoni.
The correct joint application of those sound
methodologies could be a huge step forward
in the protection of critical infrastructures
25FREEDOM FROM FEAR - July 2010
UNHCR/B.Heger/LBR.2002
WWW.UNHCR.ORG
26 FREEDOM FROM FEAR - July 2010
* John Carr
Online Crimes
against Children
The emergence of the
Internet as a mass
consumer product
has not necessarily
created any entirely
new genres of crime,
but it has certainly
given a new twist to
some very old and
familiar ones
27FREEDOM FROM FEAR - July 2010
The emergence of the Internet as a mass consumer prod-
uct has not necessarily created any entirely new genres of
crime, but it has certainly given a new twist to some very old
and familiar ones. Above all it has changed the scale on which a
number of offences are carried out. Crimes against children are
a classic example. Crimes involving the production and distri-
bution of child abuse images1
are a very specific case in point.
Prior to the arrival of the Internet, in most parts of the world
it was extremely difficult to get hold of child abuse images.
Usually, a person interested in acquiring any had to know
someone who already had some, otherwise they had to go
to great trouble and take several risks. This led one distin-
guished expert on child protection to describe the exchange of
child abuse images at that time as being “a cottage industry.”2
Today, however, the images can be a mouse click away. It is a
global industry worth millions of dollars to those who engage
in it for financial gain.3
Numbers
Taking 1995 as “Year 0” (the last year before the Internet
boom erupted in many countries), Interpol at that time knew
of around 4,000 child abuse images in total. Figures recent-
ly supplied by Interpol and other data published in the UK4
and Italy5
suggest that today the number of known images
is around 1,000,000, and the number of children abused to
make them runs in the tens of thousands. There is a marked
growth in images of younger children being subjected to ever
more violent and depraved sexual acts.6
It is anybody’s guess
how often the images and their duplicates are downloaded or
exchanged online and off, but it is likely to run into billions.
Another indication of the change in the scale of offending
comes from an examination of the numbers of images seized
by the police when arresting suspects. Prior to the Internet,
typically police officers would arrest individuals with only a
handful of images in their possession, or in unusual cases
maybe hundreds. In the whole of 1995 the police in Greater
Manchester in the UK seized the grand total of 12.7
In June
2009 in a single action the police in Mexico arrested one
man, Arthur Leland Sayler, who possessed 4 million images.
The trend in convictions is another useful signifier. Taking
1995 once more as the baseline, in the UK 142 people were
cautioned or proceeded against for child abuse image offenc-
es. In 2007 it was 1,402.8
Precise comparisons between 1995
and 2007 in terms of Internet usage are not very meaning-
ful because broadband barely existed in 1995, while by 2007
it had become commonplace.9
In 1995 fewer than two mil-
lions UK households had Internet access (primarily dial-up),
whereas by 2007 the number of households with Internet ac-
cess was up to 15.23 millions, of whom 84% had broadband.10
The inference is pretty clear. There is a strong link between
Internet crimes of this kind and the growth in the number of
Internet connections within a country. No nation appears to
be exempt.
The scale of activity addressed
There are well established procedures for notifying hosting
companies of the presence on their web servers of illegal
images. These procedures normally work very well and the
Prior to the arrival of the Internet,
in most parts of the world it was
extremely difficult to get hold of child
abuse images
28 FREEDOM FROM FEAR - July 2010
images are removed swiftly when the hosting company is in
the same jurisdiction as the person reporting it; however, if
the image is on a web site housed in a foreign jurisdiction
there can be inordinate delays,11
while the images remain on
view. This has led to the development of a practice known
as “blocking,”12
which renders the image inaccessible in the
reporting country.
Blocking has afforded an opportunity to gain a rare insight
into the overall level of illegal activity taking place in this
space. Five months after blocking was launched in Denmark
in 2006 the Danish police estimated 238,000 users had at-
tempted to reach known illegal child abuse sites.13
In Nor-
way blocking was stopping between 10 and 12,000 attempts
per day. In Sweden it was 20 – 30,000 attempts per day.14
In 2009, British Telecom (BT) estimated their solution was
preventing 40,000 attempts per day to access known child
abuse web sites over their broadband network. Extrapolated
across the whole UK broadband network this suggests block-
ing is preventing up to 58 million attempts per year.15
These
are substantial numbers.
The rise of Peer2Peer networks
For the foreseeable future, the worldwide web will remain a
key medium for the distribution of child abuse images, but
Peer2Peer networks such as Limewire and Gnutella are rap-
idly growing in importance.
In an in-depth documentary broadcasted on Irish TV on 31
May 2010,16
it was disclosed that in the past six months a
US technology company17
had traced 1.2 million people in
all parts of the world who had accessed child abuse images
over a number of Peer2Peer networks. Ireland itself is a small
country, with a population of around 4.25 millions and about
only 2.8 million Internet users.18
Yet in a period of 30 days
the same US company detected roughly 1,000 individuals in
Ireland trading or downloading child abuse images.
Downloading child abuse images is a serious offence against
the children depicted and it deserves police attention entirely
in its own right, but there is also evidence which suggests that
people who get involved in downloading such images may
find themselves on a path that ultimately leads them to com-
mit new offences against children, either in the real world or
online. This is another major reason for wanting such im-
ages to be removed from public view as quickly as possible: it
helps reduce the numbers of potential new online and offline
child abusers.
Internet is not to blame
The Internet itself is not to blame for any of this. At the end of
the day the decision to engage in criminal conduct is the re-
sult of a conscious choice made by individuals. But this data
underlines the singular role that technology plays in facilitat-
ing a range of crimes against children. It reminds us also of
the vital importance of law enforcement agencies across the
world having the capacity to understand how the technology
works, and having trained personnel at hand who can put
that knowledge to work to protect children.
* John Carr is Secretary of the UK Children’s Charities’ Coalition
on Internet Safety and a Senior Expert Adviser to the ITU’s Child
Online Protection initiative. He is also a member of the Executive
Board of the UK’s Council for Child Internet Safety and a member
of the Advisory Council of INHEOP, the global association of
internet hotlines.
1	 The terms “child abuse images” is used rather than “child pornography”
because this more accurately reflects the nature of the content.
2	 People Like Us, Sir William Utting, HMSO, London, 1997.
3	 See http://www.justice.gov/opa/pr/2001/August/385ag.htm where “In
just one month, the (web site) grossed as much as $1.4 million.” However
there is also a substantial trade in the images between collectors who
swap rather than sell to each other.
4	 http://www.official-documents.gov.uk/document/cm77/7785/7785.pdf
5	 Telefono Arcobaleno speak of 36,000 children of whom ‘42% are under 7
years of age and 77% are under the age of 12’ www.telefonoarcobaleno.
org/pdf/tredicmoreport_ta.pdf
6	 Correspondence with the author.
7	 Correspondence with the author.
8	 Offending and Criminal Justice Group (RDS), Home Office, Ref: IOS 503-03.
9	 Broadband access is important because it facilitates rapid and cheap
access to large files. Typically child abuse images and videos will be large
files.
10	http://www.statistics.gov.uk/pdfdir/inta0807.pdf
11	http://tinyurl.com/claytondelays
12	Currently blocking is operational in Italy, Denmark, Sweden, Norway,
Malta, UK, Finland, Iceland, South Korea, the USA and Australia. In March
2010 the Commission of the EU published a proposal which, if adopted,
will see every EU Member State becoming engaged with blocking.
13	http://www.politi.dk/da/aktuelt/nyheder/2006boernepornofilter_24052006.htm
14	http://www.politi.dk/da/aktuelt/nyheder/2005/filter_181005.htm
15	http://www.theregister.co.uk/2009/04/07/bt_cp_figures/
16	“Prime Time Investigates.”
17	http://www.tlo.com
18	https://www.cia.gov/library/publications/the-world-factbook/geos/ei.html
There is a marked growth in images
of younger children being subjected
to ever more violent and depraved
sexual acts
Prior to the Internet, typically police
officers would arrest individuals
with only a handful of images in their
possession
The Internet itself is not to blame for
any of this. At the end of the day the
decision to engage in criminal conduct
is the result of a conscious choice
made by individuals
29FREEDOM FROM FEAR - July 2010
Estimating and Interpreting
the Prevalence of
across the World
Survey-based
Estimates
The International Crime Victimisa-
tion Survey (ICVS) is a standardized
survey on experiences of crime that has been
carried out five times since 1989 in a large sample of
European countries, in the USA and in Canada. The last
round of the ICVS was coordinated by UNICRI (Van Dijk,
Van Kesteren & Smit, 2008). In developed countries the
ICVS consisted of computer-assisted telephone interviews
of probability samples of 2.000 inhabitants per country. The
questionnaire includes questions about victimization experi-
ences in the course of last year covering various forms of fre-
quently occurring types of crime (e.g. burglary, robbery and
assaults). The ICVS asked about consumer fraud for the first
time in the 1992 sweep in developed countries. People were
asked whether someone selling them something or deliver-
ing a service had cheated them in terms of quantity or quality
of the goods or services during the past year. Although the
question does not exclude serious incidents of fraud, most of
the incidents reported probably amount to simple forms of
cheating in shops. In the fifth sweep of the ICVS, carried out
among samples from 30 countries and 33 capitals or main
cities, those who reported being victims of fraud were asked
whether this happened while shopping on the Internet. An-
swers to the latter question are the source of the results pre-
sented here.
On average, 11% of respondents in the participating coun-
tries said they had experienced some type of consumer fraud
in the course of last year (2005). Victims of consumer fraud
were asked where the incident had taken place. At a nation-
al level, 45% of victims said the fraud had taken place in a
shop; 11% was the victim of a fraud during either building or
construction work or by a garage, while 9% mentioned it had
happened while shopping online. This implies that 1% of the
national inhabitants of developed countries had been victim-
ized by a case of E-fraud in the course of one year. Among
inhabitants of capital cities, the victimization rate by E-fraud
was 1,5% in one year.
Table 1 illustrates these details.
* Jan Van Dijk
E-fraud
30 FREEDOM FROM FEAR - July 2010
Victimization by Internet-based consumer fraud is most com-
mon in the USA, Poland, Germany, Bulgaria and the United
Kingdom. Prevalence rates are lowest in Italy, Finland and
Greece. Among the capitals Lima (Peru), Berlin, New York
and London stand out with comparatively high rates of vic-
timization.
In a second follow-up question, respondents reporting fraud
were asked whether it had been a case of credit card fraud.
It was so in 7% of all cases of fraud and in 27% of all cases
of E-fraud. The latter finding shows that a major part of E-
fraud consists of Identity Theft with the use of credit cards
(Identity Fraud.)1
Furthermore, the ICVS results showed that
only 10% of all frauds are ever reported to the police. Cases of
E-fraud are presumably more often reported to other agen-
cies such as banks.
According to UNDP’s 2006 Human Development Report,
between 50 and 70% of the population in industrialised
countries had access to the Internet in 2005. This implies
that around 2% of Internet users had been victim of Internet-
based fraud annually. In many developed countries in 2005
Internet-based frauds had reached prevalence levels similar
or above those of conventional property crimes such as car
theft or pick pocketing. Prevalence rates were, as mentioned,
especially pronounced among inhabitants of main cities.
Since 2005, both Internet access and E-commerce (the use
of Internet for shopping) have become more common. It is
therefore likely that prevalence rates of Internet-based frauds
have gone up significantly as well. In fact E-fraud might well
be on its way to becoming the most common form of prop-
erty crime affecting citizens of the industrialised world.
Table 1: Victims of E –fraud.
One year prevalence rates for fraud while buying something on the Internet (percentages)
in countries and main cities. 2005 ICVS
Fraud while shopping on the Internet (%) Fraud while shopping on the Internet (%)
USA 3.3 Lima (Peru) 10.7
Poland 3.0 Berlin (Germany) 3.8
Germany 2.7 New York (USA) 3.7
Bulgaria 2.6 London (England) 3.2
United Kingdom 2.4 Paris (France) 2.7
England & Wales 2.2 Copenhagen (Denmark) 1.5
Norway 1.5 Edinburgh (Scotland) 1.0
Denmark 1.4 Madrid (Spain) 1.0
New Zealand 1.3 Vienna (Austria) 0.9
Sweden 1.2 Hong Kong (SAR China) 0.9
Northern Ireland 1.2 Amsterdam (Netherlands) 0.9
Austria 1.1 Dublin (Ireland) 0.7
Scotland 1.0 Stockholm (Sweden) 0.7
Spain 0.7 Brussels (Belgium) 0.6
Ireland 0.7 Tallinn (Estonia) 0.6
Canada 0.7 Belfast (Northern Ireland) 0.5
Estonia 0.6 Athens (Greece) 0.4
Portugal 0.5 Oslo (Norway) 0.4
Luxembourg 0.5 Reykjavik (Iceland) 0.3
Iceland 0.4 Greater Johannesburg (RSA) 0.3
France 0.4 Lisbon (Portugal) 0.2
Belgium 0.4 Helsinki (Finland) 0.0
Netherlands 0.3 Budapest (Hungary) 0.0
Mexico 0.2 Rome (Italy) 0.0
Greece 0.1
Finland 0.1
Italy 0.0
Average 1.1 Average 1.5
1	 The 2003 US National Crime Victim Survey investigated victimization by credit card fraud as a subcategory of identity theft. This study showed a one-year
prevalence rate of victimization by credit card fraud of 2.4%. The Australian version of the ICVS, which used a somewhat different set of questions on
E-fraud, showed that 5% of the national public had been victimized by credit card fraud while doing transactions on the Internet (Johnson and Krone, 2007).
The British Crime Survey has included a question on credit card fraud in its questionnaire since 2006. The national prevalence rate has gone up from 3.7%
in 2005 to 6.4% in 2009 (Walker et al, 2009).
31FREEDOM FROM FEAR - July 2010
Discussion:
Is E- fraud Security Driven?
Countries or cities with comparatively high rates of victimiza-
tion by Internet-based frauds are a mixed group in terms of
Internet use. It comprises both countries where Internet is
most widely used (the USA and the UK) and countries that are
technologically less advanced (Bulgaria and Peru). Locations
with low victimization rates also appear to be heterogeneous in
terms of Internet use. For example, the use of Internet for com-
mercial transactions is very common in Iceland and Finland
where Internet-based fraud is rare. On the face of it, there is no
strong relationship between the prevalence of E-commerce in
national populations and the prevalence of E-fraud. According
to criminal opportunity theory E-crimes are likely to be driven
by the extent of E-commerce. The lack of an obvious positive
correlation is therefore somewhat surprising. One possible ex-
planation for the lack of such relationship is an inter-country
variation in the legal and technical security measures against
E-fraud. Examples are differences in the authentication pro-
cedures for the use of credit cards or for online banking. In
some countries the use of pin codes has been made obligatory
for the use of credit cards, while in others it is not. In the USA,
authentication for online banking has remained relatively
simple (use of a single password), compared to, for example,
the Netherlands where the Central Bank has imposed more
stringent security procedures on banks (Vermeulen, 2010).
The variation in security provisions might determine preva-
lence of E-fraud more strongly than differences in the level of
E-commerce per se. This “security hypothesis” merits further
testing in comparative international studies such as the 2010
round of the ICVS.
Literature
Dijk, J.J.M van, J. van Kesteren & P. Smit (2007), Criminal Victimisation in
an International Perspective; key findings from the 2004-2005 ICVS and EU
ICS, The Hague: Ministry of Justice/WODC (www. WODC.nl/publicaties).
Johnson, H. & T. Krone (2007), Internet purchasing: perceptions and
experiences of Australian households, Trends and issues in crime and criminal
justice, no.330, Canberra: Australian Institute of Criminology.
Vermeulen, N.S. (2010), Fertile Grounds: the Facilitation of Financial Identity
Theft in the United States and The Netherlands, PhD thesis Tilburg University.
MAKLU Publishers
Walker, A. et al. (2009), Crime in England and Wales 2008/2009, Vol 1
Findings from the British Crime Survey and police recorded crime, Home
Office, July 2009.
* Prof. Dr. Jan Van Dijk was the director of the Research and
Documentation Centre of the Dutch Ministry of Justice and
professor of Criminology at the University of Leiden. In 1987
he launched the International Crime Victims Surveys. Between
1998 and 2005 he worked for the United Nations in Vienna and
Turin (as Head of Research of UNICRI). In 2008 he received the
Sellin-Glueck Award of the American society of Criminology for
his lifelong contribution to international criminology. He currently
holds the Pieter van Vollenhoven chair in Victimology and Human
Security at the University of Tilburg (The Netherlands) and acts
as consultant for Eurostat on the design of the European Union
Survey on Public Safety to be conducted in 2013.
32 FREEDOM FROM FEAR - July 2010
Avoid Becoming
a Victim of
Cybercrime
* Scot Huntsberry
The news is full of reports detailing the stories of victims
who have lost thousands, even millions, of dollars at the
hands of cyber criminals. Many of us know someone who has
already been the victim of one of these crimes. As widespread
as cybercrime appears to be, it would be easy to conclude there
is little anyone can do to avoid becoming a victim. However,
the prevalence of cybercrime does not mean that victimization
is inevitable or that people should avoid using the Internet.
Users can make themselves aware of the vulnerabilities its use
creates and can take steps to reduce their risks.
Computer users can take measures to decrease their risk of
becoming the victim of cybercrime by adhering to a few sim-
ple Internet usage rules. First, users should remember to log
off and shut down their computers when they are not being
used. Cyber criminals often scan networks searching for “al-
ways on” computers, which they consider readily accessible
and unattended targets. By minimizing the amount of time
computers are powered on and connected to the Internet,
people can reduce their vulnerability to hacking attacks.
Next, users should install and maintain both antivirus and
firewall programs. These applications serve as a first line of
defence against viruses and other malicious computer pro-
grams designed to circumvent security features within com-
puters’ operating systems. Additionally, operating system de-
velopers regularly release updates or “patches.” To increase
their computer’s security, users should install these updates
as soon as they become available. Cyber criminals frequently
disguise malicious software as images or documents attached
to email messages, so users should never open or download
email attachments from unknown senders.
Many people now use wireless networks in their homes.
Strong encryption within a wireless router’s settings can
prevent cyber criminals from accessing and exploiting data
stored on computers. Unprotected, or “open” wireless net-
works that do not utilize encryption to protect network traffic
are very popular targets for cyber criminals. By intercepting
this wireless network traffic, crooks can quickly glean per-
sonal information, passwords, and other data they can then
use to perpetrate various cyber crimes.
Even worse, they sometimes abuse their access to other
people’s networks to make it seem like the victims are com-
mitting cyber crime. If you have an unencrypted wireless
network in your home, don’t be surprised if the police shows
Money is typically transferred via wire
transfers, leaving little recourse for the
victim. The most recent trend is an increase
in bank-to-bank wire transfers
Users should remember to log off and shut
down their computers when they are not
being used
33FREEDOM FROM FEAR - July 2010
up at your door to find out whether you have been hacking
into computers, committing online fraud, or distributing
contraband.
Many people maintain accounts on literally dozens of dif-
ferent websites, so they create easy to remember passwords.
While this means you’re less likely to forget an infrequently
used password, these simple passwords are quickly compro-
mised by savvy cyber criminals. Moreover, many people use
the same password on their social networking websites and
their banking and brokerage accounts. When cyber crooks
steal passwords for social networking websites, they often try
to use them to access financial accounts. In order to avoid
such problems, people should use unique and complex pass-
words for each of their accounts.
These simple rules provide baseline security for most Inter-
net users. However, there are additional precautions people
can take to further reduce their risk of becoming the victim
of a cyber crime. Understanding and recognizing some of the
more common criminal schemes can help people avoid fall-
ing prey to them.
In one prevalent scheme, cyber criminals send phishing
emails. These emails falsely claim to be from legitimate send-
ers and contain documents meant to dupe the unsuspecting
recipient into divulging personal, sensitive information such
as passwords, credit card numbers, and bank account infor-
mation. Some phishing emails have links to fake websites
that look just like sites the victims use regularly. After trick-
ing victims into providing banking credentials or other sensi-
tive information, the criminals utilize a number of different
methods to access and steal the victim’s money.
Internet auction fraud is very common. Cyber criminals satu-
rate the Internet auction sites and offer almost every product
people are looking for. The postings often make it appear the
seller is located in the same country as the buyer, and the
criminal then advises the victim to send money to a business
partner, associate, sick relative, a family member, etc.
Money is typically transferred via wire transfers, leaving little
recourse for the victim. The most recent trend is an increase
in bank-to-bank wire transfers. Most significantly, these wire
transfers go through large banks but are then routed to banks
in other countries. Similarly, sellers also occasionally direct the
victims to pay using phony escrow services. Sometimes they
even hijack legitimate escrow websites to make themselves ap-
pear even more bonafide. Once the funds are wire transferred
to the escrow website, the seller usually discontinues contact.
Another popular scheme is the passing of counterfeit cash-
ier’s checks. This scheme targets people who use Internet
classified advertisements to sell merchandise. Typically, an
interested party contacts a seller. The seller is told the buyer
has an associate in the victim’s country who owes him mon-
ey. As such, he will have the associate send the victim a cash-
ier’s check for the amount owed to the buyer. The amount of
the cashier’s check is frequently thousands of dollars more
than the price of the merchandise and the victim is told the
excess amount will be used to pay the shipping costs associ-
ated with getting the merchandise to his location. The victim
is instructed to deposit the check, and as soon as the funds
are credited to their account, to wire the excess funds back
to the criminal or to another associate identified as a ship-
ping agent. Because a cashier’s check is used, banks typically
release the funds immediately, or after a one or two day hold.
Falsely believing the check to be genuine, the seller wires
the money as instructed. Ultimately, the bank discovers the
cashier’s check is fraudulent and removes these funds from
the victim’s account.
Some people become unwitting accomplices of cyber crimi-
nals. Criminals post work-at-home job offers on popular In-
ternet employment sites. These jobs are advertised as “finan-
cial manager” or “payment processor” positions. People who
accept these positions are told to open bank accounts and
provide the account numbers to their employers. They re-
ceive transfers to these accounts and are instructed to with-
draw this money and transfer it (minus their commission, of
course) to designated recipients in foreign countries. When
approached by law enforcement, these people are often sur-
prised to learn they have been playing the role of “money
mule” for cyber criminals. By acting as a third party receiver
of funds, these people have facilitated the transfer illegal pro-
ceeds directly to cyber criminals in foreign countries.
Although the threat posed by cyber criminals is real, through
the use of a few basic Internet security practices and an
awareness of the more common cyber criminal schemes, in-
dividuals can reduce their risk of becoming a victim. Users
should remain aware of the latest online fraud scams, many
of which are described at www.lookstoogoodtobetrue.com.
However, if an individual believes he has already been the
victim of a cyber crime, he should notify the appropriate law
enforcement agency as soon as possible, and may file a com-
plaint online from anywhere in the world at www.ic3.gov, a
partnership between the Federal Bureau of Investigation and
the White Collar Crime Center. Providing timely and thor-
ough information detailing the particulars of the scheme and
identifying characteristics of the criminals helps law enforce-
ment develop an effective investigative strategy.
* Scot Huntsberry is a Supervisory Special Agent who most
recently has been working for the FBI in the Cyber Division in
Washington, D.C.
The FBI’s Cyber Division is dedicated to applying the highest level
of technological capability and investigative expertise toward
combating cyber-based terrorism, hostile foreign intelligence
operations conducted over the Internet, and cyber crime. The
work of the Cyber Division allows the FBI to stay one step ahead
of the adversaries technologically threatening the United States.
The Cyber Division addresses all violations with a cyber nexus,
which often have international facets and national economic
implications, and simultaneously supports FBI priorities across
program lines, assisting counterterrorism, counterintelligence
and other criminal investigations when aggressive technological
investigative assistance is required.
People should use unique and complex
passwords for each of their accounts
34 FREEDOM FROM FEAR - July 2010
U N
D P
35FREEDOM FROM FEAR - July 2010
* Marco Gercke
From Encryption to Failure
of Traditional Investigation
Instruments
the Challenges of Fighting Cybercrime
The shift from industrial societies to information societies,1
and the related dependence of the society as well as the
economy on the availability of Internet services have moved
the attention of politics towards the cybercrime topic. While in
other emerging areas of crime it is possible to use traditional
crime prevention and investigation strategies, the fight against
cybercrime faces unique challenges that require a special at-
tention from both investigators and lawmakers. This article
provides an overview of some of those challenges.
1. Availability of tools and
instructions to commit Cybercrime
In the early days of computer crimes, committing an offence
required a significant amount of technical understanding.
Nowadays however, offenders can commit cybercrimes by
using software devices that do not require in-depth technical
knowledge, such as software tools2
designed to locate open
ports or break password protection.3
Due to mirroring tech-
niques and peer-to-peer exchange, it is difficult to limit the
widespread availability of such devices4
that can potentially
turn any computer user into a cybercriminal.
Furthermore, offenders can use the Internet to find instruc-
tions on how to commit crime, both online and offline. For ex-
ample, the term “Googlehacking” (or “Googledorks”) describes
the use of complex search engine queries to filter many search
results for information on computer security issues.5
Several
reports emphasised the risk of the use of search engines for
illegal purposes.6
An offender planning an attack can find de-
tailed information on the Internet explaining how to build a
bomb by using only chemicals that are available in regular su-
permarkets.7
2. Resources
Offenders can use sophisticated methods to increase their re-
sources. An example of this is represented by botnet attacks
such as those used in 2007 against computer systems in Es-
tonia.8
An analysis of the attacks suggests that they were com-
mitted by thousands of computers within a “botnet,”9
a group
of compromised computers running programs under external
control.10
Over recent years, botnets have become a serious
risk for cybersecurity.11
The size of a botnet can vary, from a
few computers to more than a million computers.12
3. Difficulties in tracing offenders
Although users leave multiple traces while using Internet
services, offenders can hinder investigations, and in particular
their identification, by resorting to special services. For exam-
ple, if they use public Internet terminals that do not require
identification, investigations will often falter. Offenders can
also make use of open wireless networks to hide their identity.
While difficulties in identifying Internet users have the poten-
tial to support democratic processes, they also go along with
fears of abuse perpetrated by offenders.
4. Failure of traditional investigation
instruments
An effective fight against terrorist use of the Internet requires
Internet-specific tools that enable competent authorities to
carry out investigations. In a growing number of Internet-
related cases, traditional investigation instruments are not
sufficient to indentify an offender. One example is the inter-
ception of Voice-over-IP (VoIP) communication.13
In the last
36 FREEDOM FROM FEAR - July 2010
decades, States have developed investigation instruments
(such as wiretapping) that enable them to intercept landline
as well a mobile phone communication.15
The interception of
traditional phone calls is usually carried out through telecom
providers.16
Applying the same principle to VoIP, law enforce-
ment agencies would operate through ISPs and service provid-
ers supplying VoIP services. However, if the service is based
on peer-to-peer technology, service providers may generally
be unable to intercept communications, as the relevant data
are transferred directly between the communicating part-
ners.17
Therefore, new techniques, as well as the related legal
instruments, might be needed.
5. Missing control instruments
The Internet was originally designed as a military network18
based on a decentralised network architecture that sought
to preserve the main functionality intact and in power, even
when individual components of the network were attacked.
Carrying out investigations in this environment goes along
with challenges, as the designer of the network did not include
control instruments.19
Recent trends to implement technology blocking access to
websites20
are an approach to compensate the absence of
control instruments. Norway,21
Sweden,22
Switzerland,23
the
United Kingdom,24
Italy,25
China,26
Iran27
and Thailand28
are
among those countries that require or encourage blocking ac-
cess to illegal contents stored outside the country. While this
in general seems like an example of the possibility of introduc-
ing control instruments, the ability of users to circumvent fil-
ter technology29
using encrypted anonymous communication
services shows the limitation of such approach.
6. Transnational nature of the
offence
The Internet is a good example of globalisation, with services
generally available to all Internet users. As a consequence,
many data transfer processes affect more than one country.30
If offenders and targets are located in different countries,
cybercrime investigations require the cooperation of law en-
forcement agencies in all the countries affected,31
as national
sovereignty does not permit investigations within different
States territories without the permission of local authorities.32
The related formal requirements and time needed to col-
laborate with foreign law enforcement agencies often hinder
investigations,33
which often occur in very short timeframes.
Offenders may deliberately include third countries in their at-
tacks to make investigation more difficult.34
7. Independence of location and
presence at the crime site
One constituting fact common to all types of cybercrimes is
the fact that offenders do not need to be present at the same
location as the victim. Offenders can therefore act from loca-
tions where there is either no effective legislation in place or
it is not enforced.35
Preventing such “safe havens” has there-
fore become a key intention of international approaches in the
fight against cybercrime.36
8. Encryption technology
Another challenge is the use of encryption technology by of-
fenders.37
Encryption is a classic example of a neutral technol-
ogy, since as it is not only used to hinder investigations but
also to prevent unauthorised access to information. It is there-
fore considered a key technical solution for ensuring cyberse-
curity.38
The latest operating systems offer the possibility to
encrypt computer data with the click of a mouse, making it
difficult for law enforcement agencies to break the encryption
and access the data.39
It is uncertain to what extent offenders
already use encryption technology to mask their activities, but
it has been reported, for instance, that terrorists are already
using encryption technology.40
* Dr. Marco Gercke is the Director of the Cybercrime Research
Institute.
1	 For more information on the information society see Masuda, The
Information Society as Post-Industrial Society; Dutta/De Meyer/Jain/
Richter, The Information Society in an Enlarged Europe; Maldoom/
Marsden/Sidak/Singer, Broadband in Europe: How Brussels can wire
the Information Society; Salzburg Center for International Legal Studies,
Legal Issues in the Global Information Society; Hornby/Clarke, Challenge
and Change in the Information Society.
2	 “Websense Security Trends Report 2004”, page 11; Information Security
- Computer Controls over Key Treasury Internet Payment System, GAO
2003, page 3; Sieber, Council of Europe Organised Crime Report 2004,
page 143.
3	 Ealy, “A New Evolution in Hack Attacks: A General Overview of Types,
Methods, Tools, and Prevention”, page 9.
4	 In order to limit the availability of such tools, some countries criminalise
the production and offer of such tools. An example of such a provision
can be found in Art. 6 of the European Convention on Cybercrime.
5	 For more information, see: Long/Skoudis/van Eijkelenborg, “Google
Hacking for Penetration Testers, 2005”; Dornfest/Bausch/Calishain,
“Google Hacks: Tips & Tools for Finding and Using the World’s
Information”, 2006.
6	 See Nogguchi, “Search engines lift cover of privacy”, The Washington
Post, 09.02.2004.
7	 One example is the “Terrorist Handbook” – a pdf-document that contains
detailed information how to build explosives, rockets and other weapons.
8	 Regarding the attacks, see: Lewis, “Cyber Attacks Explained”, 2007,
“A cyber-riot”, The Economist, 10.05.2007, available at: http://www.
economist.com/world/europe/PrinterFriendly.cfm?story_id=9163598;
“Digital Fears Emerge After Data Siege in Estonia”, The New York Times,
29.05.2007.
9	 See: Toth, “Estonia under cyber attack”, http://www.cert.hu/
dmdocuments/Estonia_attack2.pdf
10	See: Ianelli/Hackworth, “Botnets as a Vehicle for Online Crime”, 2005,
page 3.
11	See “Emerging Cybersecurity Issues Threaten Federal Information
Systems”, GAO, 2005, available at: http://www.gao.gov/new.items/
d05231.pdf
12	Keizer, Duch “Botnet Suspects Ran 1.5 Million Machines”, TechWeb,
21.10.2005.
13	This was as well highlighted by the drafters of the Council of Europe
Convention on Cybercrime that contains a set of essential investigation
instruments. The drafters of the report point out: “Not only must
substantive criminal law keep abreast of these new abuses, but so must
criminal procedural law and investigative techniques“ see: Explanatory
Report to the Council of Europe Convention on Cybercrime No. 132.
Regarding the substantive criminal law provisions related to Cybercrime
see above: Chapter 6.1.
14	The term “Voice over Internet Protocol” (VoIP) is use to describe the
transmission technology for delivering voice communication by using
37FREEDOM FROM FEAR - July 2010
packet-switched networks and related protocols. For more information
see: Swale, Voice Over IP: Systems and Solutions, 2001; Black, “Voice
Over IP”, 2001.
15	Regarding the importance of interception and the technical solutions
see: Karpagavinayagam/State/Festor, “Monitoring Architecture for Lawful
Interception in VoIP Networks, in Second International Conference
on Internet Monitoring and Protection” – ICIMP 2007; Regarding
the challenges related to interception of data communication see:
SwaleChochliouros/Spiliopoulou/Chochliouros, “Meassures for Ensuring
Data Protection and Citizen Privacy Against the Threat of Crime and
Terrorism – The European Response”, in Janczewski/Colarik, “Cyber
Warfare and Cyber Terrorism”, 2007, page 424.
16	Regarding the differences between PSTN and VoIP communication
see: Seedorf, “Lawful Interception in P2P-Based VoIP System”s, in
Schulzrinne/State/Niccolini, Principles, Systems and Applications of IP
Telecommunication. Services and Security for Next Generation Networks,
2008, page 217 et seq.
17	Regarding the interception of VoIP by law enforcement agencies,
see Bellovin and others, “Security Implications of Applying the
Communications Assistance to Law Enforcement Act to Voice over
IP”; Simon/Slay, “Voice over IP: Forensic Computing Implications”,
2006; Seedorf, “Lawful Interception in P2P-Based VoIP Systems”, in
Schulzrinne/State/Niccolini, Principles, Systems and Applications of IP
Telecommunication. Services and Security for Next Generation Networks,
2008, page 217 et seq.
18	For a brief history of the Internet, including its military origins, see: Leiner,
Cerf, Clark, Kahn, Kleinrock; lynch, Postel, Roberts, Wolff, “A Brief History
of the Internet”, available at: http://www.isoc.org/internet/history/brief.
shtml
19	Lipson, “Tracking and Tracing Cyber-Attacks: Technical Challenges and
Global Policy Issues”.
20	Callanan/Gercke/De Marco/Dries-Ziekenheiner, Internet Blocking -
Cybercrime Response in Democratic Societies, 2009.
21	Telenor Norge: Telenor and KRIPOS introduce Internet child pornography
Filter.“ Telenor Press Release, 21 Sep 2004; Clayton, Failures in a Hybrid
Content Blocking System in: Privacy Enhancing Technologies, 2006, page
79; Stol/Kaspersen/Kerstens/Leukfeldt/Lodder, Filteren van kinderporno
op internet, 2008, page 46 et seq.; The Cybercrime Convention
Committee (T-CY), Examples of how the private sector has blocked child
pornograpyh sites, T-CY (2006) 04, page 3.
22	Swedish Providers are using a tool called „Netclean“. See Netclean Pro
Active, available at: http://www.netclean.com/documents/NetClean_
ProActive_Information_Sheet_EN.pdf; Telenor and Swedish National
Criminal Investigation Department to introduce Internet child porn filter,
Telenor Press Release, 17 May 2005, available at: http://press.telenor.
com/PR/200505/994781_5.html; Stol/Kaspersen/Kerstens/Leukfeldt/
Lodder, Filteren van kinderporno op internet, 2008, page 59 et seq.; The
Cybercrime Convention Committee (T-CY), Examples of how the private
sector has blocked child pornograpyh sites, T-CY (2006) 04, page 3;
Edwards/Griffith, Internet Censorship and Mandatory Filtering, NSW
Parliamentary Library Resarch Service, Nov. 2008, page 6.
23	Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 55;
Schwarzenegger, Sperrverfuegungen gegen Access-Provider in: Arter/
Joerg, Internet-Recht und Electronic Commerce Law, page 250.
24	Edwards/Griffith, Internet Censorship and Mandatory Filtering, NSW
Parliamentary Library Resarch Service, Nov. 2008, page 4; Stol/
Kaspersen/Kerstens/Leukfeldt/Lodder, Filteren van kinderporno op
internet, 2008, page 64 et seq.; The Cybercrime Convention Committee
(T-CY), Examples of how the private sector has blocked child
pornograpyh sites, T-CY (2006) 04, page 3; Eneman, A Critical Study of
ISP Filtering of Child Pornography, 2006, available at: http://is2.lse.ac.uk/
asp/aspecis/20060154.pdf
25	Lonardo, Italy: Service Provider’s Duty to Block Content, Computer Law
Review International, 2007, page 89 et seq.; Edwards/Griffith, Internet
Censorship and Mandatory Filtering, NSW Parliamentary Library Resarch
Service, Nov. 2008, page 6 et seq.; Sieber/Nolde, Sperrverfuegungen im
Internet, 2008, page 54.
26	Clayton/Murdoch/Watson, Ignoring the Great Firewall of China, available
at: http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf; Pfitzmann/Koepsell/
Kriegelstein, Sperrverfuegungen gegen Access-Provider, Technisches
Gutachten, available at: http://www.eco.de/dokumente/20080428_
technisches_Gutachten_Sperrvervuegungen.pdf; Sieber/Nolde,
Sperrverfuegungen im Internet, 2008, page 53; Stol/Kaspersen/Kerstens/
Leukfeldt/Lodder, Filteren van kinderporno op internet, 2008, page 73;
27	Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 53; Stol/
Kaspersen/Kerstens/Leukfeldt/Lodder, Filteren van kinderporno op
internet, 2008, page 73.
28	Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 55
29	Regarding filter obligations/approaches see: Zittrain/Edelman,
Documentation of Internet Filtering Worldwide, available at: http://cyber.
law.harvard.edu/filtering/; Reidenberg, States and Internet Enforcement,
University of Ottawa Law & Technology Journal, Vol. 1, No. 213, 2004,
page 213 et. Seq., available at: http://papers.ssrn.com/sol3/papers.
cfm?abstract_id=487965; Regarding the discussion about filtering in
different countries see: Taylor, Internet Service Providers (ISPs) and their
responsibility for content under the new French legal regime, Computer
Law & Security Report, Vol. 20, Issue 4, 2004, page 268 et seq. ; Belgium
ISP Ordered By The Court To Filter Illicit Content, EDRI News, No 5.14,
18.06.2007, available at: http://www.edri.org/edrigram/number5.14/
belgium-isp; Enser, Illegal Downloads: Belgian court orders ISP to filter,
OLSWANG E-Commerce Update, 11.07, page 7, available at: http://
www.olswang.com/updates/ecom_nov07/ecom_nov07.pdf; Standford,
France to Require Internet Service Providers to Filter Infringing Music,
27.11.2007, Intellectual Property Watch, available at: http://www.ip-
watch.org/weblog/index.php?p=842; Zwenne, Dutch Telecoms wants to
force Internet safety requirements, Wold Data Protection Report, issue
09/07, page 17, available at: http://weblog.leidenuniv.nl/users/zwennegj/
Dutch%20telecom%20operator%20to%20enforce%20Internet%20
safety%20requirements.pdf; The 2007 paper of IFPI regarding the
technical options for addressing online copyright infringement , available
at: http://www.eff.org/files/filenode/effeurope/ifpi_filtering_memo.pdf;
Regarding self-regulatory approaches see: ISPA Code Review, Self-
Regulation of Internet Service Providers, 2002, available at: http://pcmlp.
socleg.ox.ac.uk/selfregulation/iapcoda/0211xx-ispa-study.pdf
30	Regarding the extent of transnational attacks in the most damaging
cyberattacks, see: Sofaer/Goodman, “Cyber Crime and Security – The
Transnational Dimension” in Sofaer/Goodman, “The Transnational
Dimension of Cyber Crime and Terrorism”, 2001, page 7.
31	Regarding the need for international cooperation in the fight against
Cybercrime, see: Putnam/Elliott, “International Responses to Cyber
Crime”, in Sofaer/Goodman, “ Transnational Dimension of Cyber Crime
and Terrorism”, 2001, page 35 et seq; Sofaer/Goodman, “Cyber Crime
and Security – The Transnational Dimension” in Sofaer/Goodman, “The
Transnational Dimension of Cyber Crime and Terrorism”, 2001, page 1 et
seq.
32	National Sovereignty is a fundamental principle in International Law. See
Roth, “State Sovereignty, International Legality, and Moral Disagreement”,
2005, page 1.
33	See Gercke, “The Slow Wake of A Global Approach Against Cybercrime”,
Computer Law Review International 2006, 142. For examples, see Sofaer/
Goodman, “Cyber Crime and Security – The Transnational Dimension”,
in Sofaer/Goodman, “The Transnational Dimension of Cyber Crime and
Terrorism”, 2001, page 16.
34	See: Lewis, “Computer Espionage, Titan Rain and China”, page 1,
available at: http://www.csis.org/media/csis/pubs/051214_china_titan_
rain.pdf
35	Gercke, “Understanding Cybercrime: A Guide for Developing Countries”,
ITU 2009, page 71.
36	This issue was addressed by a number of international organisations. The
UN General Assembly Resolution 55/63 points out: “States should ensure
that their laws and practice eliminate safe havens for those who criminally
misuse information technologies”. The full text of the Resolution is
available at: http://www.unodc.org/pdf/crime/a_res_55/res5563e.pdf. The
G8 10 Point Action plan highlights: “There must be no safe havens for
those who abuse information technologies”.
37	Regarding the impact on computer forensic and criminal investigations,
see: See Huebner/Bem/Bem, “Computer Forensics – Past, Present And
Future”, No.6.
38	With regard to the importance of encryption technology see: OECD
Report on Background and Issues of Cryptography Policy, 2007; The
importance of encryption is further highlighted by the fact that 74 per cent
of respondents of the 2006 E-Crime Watch Survey mentioned encryption
technology as one of the most efficient e-crime fight technologies. For
more information, see: “2006 E-Crime Watch Survey”, page 1.
39	Regarding the consequences for the law enforcement, Denning observed:
“The widespread availability of unbreakable encryption coupled with
anonymous services could lead to a situation where practically all
communications are immune from lawful interception and documents
from lawful search and seizure, and where all electronic transactions
are beyond the reach of any government regulation or oversight. The
consequences of this to public safety and social and economic stability
could be devastating”. Excerpt from a presentation given by Denning,
“The Future of Cryptography”, to the joint Australian/OECD conference
on Security, February, 1996. Regarding practical approaches to recover
encrypted evidence see: Casey “Practical Approaches to Recovering
Encrypted Digital Evidence”, International Journal of Digital Evidence, Vol.
1, Issue 3.
40	Regarding the use of cryptography by terrorists, see: Zanini/Edwards,
“The Networking of Terror in the Information Age”, in Arquilla/Ronfeldt,
“Networks and Netwars: The Future of Terror, Crime, and Militancy”,
page 37Flamm, “Cyber Terrorism and Information Warfare: Academic
Perspectives: Cryptography”, available at: http://www.terrorismcentral.
com/Library/Teasers/Flamm.html
38 FREEDOM FROM FEAR - July 2010
ITU (International Telecommunication Union) recogniz-
es that information and technology security are critical
priorities for the international community. Cybersecurity
is in everyone’s best interest and this can only be achieved
through collaborative efforts. Cyber threat issues are global
and therefore their solutions must be global too. It is vital
that all countries arrive at a common understanding regard-
ing cybersecurity, namely by providing protection against
unauthorized access, manipulation and destruction of criti-
cal resources. ITU believes that in developing a solution one
must identify all existing national and regional initiatives, in
order to foster collaboration with its multiple stakeholders
and avoid duplication of efforts. With its 191 Member States
and more than 700 Sector Members, ITU is uniquely placed
to propose a framework for international cooperation in cy-
bersecurity and assist in tackling cybercrime.
The World Summit on the Information Society (WSIS), which
met in Geneva in 2003 and in Tunis in 2005, called upon ITU
to act as the sole Facilitator of Action Line C5, “Building con-
fidence and security in the use of ICTs”. On 17 May 2007, ITU
Secretary-General, Dr. Hamadoun I. Touré, launched the
Global Cybersecurity Agenda (GCA) which is a framework
for international cooperation aimed at enhancing confidence
and security in the information society. A multi-stakeholder
High Level Experts Group (HLEG) comprising of more
than one hundred experts from Governments, Industry, In-
ternational organizations, NGOs and academic institutions
was established to further develop main goals, analyse cur-
rent developments in all areas of cybersecurity and formu-
late proposals on possible long-term strategies and emerging
trends in cybersecurity. In 2008, the HLEG put together the
Global Strategic Report which provided recommendations
on key steps forward for all five pillars of the GCA.
The GCA is a multi-stakeholder approach designed to pro-
mote collaborative work across the sectors of ITU namely,
the Radiocommunication Sector (ITU-R), the Standardiza-
tion Sector (ITU-T) and the Telecommunication Develop-
ment Sector (ITU-D). It has fostered initiatives such as Child
Online Protection, launched the Cybersecurity Gateway and
through its partnership with IMPACT and with the support
of leading global players is currently deploying cybersecurity
solutions to countries around the world.
The GCA is built upon five strategic pillars, also known as
work areas, and made up of seven main strategic goals.
The Five Pillars/Work Areas:	
1. Legal Measures
2. Technical and Procedural Measures
3. Organizational Structures
4. Capacity Building
5. International Cooperation
Legal Measures
To better understand the legal aspects of cybersecurity ITU
has devised cybercrime legislation resources. With these re-
sources, ITU is working to assist countries in moving towards
harmonizing legal frameworks. This activity also addresses
the ITU-D Study Group Q22/1 approach for organizing na-
tional cybersecurity efforts, highlighting that establishing the
appropriate legal infrastructures is an integral component of
a national cybersecurity strategy.
The ITU cybercrime legislation resources currently consist of
two main deliverables, the ITU publication titled ITU Toolkit
for Cybercrime Legislation and Understanding Cybercrime:
A Guide for Developing Countries.
Global Cybersecurity
Agenda
39FREEDOM FROM FEAR - July 2010
40 FREEDOM FROM FEAR - July 2010
ITU- IMPACT Collaboration
As the world’s first non-profit comprehensive global public-private partnership against cyber threats, the International Mul-
tilateral Partnership Against Cyber Threats (IMPACT) is well positioned to assist partner countries, especially developing
nations who are broadening their Internet capabilities.
On 3 September 2008, IMPACT and the ITU
formally entered into a Memorandum of
Understanding (MoU) in which IMPACT’s
state-of-the-art Global HQ in Cyberjaya,
Malaysia, effectively became the physical
and operational home of the GCA. Under
this landmark collaboration, IMPACT pro-
vides the ITU’s 191 Member States with the
expertise, facilities and resources to effec-
tively address the world’s most serious cy-
ber threats.
The partnership provides:
•	 Real-time analysis, aggregation and dis-
semination of global cyber-threat infor-
mation;
•	 Network Early Warning System (NEWS)
and emergency response to global cyber-
threats; and
•	 Training and skills development on the
technical, legal and policy aspects of cy-
bersecurity.
Current Deployment Status
41FREEDOM FROM FEAR - July 2010
Below is an alphabetical list of countries which have already
joined ITU-IMPACT collaboration:
Child Online Protection (COP)
Under the GCA umbrella, the ITU launched the Child Online
Protection (COP) initiative in November 2008. The COP ini-
tiative has been established as an international collaborative
network for action to promote the online protection of chil-
dren and young people worldwide by providing guidance on
safe online behaviour in conjunction with other UN agencies
and partners. It addresses the legal, technical, organizational
and procedural issues as well as capacity building and inter-
national cooperation.
Since its launch, COP has attracted the support and recog-
nition of leaders and experts from around the world. More
recently, the President of Costa Rica Mme. Laura
Chinchilla accepted the invitation to be the Patron of this
initiative.
The key objectives of the initiative are to:
1.	 Identify the key risks and vulnerabilities to children and
young people in cyberspace;
2.	 Create awareness of the risks and issues through multiple
channels;
3.	 Develop practical tools to help governments, organiza-
tions and educators minimize risk;
4.	Share knowledge and experience while facilitating inter-
national strategic partnerships to define and implement
concrete initiatives.
Cybersecurity Gateway
The purpose of the ITU Cybersecurity Gateway is to provide
an easy-to-use information resource on national, regional
and international cybersecurity-related initiatives world-
wide.
In today’s interconnected world of networks, threats can
originate anywhere, and thus our collective cybersecurity
depends on the security practices of every connected coun-
try, entity, business, and citizen. National and international
cooperation is needed among those who seek to promote,
develop and implement initiatives for a global culture of cy-
bersecurity. Through the Cybersecurity Gateway, ITU aims
to enable information access, dissemination and online col-
laboration among stakeholders working in cybersecurity and
related areas. The Gateway provides a platform to share in-
formation between partners in civil society, the private sec-
tor, governments and international organisations working on
enhancing cybersecurity. The ITU invites all interested par-
ties to explore the vast resources and links available through
the Cybersecurity Gateway and join in partnership with the
ITU and others to build confidence and security in the use of
ICTs. The Cybersecurity Gateway has been recently updated
with a newer version.
Conclusion
It is undeniable that ICTs form an integral part of society to-
day and that they will continue to do so in the future, with
the Internet connecting ever more parts of the world. ICTs
are constantly evolving, progressing and improving many
aspects of our lives. This also rings true for cyber threats as
they are intrinsically linked to ICT evolution. The ITU is very
serious towards its responsibility for WSIS Action Line C5,
“Building confidence and security in the use of ICTs”, and
is working hard to address the emerging challenges of the
Information Society. The Global Cybersecurity Agenda as an
international framework has helped ITU take a leadership
role in both cybersecurity issues and in WSIS implementa-
tion. It has helped build awareness of ITU’s activities among
experts within the field and won their commitment and own-
ership of the strategies developed by the HLEG.
The GCA continues onwards, forming partnerships and ena-
bling ITU Sectors to implement these strategies through con-
crete activities. Much has been achieved but cybersecurity is
a constantly evolving challenge, which needs to be continu-
ally addressed due to the ever changing nature of ICTs. ITU
will persistently work to build confidence and trust to ensure
a safe and secure cyber environment for all.
For more information log on to: www.itu.int/cybersecurity
Contact: cybersecurity@itu.int
42 FREEDOM FROM FEAR - July 2010
European Union
43FREEDOM FROM FEAR - July 2010
* Bruce Schneier
The Internet
Anonymous Forever
Universal identification is portrayed by some as the holy
grail of Internet security. Anonymity is bad, the argu-
ment goes; and if we abolish it, we can ensure only the proper
people have access to their own information. We will know
who is sending us spam and who is trying to hack into corpo-
rate networks. And when there are massive denial-of-service
attacks, such as those against Estonia or Georgia or South
Korea, we will know who was responsible and take action ac-
cordingly.
The problem is that it will not work. Any design of the In-
ternet must allow for anonymity. Universal identification
is impossible. Even attribution - knowing who is respon-
sible for particular Internet packets - is impossible. At-
tempting to build such a system is futile, and will only give
criminals and hackers new ways to hide.
Imagine a magic world in which every Internet packet
could be traced to its origin. Even in this world, our Inter-
net security problems would not be solved. There is a huge
gap between proving that a packet came from a particular
computer and that a packet was directed by a particular
person. This is the exact problem we have with botnets,
or pedophiles storing child porn on innocents’ computers.
Any design of the Internet must allow
for anonymity. Universal identification
is impossible
44 FREEDOM FROM FEAR - July 2010
In these cases, we know the origins of the DDoS packets
and the spam; they are from legitimate machines that have
been hacked. Attribution is not as valuable as you might
think.
Implementing an Internet without anonymity is very diffi-
cult, and causes its own problems. In order to have perfect
attribution, we would need agencies - real-world organiza-
tions - to provide Internet identity credentials based on
other identification systems: passports, national identity
cards, driver’s licenses, whatever. Sloppier identification
systems, based on things such as credit cards, are simply
too easy to subvert. We have nothing that comes close to
this global identification infrastructure. Moreover, cen-
tralizing information like this actually hurts security be-
cause it makes identity theft that much more profitable a
crime.
And realistically, any theoretical ideal Internet would need
to allow people access even without their magic creden-
tials. People would still use the Internet at public kiosks
and at friends’ houses. People would lose their magic In-
ternet tokens just like they lose their driver’s licenses and
passports today. The legitimate bypass mechanisms would
allow even more ways for criminals and hackers to subvert
the system.
On top of all this, the magic attribution technology does
not exist. Bits are bits; they do not come with identity
information attached to them. Every software system we
have ever invented has been successfully hacked, repeat-
edly. We simply do not have anywhere near the expertise
to build an airtight attribution system.
Not that it really matters. Even if everyone could trace all
packets perfectly, to the person or origin and not just the
computer, anonymity would still be possible. It would just
take one person to set up an anonymity server. If I wanted
to send a packet anonymously to someone else, I would
just route it through that server. For even greater anonym-
ity, I could route it through multiple servers. This is called
onion routing and, with appropriate cryptography and
enough users, it adds anonymity back to any communica-
tions system that prohibits it.
Attempts to banish anonymity from the Internet will not
affect those savvy enough to bypass it, would cost billions,
and would have only a negligible effect on security. What
such attempts would do is affect the average user’s access
to free speech, including those who use the Internet’s ano-
nymity to survive: such as dissidents in countries violating
human rights.
Mandating universal identity and attribution is the wrong
goal. Accept that there will always be anonymous speech
on the Internet. Accept that you will never truly know
where a packet came from. Work on the problems you can
solve: software that’s secure in the face of whatever packet
it receives, identification systems that are secure enough
in the face of the risks. We can do far better at these things
than we are doing, and they will do more to improve secu-
rity than trying to fix insoluble problems.
The whole attribution problem is very similar to the copy-
protection/digital-rights-management problem. Just as it
is impossible to make specific bits not copyable, it is im-
possible to know where specific bits came from. Bits are
bits. They do not naturally come with restrictions on their
use attached to them, and they do not naturally come with
author information attached to them. Any attempts to
circumvent this limitation will fail, and will increasingly
need to be backed up by the sort of real-world police-state
measures that the entertainment industry is demanding in
order to make copy-protection work.
Just as the music industry needs to learn that the world
of bits requires a different business model, law enforce-
ment and others need to understand that the old ideas of
identification do not work on the Internet. For good or for
bad, whether you like it or not, there is always going to be
anonymity on the Internet.
http://www.schneier.com/essay-308.html
This essay previously appeared in Information Security and in Forbes as the
first half of a point-counterpoint with Marcus Ranum (counterpoint which can
be found at http://searchsecurity.techtarget.com/magazinePrintFriendly/0,2
96905,sid14_gci1380347,00.html)
This article was republished with the author’s permission.
* Bruce Schneier is an internationally renowned security
technologist and author. Described by The Economist as a
“security guru”, he is the author of Applied Cryptography, Secrets
and Lies, Beyond Fear and Schneier on Security. Regularly
quoted in the media - and subject of an Internet meme - he has
testified on security before the United States Congress on several
occasions and has written articles and op eds for many major
publications, including The New York Times, The Guardian, Forbes,
Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney
Morning Herald, The Boston Globe, The San Francisco Chronicle,
and The Washington Post. Schneier also publishes a free monthly
newsletter, Crypto-Gram, with over 150,000 readers. In its ten
years of regular publication, Crypto-Gram has become one of the
most widely read forums for free-wheeling discussions, pointed
critiques, and serious debate about security. Schneier is the Chief
Security Technology Officer of BT. More from the author can be
found at www.schneier.com
Imagine a magic world in which every
Internet packet could be traced to its
origin. Even in this world, our Internet
security problems would not be solved
Implementing an Internet without
anonymity is very difficult, and causes
its own problems
45FREEDOM FROM FEAR - July 2010
Improve Maternal Health
For any enquiries contact: UN Millennium Campaign, Africa Office, Bishop Josiah Kibira House, All Africa Conference of Churches, Waiyaki Way, Westlands, Nairobi, Kenya.
Tel: 254 - 20 - 4453440 Fax: 254 - 20 - 4453444, Cell: +254 729 - 467197 Email: milleniumcampaign@undp.org Website: www.endpoverty2015.org
Millennium Development Goals
You and I Can Make It HappenYou and I Can Make It Happen
46 FREEDOM FROM FEAR - July 2010
* Giuseppe Vaciago
Privacy
vs. Security?
A Dilemma of the Digital Era
Over the coming years a crucial issue in dealing with cy-
bercrime will be the delicate balance that must neces-
sarily be struck between personal data protection, public
order, and security. If the stellar growth in e-commerce in
the last decade, was accompanied by increasing alarm about
the attendant potential for fraud (from e-bay scams to credit-
card cloning), the next ten years seem bound to be beset by
the headaches of cloud computing: who knows what dormant
dangers may be inadvertently aroused merely by surfing the
web, even without posting personal data online, or using so-
cial networks (all of which are exposed to data mining)?
In this specific context, given the enormous wealth and value
of the information that can be gleaned from the hard drives
of individual PCs, from mere web searches, not to mention
electronic intercepts, digital forensics and cloud comput-
ing which will certainly play an ever more decisive role in
criminal investigations. This trend, already underway, was
recently most singularly highlighted in the capture of a fugi-
tive member of the “N’drangheta” (a Mafia-type organization
operating in Calabria), one of Italy’s 100 most-wanted crimi-
nals, arrested because he frequently logged on to his personal
Facebook account using the nickname “scarface.”
Over the coming years a crucial issue
in dealing with cybercrime will be the
delicate balance that must necessarily
be struck between personal data
protection, public order, and security
©PavelMaximov
47FREEDOM FROM FEAR - July 2010
Social networks and digital data in
the public domain
Digital data useful for law-enforcement purposes, may be
broadly divided into information identifying a suspect (IP
Address), data retracing the latter’s web-browsing history
(server logs) and the content of the suspect’s online corre-
spondence (electronic intercepts). This type of data is indis-
pensable for identifying a person in the course of digital in-
vestigations. Although this kind of information is accessible,
as a general rule, only on the basis of warrants, subpoenas
or other discovery orders issued by the relevant authorities
against Internet service providers, a great deal of the data in
question may, in fact, be obtained indirectly through simple
web searches.
Corporations such as Intelius Inc., offer an impressive array
of highly effective services, supplying, for a fee ranging from
$1 to $10, information on each and every US citizen, includ-
ing residential address, fixed-line and cell phone numbers,
e-mail address, criminal records, creditworthiness, employ-
ment history and level of education.
Date Check, one of Intelius’ cell-phone supported services,
for instance, provides users with a full profile of potential
dates, with nothing more to start with than their telephone
number. The information offered includes not only personal
data, but also the target’s criminal record, if any, as well as
his or her earnings and assets, academic qualifications, and
most crucially, current marital status, all delivered in a mat-
ter of seconds and a few clicks on users’ mobile handsets, so
as to help them decide whether to start or continue a roman-
tic relationship.
Intelius Inc. states on its website that all the information it
provides is gleaned from public records: if true, this means
that public data placed online on a daily basis, holds the keys
to a vast variety of significant information which, until very
recently, was considered beyond the reach of prying eyes.
The user profiles on Facebook or any other social network
can be mined not only to reveal the account holder’s identity,
but also to “intercept” all the chats, posts and data passing
through the account, so as to analyze their content for infor-
mation useful to law enforcement agencies.
It is, therefore, obvious that data must also be classified on the
basis of whether or not they are accessible to the public. The
need for such a distinction is all the more pressing given that, so
far, it has received scant consideration at European level.
The U.S. Supreme Court has held that “the Fourth Amend-
ment does not prohibit “the obtaining of information revealed
to a third party and conveyed by him to Government authori-
ties, even if the information is revealed on the assumption
that it will be used only for a limited purpose.” If these princi-
ples are to be applied unmitigated in their present form to the
emergent reality of Web 2.0, they would enable intelligence
and law-enforcement agencies to indiscriminately mine all
information posted on social networks.
According to the results of a survey of over 2,000 Canadian
undergraduates by Toronto-based Ryerson University’s Pri-
vacy and Cybercrime Institute, young people overwhelm-
ingly tend to believe that information shared over personal
networks was automatically protected by a sort of “network
privacy” that did not however extend to content posted on
websites. In sharp contrast with this view, the same study
found, businesses and academic institutions recognize no
such notion and consider all information posted online, fully
in the public domain and undeserving of protection.
As the online information that could prove useful for solv-
ing, fighting and thwarting crime continues to grow in both
quality and quantity at a breathtaking pace, law-enforcement
agencies are bound to increase their reliance on data-mining
techniques. It is therefore urgent that at least the courts fo-
cus greater attention on the type and manner of acquisition
of online data deemed admissible as evidence in criminal
trails.
Lastly, as European data protection agencies have repeatedly
pointed out, it is also important for users, both young and
not-so-young, to take greater responsibility for the type of
content they post on these “virtual private premises.”
Data retention and Digital
wiretapping: US and Europe have
adopted two different approaches
Besides playing a crucial role in digital investigation, IP ad-
dresses can also be used to profile users for commercial pur-
poses, especially in combination with cookies, as underscored
in the recent European e-privacy Directive (2009/136/EC).
In 2008, the German data protection commissioner, Peter
Schaar, who headed the Article 29 Data Protection Working
Party (comprising all European privacy authorities), expressed
the view that IP addresses constitute personal data, and as
such, are protected under the European e-privacy Directive.
His remarks sparked a lively debate with certain US corpora-
tions which argued, on the contrary, that since an IP address
did not, in itself, identify the user, so it could not be deemed
personal information meritorious of protection under pri-
vacy regulations.
Torn between demands from European data protection au-
thorities and US privacy rights groups to curtail data reten-
tion on the grounds that corporations like Microsoft, Google
and Yahoo currently store far too much identification data for
Data must also be classified on the
basis of whether or not they are
accessible to the public
The online information that could
prove useful for solving, fighting and
thwarting crime continues to grow in
both quality and quantity
48 FREEDOM FROM FEAR - July 2010
far too long, on the one hand, and calls by law-enforcement
agencies for even more data be stored for ever longer periods
of time, on the other, ISPs are at a loss to decide which direc-
tion to take.
Although Europe has opted for highly detailed data retention
regulations (Directive 2006/24/EC, Article 5 states that IP
addresses and server logs may not be stored for less than six
months or more than two years), the issue is by no means
settled. Calls for similar regulations in the U.S. were met
with vigorous opposition and loud protests by both the EPIC
(Electronic Privacy Information Center) and the EFF (Elec-
tronic Frontier Foundation).
There was no dearth of criticism in Europe either: Article 29
of the Working Party’s document entitled “The Future of Pri-
vacy” noted that the Directive not only lacked some adequate
and specific safeguards as to the treatment of communica-
tion data, including provisions requiring an indication of the
purposes for which the data are stored, or of the persons and
parties authorized to access the retained information, but also
failed to clarify the types of data that may in no event be law-
fully stored or retained by ISPs and connectivity providers.
Recently, the German Constitutional Court outlawing the
national legislation on mass storage of telephone and web
traffic data, passed in implementation of the Directive. The
practical repercussions of this scenario are clear: when deal-
ing with an ISP in a jurisdiction bereft of data retention regu-
lations, such as the U.S., or Germany, law-enforcement of-
ficers could never be sure if the information they seek has
long been cancelled or is still in storage and admissible as
evidence.
Electronic interceptions of online communications are even
greater cause for concern in terms of privacy protection, than
merely identifying a user and perusing his/her web-browsing
history. Unlike phone calls, e-mails can be immediately in-
dexed using specific tags, and often contain exceedingly use-
ful attachments as well as other information shedding light
on the context of the exchange.
The fact that electronic intercepts make it possible to glean in-
formation which is undeniably more useful than that obtained
from telephone wiretaps does not seem to foster forms of tran-
snational cooperation that are more effective than the bilateral
instruments on mutual legal assistance currently in force. This
issue is particularly delicate since the world’s largest “holders”
of digital information are US-based corporations.
In a comment made at the 2001 Cybercrime Convention
(which was also ratified by the United States), the Council of
Europe laconically presented the issue of a Party permitted
to unilaterally access computer data stored in another Party
without seeking mutual assistance, stating that such a case is
particularly complex and could not be resolved “in part (...)
due to a lack of concrete experience with such situations to
date.”
Conclusions
While this article is intended to highlight the differences be-
tween the European and US approaches to privacy rights and
public order and security, and to spark further research and
debate on the issues involved, it does however lead to three
preliminary conclusions.
First and foremost, there are no winners or losers in the ef-
forts to strike a balance between personal rights and public
order and security, as these two following examples illus-
trate. On the one side, Europe adopted a data retention poli-
cy necessitating clearer definitions of the types of offences in
connection to which stored personal data may be subjected
to disclosure. On the other side, during the Bush administra-
tion the National Security Agency struck a deal with the main
national telecommunications carriers to set up a database
of the records of all the phone calls and online activities of
American citizens.
Secondly, the EU-US joint statement released in Washington
on 28 October 2009, as well as the Stockholm Program of
2 December 2009, are and must be treated as urgent calls
for the active implementation of the Cybercrime Conven-
tion. Without wishing to belittle the importance of this Con-
vention, however, it is clear that in an area such as Internet
which connects the entire world, Intergovernmental Organi-
sations also need to intervene, endeavouring to include as
many countries as possible.
The third and last conclusion is more of a hope: the huge po-
tential of the Internet cannot be exploited merely to keep in
touch with old classmates or make free video calls to family
and friends. It is precisely as a result of the global intercon-
nectivity it offers, allowing people from different countries
and backgrounds to share information and exchange ideas,
that the Internet must serve as the starting point for setting
up a framework of rules that reconciles privacy protection
with the public interest in detecting, investigating and pre-
venting crime both online and offline, in a manner satisfac-
tory to all. We managed to draw up the Universal Declara-
tion of Human Rights without the benefit of the Internet as
a universal instrument of peace. Imagine what we can now
do, with it.
* Giuseppe Vaciago is a lecturer in IT Law at University of Milan,
focusing his research on cybercrime and computer forensics.
Electronic interceptions of online
communications are even greater
cause for concern in terms of privacy
protection
The huge potential of the Internet
cannot be exploited merely to keep in
touch with old classmates or make free
video calls to family and friends
49FREEDOM FROM FEAR - July 2010
* Bruce Schneier
Cyberwar
Myth or
Reality?
The biggest problems in discussing cyberwar are the defi-
nitions. The things most often described as cyberwar are
really cyberterrorism, and the things most often described as
cyberterrorism are more like cybercrime, cybervandalism or
cyberhooliganism - or maybe cyberespionage.
At first glance there is nothing new about these terms except
the “cyber” prefix. War, terrorism, crime and vandalism are
old concepts. What is new is the domain; it is the same old
stuff occurring in a new arena. But because cyberspace is dif-
ferent, there are differences worth considering.
Of course, the terms overlap. Although the goals are different,
many tactics used by armies, terrorists and criminals are the
same. Just as they use guns and bombs, they can use cyberat-
tacks. And just as every shooting is not necessarily an act of
war, every successful Internet attack, no matter how deadly,
is not necessarily an act of cyberwar. A cyberattack that shuts
down the power grid might be part of a cyberwar campaign,
but it also might be an act of cyberterrorism, cybercrime or
even - if done by some 14-year-old who does not really un-
derstand what he is doing - cyberhooliganism. Which it is
depends on the attacker’s motivations and the surrounding
circumstances, just as in the real world.
For it to be cyberwar, it must first be war. In the 21st Century,
war will inevitably include cyberwar. Just as war moved into
the air with the development of kites, balloons and aircraft,
and into space with satellites and ballistic missiles, war will
move into cyberspace with the development of specialized
weapons, tactics and defenses.
I have no doubt that smarter and better-funded militaries
are planning for cyberwar. They have Internet attack tools:
denial-of-service tools; exploits that would allow military in-
telligence to penetrate military systems; viruses and worms
similar to what we see now, but perhaps country- or network-
specific; and Trojans that eavesdrop on networks, disrupt op-
erations, or allow an attacker to penetrate other networks.
I believe militaries know of vulnerabilities in operating sys-
tems, generic or custom military applications, and code to
exploit those vulnerabilities. It would be irresponsible for
them not to.
The most obvious attack is the disabling of large parts of
The biggest problems in discussing
cyberwar are the definitions
©NASA
50FREEDOM FROM FEAR - July 2010
Council of Europe
campaign
www.coe.int/antidiscrimination
51FREEDOM FROM FEAR - July 2010
the Internet, although in the absence of global war, I
doubt a military would do so; the Internet is too use-
ful an asset and too large a part of the world economy.
More interesting is whether militaries would disable
national pieces of it. For a surgical approach, we can
imagine a cyberattack against a military headquarters,
or networks handling logistical information.
Destruction is the last thing a military wants to ac-
complish with a communications network. A military
only wants to shut down an enemy’s network if it isn’t
acquiring useful information. The best thing is to in-
filtrate enemy computers and networks, spy on them,
and surreptitiously disrupt select pieces of their com-
munications when appropriate. The next best thing
is to passively eavesdrop. After that, perform traffic
analysis: analyze the characteristics of communica-
tions. Only if a military can not do any of this would it
consider shutting the thing down. Or if, as sometimes
but rarely happens, the benefits of completely denying
the enemy the communications channel outweigh the
advantages of eavesdropping on it.
Cyberwar is certainly not a myth. But you have not
seen it yet, despite the attacks on Estonia. Cyberwar
is warfare in cyberspace. And warfare involves mas-
sive death and destruction. When you see it, you will
know it.
http://www.schneier.com/essay-201.html
This essay first appeared on Information Security as the second half of a
point/counterpoint with Marcus Ranum (which can be found at http://
searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_
gci1280052_idx1,00.html)
This article was republished with the author’s permission.
* Bruce Schneier is an internationally renowned security
technologist and author. Described by The Economist as a
“security guru”, he is the author of Applied Cryptography,
Secrets and Lies, Beyond Fear and Schneier on Security.
Regularly quoted in the media - and subject of an Internet
meme - he has testified on security before the United
States Congress on several occasions and has written
articles and op eds for many major publications, including
The New York Times, The Guardian, Forbes, Wired, Nature,
The Bulletin of the Atomic Scientists, The Sydney Morning
Herald, The Boston Globe, The San Francisco Chronicle,
and The Washington Post. Schneier also publishes a
free monthly newsletter, Crypto-Gram, with over 150,000
readers. In its ten years of regular publication, Crypto-
Gram has become one of the most widely read forums for
free-wheeling discussions, pointed critiques, and serious
debate about security. Schneier is the Chief Security
Technology Officer of BT. More from the author can be
found at www.schneier.com
www.unodc.org/blueheart
“Wear” the Blue Heart on
your website, your Facebook
profile, your products, your
publications — above all
“wear” it on your heart!
Don´t let us forget those
without a voice.
Join with us
in this fight!
For more information on what you can do
to support the campaign and “wear” the
Blue Heart:
www.unodc.org/blueheart
Photos: Kay Chernush for the U.S. State Department
Printed in Austria
April 2009
Destruction is the last thing a
military wants to accomplish with a
communications network
52 FREEDOM FROM FEAR - July 2010
The rapidly changing nature of information and communications
technologies suggests that as soon as new hardware, software or
other applications are introduced, they will be exploited in some form
or fashion by international criminal organisations. The speed at which
criminals can exploit these technologies is truly remarkable. Unfor-
tunately, law enforcement and the criminal justice system, bound by
limited budgets, finite training, and traditional legal regimes are much
slower in their abilities to respond.
Cybercrime has, and will continue, to evolve overtime. From the early
days of phone phreaking and the hacking of Bulletin Board Systems
(BBS’s), information technology crime has transformed itself to in-
clude a much broader spectrum of criminal activities comprising pre-
viously unimagined technical forms of malfeasance, such as computer
viruses, worms and Trojans; hacktivism, phishing, botnets, critical in-
formation infrastructure attacks and even cyber-terrorism.
Given the significant advances in computer processing power and the
growing number of Internet users around the world, it should come
as no surprise that newer forms of criminal conduct in cyberspace are
surfacing, to include crime and disorder in “virtual worlds”1
as well.
* Marc Goodman
Crime and Policing
in Virtual Worlds
What are virtual worlds?
The concept of “virtual reality” is new to law
enforcement agencies around the world.
Yet every day, millions of people connect
in these 3-D worlds to socialise, shop and
learn. Unfortunately, lawbreakers have also
joined these virtual worlds and the full range
of criminal activities is now also present.
Common “real world” crimes are occurring
every day in virtual worlds, including money-
laundering, theft of intellectual property,
exchange of child abuse images and even
suspected terrorist activities. For these
reasons, new virtual worlds and communities
pose a unique set of challenges for the criminal
justice system. Moreover, the near total lack of
requisite jurisprudence means that criminals
are often free to act with impunity.
On the Ever-Evolving Nature of Cybercrime
53FREEDOM FROM FEAR - July 2010
Features of Virtual
Worlds
Virtual Worlds can often be classified
according to their specific features.
The most commonly seen types of
virtual worlds break down into two
general categories: game-playing and
community-based, although they of-
ten share some characteristics of the
other. One of the interesting develop-
ments with certain Virtual Worlds is
the possibility of transforming gains
generated within these online spaces
into real world money.
As a result, a whole new breed of en-
trepreneurs has developed and several
“virtual industrialists” have turned
virtual world activities into real world
profits. Perhaps the most famous of
these virtual world entrepreneurs is an
individual whose Second Life charac-
ter is known as Ailin Graef, but in re-
ality is controlled by Chinese national
Anshe Chung. Chung created a real es-
tate company within Second Life and
as a result became the first “real world”
millionaire based solely upon her ac-
tivities in virtual worlds.2
In short, “virtual worlds” create an al-
ternative reality where users can rep-
resent themselves as they wish, in just
about any format they desire through
their “avatars.” Men can become wom-
en, women men, adults may become
children and human beings may trans-
form themselves into animals, super-
heroes or monsters.
Virtual worlds often contain elements
common to other types of online activi-
ties, such as MMORPGs (Massive Mul-
tiplayer Online Role-Playing Games).
MMORPG’s are videogames that allow
thousands of players to simultaneously
enter a virtual world and interact with
one another. Players can run their own
“cities and countries,” stand up armies
to win battles and go on any variety of
“quests” with their own avatars. These
avatars are completely customizable.
Within MMOG’s participants may
communicate with each other through
a variety of means, including text chat
or real time voice communication, us-
ing technologies such as VOIP to carry
their messages.
Psychology of Virtual
Worlds
To many that live in the “First World,”
the concept of a Second or Virtual
World may not make much sense at
all. Many criminal justice officials may
be asking themselves why individu-
als would spend so much time in these
simulated environments. The answers
are complex and are not yet fully un-
derstood by psychologists. To many,
virtual worlds offer not just a form of
entertainment, but also a means of es-
capism, a way of creating an alternative
environment that is much more attuned
to the user’s liking. The fantasy lives
permitted via these virtual worlds cre-
ate almost unlimited opportunities for
escapism, starting from the fact that an
avatar does not need to have any verisi-
militude to how one appears or behaves
in real life.
In order for any investigator to under-
stand virtual worlds, the crimes that
take place therein, and the suffering of
victims of “virtual crimes,” it is critical
that the investigator gain insight into
the mindset of virtual spaces’ “inhabit-
ants.” Many of them sincerely see their
“second lives” as “first lives,” to the ex-
tent that, for the more extreme partici-
pants (about 20% of MMORPG gam-
ers), the real world (a.k.a. “meatspace”)
is nothing more than a secondary home
in which to eat and sleep, while the vir-
tual world clearly represents in their
minds their first place of residence and
interaction.4
Until one fully grasps the how real the
“reality” in virtual worlds is to its par-
ticipants, it will be impossible to suc-
cessfully understand the mindset of
both the criminals and the victims who
participate in these new virtual com-
munities. Only by understanding this
mindset can one begin to comprehend
why somebody might show up at their
police station to report a virtual rape,
a virtual assault, a virtual burglary or a
virtual suicide.
Economics
Millions and millions of euros are
spent each year in various online vir-
tual worlds. While the idea of a “virtual
economy” versus a real world economy
might sound strange at first, most vir-
tual worlds allow for some exchange of
goods and services, either through bar-
tering systems, or by overcoming vari-
ous game challenges or through the use
of “virtual currency.”
While previously many of these econo-
mies were strictly virtual, recently there
has been a cross over between vir-
tual worlds’ economies and real world
economies. Some virtual worlds actu-
Common Virtual Worlds
There are dozens, if not
hundreds, of virtual worlds
and MMORPG’s in existence
today, with new ones emerging
increasingly frequently. Perhaps
one of the most popular virtual
worlds is Second Life (SL),
which was established by
Linden Labs in 2003. SL has
grown significantly over the past
years and has an international
reputation as one of the
preeminent non-game based
virtual reality worlds.
Among MMORPG’s, the World
of Warcraft (WoW) is perhaps
the most popular worldwide.
Players control a character/
avatar within the game world,
exploring the landscape,
fighting monsters, completing
quests and interacting with
Non-Player Characters (NPCs )
or with other players.
Other common virtual worlds
and MMORPG’s include Club
Penguin, Lineage II, Habbo,
HiPiHi, Runescape, Entropia
Universe, Gaia Online and
IMVU. The number of users in
virtual worlds is impressive,
with tens of millions of
individuals visiting these
spaces every month. Blizzard
Entertainment’s World of
Warcraft alone has over 11
million active subscribers:3
if
WoW were it’s own country, it
would be the 75th largest in
the world, surpassing Belgium,
Portugal, Sweden, Austria
and Switzerland in terms of
population size.
54 FREEDOM FROM FEAR - July 2010
55FREEDOM FROM FEAR - July 2010
ally have currency exchange rates with
real world currencies such as dollars,
pounds, RMB and euros. That means it
is possible to buy Linden Dollars or En-
tropian dollars with Swedish krona or
Brazilian reals. Often virtual currencies
trade with or without authorization in a
booming secondary market, which op-
erates without any regulations, opening
the door to further criminal opportuni-
ties.
Real Crimes in Virtual
Worlds
Many police officials, including sea-
soned and experienced cybercrime
investigators, may not have yet inves-
tigated a case involving a virtual world
or MMORPG. Faced with already over-
whelming caseloads from traditional
forms of cybercrime, such as hacking,
Internet fraud and online child abuse
images, few investigators want addi-
tional work from virtual cases. That
said, we believe that virtual world
crimes merit further examination given
their inevitable emergency into the dai-
ly workload of cybercrime investigators
around the world.
While it might be tempting to ignore
MMORPG crimes as being purely vir-
tual in nature, and thus not “real,” the
vast majority of virtual crimes have real
world victims. While one can certainly
argue whether “virtual rape” indeed con-
stitutes “real rape,” let there be no doubt
about the economic or psychological
effect of these crimes on their victims,
since these virtual spaces are every bit as
real to their inhabitants as is the physi-
cal world to most investigators.
Economic Crimes
Given the size of virtual world econo-
mies, it should not be surprising that
many of the crimes committed in virtu-
al spaces involve financial fraud or oth-
er nefarious activities for criminal eco-
nomic gain. Virtual World economist
Edward Castronova has estimated the
value of all the goods and services pro-
duced in virtual worlds to be between
7-12 billion US dollars per annum. He
further noted the economic transfer of
at least 1 billion dollars in virtual cur-
rencies per annum as of May 2009.5
As such, the virtual economy dwarfs
the “real world” economy of dozens of
countries around the world.
The proliferation of virtual currencies,
such as Linden Dollars, WoW gold,
QQ coins and so many others, has cre-
ated an attractive economic target for
international organised crime groups.
Long gone are the days where hackers
engaged in criminal activities merely
for the “fun” or “challenge” of the mat-
ter. Modern organised crime seeks first
and foremost financial gain and the
amount of money in MMORPG’s poses
an incredibly enticing target for them
and the millions of MMORPG users
can become to organised crime a read-
ily accessible victim-base. The emer-
gence of some dominant companies
in the MMORPG field, such as Second
Life and World of Warcraft, has meant
that criminals can now create computer
malware and social engineering scams
to specifically locate and target large
numbers of potential victims.
Financial Frauds
There are several tried and tested ways
of committing financial fraud in virtual
worlds, including social engineering,
exploiting or hacking MMORPG servers
and the introduction of malicious com-
puter code into an individual’s virtual
world environment.6
Social engineering
attacks occur when cyber criminals en-
ter an MMORPG or an associated, but
independent, gaming forum where they
search out users and offer them help or
various bonuses to help “improve” their
user experience or increase their gam-
ing level. In exchange they solicit user
names and passwords so that they can
carry out the purported helpful work.
The Role of Malware
These malicious programs or computer
Trojans enable a wide variety of crimi-
nal activities in MMORPG’s, including
the theft of virtual goods and money.
The number of malware programs spe-
cifically directed at virtual worlds and
online gaming has increased dramati-
cally over the past few years. In fact, ac-
cording to computer security company
Kaspersky Laboratories, over 30,000
new malicious programs specifically
targeting online games were introduced
in 2008.7
Money laundering
Over the past decade, a number of new
alternative forms of payment have been
introduced throughout the world to
keep up the growing volume of elec-
tronic commerce. The most famous of
these companies is PayPal, which be-
came a wholly owned subsidiary of eBay
in 2003. PayPal made it easier for pay-
ments to be made through the Internet
and serves as an electronic alternative
to traditional paper money, checks or
bank money orders. It can be very use-
ful for the vast majority of the planet’s
inhabitants that do have access to a
credit card. Of course alternative pay-
ment systems also open up the doors to
alternative forms of money laundering.
While PayPal was certainly revolution-
ary in its approach, it always settled
transactions in well-established forms
of national currency, such as dollars,
yen or euros. Over the past few years
however, a number of virtual worlds
have begun to issue their own forms of
currency. With names like the Linden
Dollar (used by Linden Lab’s Second
Life), World of Warcraft Gold (from
Blizzard Entertainment) or QQ Coins
(by Tencent Limited), these virtual cur-
rencies are being used by literally tens
of millions of people worldwide. There
have been various estimates of the size
of the virtual world economy, but some
estimates have placed it in the billions
of (US) dollars.
Given the vast sums of money being
transferred among parties around the
world, it should not be surprising of
course that criminals would want to
take advantage of this money flow.
With little if any regulation, virtual
world economies are ripe for exploita-
tion by organized crime, terrorists and
others who wish to launder large sums
of money.
While virtual world money laundering
has theoretically been a possibility for
some time, the following case clearly
shows that theory has now been put
into practice, to the tune of $38 million
US dollars. As the Seoul Metropolitan
56 FREEDOM FROM FEAR - July 2010
Police Agency (SMPA) demonstrated,
a group of Chinese and Korean crimi-
nals were able to successfully defraud
Korean game players and then launder
the funds through a number of busi-
ness front companies back in mainland
China.
Extortion
In further evidence demonstrating
the growing value of virtual world
goods, a court in China handed down
a 3-year prison sentence in mid-2009
to a known gang member for extort-
ing virtual goods. According to Chinese
officials, three suspects cornered the
victim in a cyber café and noticed he
had a particularly large balance of vir-
tual goods in his QQ-Tencent account.
An assault ensued and the victim was
forced to turn over the equivalent of
nearly 100,000 RMB of the virtual cur-
rency QQ coins.8
This case is interesting
in that it shows that virtual goods must
be of value in order for the arrest and
prosecution to have occurred. As vir-
tual goods proliferate, more and more
individuals could become victims of
virtual thefts and extortions.
Possession of Child
Abuse Images
By the very nature of their entertainment
value, virtual worlds and MMORPGs are
attractive to people of all ages, and in
particular to young people. The enticing
cartoon-like graphics, the gaming poten-
tial and the entertainment value all make
virtual worlds of interest to a younger
audience. Of course this is not to say that
children are the only ones using virtual
worlds. In fact, across the board, most
users in MMORPG’s are in the 20’s and
30’s, but average ages vary greatly from
game to game. Second Life tends to draw
an older crowd than Disney’s Club Pen-
guin for example, which targets children
from 6 to 14 years of age.
Many virtual worlds allow for outside
connections and communications: text
chats, real-time voice over internet pro-
tocol (VOIP) conversations, exchanges
of photographic and video images with
one another. While friends might want
to do this for legitimate purposes, there
certainly could be criminal implications
as well.
For example, a number of paedophiles
could create avatars in Second Life pro-
viding false identification details. They
could meet each other in various chat
rooms/islands dedicated to “child love”
or “Lolita” or any other such keyword
and begin socializing with each other.
One of the paedophiles (represented by
his avatar) could readily build a movie
theatre on the island of his choice and
show whatever streaming video file he
chooses. So in effect, it would be en-
tirely possible to have a virtual room
full of paedophiles watching real child
abuse images (photos, videos, etc) of
real children.
Age Play
While few would argue that the ex-
change of real child abuse images,
whether done in person, on IRC (In-
ternet-relay chat) or in a virtual world
should be a criminal matter, the de-
piction of virtual children engaging in
sexual activity proves much more dif-
ficult. For example, in Second Life, you
can choose and dress you avatar as you
wish, thus a 56 year old man could in-
habit the avatar of a 12 year old girl and
could then script that avatar to engage
in various sexual activities. To those ob-
serving in Second Life, it would look as
if the “12 year old girl” was engaging in
sexual activities, while in reality it is the
older man using the avatar for his own
sexual purposes.
Shouldsuchactivitiesbeacrime?Across
the world, government legislatures are
answering this question differently.
In Germany, Ireland and many other
European countries the possession of
“virtual child pornography” is consid-
ered the legal equivalent of possessing
“real” child pornography and is equally
punishable by law. In the United States
the courts have ruled that “virtual”
child sex depictions are a form of fan-
tasy and, as such, they do not constitute
criminal behaviour because no actual
child was ever abused or photographed
in the production of those virtual child
abuse images. Others have argued that
only somebody predisposed to abus-
ing a real world child would want to act
out sexually as a virtual child. Those in
opposition responded that democratic
societies should not have “thought po-
lice” and that a fantasy life that does not
cross the threshold into harming others
should not be criminalized.
One of the largest and most infamous
cases of age play occurred in Second
Life in an area known as “Wonderland.”
There, young “children” avatars were
offering sex in a playground environ-
ment. The young children were in this
context not real children, but graphical
representations, the so-called avatars,
and the playground was a virtual play-
groundcreatedwithcomputersoftware.
The case created a strong rebuke from
law enforcement authorities and pros-
ecutors in Germany opened a criminal
case in the matter. Another such case
was investigated by the British police.
Rape/Sexual Assault
Perhaps no other form of virtual world
crime endangers quite as much passion
amongst participants as the discussion
of“virtualrape.”Tosome,itisverymuch
a crime as “real” world rape. Doubters
dismiss the possibility outright, noting
that rape is impossible without a human
victim who has been physically attacked
or violated. Despite the differences,
more and more police agencies around
the world are having victims of these
types of crimes present themselves and
demanding police redress.
A “virtual rape” occurs when one per-
son’s avatar is forced into a sexual
situation against his/her desire. To
be clear, this type of crime is differ-
ent from consenting adults acting out
a fantasy version of rape for whatever
reasons. Virtual world rape is alleged
when one of the participants is an un-
willing participant in the act. Graphics
in MMORPG’s and virtual worlds have
progressed enormously, to the point
that they can accurately represent real
world scenarios fairly well. As such,
an involuntary sexual assault could be
perceived as having verisimilitude to
the actual real world act. While many
virtual worlds such as Second Life have
built-in technical protections to prevent
such activities from occurring, they can
occur elsewhere through the introduc-
57FREEDOM FROM FEAR - July 2010
A NEW AND ADDICTIVE DRUG
C O R R U P T I O N
The phenomenon of corruption has always existed, nonetheless it is only in recent years that awareness of it has grown at
the international level.
Corruption is a phenomenon that is not limited by politics or geography.
It exists in rich countries and in poor countries.
The economic impact of corruption is difficult to establish with precision; in fact, available data is often inconsistent.
On the international level, the fight against corruption requires that people work together to increase transparency in eco-
nomic and financial transactions and to enact within different countries uniform legislation in this area.
INTERNATIONAL
LEGALRESEARCHGROUP
Call for Applicants
Applications are invited from all ELSA members, coming from the Mediterranean Countries, whether new or
experienced.
However, you will need to show evidence of commitment to the values and goals of ELSA.
Applicants must also have sufficient knowledge and interest in the topic, but no specific area of Law is pri-
vileged, as the corruption phenomenon can involve any legal field.
Evidence of previous dissertations or researches will also help your application.
Participants are expected to work on the issue from December 2010 to July 2011.
They will need regular access to e-mail and the internet; it is advised to keep a good communication flow,
exchanging emails on a regular basis.
REGISTRATIONDEADLINE:20THNOVEMBER2010
Fill in the Application Form (www.elsa.org)
Send it to your Local VP AA
For further information:
preventcorruption@elsa.org & www.elsa.org
58 FREEDOM FROM FEAR - July 2010
tion of malicious code that forces an
avatar to do something against its will.
Again a review of the psychology of
virtual worlds is critical here. To an
individual who spends 12 hours a day
inside a MMORPG living through their
avatar, any activity that occurs to that
avatar against its owner’s will can be
troubling. For some seeing one’s avatar
undergo a graphic representation of a
violent sexual attack clearly would have
a negative impact to the psyche of the
avatar’s owner. Whether this harm is
as serious as a “real world rape” is very
much debated openly and is beyond the
scope of this report. That said, many
such cases are occurring and are being
reported to law enforcement around
the world.
In Belgium recently, federal prosecu-
tors asked the Belgian Federal Compu-
ter Crime Unit to travel to the scene of a
crime in Second Life for the purpose of
investigating a “virtual rape” involving
a Belgian victim.9
This type of activity
has been around for a very long period
of time. The first most widely reported
case of virtual rape was documented in
1993, long before today’s MMORPG’s
existed.
Despite how police may or may not feel
about such cases, one thing is certain,
they will be increasingly reported to po-
lice. As such, law enforcement should
have a plan in place to deal with them
and to secure any potential crime scene
in search of evidence of criminal activity.
Stalking/Griefing
One of the most common complaints
and potential criminal activities in
virtual worlds/MMORPG’s is that of
harassment, intimidation or stalking.
This often occurs when an individual
becomes the subject of unwanted atten-
tion or focus by another person (avatar)
or group of them. In virtual worlds, this
type of activity is commonly referred to
as “griefing.”
Perhaps it is not surprising that all the
pettygrievances,insults,argumentsand
disorders that occur in the “real world”
also occur in “virtual world” spaces. A
griefer is not playing an online game or
inhabiting an MMORPG for any useful
purpose, except to harass or intimidate
others. They may have uncovered un-
documented technical aspects of the
virtual world software and exploit these
glitches or features to purely harass
other players or inhabitants. For those
victimized by such behaviour, it can be
extremely annoying and it could feel
like the real world equivalent of stalk-
ing or harassment.
Prostitution
Prostitution is certainly common in
virtual worlds and MMORPGs, but one
must be careful about how one defines
the term. Some individuals are will-
ing to pay for their avatar to engage in
simulated sexual conduct with another
avatar for money (virtual currency or
real). While this may or may not vio-
late the terms of service of the virtual
world itself, it would not be a criminal
offense in many jurisdictions, assum-
ing all parties were consenting adults.
In other jurisdictions, even simulated
sexual contact in exchange for money
would be criminal.
While most police forces might not pur-
sue strictly virtual prostitution between
adults (especially when all activities
were purely online within the MMOR-
PG), there are many overlapping tech-
nologies that can make this type of ac-
tivity a hybrid cross between the virtual
and the real. For example, many virtual
worlds allow users to incorporate VOIP
communication into the MMORPG en-
vironment. Thus the addition of voice
communication as part of the prosti-
tution scenario might further push the
boundaries of what is legal in some ju-
risdiction.
In other cases, pure acts of prostitu-
tion in the real world have taken on
a virtual world component. In one of
the most famous cases known as the
“Epic Mount” case, a woman offered
sexual encounters in the real world in
exchange for money: 5,000 pieces of
World of Warcraft gold. The woman
claimed she needed the money to pur-
chase her “epic flying mount.” Since
WoW gold can be exchange for real
world currency (euros, dollars or yen)
it has a real world value based on mar-
ket conditions, and given the exchange
of said currency for a real-world sexual
act, that woman could be punishable in
many jurisdictions.
Riots/Public Disorder
Though it might seem odd to talk about
riots or public disorder issues in virtual
worlds, they are in fact, not that un-
common. For example, during the most
recent round of elections in Spain, most
politicians had established a virtual
presence in Second Life. Some politi-
cians had even established their own
avatars, which in turn campaigned,
held rallies and put up election posters
in virtual spaces. While things worked
well for a while, politicians from one
party were quickly overwhelmed with
griefing by opposition supporters.
This is of course not the first time such
a thing has happened. During a recent
political rally by a far-right French poli-
tician, his posters were defaced, he had
“exploding virtual pigs” hurled at him
and Nazi swastikas were painted on
campaign headquarters.10
Surely when incidents as these occur,
especially when they involve high-level
politicians, law enforcement will be
contacted. Whether or not police are
able to respond to such matters under
national law is another question. The
fact is, however, that the public will in-
creasingly expect their police service to
handle incidents such as these.
59FREEDOM FROM FEAR - July 2010
Conclusions
The evolving nature of modern science portends that as
new information and communications technology tools
are introduced, so too will criminal exploits for these
technologies. The aforementioned focus on virtual world
crime was provided to highlight how a simple new tech-
nology can be utilized by criminals to commit a wide va-
riety of offenses. As has been noted, almost any crime
that can occur in the real world can also be committed in
virtual spaces. From child abuse to terrorist attacks, po-
lice will increasingly encounter a plethora of offences in
virtual spaces. In order to keep these virtual spaces safe
and crime free, criminal justice professions should con-
tinue to work with industry and academia to ensure the
greatest possible cooperation in trying to minimise any
social harm resulting from these technological develop-
ments. The size of the financial gain to be made by mod-
ern criminals will ensure that virtual worlds continue to
be targeted for illicit purposes. Moreover, as human so-
cial interactions increasingly migrate from “real space”
to virtual space, so too will the panoply of social ills and
harms. Given the complexity of the issues involved, now
is the time to begin thinking about and responding to
these concerns before the virtual crime wave spills over
into the real world.
* Marc Goodman is a visiting researcher at the University
College Dublin’s Centre for Cybercrime Investigation. He also
serves as a Senior Advisor to Interpol’s Steering Committee
on Information Technology Crime, where he chairs the
organisation’s working group on Next Generation Cyber
Threats.
1	 A virtual world is a type of online community that often takes the form of a computer-based simulated environment, through which users can interact
with one another and use and create objects, often in 3D virtual environments. In virtual worlds, users often take the form of avatars visible to others as
graphical representation of the users.
2	 According to: www.el-universal.com.mx/articulos/36445.html. See also Business Week Magazine’s feature article on Chung: http://www.businessweek.
com/magazine/content/06_18/b3982001.htm
3	 http://en.wikipedia.org/wiki/World_of_Warcraft
4	 http://motherjones.com/politics/2007/05/even-better-real-thing
5	 http://edition.cnn.com/2009/TECH/05/19/online.currency/index.html
6	 For a good overview of fraud in online gaming environments, see the white paper by Kaspersky Labs entitled “Online games and fraud: a source of easy
money,” available at: http://www.kaspersky.com/au/reading_room?chapter=207716493
7	 http://www.kaspersky.com/au/reading_room?chapter=207716493
8	 http://www.virtualgoodsnews.com/2009/05/chinese-man-faces-three-year-sentence-for-virtual-currency-extortion.html
9	 Source: http://virtuallyblind.com/2007/04/24/open-roundtable-allegations-of-virtual-rape-bring-belgian-police-to-second-life/
10	http://www.guardian.co.uk/technology/2007/jan/20/news.france
60 FREEDOM FROM FEAR - July 2010
Most governments and founding char-
ters originated at least 200 years ago:
the United States Constitution (which then
also served as a basis in most Latin Ameri-
can countries), and democratic governments
such as those of the United Kingdom and
France. Moreover, the concept of democracy
is even older than that, dating back to the ideas of Socrates,
Plato and Aristotle.
Cybernetics, however, which is literally the science of gov-
ernment as it studies the structure of regulatory systems, is
only about 63 years old. Many years ago I asked myself: What
are current governments doing right or missing? What does
Cybernetics have to do with the world of Law, given that laws
are about controlling people’s behaviour?
Rather than telling you the long-winded story, I want to “in-
fect” you with a quick and valuable insight and an example
of my findings.
If you think that “systems” have been around for a long time
and that they have had their chance to make their impact on
the world, please reconsider. Reductionist thinking has be-
come so engrained in our culture that it has become invisible.
We think that just because we are able to take things apart,
we know how they work. Complex systems though are inher-
ently tricky.
Systems thinking, the process of analyzing and understand-
ing how things work and how they influence each other, is
something absolutely necessary when designing a govern-
ment, otherwise it just won’t work. I learned about manage-
ment cybernetics (the science of managing organizations)
under Stafford Beer’s guidance, who first introduced this
concept of analyzing management and organizations in the
late 1950s. I discovered with great joy for instance, that the
American Constitution can be mapped in detail by his Viable
System Model (VSM). Stafford built this model after stand-
ing on the shoulders of the giants of cybernetics such as Nor-
bert Wiener, W. Ross Ashby and others.
* Javier Livas
Cybernetics and Law
What are current governments doing
right or missing? What does Cybernetics
have to do with the world of Law, given
that laws are about controlling people’s
behaviour?
61FREEDOM FROM FEAR - July 2010
The modern state is a highly complex
system. Stafford Beer discovered that
nature and living things seem quite
multifarious, but not as much as they
would appear to be. Nature’s secret
for creating complexity is a little magic
trick called recursiveness, of which the
human body is the best and closest ex-
ample: cells, tissues, organs, each of
these are a living entity working togeth-
er as one.
Living things have evolved thanks to
genetic evolution. Ideas and concepts
evolve too. Lately, we speak about me-
mes (copiable packages of information),
and about memetic evolu-
tion, which results from
meme mutation. Brains
or minds copy memes and
change them; the amount
of copying done by autono-
mous agents depends on
the meme’s usefulness. De-
mocracy, for instance, was a
meme originally created by
the Greeks, but it has come
to mean many other things
now.
Legal solutions and insti-
tutions are memetic super
packages. They are meme
complexesthathaveevolved
slowly: from Greece to the
Middle Ages, through the
Industrial Revolution, and
the Atomic Era.
If you research what a legal
system is, you will find it de-
fined as a system of rules, or
norms or some other kind of order, but
you are never referred to its ultimate
essence: information. The legal realm
is a world of guidelines with which to
govern. Laws and constitutions are
like instruction manuals telling people
what to do in many different situations.
As such, they resort to previous agree-
ments, such as the meanings contained
in a dictionary, in order to be under-
stood and obeyed.
The Viable System Model (VMS) ex-
plains in great detail how several sys-
tems connect to one another to create
a greater one, a whole which emerges
from simpler parts and can do things
that the individual components cannot
do themselves. Building these connec-
tions and communication lines is what
the law has been doing for many cen-
turies now. Furthermore, emergence is
what makes a system behave consist-
ently. Businesses use the holistic syn-
ergy (2+2=5) to signify that the whole
is greater than the sum of its parts.
Cybernetics was born as a strictly math-
ematical science, using sophisticated
statistical methodologies discovered by
Norbert Wiener when he was studying
Brownian motion in gases (the seem-
ingly random movement of gas parti-
cles). When cybernetics evolved to be-
come a scientific paradigm, it did not
discard its mathematical foundations,
but it simply built on top of them. Man-
agement Cybernetics, Stafford Beer’s
brainchild, is built on Set Theory and
on Ashby’s Law of Requisite Variety,
which states that the regulator must
match the variety of the regulated sys-
tem in order to assure control.
The variety of a system has been defined
as the number of different states that
the system is capable of showing. When
you have a system as large and com-
plex as the nation-state, the number of
potential individual behaviours is un-
imaginable and yet, somehow, control
and an ordered society manage to make
its way through. This is thanks to the
facts that laws have evolved following
certain cybernetic control principles in-
tuitively. This is not a small merit of the
legal system.
Therefore, if we opt for redesigning
governance, we can do so with a very
clear knowledge of how not to produce
unwanted side effects. We can map the
interactions and identify the positive
and negative control loops. Positive
feedback is like the acceleration made
possible by a car’s engine, while nega-
tive feedback is used for con-
trol, such as the brakes and
the steering wheel.
Legal systems use circular
causality, even if lawyers do
not identify it as such. For
instance, the legislative proc-
ess is an example of a circular
causality system. It is assumed
that laws are not approved
to work forever: lawmaking
presupposes the need to go
back and adapt legislations to
the changing circumstances.
These are clearly cybernetic
mechanisms at work.
When I say that Law has dis-
covered the VSM without any
knowledge of cybernetics it is
because trial and error leads
to solving governance prob-
lems and, eventually, a system
of checks and balances has
proved to be a wise solution.
Well, checks and balances is another
word for homeostats, which nature
uses to get results while maintaining
an internal stability. What many people
have not noticed is that legal systems
use contradictory values to balance
the performance of the system. Some
jurists are aware of the contradictions
within the process, which can imply as-
sumptions such as: justice is the enemy
of certainty; liberty is the enemy of or-
der and so on.
Lawyers are proud users of Aristotelian
logic, the syllogistic logic of “All men
are mortal; Socrates is a man; therefore
Socrates is mortal.” This is the supreme
Focus on
62 FREEDOM FROM FEAR - July 2010
tool of the legal process, also used in defining the burden of
proof.
However, what may seem as a chain of syllogistic reasoning
could create an aberration. Consider the rules of “probable
cause,” which have degenerated into a bureaucratic mess
that hinders the expedition of search warrants. Why not use
a more systemic approach to the problem? What if several
neighbours were given the power to request a police search?
Individuals do not have “requisite variety,” but the neigh-
bourhood “system” does! Peer monitoring by neighbours
would, for instance, dissuade the existence of crack houses.
Has the Law realized that making finer and finer distinctions
creates exactly the opposite effect?
Law has not used the power of dispersed information. Our
ideas of individuality do not allow the current system of jus-
tice to know what is going on. A family knows its members
better that any police ever will. Why not tap into this wealth
of information? We disapprove the public lashing of graffiti
violators in certain countries, but the truth is that the very
existence of the rule produces a behaviour that seldom re-
quires the punishment to take place at all! If you compare
this to the high occurrence of rapes in some countries’ pris-
ons, we can deduce that it is not the severity of the crime
per se that determines the frequency of said crime, but it is
instead the entire system variables that affect the behaviour
of the potential perpetrators.
Another “systemic solution” is the way the Iroquois, an indig-
enous tribe in North America, fought the unwanted behavior
of their members. They sat the culprit in the middle of the
tribe assembly and said: “We are going to do nothing and
stay here until you convince us that you have repented be-
cause your behavior is something we cannot live with.” This
social pressure and the resulting bonding produced a society
with virtually no crime! The Iroquois did not have jails, and
those that repeated extreme cases of disobedience were de-
clared “invisible,” which meant that nobody could ever speak
to them again or help them in any way. Without the tribe’s
support they would usually die or be killed by enemy tribes.
Therefore we must look “at the whole” system before making
choices.
Living systems are awash with paradoxical situations. Cyber-
netics embraces paradoxes such as homeostatic checks and
balances. The final analysis should answer the question: is
the system doing what we want it to? Is filling jails with two
million people the purpose of the system? This is what the
complex system does. We can change that through the use of
the systems’ knowledge.
It is sad that defenders of minorities do not have their cyber-
netics in place. As they demand more and more safeguards
of individual rights, they are giving proof of the counterintui-
tive nature of complex systems.
Take note that I have said nothing here about those attorneys
and judges’ self-interested role in perpetuating the mess. My
analysis does not take into account the role played by those
taking advantage of the perpetuation of this mess for self
interest or political gain. Corruption is, for instance, a very
important component in the system’s performance and it can
generate errors which negatively impact the communities in
their functioning and in their daily lives.
For more information on the topic, see Law & Cybernetics
on YouTube.
* Javier Alfredo Livas Cantú is an attorney with an MBA
from ITESM (Monterrey Tech). Has spent most of his time as a
political activist for democracy and freedom in Mexico, and as
an attorney with legislative initiatives to change laws regarding
civil procedures, transparency and elections. Livas is an expert in
cybernetics, a discipline first applied to management by the British
cybernetician Stafford Beer. He is the author of many books,
among which Cibernética, Estado y Derecho, The Cybernetic
State, Más allá de la Psicocibernética, el Libro del Poder Personal,
Batallas por la Democracia. He has also been writing a weekly
political column in El Norte newspaper for more than 25 years and
has published more than 50 videos on YouTube.
Corruption is, for instance, a very
important component in the system’s
performance and it can generate errors
which negatively impact the communities
in their functioning and in their daily lives
63FREEDOM FROM FEAR - July 2010
We are all citizens of the same World
Please stand up for justice and equality
64 FREEDOM FROM FEAR - July 2010
©APOPO
For decades, the international community’s approach to
issues of nuclear proliferation on the one hand, and of
the use of criminal law mechanisms on the other, has hardly
been an integrated one.
In the post-Cold War environment, the events of 9/11 have
acted as a powerful catalyst for change. The conceptual bor-
ders within which these two areas (nuclear proliferation and
criminal law) were “locked” have been challenged. However,
only recently has this change begun to be reflected in specific
international legal instruments.
Two major changes, closely linked to each other, have con-
tributed to explain the convergence:
a) First major change: non-State actors are increasingly
perceived as having the potential to become fully fledged
“nuclear proliferators,” in the same way as State entities.
It is true that some legal instruments adopted during the
Cold War, such as the 1979 Convention on the Physical Pro-
tection of Nuclear Material, require the criminalization of
certain conducts involving the unlawful handling and theft
of nuclear material. It was certainly recognised that such
material may fall into the hands of individuals for malevo-
lent purposes, including terrorist ones. However, the overall
consensus at that time was that only States would be capa-
ble and/or willing to manufacture and use nuclear weapons.
This is evident in the language of the only multilateral legal
instrument which continues to represent the cornerstone of
global nuclear non-proliferation efforts: the 1968 Treaty on
the Non-Proliferation of Nuclear Weapons (NPT). One of
the core requirements of the NPT is the prohibition for non-
nuclear-weapon States (NNWS) to receive nuclear weapons,
and a corresponding prohibition for nuclear-weapon States
to carry out such transfers to NNWS. (In a nutshell, “nuclear
proliferation” can be defined as the spread of nuclear weapons
to States that did not previously possess them, i.e. “horizontal
proliferation”, and the increase in the number of weapons by
States already possessing them, i.e. “vertical proliferation”).
* Stefano Betti
The New Convergence
between International Criminal
Law, Nuclear Non-Proliferation
and Maritime Security
©UNPhoto/IndobattMPIO
In a nutshell, “nuclear proliferation”
can be defined as the spread of
nuclear weapons to States that did not
previously possess them, i.e. “horizontal
proliferation”, and the increase in
the number of weapons by States
already possessing them, i.e. “vertical
proliferation”
65FREEDOM FROM FEAR - July 2010
When the NPT was adopted, it was sim-
ply unthinkable that individuals acting
outside State direction could ever gath-
er the high level of skills and technolog-
ical awareness necessary to pose a seri-
ous and direct global threat. Crucially,
the NPT lacks a provision equivalent to
the ones contained in more recent non-
proliferation instruments, such as the
Chemical Weapons Convention, which
requires that activities prohibited for
States Parties also be the object of a
prohibition for natural or legal persons
acting on their territory.
The events of 9/11 suddenly brought to
the attention of the world community a
new possibility: criminal organisations
could develop an autonomous capacity
to acquire,manufacture, use and threat-
en to use nuclear weapons. Intelligence
reports started to document attempts
by the Al-Qaida network to come into
possession of nuclear materials and the
know-how. Osama Bin Laden has even
been reported stating that the acquisi-
tion of weapons of mass destruction
constitutes a religious duty. In 2002,
the UN General Assembly adopted the
first of a series of resolutions on “Meas-
ures to Prevent Terrorists from Acquir-
ing Weapons of Mass Destruction.”
In this process, Resolution 1540 can
be considered a landmark instrument
since, for the first time, the Security
Council used its prerogatives under
Chapter VII of the UN Charter to en-
trench a requirement for all States to
“prohibit any non-State actor to manu-
facture, possess, develop, transport,
transfer or use nuclear, chemical or
biological weapons and their means of
delivery, in particular for terrorist pur-
poses, as well as attempts to engage in
any of the foregoing activities, partici-
pate in them as accomplice, assist or fi-
nance them” (para.2).
b) Second major change: Interna-
tional criminal law is increasingly being
used to control nuclear proliferation.
Resolution 1540 has provided the po-
litical impetus and legal framework
for the adoption of the 2005 Protocol
to the Convention for the Suppression
of Unlawful Acts against the Safety of
Maritime Navigation (2005 SUA Pro-
tocol).
Whereas the original 1988 SUA Con-
vention deals exclusively with direct
threats to a ship and its passengers (tak-
ing the Achille Lauro case as the para-
digmatic situation), the new Protocol
goes well beyond the goal of strength-
ening maritime security. By defining
new offences of transporting nuclear
weapons and related materials in vio-
lation of the NPT’s legal framework, it
promotes criminal law as a central ele-
ment in the global non-proliferation ef-
fort and recognizes the dangers posed
by non-State actors beside “traditional”
State-driven proliferators. The techni-
cal complexity of the new legal regime,
merging criminal law, nuclear law and
the law of the sea, reflects an attempt to
face an increasingly intricate and vola-
tile security environment.
What are the implications of the new
approach, and what developments can
be expected in the next few years? Al-
though it is impossible to make predic-
tions, some trends can already be an-
ticipated.
First of all, the 2005 SUA Protocol
is set to enter into force at the end of
July 2010 (having now been ratified by
twelve States). Although many more
instruments of ratification will have to
be deposited before the Protocol can
achieve the sort of “universal charac-
ter,” a pre-requisite for its usefulness
as a truly global cooperation platform,
the focus of the international commu-
nity will gradually move to issues of
implementation. The multidisciplinary
nature of the new legal regime will re-
quire that domestic agencies acquire a
particularly high level of specialization
for the purpose of incorporating inter-
national standards into domestic legal
systems and enabling the law enforce-
ment community to act effectively.
The innovative approach taken in the
2005 SUA Protocol is not going to re-
main an isolated case. In August this
year, a Diplomatic Conference under
the aegis of the International Civil
Aviation Organization is set to amend
the existing international legal regime
governing illicit acts affecting civil avia-
tion. As things stand now, it is likely
that new instrument(s) will envisage a
central role for criminal law in the area
of transport of nuclear weapons and
materials (as well as other weapons of
mass destruction) by air. Consequently,
lessons learned during the implemen-
tation phase of the 2005 SUA Proto-
col may facilitate the understanding of
similar provisions in the field of civil
aviation.
Several international agencies will have
to play a leading role in promoting ac-
ceptance and understanding of the new
approach, and they will have to do so
as a joint endeavor. Natural candidates
are the International Maritime Organi-
zation, the International Atomic En-
ergy Agency and the United Nations
Office on Drugs and Crime. The need
to achieve better coordination among
international bodies in delivering tech-
nical assistance, particularly to devel-
oping countries, will become more and
more pressing.
Handling the complex security envi-
ronment of the 21st Century will make
it inevitably necessary for deeds to fol-
low words.
* Stefano Betti, Terrorism Prevention
Expert, United Nations Office on Drugs and
Crime (UNODC). The views contained in
this paper do not necessarily reflect those
of the United Nations.
Several international
agencies will have to
play a leading role in
promoting acceptance and
understanding of the new
approach
©NASA
Insight
66 FREEDOM FROM FEAR - July 2010
©UNPhoto/AlbertGonzalezFarran
Once upon a time there was journalism. Many have recit-
ed the de profundis for the reporting profession over the
last few years. Because of the economic crisis, which has been
stifling newspapers for the last two years. And before that, in
an even more substantial way, because of how conflicts in the
post 9/11 world have changed the way of telling History and
the stories of those who are called upon to cover them.
In the future, journalism handbooks will still exist, along
with the profession itself. They will still be written, perhaps
not on paper, but, in my opinion, they will nevertheless be
published digitally and read on Kindle. These manuals of
the future will dedicate an important chapter to that sunny
morning in Manhattan: 9/11 changed the world as we knew
it, but it also changed journalism.
Until that day, the men and women with notebooks had
lived in a sort of limbo: the pen and the recorder had al-
most always granted them a sort of immunity and a form
of respect, albeit vague, from the factions in conflict. This,
however, did not always work: during the fifteen years of
bloody civil war in Lebanon, saying sahafie (journalist) at
checkpoints wasn’t enough to avoid being stopped and tak-
en hostage, sometimes even for years. Nevertheless, these
cases were always conceived as marginal ones that did not
tarnish the overall concept of immunity.
Reporting in Times of War
* Francesca Caferri
67FREEDOM FROM FEAR - July 2010
Close up
However, everything changed with the wars in Afghanistan and Iraq: journal-
ists slowly understood that the press label wasn’t enough, that the guarantee
of impartiality was no longer the same, and that even those who took sides
with the “victims” (the civilian population in those countries) were no longer
safe. That was because they were rec-
ognized as westerners first and jour-
nalists later: they were therefore, by
definition, either targets for revenge
or sources of economic revenue. Many
colleagues from notorious newspapers
have lost their lives in this context,
Corriere della Sera and El Mundo lost Maria Grazia Cutuli and Julio Fuentes;
but papers typically associated with leftist and anti-war ideologies were also
affected, such as Manifesto’s Giuliana Sgrena and Libération’s Florence Aube-
nas, who were kidnapped and held hostage for several weeks.
It was therefore almost natural for colleagues to resort to a type of journalism
that has been forcefully establishing itself: embedded journalism. This Ameri-
can expression has been applied to reporters travelling with military units,
following them everywhere and reporting their work, taking advantage of the
security bubble that they (sometimes) offer. In 2006, embedded journalism
was basically the only type that had survived in Iraq, telling us of the battle
of Fallujah and of the bloodsheds that brought the country on the verge of a
civil war.
In those months, many criticized the media accusing it of a lack of objectivity,
and many took up the cudgels in its defence. I believe that the ultimate answer
was given by Kevin Sites, an embedded correspondent for NBC who had filmed
a group of marines shooting the final rounds against a wounded insurgent in
a mosque in Fallujah. The footage was aired, provoking outrage and making
a few heads roll. The journalist was overwhelmed by criticism: many accused
him of having betrayed the pact that had bound him for weeks to the troops he
was embedded with, who had fought to save his life too, just to be then paid
back with that video. Sites defended himself, explaining that the real pact was
the one he had with his job: telling reality without filters or constrictions. And
in that case, reality was represented by those deadly shots against a wounded
man lying on the ground.
In my opinion, that reporter saved the soul of today’s journalism, demonstrat-
ing that the press can benefit from the troops’ protection to reach areas other-
wise inaccessible, but that this does not necessarily imply embracing the mili-
tary’s point of view on everything. This lesson is far too frequently forgotten
(particularly in the Italian context, which is the one I know best) in favour of
a more servile and slovenly way of reporting: one that is not very useful to the
writers, to the sources or to the readers, and one that runs the serious risk of
proving right the doomsday prophets of the demise of journalism.
* Francesca Caferri is Vice-Editor (World affairs section) of La Repubblica, one of
the main Italian newspapers. She has provided extensive coverage on the Middle
East, USA, Africa, Europe and Latin America, specializing in development issues
and major international events, with an emphasis on the Middle East. Previously, she
has also worked for CNN covering humanitarian issues, international organizations
and European Union issues. Francesca Caferri is a Professor of International
Organizations and Foreign Affairs. In 2005 she was awarded the highest prize for
Italian journalists (Saint Vincent Journalism Prize) for reporting from Cuba during the
first meeting of the Cuban opposition.
Translated by Olivia Jung, UNICRI
Many have recited
the de profundis
for the reporting
profession over the
last few years
Many colleagues from
notorious newspapers
have lost their lives
©UNPhoto/ArminehJohannes
68 FREEDOM FROM FEAR - July 2010
* Laura Boldrini
Op-ed
Idecided to write a
book in the summer
of 2009 when the Ital-
ian government start-
ed intercepting and
turning back migrants
at sea. I thought it
would have helped me
analyse what has been
going on these years and what is not happening nowadays.
Despite the apparent calm that was looming over the wa-
ters of the Mediterranean in the absence of disembark-
ments, apprehension still arose from the many stories of the
men and women who had reached, one after the other and
throughout the years, the Favarolo dock of Lampedusa and
the southern coasts of Italy.
Those stories echo in my ears, hindering me from find-
ing even just a single positive aspect of the “pushbacks”
in high waters. All back, the same solution was applied to
all of them: indiscriminately pushed back regardless of the
individual causes behind their escape. A single offhanded
sentence without appeal. Notwithstanding if you are in the
middle of the sea because your country is torn apart by war,
or if you are in a rubber dinghy because staying at home
would have meant being tortured.
On this side of the Mediterranean, the distinctions are no
longer taken into account. And the reaction of a substantial
portion of the public opinion applauding this initiative with-
out considering the price paid by those migrant also makes
me feel uneasy. Those pushed back, including the children,
end up in detention centres in Libya, where they remain for
months or perhaps years, without having committed any
crime whatsoever. They are only human beings who do not
have the privilege of living at home and who have to look
for peace and security elsewhere. Moreover, those returned
also run the risk of being sent back further south, in the
middle of the desert. How can we agree with all this?
Very few of the stories of the many men and women I have
met throughout the years working as a spokesperson for the
United Nations High Commissioner for Refugees (UNHCR)
are devoid of suffering. The condition of person on the run
is almost never resolved without traumas. Most of these
people endure a genuine ordeal of pain and solitude.
But it is not necessarily the cruelest stories that have left
Humankind’s
Suffering is Not Something
One Can Get Used to
Everybody Back!
©UNPhoto/RLeMoyne
69FREEDOM FROM FEAR - July 2010
more of a mark in my mind. There
are situations where someone else’s
anguish is so overwhelming that it is
hard even for the listener to contain it.
This transposed sense of malaise can
be comforted only with a concrete ac-
tion to help those people, to instill in
them a glimmer of hope in the future.
Humankind’s suffering is not some-
thing that one can get used to. Going
back through the years, my memory
takes me to Afghanistan, one of the
most spectacular places on the planet.
A place where you can perceive the in-
tolerable dissonance between nature’s
beauty and the horrific stories told by
women annihilated by violence; the
immaculate white peaks of the Hindu
Kush and the nefarious crimes per-
petrated against entire generations of
women and girls, silent and invisible.
From the Balkans, the images im-
pressed in my mind are those of the
elderly kicked out of the hospitals in
Kosovo and transported in hand-carts
by their relatives through impervious
mountain paths under the pouring
rain. In pain and quiet are the aghast
looks of those seniors who would have
died rather than endure that tribula-
tion, or the looks of those skeletal pris-
oners released at a frontier post after
having been used as human shields to
protect the enemy’s military posts.
It is also difficult to forget the long lines
of Eritrean women and children, envel-
oped in the sandy winds overshadow-
ing the sky. After walking for hours un-
der the implacable sun and blistering
temperatures reaching 50°C (122°F),
they arrive exhausted and parched at
the first refugee camp of Kassala, just
beyond the Sudanese border.
A few years later, other stories of refu-
gees, this time told in Italy, opened my
eyes on the ultimate frontier of des-
peration. They revealed an actual Rus-
sian roulette managed by smugglers
of human beings, the real warlords of
the war fought in the Mediterranean.
Being forced on a ramshackle rubber
dinghy or on a fiberglass skiff to cross
the 160 miles separating Libya from
Lampedusa basically means being
willing to pay the ultimate price. But,
when you are without papers, or with-
out an entry visa for a safe country,
you have no choice.
But what do we know of these people
and of their arduous existence? In my
opinion, not enough. In the media,
and consequently in the public opin-
ion, those arriving from the sea are
commonly and hastily called “illegal
aliens” (or, in Italian, clandestini). It is
a term loaded with prejudice, a word
evoking something dangerous that has
to hide from justice, even though most
of the people arriving on the Italian
shores are seeking asylum. This is why
I consider each of these stories a legacy
handed over to me, an extremely valu-
able patrimony in which to invest con-
stantly through my work.
Refugees do not have the privilege of
living at home, and many of them wish
to return there as soon as possible.
When migrants are repatriated, ei-
ther because they entered or are stay-
ing in the country irregularly, they do
not run the risk of being imprisoned,
tortured or killed; at most, they can in-
cur in some sanction, but nothing that
would put their lives on the line. But
if it is a refugee who is being pushed
back to his or her country of origin af-
ter having fled from it because of per-
secutions, being repatriated basically
means being forced back into the lion’s
den. There are about 35 million peo-
ple in the world who live this condition
of forced rootlessness, and the United
Nations High Commissioner for Refu-
gees is there to look after them.
The media doesn’t give much space
to the ‘other side’ of these disembark-
ments, so the public opinion often
neglects the tragedy behind their es-
capes: it is too easy to take advantage
of this situation and to play on peo-
ple’s fear. In doing so, a victim need-
ing help becomes a menace, a person
who is frightening just because he or
she arrived in this country irregularly,
perhaps by sea.
Common sense can do little in front
of fear, especially when it is fuelled
in such a misleading way, spreading
it and turning it into something col-
lective. This perception, so arbitrary
and deceptive, does not do justice to
the women, men and children who
have reached the Italian coasts in
these years. Nor does it do justice to an
Italy that is invisible, yet real: that of
those who, in their everyday lives and
through their jobs, promote a mutual
understanding and a civil coexistence.
I think of the teachers who, with the lit-
tle resources given, support young for-
eigners in their difficult academic path
and who prepare the young Italians to
live in the global village. I think of the
many fishermen who have risked their
own lives to save hundreds of people
in the Mediterranean in the past few
years. I think of the Italian families
who get to know and learn from this
new resource, who respect their dig-
nity and their rights.
It is in these contexts that the society
of the future is developing, and it is
thanks to these ordinary heroes that
integration becomes a concrete thing,
in a spontaneous and almost uncon-
scious way, while too often it still re-
mains a vague and abstract objective
for the institutions.
* Laura Boldrini is the Italian
spokesperson for the United Nations High
Commissioner for Refugees (UNHCR)
and author of the book Tutti indietro (ed.
Rizzoli, 2010).
Translated by Olivia Jung, UNICRI
But what do we know of
these people and of their
arduous existence? In my
opinion, not enough
In the Spotlight
©UNPhoto/EricKanalstein
70 FREEDOM FROM FEAR - July 2010
On the Interna
01-04September 2010
Summer Programme on Disarmament and Non-Proliferation of Weapons of
Mass Destruction
The T.M.C. Asser Institute organizes a summer programme in close cooperation with the OPCW (the Organisation for the
Prohibition of Chemical Weapons), the CTBTO Preparatory Commission, the BWC-ISU (Biological Weapons Convention
Implementation Support Unit of the United Nations Office for Disarmament Affairs) and the IAEA (International Atomic Energy
Agency). The objective of this one-week summer programme is to raise interest among the younger generation in pursuing
careers in disarmament and non-proliferation as part of the larger process of enhancing stability and security in the world.
More Information: www.asser.nl/events.aspx?id=115
01-04September 2010
International Conference on the Treatment of Sex Offenders
The biennal International Conferences on the Treatment of Sexual Offenders aim to the dissemination of new research, treatment
methods and to provide continuing education and networking opportunities. The Conferences also promote advocacy of
humane, dignified, comprehensive, ethical and effective treatment of sexual offenders throughout the world.
More Information: www.iatso.org/Oslo
The Hague, The Netherlands
Oslo, Norway
23-24 September 2010
International Conference on “Freedom, Security and Justice”
50th Anniversary of the Foundation of the National Institute of Criminology (NIC)
“Freedom, Security and Justice” is the title of the closing conference of the NIC Anniversary Year, with invited speakers from
Hungary and abroad. The conference aims both to report on the events and achievements of the Anniversary Year, and to
provide a frame for programmes on the topics of freedom, security and justice.
More information: http://en.okri.hu/content/view/123/9/
Budapest, Hungary
08-11September 2010
10th Annual Conference of the European Society of Criminology
The Conference aims to foster a Criminology that works on the double level of analysis (crime committed by a single person
or by individuals linked by various kinds of relationships) and to stimulate bridges between them. The Conference will embrace
most of the issues about crime, crime prevention and deviance. It will also try to enhance exchanges and cooperation between
scholars, academics and other institutions (both public and private).
More Information: www.eurocrim2010.com
Liege, Belgium
71FREEDOM FROM FEAR - July 2010
ational Agenda
13-15October 2010
The 13th World Conference of the International Institute for Restorative
Practices
The interdisciplinary conference will spotlight the city of Hull, which is bringing restorative practices training to its 23,000
professionals and volunteers who work with children and young people. Beginning with educators, police, social workers
and others in the Riverside section of Hull, and expanding to a wide variety of agencies throughout the city, the Hull Centre
for Restorative Practices is using training programs developed by the International Institute for Restorative Practices. The
conference. will also include educationalists, social care and criminal justice professionals from many countries who, in
small breakout sessions, will share their experiences in effectively using restorative practices.
More information: http://www.iirp.org/hull10/
18-22October 2010
Conference of the Parties to the United Nations Convention against
Transnational Organized Crime and its Protocols - (CTOC/COP)
Pursuant to article 32 of the United Nations Convention against Transnational Organized Crime, a Conference of the
Parties to the Convention was established to improve the capacity of States Parties to combat transnational organized
crime and to promote and review the implementation of this Convention.
More information: http://www.unodc.org/unodc/en/treaties/CTOC/CTOC-COP.html
08-12November 2010
6th United Nations Conference to review the UN set on competition Policy
The Sixth UN Review Conference will mark the 30th anniversary of the adoption of the United Nations Set of Multilaterally
Agreed Equitable Principles and Rules for the Control of Restrictive Business Practices (United Nations Set). The UN Set
is a multilateral agreement on competition policy that: provides a set of equitable rules for the control of anti-competitive
practices; recognizes the development dimension of competition law and policy; provides a framework for international
operation and exchange of best practices.
More information: http://www.unctad.info/en/6th-UN-Conference-on-Competition-Policy/
Hull, England, UK
Vienna, Austria
Geneva, Swizerland
72 FREEDOM FROM FEAR – July 2010
Challenging Ideas
An essential reference for scholars and others whose work brings them into contact with managing,
policing and regulating online behaviour, the “Handbook on Internet Crime” emerges at a time of rapid
social and technological change. Amidst much debate about the dangers presented by the Internet
and intensive negotiation over its legitimate uses and regulation, this is the most comprehensive and
ambitious book on cybercrime to date. “The Handbook on Internet Crime” gathers together the leading
scholars in the field to explore issues and debates surrounding internet-related crime, deviance, polic-
ing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime
research and scholarship, combining contributions from many of those who have established and de-
veloped cyber research over the past 25 years and who continue to shape it in its current phase, with
more recent entrants to the field who are building on this tradition and breaking new ground. Contribu-
tions reflect both the global nature of cybercrime problems, and the international span of scholarship
addressing its challenges.
- Amazon editorial review
Handbook of Internet Crime
Yvonne Jewkes, Majid Yar - Willan Publishing (November 2009)
Cyber War goes behind the “geek talk” of hackers and computer scientists to explain clearly and con-
vincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as
individuals to the vast and looming web of cyber criminals. From the first cyber crisis meeting in the
White House a decade ago to the boardrooms of Silicon Valley and the electrical tunnels under Manhat-
tan, Clarke and coauthor Robert K. Knake trace the rise of the cyber age and profile the unlikely charac-
ters and places at the epicenter of the battlefield. They recount the foreign cyber spies who hacked into
the office of the Secretary of Defense, the control systems for U.S. electric power grids, and the plans to
protect America’s latest fighter aircraft.
- Amazon editorial review
Cyber War: The Next Threat to National Security and What to Do About It
Richard A. Clarke, Robert Knake - ECCO Press, U.S. (May 2010)
Cybercrime sets out to explain two things: what cybercrime is, and why the average citizen should care
about it. To accomplish that task, the book offers an overview of cybercrime and a discussion of the
legal issues surrounding it. Enhancing her narrative with real life stories, author Susan Brenner traces
the rise of cybercrime from mainframe computer hacking of the early days, to the organized, profes-
sional, often transnational cybercrime that has become the norm in the 21st century. She explains the
many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the
use of viruses and worms to damage computers, and outlines and analyses the challenges cybercrime
poses to law enforcement at national and international levels.
- Amazon editorial review
Cybercrime: Criminal Threats from Cyberspace
David G. Raffaelli, Christopher L. J. Frid (Editors) - Cambridge University Press (2010)
73FREEDOM FROM FEAR - July 2010
This book fully defines computer-related crime and the legal issues involved in its investigation. Re-or-
ganized with different chapter headings for better understanding of the subject, it provides a framework
for the development of a computer crime unit. Updated with new information on technology, this book
is the only comprehensive examination of computer-related crime and its investigation on the market.
It includes an exhaustive discussion of legal and social issues, fully defines computer crime, and pro-
vides specific examples of criminal activities involving computers, while discussing the phenomenon in
the context of the criminal justice system. Computer Forensics and Cyber Crime 2e provides a compre-
hensive analysis of current case law, constitutional challenges, and government legislation. New to this
edition is a chapter on Organized Crime & Terrorism and how it relates to computer related crime as
well as more comprehensive information on Processing Evidence and Report Preparation.
- Amazon editorial review
Computer Forensics and Cyber Crime: An Introduction
Marjie T. Britz - Prentice Hall, 2nd edition (October 2008)
This book presents information on how to analyze risks to your networks and the steps needed to select
and deploy the appropriate countermeasures to reduce your exposure to physical and network threats.
It also imparts the skills and knowledge needed to identify and counter some fundamental security risks
and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing
etc.) and how to implement security policies and procedures.
In addition, this book also covers security and network design with respect to particular vulnerabilities
and threats. It also covers risk assessment and mitigation and auditing and testing of security
systems.
- Amazon editorial review
Computer and Information Security Handbook (Morgan Kaufmann Series in
Computer Security)
John R. Vacca - Morgan Kaufmann (July 2009)
This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion
industry and is growing rapidly. It examines economic and institutional processes in the cybercrime
industry, provides insights into the entrepreneurial aspect of firms engaged in cyber-criminal activities,
takes a close look at cybercrime business models, explains the global variation in the pattern of cyber-
crimes and seeks to understand threats and countermeasures taken by key actors in this industry. This
book’s distinguishing features include the newness, importance, controversiality and complexity of the
topic; cross-disciplinary focus, orientation and scope; theory-based but practical and accessible to the
wider audience; and illustration of various qualitative and quantitative aspects of the global cybercrime
industry.
- Amazon editorial review
The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives
Nir Kshetri - Springer, 1st Edition (May 2010)
for Challenging Times
74 FREEDOM FROM FEAR – July 2010
In this book an international panel of experts analyzes current trends and new developments in law
enforcement and legal systems throughout the continent, including material from non-English-
speaking countries that is seldom available to the broader academic community. Offering a succinct
overview with special focus on criminal law, police procedure, immigration law, and human rights,
the book provides unique insight into what the war on terror means to EU member and non-member
countries; state supporters and critics of American anti-terrorist policy; nations with recent histories of
outside terrorist attacks and those facing threats from homegrown entities. This comparative approach
gives readers three levels of understanding: by country, as affecting the European Union as a whole,
and in the context of the UN.
- Amazon editorial review
A War on Terror?: The European Stance on a New Threat, Changing Laws and
Human Rights Implications
Marianne Wade, Almir Maljevic - Springer (November 2009)
“The Handbook of Crime” is a comprehensive edited volume that contains analysis and explanation of
the nature, extent, patterns and causes of over 40 different forms of crime, in each case drawing atten-
tion to key contemporary debates and social and criminal justice responses to them. It also challenges
many popular and official conceptions of crime. This book is one of the few criminological texts that
takes as its starting point a range of specific types of criminal activity. It addresses not only ‘convention-
al’ offences such as shoplifting, burglary, robbery, and vehicle crime, but many other forms of criminal
behaviour - often an amalgamation of different legal offences - which attract contemporary media,
public and policy concern. These include crimes committed not only by individuals, but by organised
criminal groups, corporations and governments.
- Amazon editorial review
Written by a journalist and a lawyer (the brothers Antonio and Silvio Scuglia, respectively), Toto Truffa
(the lottery of frauds) presents various tricks and techniques used to fraudulently deceive people. The
offenders present themselves with thousands of different scams and costumes: fake Municipality em-
ployees, fake gas technicians or electricians, even fake priests… The swindlers are everywhere, they
strike at home and in the streets, they empty out their victims’ bank accounts with a simple click of a
mouse. But for every trap there’s a way out. The book Toto Truffa is a collection of 150 different types
of tricks and, above all, a practical manual to avoid being deceived.
- Felici Editore review
Handbook of Crime
Fiona Brookman, Mike Maguire, Harriet Pierpoint, Trevor Bennett - Willan Publishing (February 2010)
Toto Truffa
Antonio Scuglia and Silvio Scuglia - Felici Editore (April 2009)
Printedonenvironmentally-friendlyrecycledpaper
Università degli Studi di Torino
Faculty of Law
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7

More Related Content

PDF
Challenges from the Cyber Domain: Cyber Security and Human Rights
PDF
PDF
Tema 5.cybersecurity
PDF
The National Cyber Security Strategy: Success Through Cooperation
DOC
Internet Security Threat
PDF
Cybercrime: An Analysis from Positive Law Perspective
PDF
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
PDF
Computers as weapons of war
Challenges from the Cyber Domain: Cyber Security and Human Rights
Tema 5.cybersecurity
The National Cyber Security Strategy: Success Through Cooperation
Internet Security Threat
Cybercrime: An Analysis from Positive Law Perspective
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Computers as weapons of war

What's hot (20)

PPT
Power Point Gov
PDF
The Social Takeover
PDF
CYBER AWARENESS
PDF
Cyber terrorism fact or fiction - 2011
DOCX
Final Copy Cyber Crime Research Essay
PDF
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
PDF
Cybersecurity Context in African Continent - Way Forward
PPTX
Cyber terrorism
PDF
Cyberdefense strategy - Boston Global Forum - 2017
DOCX
privtechsomeassemb
PDF
Delincuencia Cibernética- Inglés
PDF
PDF
Cyber Crime Challenges in the Middle East
PDF
Cyberterrorism - Conflict in Cyberspace
PDF
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
PPTX
Youth of Turkey online
PDF
Francesca Bosco, Le nuove sfide della cyber security
PDF
Organised Crime in the Digital Age
PDF
Vincent O. Mwando - Encryption
PDF
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Power Point Gov
The Social Takeover
CYBER AWARENESS
Cyber terrorism fact or fiction - 2011
Final Copy Cyber Crime Research Essay
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Context in African Continent - Way Forward
Cyber terrorism
Cyberdefense strategy - Boston Global Forum - 2017
privtechsomeassemb
Delincuencia Cibernética- Inglés
Cyber Crime Challenges in the Middle East
Cyberterrorism - Conflict in Cyberspace
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Youth of Turkey online
Francesca Bosco, Le nuove sfide della cyber security
Organised Crime in the Digital Age
Vincent O. Mwando - Encryption
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Ad

Similar to Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7 (20)

DOC
Cyber-Law and Cyber-Crime
DOC
Cyber law and cyber-crime
DOCX
RESEARCH PAPER
PDF
Digital footprints (preview)
PDF
Cybercrime and society 1st Edition Majid Yar
PDF
Delusions of-safety-cyber-savvy-ceo
PDF
Cyber Security in the Age of Globalization
PDF
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
PDF
HacktivismPaper.docx
PDF
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
PDF
The Rise of Cybercrime 1970s - 2010
PDF
Cybercrime and society 1st Edition Majid Yar
PPTX
Cyber security by Gaurav Singh
DOCX
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
PDF
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PDF
Is Cyber-offence the New Cyber-defence?
PDF
Cyber security rule of use internet safely
PDF
2010 6 Things u need 2 know in 2010 Whitepaper Final
DOCX
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
Cyber-Law and Cyber-Crime
Cyber law and cyber-crime
RESEARCH PAPER
Digital footprints (preview)
Cybercrime and society 1st Edition Majid Yar
Delusions of-safety-cyber-savvy-ceo
Cyber Security in the Age of Globalization
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
HacktivismPaper.docx
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
The Rise of Cybercrime 1970s - 2010
Cybercrime and society 1st Edition Majid Yar
Cyber security by Gaurav Singh
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Is Cyber-offence the New Cyber-defence?
Cyber security rule of use internet safely
2010 6 Things u need 2 know in 2010 Whitepaper Final
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
Ad

More from Daniel Dufourt (20)

DOCX
CO_EPI_2010-2011_chap_4_def 0904 bis.docx
PDF
Vom First-Mover zum Laggard? Entwicklung der Direktinvestitionen zwischen Ö...
PDF
Les transformations géopolitiques dans la région MENA : Les dynamiques struct...
PDF
Audition L'accès à la justice pour les femmes victimes de violence
PDF
Review of Learning 2.0 Practices: Study on the Impact of Web 2.0 Innovations ...
PDF
The Use of ICT for the Assessment of Key Competences
PDF
European Framework for the Digital Competence of Educators
PDF
Digital Education Policies in Europe and Beyond: Key Design Principles for Mo...
PDF
Arrangements institutionnels et logiques de l'action collective 1995
PDF
Economies et Sociétés
PDF
UNCTAD Trade and Development Report, 2016
PDF
Le Manuel de statistiques de la CNUCED 2016
PDF
Global governance and global rules for development in the post-2015 era
PDF
Age of entitlement: age-based tax breaks
PDF
Progressive economy journal-issue8_v09_final-small_pbp
PDF
NATIONAL ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT STRATEGIC PLAN
PPT
L'argent et la démocratie
PDF
World trade report15_f
PDF
Trade profiles14 f
PDF
Dp 2015 59
CO_EPI_2010-2011_chap_4_def 0904 bis.docx
Vom First-Mover zum Laggard? Entwicklung der Direktinvestitionen zwischen Ö...
Les transformations géopolitiques dans la région MENA : Les dynamiques struct...
Audition L'accès à la justice pour les femmes victimes de violence
Review of Learning 2.0 Practices: Study on the Impact of Web 2.0 Innovations ...
The Use of ICT for the Assessment of Key Competences
European Framework for the Digital Competence of Educators
Digital Education Policies in Europe and Beyond: Key Design Principles for Mo...
Arrangements institutionnels et logiques de l'action collective 1995
Economies et Sociétés
UNCTAD Trade and Development Report, 2016
Le Manuel de statistiques de la CNUCED 2016
Global governance and global rules for development in the post-2015 era
Age of entitlement: age-based tax breaks
Progressive economy journal-issue8_v09_final-small_pbp
NATIONAL ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT STRATEGIC PLAN
L'argent et la démocratie
World trade report15_f
Trade profiles14 f
Dp 2015 59

Recently uploaded (20)

PPTX
Spanish colonization in the Philippines 1521
PDF
The City of Stuart CDBG, Florida - Small Cities CDBG FloridaCommerce -Report ...
PDF
Item # 1a - August 11, 2025 Meeting Minutes
PPTX
DepEd Programshuhmnbjojnasssssdhdkfhnsoh
PDF
Bridging Nations Through Mobility: Indonesia’s Vision for Transportation Dipl...
PDF
POCSO ACT in India and its implications.
PPTX
Unit 3 - Genetic engineering.ppvvxtm.pptx
PPTX
smart_health_monitoring_northeast_india_20250830155837.pptx
DOCX
Diplomatic Studies and Migration- Global Perspectives and Practices.docx
PDF
How Does AI Work? - by Google.org from aiclassasean.org
PDF
PPT Items # 3&4 - Residential Haunted House
PPTX
ROADMAP AND PATHWAYS TO EXIT AND SUSTAINABILITY.pptx
PDF
rs_9fsfssdgdgdgdgdgdgdgsdgdgdgdconverted.pdf
PDF
The Council of Europe Landscape Convention: A key instrument for an innovativ...
PPTX
Quiz Night Game Questions and Questions for interactive games
PDF
Covid-19 Immigration Effects - Key Slides - June 2025
PDF
PPT Item # 8 - Pool Pocket Staff Report
PDF
Buy Naver Account in 2025 — And Why You Ought to Too (1).pdf
PDF
Items # 3&4 - Residential Haunted House Ordinance
PDF
PPT Item # 7 - Proposed Budget and Tax Rate
Spanish colonization in the Philippines 1521
The City of Stuart CDBG, Florida - Small Cities CDBG FloridaCommerce -Report ...
Item # 1a - August 11, 2025 Meeting Minutes
DepEd Programshuhmnbjojnasssssdhdkfhnsoh
Bridging Nations Through Mobility: Indonesia’s Vision for Transportation Dipl...
POCSO ACT in India and its implications.
Unit 3 - Genetic engineering.ppvvxtm.pptx
smart_health_monitoring_northeast_india_20250830155837.pptx
Diplomatic Studies and Migration- Global Perspectives and Practices.docx
How Does AI Work? - by Google.org from aiclassasean.org
PPT Items # 3&4 - Residential Haunted House
ROADMAP AND PATHWAYS TO EXIT AND SUSTAINABILITY.pptx
rs_9fsfssdgdgdgdgdgdgdgsdgdgdgdconverted.pdf
The Council of Europe Landscape Convention: A key instrument for an innovativ...
Quiz Night Game Questions and Questions for interactive games
Covid-19 Immigration Effects - Key Slides - June 2025
PPT Item # 8 - Pool Pocket Staff Report
Buy Naver Account in 2025 — And Why You Ought to Too (1).pdf
Items # 3&4 - Residential Haunted House Ordinance
PPT Item # 7 - Proposed Budget and Tax Rate

Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7

  • 1. reedom from fear FreedomfromFear-July2010-Issuen°7-MagazinePublishedbyUNICRI,MaxPlanckInstitute,BaselInstituteonGovernance-EditorialBoard:ViaMaestridelLavoro,10,10127,Turin,Italy Hackers Profiling: Who Are the Attackers? Raoul Chiesa Cyberwar: Myth or Reality? Bruce Schneier MAX-PLANCK-GESELLSCHAFT 7 www.freedomfromfearmagazine.org SPECIAL ISSUE Terrorist use of the Internet and Legal Response Marco Gercke Daniel Thelesklaf Looking for Safer Spaces? CYBERCRIMES
  • 3. UNICRI United Nations Interregional Crime and Justice Research Institute Viale Maestri del Lavoro, 10 10127 Turin, Italy Telephone (+39) 011 653 71 11 Telefax (+39) 011 631 33 68 E-Mail [email protected] Web www.unicri.it MAX PLANCK INSTITUTE for Foreign and International Criminal Law (MPI) Guenterstalstrasse 73, 79100 Freiburg, Germany Teleph one (+49) 761 708 10 Telefax (+49) 761 7081 294 E-Mail [email protected] Web www.mpicc.de BASEL INSTITUTE ON GOVERNANCE Steinenring 60 4052 Basel, Switzerland Telephone +41 (0)61 205 55 11 Telefax +41 (0)61 205 55 19 E-Mail [email protected] Web www.baselgovernance.org The views and opinions expressed in the Magazine do not necessarily reflect those of the United Nations, UNICRI, and the Max Planck Institute. The designations and terminology employed may not conform to United Nations practice and do not imply the expression of any opinion whatsoever on the part of the publishing institutions. Award notification Congratulations your identity has been sold! All our lauded technological progress -- our very civilization - is like the axe in the hand of the pathological criminal. (Albert Einstein) Over the last years we have witnessed changes as we analyzed criminal trends and elaborated new strategies to confront crime. New scenarios have emerged, which have obliged us to improve knowledge and to rethink strategies. These changes are the direct consequences of a wired world driven by global markets where frontiers are abolished mainly in the name of economics. This new world, dominated by new information and communication technologies, has also redefined the criminals’ profile and their modus operandi. Most of the criminal phenomena we are fighting today are transnational. The network woven by organized crime has also become part of our daily life, it has infiltrated the new information and communication technologies (ICT) and, the more we depend on these, the more we are potential victims. ICTs have expanded our possibilities, but they have also enabled a wide spectrum of offences, and the magnitude of these violations can reach impressive levels through the Internet. Nowadays, security is no longer just an issue in the real world: it is a virtual matter as well. Therefore, trying to be on the safe side today also means having a good firewall, a strong program to detect viruses, avoid answering messages from unknown senders or sharing sensitive information on unprotected channels, and so on. As it turns out, the likelihood of suffering from a real crime, like being robbed in the street, is actually smaller than the possibility of suffering a virtual crime, such as an on-line identity theft or a credit card fraud. Committing cybercrimes is much more profitable, significantly less risky and strictly linked to market logic and trends. Moreover, many of them no longer require a high level of expertise or sophisticated techniques. Internet abuses may originate anywhere in the world, no matter where the target happens to be. How we defend ourselves from crime has changed, but we should consider that organized crime is becoming faster and more aggressive in exploiting new technologies and in sharing their know-how with the hacker community. However, none of us can deny that the impressive changes that information technology has brought to our societies have also allowed for the development of countries and democracies, and for the improvement of people’s life standards. According to the International Telecommunication Union (ITU), in 2009 an estimated 26 percent of the world’s population (or 1.7 billion people) were using Internet. This means that one out of four persons Freedom from Fear www.freedomfromfearmagazine.org
  • 4. 2 FREEDOM FROM FEAR - July 2010 has opened a window to the rest of the world: they can avail themselves of the amazing opportunities offered by the Internet, but, at the same time, they can also become a victim of cybercrime. We can now exchange data, information and know-how from one side of the world to another in just a few seconds. The accessibility of information combined with the fact that all aspects of our life are electronically stored are the two aspects that contribute to our socio-economic development, our possibility to enjoy the freedom of a world simultaneously connected to us, but also to our vulnerability to cybercrime. The Internet breakthrough and its widespread accessibility are the technical factors that have allowed the emergence of cybercrime: phishing, pharming, credit card fraud, identity theft, computer espionage, hacking, the elaboration and diffusion of viruses and worms, just to mention a few, are now part of our common dictionary. Think about it. One of the articles here included mentions that, considering 1995 as “year 0” (the last year before the Internet boom erupted in many countries), Interpol knew of only 4,000 child abuse images; today it totals around 1,000,000, and the number of children abused to make them runs in the tens of thousands. And this is but one of the many facets of crime in the Internet Era. A bot herder can remotely control thousands of victim computers at once, including yours, and launch a systematic and widespread attack with just the click of a mouse. The UN estimates that identity theft alone can account for around 1.5 million victims, with an estimated annual value of 1 billion USD. Furthermore, we are speaking about a world that right now is still only partially connected. Africa: is going to be the latest Internet-connected continent, also thanks to the recent FIFA World Cup, which this year has doubled the continent’s Internet links capacities. In a region where the hardware platforms and the operating systems are outdated, security issues, mass-worms and botnets could spread through Africa. This could mean a new wave of targeted attacks that may have a serious impact on African financial institutions and national critical infrastructures, such as oil and gas pipelines. In this landscape, cybercrime represents a real challenge to governments’ security: militaries have been working for years on issues like cyber espionage and cyber war scenarios, just to mention few. Let’s imagine the consequences of a cyber attack to a crucial infrastructure: the outbreaks of violence, looting, plunder and destruction that occurred during the 1977 blackout in New York would fade in comparison. From the evolution of cybercrimes, to terrorist use of information technology, to the main offences committed through the Internet, this issue of the Magazine aims to improve our knowledge of phenomena that could potentially affect or are already having an effect on each of us: cybercrime. This issue includes several perspectives on cybercrimes and suggestions to reduce our vulnerability and on how to prevent them. The fight against cybercrime is not a journey towards the unknown (although it is almost impossible to identify the offenders): it is actually a matter of creating a collective strategy to avoid criminals from taking advantage of the weakest links of the chain (lack of legislation, of technical expertise and statistics, poor coordination across borders and sectors) and to exploit to its utmost the global market opportunities driven by new technologies. The world we know today is not capable of surviving a collapse of the system of information technology. But, on the other side of the coin, our increased vulnerability should not be neglected. Doris Buddenberg UNICRI Officer-in-Charge
  • 5. 1FREEDOM FROM FEAR - July 2010 Contents2 That Was then, This Is Now: A Concise Look Back on the Hacker Subculture Ioan Landry 4 Hackers Profiling: Who Are the Attackers? Raoul Chiesa 5 Interview with a Hacker: Chronicles of a Black Hat Interview conducted by Raoul Chiesa 8 The State of Cybercrimes Levi Gundert 16 Cyber Crime and Organized Crime Tatiana Tropina 18 Terrorist Use of the Internet and Legal Response Marco Gercke, Daniel Thelesklaf 22 Defending Quality of Life through Critical Infrastructure Protection Marco Carbonelli, Luisa Franchina, Laura Gratta, Fabio Guasconi, Daniele Perucchini 26 Online Crimes against Children John Carr 32 Avoid Becoming a Victim of Cybercrime Scot Huntsberry 35 From Encryption to Failure of Traditional Investigation Instruments: the Challenges of Fighting Cybercrime Marco Gercke 38 Global Cybersecurity Agenda ITU (International Telecommunication Union) 43 The Internet: Anonymous Forever Bruce Schneier 46 Privacy vs. Security? A Dilemma of the Digital Era Giuseppe Vaciago 49 Cyberwar: Myth or Reality? Bruce Schneier 52 Crime and Policing in Virtual Worlds: On the Ever-Evolving Nature of Cybercrime Marc Goodman Estimating and Interpreting the Prevalence of E-fraud across the World29 Jan Van Dijk Editorial board UNICRI Doris Buddenberg Kristiina Kangaspunta Amaury Aubrée-Dauchez Marina Mazzini Max-Planck Institute Hans-Joerg Albrecht Ulrike Auerbach Michael Kilchling Basel Institute on Governance Daniel Thelesklaf Editorial team Olivia Jung Fatima Zahra Habib Eddine Proofreading & translation Olivia Jung Graphics and layout Manuela Flamini 70 On the International Agenda 72 Challenging Ideas for Challenging Times Columns 68 Humankind’s: Suffering is Not Something One Can Get Used to Laura Boldrini - Op-ed In the Spotlight 64 The New Convergence between International Criminal Law, Nuclear Non-Proliferation and Maritime Security Stefano Betti Insight 60 Cybernetics and Law Javier Livas Focus on 66 Reporting in Times of War Francesca Caferri Close up
  • 6. 2 FREEDOM FROM FEAR - July 2010 T here is no argument that since the Internet’s widespread commercialization roughly twenty years ago, it has exponentially improved, automated and streamlined much of our lifestyle with every passing year. The advantages of living in a wired (or, wireless) world are apparent, but not without risks: the media is rife with speculation on hackers and every week a new phishing ring is busted or a massive data breach is reported. But who are these much-maligned hackers, and where do they come from? The Hacker Profiling Project has successfully identified the generations of the hacker subculture, but we are going to focus here on the tentative links between criminal or “cybercriminal” links to this world. An understanding of what is unique or overlapping in each of them is crucial to understand where we are headed, and why criminal elements are going digital. The first generation of hacking - comprising the 1960 all the way to the 1980s - was very much academic, with students at universities putting together various programs for the new mainframes being installed on campus, as well as early forays into the telephony system. The ethics of this era focused on shared ownership of data and information, as well as promoting the contribution of all those involved in the hacker culture. The second “hacker era” characterizing the early ‘80s, was driven by curiosity, and the motivation to hack into external targets was often driven by the scarcity of technology: the mainframes and the unique operating systems running on them would cost vast sums of money and technology was not yet a common utility: even a PC was beyond reach for many, and dialling into modems half-way across the globe could result in exorbitant monthly phone bills. The next wave of hacking covers a larger timeframe - from 1985 until the mid to late ‘90s - and was a very active period, especially with the commoditization of the Internet in the later half. This was an extremely prolific period for the culture and many “hacker periodicals,” such as 2600 (1984) and Phrack (1985), began their publication in these years. The motives of hackers from this era were as eclectic as their geographical distribution and background, but even in this period there were very few economically motivated black-hat-hackers. Interestingly, the diffusion of “crimeware” and increases in frauds both rose as the ‘90s progressed, leading us to the next era of hacking. The current wave of hacking is just as convoluted as the previous, but it is marked by a worrying trend: the monetization of hacking. In the past couple of decades, there has been a shift from hobbyist hacking primarily driven by ego and “the thrill of the chase” to malicious and financially motivated crime conducted over the Internet. One only needs to research the stark contrast between the early hacker crew known as L0pht Heavy Industries (1992-2000) and the recent cases of the Russian Business Network (RBN), Innovative Marketing Ukraine, or the Shadowcrew fraudster forums (2002-2004) to see the devolution of ethics and ideals in the hacker subculture. The “infiltration” or usurpation of hobbyist hacking by outright criminal elements is a relatively recent phenomenon, but one all too natural given the open-nature and naivety of the subculture, as well as the adoption en masse of the Internet for key sectors such as finance or the management of PII (Personally Identifiable Information). In fact, some early hackers were prophetic enough to predict a hijacking of their beloved lifestyle by organized crime or loosely affiliated criminal bands. But when did we reach the threshold or boiling point, which led to the rise in financially motivated attacks launched over the Internet? It is difficult to say exactly when online criminals organized themselves for profit- driven attacks, but we began spotting large-scale attacks against financial institutions and gambling websites just before the turn of the Millennium. Not coincidentally, this is also the same period when so-called “crimeware” became marketable among the cybercriminal underground. These kits are sold to aspiring black-hats to automate and streamline their criminal operations, allowing them to work with corporate-like efficiency. That Was Then, This Is Now a Concise Look Back on the Hacker Subculture * Ioan Landry
  • 7. 3FREEDOM FROM FEAR - July 2010 The purpose of distinguishing between the modes and motives of hackers throughout the years is not to whitewash the second and third abovementioned waves of hacking as purely innocent or without consequence: crimes were in fact being committed, and even as early as 1991 there were cases of individuals peripherally related to the then-booming hacker scene being investigated and arrested for toll fraud or “carding” (using stolen credit card information to purchase items or services). However, even a cursory glance at the literature and archived timelines of those days would show us that the majority of the players involved tended to be uniform in their disdain of the outright criminal elements in their midst, such as virus writers and carders. However, even today the monetization of hacking is being pursued by small, flexible and tight-knit criminal bands which, despite their size, have a considerable impact on the online ecosphere: an Anti-Phishing Working Group report states that 66% of all phishing attacks in the second half of 2009 were perpetrated by a single group known as “Avalanche.” The only good news one could possibly extrapolate from this statistic would be that the skilled criminal groups operating online are perhaps less numerous than previously anticipated, but, as always, there is no lack of “script kiddies” and newcomers to the “underground economy” waiting for their turn at the table. And where are the black-hat hackers going now? Wherever the money is. It is no secret that since the dawn of civilization criminals have sought out the “low-hanging fruit,” and we have already seen them shift away from targeted attacks on financial institutions or e-commerce with server-side attacks, to phishing scams and particularly virulent blended threats targeting end-users and consumers who don’t have the luxury of an annual security budget ranging in the millions of dollars. We speculate that the prime target will remain the end-user for the near future, with an increase in sophisticated XSS (Cross-Site Scripting) attacks targeting social networking sites and a constant focus on subverting the web browser. An example of this, offering a glimpse of the next generation of phishing attacks, would be the devious tabnabbing exploit: it subverts an open, idle and otherwise innocent browser tab to redirect itself to a hostile page of the attacker’s choice once the user’s attention is elsewhere, fooling the user into providing sensitive data in the fraudulent page (i.e. a spoof page of Gmail or Facebook asking for log-in and password). As always, there is no technological or legislative “silver-bullet” solution to tackling the increase in cybercrime: these criminals conducting online abuses and frauds have already shown their capacity to defeat IT security measures, and an indifference to national or international laws focusing on them. As long as their activities remain profitable the miscreants will continue, and as long as technology advances they will keep on adapting. THEN NOW L0pht Heavy Industries (1992-2000) L0pht Heavy Industries was the original “hacker think tank.” They initially supported themselves by selling used hardware at local flea markets, offering UNIX shell accounts and archives of files and texts. They eventually created the famous password recovery suite “L0phtCrack,” and they offered their skills as developers of secure code to the corporate sector. The origin of the name, pronounced “loft,” most likely relates to the fact that many members shared a common apartment in Boston. After years of unique contributions to the hacker subculture (and years of barely breaking even), L0pht merged with security firm @stake in 2000, which was subsequently purchased by Symantec in 2004. Russian Business Network (2006 - ?) The RBN is, or was, based in Saint Petersburg (Russia) and operated as a host or Internet Service Provider for illicit services such as child pornography, malware distribution, etc. Their 2006-2007 revenue is estimated at $150 million. Their main areas of criminal activities include spam (estimated to have been actively involved with up to 50% of worldwide spam distribution at their height), malware, phishing scams (estimated to have been behind up to 50% of phishing spams throughout 2007), all the while providing hosting services for other criminal activities, such as the dissemination of child pornography, identity theft, credit card fraud, etc. The RBN is alleged to have dispersed (but not suspended) its activities as of 2008, due to increasing attention from international security vendors, media, and law enforcement. * Ioan Landry is a UNICRI consultant on cybercrimes.
  • 8. 4 FREEDOM FROM FEAR - July 2010 Hackers Profiling Who Are the Attackers? Who is attacking you? “We don’t know...” When talking about attackers and hacking it often happens that I ask people working at customer’s sites “who is scaring you?” Most of the time the answer I hear is not “Well, you know… I’m scared by script kids, playing with those couple of unpatched machines I have,” nor is it “I’m really scared about industrial spies.” Rather, 98% of the time the answer is “I don’t know.” These answers possibly mean that the company, feeling as a potential target, has not developed a proper IT Security Risk Analysis, while trying to figure out who may want to attack its IT infrastructure and gain access to its information. This mistake probably happens because every time people hear “hackers profiling,” the word “profiling” automatically makes them think about something that has already hap- pened, rather than something that may happen. The hacking world has changed dramatically in the last thir- ty years, and the somehow “romantic” figure of the hacker of the ‘80s is far from today’s. At the very beginning, “hackers” were computer researchers in places like MIT and Berkley; they wore long, white lab coats and gloves while working in big aseptic data rooms. * Raoul Chiesa The hacking world has changed dramatically in the last 30 years, and the somehow “romantic” figure of the hacker of the ‘80s is far from today’s
  • 9. 5FREEDOM FROM FEAR - July 2010 1. How you would define yourself with respect to the hacking activities you are conducting? I’m a Black Hat. This means that hacking is my job and gives me salary. I run black-ops for those hiring me. I’m quite expensive. 2. How did you learn hacking techniques? Mainly at school. At the University we also used to have a couple of cybercafés at the very beginning (around 1999-2000), which is basically where most of us started. 3. What led you to become a hacker? I’d say it was a mix of friends and free time. I was a teenager hanging out at that cybercafé and... everything began there, ya know. I was impressed by the things those guys were doing, I just fell in love with hacking... it was that much easier to accomplish goals, hacking into servers, stealing information, pictures... a lot of fun. Then I went into other things, meaning money. 4. What were/are your aims? Right now it’s just money. People can hire me, I do the job, get the money, and disappear. 5. Have your motivations for hacking ever changed over time? I would say yes. At the very beginning it was all about curiosity and learning. Then I decided to step forward into the real world, where people pay you money because they don’t know how to play as I do. 6. Are you part of a group or do you act alone? I was initially part of a group. Then some people left, others stayed, although they lacked real skills; in the meanwhile I grew up and updated myself. That’s why right now I’m working mainly alone. I may buy 0day from some friends, but I prefer to run all jobs alone. 7. What criminal offenses have you committed with a computer? I guess they would include gaining unauthorized access to computer systems and networks; stealing accounts, personal information, and selling them out. And I guess also industrial espionage and money laundering. 8. Have you ever been arrested or convicted for computer crimes? No. 9. Have laws and penalties against cybercrimes had a deterrent effect on you? Sort of... but I’ve decided to take the risk. 10. Have technical difficulties encountered when penetrating a system represented a deterrent or a challenge? They are basically a challenge. Whenever the target can’t be hacked well... ya know, there’s plenty of other targets out there :) 11. What is your main aspiration? Stop working in 2 or 3 years, retiring, giving money to my family, buy my own house. 12. Can you describe the impact and results of the hacking activities you have conducted? I don’t understand the question. 13. Have you aver considered the negative effects of your hacking activities on people? Are you talking about identity theft and this kind of things? Yes I did consider the effects, but... it’s not my fault if the victim is an idiot, I’m sorry. Interview conducted by Raoul Chiesa in coordination with the UNICRI Management and External Relations team. INTERVIEW WITH A HACKER Chronicles of a Black Hat
  • 10. 6 FREEDOM FROM FEAR - July 2010 Hacking used to mean “building something” while thinking outside the box, in a different manner, applying new views and problem-solving approaches. The reason why the hacking phenomenon spread at the begin- ning of the ‘80s is simple: because of the business. Companies went on the market with the very first home computers, mod- els like Commodore VIC-20 and C-64 or Sinclair ZX-Spec- trum, and with the grandparents of today’s Internet routers, the “modems,” running as slow as 300 baud-bits per second! It was the beginning of the second hacker’s generation, and the most known to the public too. It is not by chance that the general cliché image of a hacker that most people have in mind is that of a teenager, sitting at his desk in his room, typing at the keyboard of his PC, sending commands to the other side of the world... In reality, those kids who were hack- ing in the ‘80s are probably your IT Security Managers today, and the world of hacking has been replenished with differ- ent players. Most of these new players may attack the same targets, but their motivations and goals will probably differ from each others, and substantially so. Applying the same approach used above, when analyzing the digital evidences left from the attacker on a computer system (meaning, while running a Digital Forensics analysis) we may ask ourselves what the overall goals of the attacker were and why he/she would run that kind of attack on our machine. The Hackers Profiling Project (HPP) started in 2004 at UNICRI to answer these and many other questions. And, even if we do not have all the answers yet (since the project is still on-going), we can nonetheless surely address the question raised above: who are the attackers? As a matter of fact, the HPP research team has been able to identify nine different main categories of attackers. We use the word “attacker” and not “hacker” simply because the evolution of the hacking world and of cybercrime itself has merged together different actors, who do not always belong to the category of “hackers” in a strict sense, at least as we were used to know. The 9 main attacker categories Wannabe (Lamer) The “wannabe,” often labelled a “lamer,” is the “I would love to be a hacker” kind. They use hacker techniques without neither knowing nor having the curiosity to learn how they actually function. They use “hacker toolkits,” which can be downloaded for free from Internet; these toolkits automate processes otherwise made manually and in a “creative” way by more experienced hackers (and that often include mis- takes and backdoors). They post a huge amount of messages on forums and BBSs (Bulletin Board Systems), asking other hackers to teach them how to become a real hacker. They want to learn to be hacker without really being one, and of- ten their actions result in huge damages to some computer system or network. Script kiddie The “script kid” term stands for “the boy from the scripts,” meaning those hackers relaying on UNIX/Linux shell scripts written by others. They lack technical skills and sophistication, and the ones least capable are called “point-and-clickers,” since their attacks are called “point-and-click attacks.” They are in- terested only in the result and not in learning how computer and hacking techniques work. They simply download from In- ternet (or from the “crews” they belong to) software and hacker tools, and follow the related instructions. A very good example of this profile was “Mafia Boy”, a 14 years-old kid arrested on Montreal, Canada, after running DDoS (Distributed Denial-of- Service) attacks to e-Bay, Amazon, Yahoo! back in 2000. Cracker The term “cracker” was created around the beginning of the ‘90s, when the hacker community wanted to somehow dif- ferentiate the malicious (or lame) actions highlighted by the media, from the serious hacker research done by many un- derground groups such as CCC, L0pht, THC and so on. Generally speaking, crackers have good technical skills, which allow them to pursue their purposes; in the last years, nevertheless, due to the different players in the cybercrime arena (particularly when referring to skimming and phishing activities), we have also found crackers with poor or aver- age technical background and field skills. Note also that they are different from the so called “software crackers” who crack software protection to reproduce it illegally (a.k.a. software cracking): this was something very in vogue back in the ‘90s, and it is still employed in many Asian and African countries. Ethical Hacker “Ethical hacker” is not just a term, but it designates an en- tire debate both in the underground community and in the information security market. An ethical hacker is somebody with excellent hacking skills, whose “past life” may have been with the bad or with the good guys, who decides to help the community, digging with software and discovering bugs and mistakes in widely (or poorly) used IT infrastructures (i.e. social networks), protocols or applications. They are creative hackers, since they try not to use software created by others and they prefer creating it by themselves (scripts, exploits and/or 0-days) or improving it when there are no useful programmes for their attacks. They would pre- fer a manual attack rather than an automated one, and this is something to carefully note and a rule to apply to your IDS (In- trusion Detection System)! Ethical hackers are also highly so- phisticated and specialised in different operating systems, net- works and attack techniques: this means they can range from Sun Solaris, HP/UX or OpenVMS to Microsoft Windows. The Hackers Profiling Project (HPP) started in 2004 at UNICRI to answer these and many other questions
  • 11. 7FREEDOM FROM FEAR - July 2010 QPS (Quiet, Paranoid, Skilled Hacker) If this type of attacker are on a system, and if they have just a remote feeling that they may be caught, they will disappear. This kind of hackers attack IT systems not because they are looking for information, but perhaps because they just love that particular release of HP/UX that one is running, or loves a SS7 backbone. The QPS are creative hackers, using as little as possible soft- ware made by others, since they prefer creating them by them- selves. They are similar to Ethical hackers on a lot of issues. Cyber-warrior/Mercenary This is one of those categories that appeared in the last few years because of Internet’s globalization and of the “hacktiv- ism” phenomenon. Cyber-warriors feel like heroes from their own environment (i.e. an extremist group with political or religious background). Their skills may vary substantially, from basic ones of a script kid to good or excellent ones, espe- cially when specialized on focused areas (i.e. DDoS, or Web Defacing, or Wi-Fi). Not being “exposed” in the business environment like the Industrial Spy profile, the Mercenary hacker works on com- mission, getting money to attack specific targets. A lot of the well-known Russian mobs (such as the RBN, the Russian Business Network) use this kind of elements to support their illegal activities Industrial Spy Hacker The practice of industrial espionage had existed as long as business itself, infiltrating spies in companies throughout the years, and walking out of them with information stored on paper files, microfilms, floppy disks, cd-roms and, today, USB keys or emails. Nevertheless, the recent scandals of industrial espionage that have emerged in the last years surely involve Industrial Spy Hackers, which modernized this practice taking advantage of the new opportunities brought in by Information technology. Government Agent Hacker Nowadays the existing information technology and the gran- ularity itself of information allow external attackers from governments to run highly-sophisticated attacks, specifically focused towards nations’ know-how in different business markets. Military Hacker When the HPP research team introduced this kind of profile back in 2004, the reactions we received were doubtful: it ap- peared we had gone “too far.” Unfortunately, history seems to confirm our assumptions, given the latest waves of “infor- mation warfare” highlighted in the newspapers from all over the world. This profile is also often associated with the term “state- sponsored attack,” which effectively represents the logic and the approach behind those attacks run by Military hackers. Conclusions While this list of profiles is not to be considered a complete one or a golden rule to follow blindly, it is nevertheless a very good first step. In order to apply it to your own com- pany or institution’s environment, keep these profiles in mind when trying to figure out the W4s: Who, Where, Why, When. As for the “How,” refer to the Honeynet Project, an excellent program created by Lance Spitzner (www.honey- net.org) to figure out how malicious hackers act. But that’s another story. * Raoul Chiesa, UNICRI Senior Advisor, Strategic Alliances & Cybercrime Issues. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking (2008) by Raoul Chiesa, Stefania Ducci, Silvio Ciappi Profiling Hackers is an exploration of an underground world where people “next- door” try to prove their invincibility and power by test- ing their intelligence through cyber- space, and where curiosity fits together with profitable motiva- tions, in a world often criticised and criminal- ised but apparently not sufficiently understood. Constantly interested in Emerging Crimes and actively involved in Cybercrime, UNICRI col- laborated with Raoul Chiesa, Stefania Ducci and Silvio Ciappi to produce a work with the purpose of serving as a trustworthy reference on this issue in the long run. UNICRI editorial review In order to apply it to your own company or institution’s environment, keep these profiles in mind when trying to figure out the W4s: Who, Where, Why, When
  • 12. 8 FREEDOM FROM FEAR - July 2010 Your computer may be “pwned.”1 While you’re reading this article a miscreant might be virtually peering over your shoulder, or worse. Then again, perhaps you follow best practices for securing your computer: you patch your operat- ing system, you maintain a current anti-virus software sub- scription, and your Web surfing habits are fastidiously cau- tious. Unfortunately your computer may still be pwned. Depending on whom you ask, approximately 1.8 billion peo- ple are connected to the Internet.2 Team Cymru3 conserva- tively estimates that over 5 million unique computers are compromised at any given time. In dispensing with the FUD (Fear, Uncertainty, and Doubt) that often plagues the cyber security industry, the realistic global compromise rate is ap- proximately 0.003%. An issue that plagues less than 1%4 of the world’s computers may not appear to be an issue at all, but context is everything. When a new worm begins spread- ing, the cost of repairing millions of computers and interrup- tions to business can be staggering. When bank accounts are drained and e-mail accounts compromised, the victim is of- ten left feeling helpless. When mothers are social engineered out of their life savings by a faceless criminal thousands of miles away, all of a sudden the impact of technology used for malevolent purposes becomes important. When a network responsible for processing 100 million debit/credit cards daily is breached, or the control systems for a city’s electric grid are disabled the fallout is beyond unpleasant. Over the past decade cybercrime has continuously evolved, motivated by profit, ideology, and nationalism.5 The Internet has enabled criminals to ply their trade in new and innova- tive ways. The physical elements of crime have been replaced by digital trails that are becoming increasingly difficult for law enforcement to follow. Attribution for cybercrime is rare, and prosecution is even rarer. Yet, the fight continues as in- vestigators work harder toward criminal attribution. In this article, Team Cymru explores the nuances of today’s most insidious cybercrimes. The State of Cybercrimes * Levi Gundert
  • 13. 9FREEDOM FROM FEAR - July 2010 The term “Underground Economy” has historically been used to denote business that occurs outside of regulatory channels. Around the turn of the 21st century, Team Cymru adapted the term to the cyber locations and individuals who buy, sell, and trade criminal goods and services. Today the Underground Economy can be found in IRC6 networks, HTTP forums (web boards), various Instant Messaging services, and any other communications platform that lends itself to anonymous collaboration. Today, the publicly available Underground Economy is a shell of its former self. The undercover operations targeting and subsequently arresting criminals involved in web forums like Shadow Crew,7 Carders Market,8 and Dark Market9 have pushed the fraud trade further underground. The Underground Economy is comprised of criminals who typically specialize in a specific criminal commodity. A few of the more common commodities include credit/debit cards, personal identities, hacked servers, hacked network equipment, malware (malicious code), Internet vulnerability scanners, e-mail spam lists, fictitious identification documents, and fraudulent money movement services. Like any economy, this one involves various strata of criminal proficiency and experience. Participation in the Underground Economy requires only minimal technical ability, and many criminals’ strategy is to defraud other criminals. The higher levels of the Underground Economy involve technically talented actors who work with other criminals through private communication methods often involving encryption. The public criminal market place is contracting, but the criminal activity itself is increasing in both volume and sophistication. The Underground Economy One of the latest trends in cybercrime profiteering involves “scareware,” also known as fake anti-virus software. The scam is maximized during a global event, such as the recent earthquake in Haiti. Criminals understand that a large event such as Haiti creates millions of queries on popular search engines like Google. Savvy criminals research key words linked to the event in question and then use those terms to create a new website that is pushed to Google for indexing. Often within hours of an event occurring (Michael Jackson’s death was another of these large global events), the newly created website appears in Google’s top 10 page rankings. Now millions of people may be visiting this newly created website in search of information related to the global event in question. Once the public accesses the website, a message is displayed informing the user that his/her computer is infected with malicious code. The webpage encourages the user to download an application that will clean the current infection and also locate additional malicious code that may be residing on the victim’s computer. Before this theoretical activity occurs, the program solicits credit card information. Typically the price for this scareware is twice what legitimate anti-virus companies charge for their product. The victim’s credit card is then charged and the user is left with a piece of software that is deliberately spurious at worst, and marginally legitimate at best. Either way, the victim is scared into believing a threat exists and the fraudster’s software package is the only way to resolve the issue. Scareware/“Fake Anti-Virus” Criminals understand that a large event such as Haiti creates millions of queries on popular search engines like Google The Underground Economy is comprised of criminals who typically specialize in a specific criminal commodity
  • 14. 10 FREEDOM FROM FEAR - July 2010 Phishing Phishing is the digital representation of social engineering tactics. The ploy involves tricking Internet users into providing confidential information, believing that the website requesting the information is legitimate. In fact, these Phishing sites are cleverly designed forgeries. The sophistication of these attacks continues to increase and the line between malware and phishing is blurring. One of the largest criminal platforms for phishing and spam has been labelled by anti-virus software companies as “Avalanche.” It is believed that Avalanche is operated by a group of miscreants who run their criminal enterprise like any legitimate software company. Avalanche uses a technology that is specifically known in the security community as a “fast flux botnet.” The botnet is large and compromised of geographically diverse “zombies” (infected computers). The botnet also possesses powerful functionality (known as “fast flux”) that allows phishing websites to avoid take down efforts much longer by constantly migrating the website’s address to a different zombie in the botnet. The Avalanche owners generate revenue by leasing their expansive botnet platform to criminal customers for a wide array of wickedness. The flexibility of this particular botnet ensures owner attribution efforts are especially difficult. Phishing has given birth to Pharming and Smishing. Pharming typically involves changing the internal settings on a victim’s computer thereby bypassing a victim’s legitimate address query functionality. For example, a victim may open a web browser and request hsbc.com. The website loads and while the page appears to be hsbc. com, it is in fact a Phishing site. The user is seamlessly delivered to a spurious website because the victim computer’s internal settings were changed to redirect specific website requests to malicious websites that appear legitimate. Smishing is Phishing across mobile phones. Smishing involves spamming SMS (mobile phone text messages) messages to a large pool of mobile phone numbers with a social engineering message and a corresponding website link to visit. Fortunately consumers appear to be much more wary of unknown mobile phone message senders vs. unknown e-mail senders. If mobile phone identity becomes a future challenge, then Smishing will become more interesting to criminals. Banks protect their customers by campaigning to have phishing sites disconnected from the Internet as soon as the site is detected. Typically a bank will petition a website hosting provider to take down a phishing site within four hours of detection. Phishing is the digital representation of social engineering tactics
  • 15. 11FREEDOM FROM FEAR - July 2010 Cybercrime and Fraud Recently the author of this article was on a trip to Chicago when he was notified that his credit card was used in Philadelphia. The spurious credit card was presented in person to purchase physical goods. The thieves had managed to capture the data contained on the credit card’s magnetic stripe before replicating the data to the magnetic stripe of a blank “white plastic” card. The swiftness between card compromise and physical exploitation was amazing. Unfortunately this scene occurs daily all over the world.10 A credit card compromised in Britain, may be used within 24 hours in India. Criminals involved in physical world fraud are constantly leveraging technology to increase their profits. Victim debit/credit cards can be used or sold as “cvv” or “dumps.” The criminal colloquial “cvv” represents the data embossed on the front of a card such as name, card number, expiration date, and the 3-digit security code printed on the rear of the card. “Dumps” describe the track1 and/or track 2 data encoded to the card’s magnetic stripe. A criminal is able to monetize “cvv” through online or phone purchases of legitimate goods. “Dumps” are monetized through duplication of the physical card and subsequent purchases of goods in person. Typically criminals resell the fraudulently obtained merchandise on auction type websites for competitive prices. Stolen credit/debit card details remain especially lucrative for criminals. When PIN numbers can be tangentially obtained with a victim’s card details, criminals will monetize cash very quickly at ATM locations. Team Cymru has observed groups of criminals operating in disparate geographic locations to maximize profit. Attacks on ATMs have been well coordinated, as have groups buying physical goods. Criminal groups can compromise and monetize their own credit cards, but typically criminals seek to purchase credit cards details from quality suppliers. The lure of easy profits creates a constant demand for quality dumps. The source of stolen cards continues to originate through two primary methods: skimmers and network breaches. A hardware skimmer is a device placed over a card port on an ATM or gas pump. The skimmer is designed to capture the data on the card’s magnetic strip as it is inserted for payment or to withdraw cash. This physical attack on the card previously required a criminal to retrieve the skimmer in order to download the captured data. Today, most skimmers sold in the Underground Economy are equipped with GSM or Bluetooth functionality thereby allowing criminals to remotely retrieve the stolen data and reduce the risk of capture. Generally these skimmers are equipped with enough memory to store a few hundred credit card numbers. Additionally, skimmers are sold to specifically match the manufacturer and model of ATM being targeted. Since ATM manufacturers publicly release new bank contracts, criminals are able to plan skimmer placement before new ATMs are even installed. A soft skimmer is a device placed on a POTS (Plain Old Telephone Service) circuit in order to intercept the data in transit. Stand-alone ATMs in convenience stores or hotel lobbies may rely on modems for communication with a merchant network. After recording the tones on these phone lines, criminals use widely available software to convert the tones to digital data, specifically credit card numbers. Skimmers continue to be a threat to consumers in countries that rely on magnetic stripe cards. Unauthorized access to computers and networks containing credit card track data has proven especially disastrous for merchants and banks. The breaches of Heartland Payment Systems,11 RBS WorldPay,12 and TJX13 illustrate the determination of criminals to find and secure large databases of credit card track data. In the past, Point of Sale (POS) terminals used in retail outlets were exploited through vulnerabilities in the underlying operating system that these terminals use. Failure to patch the operating system has led to remote exploitation via freely available hacker tools. Data exfiltration has occurred for months before the merchant discovered or was alerted to the tainted POS terminal. Criminals continue to aggressively hunt for large amounts of card track data either in storage or in transit. Once a target is identified, the compromise is only a matter of time and resources. Today, financial databases and networks continue to fall victim to the most motivated and talented hackers. Previously, compromises have existed for over a year before the breach was discovered. The purveyors of this data will quickly become rich, as will the end users who purchase the data for coordinated exploitation. The payment card industry (PCI) is in the final stages of implementing an updated version of the Data Security Standard (DSS).14 DSS is a collection of policies and procedures designed to establish a best practices document for organizations involved in transferring or storing payment card details. While DSS is absolutely necessary and obligatory for merchants, it merely acts as a stopgap for an outdated magnetic stripe card technology. Multiple European countries have fully implemented EMV (also known as “Chip + PIN”), which has significantly reduced the criminal demand for “chipped cards” in these respective countries. In this framework, debit/credit cards store data on an encrypted chip embedded in the card. While the implementation of the technical EMV specification may be different at various banks, overall the adoption has been very successful from a fraud perspective. Unfortunately this evolution has increased demand for monetization schemes in countries that do not use EMV. A global bank movement to the EMV standard would significantly raise the bar on criminals specializing in this trade. In the realm of “Card Not Present” fraud (telephone and Internet purchases), Visa and MasterCard implemented “Verified by Visa” and “SecureCode” respectively, which require an additional password before a transaction is successfully completed. Unfortunately, a substantial number of “cvv” sold in the Underground Economy today are accompanied by the corresponding Verified by Visa or SecureCode password. This is the result of criminals slightly modifying Phishing and malware attacks. The source of stolen cards continues to originate through two primary methods: skimmers and network breaches
  • 16. 12 FREEDOM FROM FEAR - July 2010
  • 17. 13FREEDOM FROM FEAR - July 2010 Malware EMV also acts as a specification for secure online banking. Securing online banking access via a username and password in concert with security questions is a failed model. The financial services sector obviously defines failure on an annual rolling metric basis, but consumers and businesses feel the failure effects daily. Multi-factor authentication is a security term used to describe authentication procedures that require additional criteria be validated before access is granted. This usually means producing something you have in your possession in concert with something you know like a password or PIN. Multi-factor authentication certainly increases the difficultly of bank account compromise, but in its current form it is far from a solution for preventing fraud. Most two-factor deployments involve a hardware “token” issued by a bank to a customer. The digits displayed on the token change at regular time intervals. These digits are required in tandem with a customer’s password in order to successfully authenticate online. The criminal response to two-factor authentication has been a continual stream of malicious code (also known as “malware”). Some of the more malevolent malware families are labelled by anti-virus software companies as “Sinowal,” Zeus,” “Silent Banker Trojan,” etc. The malware itself is programmed to execute clever functions while remaining as undetectable on the victim’s computer as possible. The malware typically turns off any anti-virus software present on the computer and then silently waits. It waits for the victim to open a web browser and login into their bank or other financial account(s). The malware then typically conducts a “Man in the Middle”15 or “Man in the Browser”16 attack. Skipping the technical minutiae, the malware is capable of initiating an account transfer that looks legitimate to the victim’s financial institution as well as manipulating returning data in the webpage to hide the fraudulent activity from the user. Both sides of the transaction are unaware of the digital thievery occurring in real time. Additionally, different malware families are able to extend the authenticated online banking session even after the victim believes they logged off or closed their browser. Regardless of the two-factor authentication banks are currently employing, malware authors continue to devise clever countermeasures. The technical arms race has no apparent end in sight. The current situation is particularly harmful to small businesses and financial accounts that are not rigorously checked17 by their owner(s). Criminals are performing online reconnaissance about specific businesses that appear to lack sufficient information security safeguards. Once a target is identified, malware placement is strategized, and then unauthorized bank account transfers or international wires begin occurring daily. Of course online banking interception is only one small facet of modern malware. Today, the functionality embedded in malicious code is as diverse as the criminal population who utilizes it. Victim computers may be participating in spamming, DDoS18 (Distributed Denial of Service) attacks, proxy points for cyber criminals, data theft, extortion (via encrypting the victim’s hard drive), key logging, advertising, and more. As Internet users’ habits evolve, malware authors take notice and develop new malicious features both for infection and monetization. Then again, malware’s objective is not always revenue. Consider “Operation Aurora”19 and the intended purpose of an apparent attack on Google’s network for the purpose of collecting data about human rights activists. On the surface it certainly appears the attack was not motivated by greed. Therein lies the differentiator between malware: purpose. Custom malware is typically only written when the surfeit of available malware or hacking tools will not suffice. Often, this is the case where stealth is paramount, such as in the case of “GhostNet,”20 which appeared to be exfiltrating data from the Dalai Lama’s network for over a year before anyone discovered the breach. Malware is a scourge upon the Internet, and a particularly nasty subset of that malware is botnets. A botnet is a collection of infected computers (also known as “zombies”) that are typically centrally controlled by a remote entity. Ten years ago a bot was a piece of code that automated some activity, typically in Internet Relay Chat (IRC). Today, the term bot usually implies a malicious persistent connection from an infected computer to a Command & Control (CnC) interface.21 This has created the problem of exporting real criminal tools to the criminal masses for a small fee. A handful of malware authors create botnet code that is then sold to the criminal public, typically for a few hundred dollars. These “crimeware” kits are delivered with meticulous instructions for use and a scale of fees for updated functionality and/or upgrades that prevent anti-virus detection. In fact the escalating game of cat and mouse between malware authors and anti-virus companies has become so extreme that over the past five years Team Cymru has observed 30 million unique malware samples22 and a very small percentage of those samples are actually new pieces of computer code. The difference represents the by-product of polymorphism, encryption, and other obfuscation techniques (known in the security industry as “stubs”). Since anti- virus companies largely depend on exact signatures to identify malicious code and malware authors create malware that mutates (or is “packed” differently) every time it runs, thus producing a completely different signature for detection. Other obfuscation techniques attempt to hide the malicious code in a virtual shell (a stub) and anti-virus software only scans the benign shell. Botnets are particularly sinister because they exponentially increase a criminal’s capabilities and malicious schemes. Instead of infecting and controlling one victim’s computer, a bot herder (an individual who controls a botnet) is capable of centrally controlling thousands, sometimes even hundreds of thousands, of victim computers at once. Presently, criminals who have no technical ability can purchase a botnet and further their criminality online. Regrettably, the purveyors of these botnets are now publicly advertising and marketing in order to differentiate their product in the market place. In Underground web forums and Twitter feeds,23 botnet authors are actively attempting to increase revenue despite raising their risk profile with law enforcement. Given the geographic disparities between victim’s computers, CnC nodes, and the bot herder(s), law enforcement’s attribution efforts are increasingly protracted and frustrating affairs. Until national cybercrime legislation enjoys global reciprocity,24 law enforcement’s efforts will continually be stymied. The picture, however, is not completely bleak. Law enforcement continues to pursue malware/botnet cases across international boundaries with occasional success.25 Presently, the problem is in scope. The current number of cyber-trained investigators is a pittance in relation to the number of criminals currently writing or using malware. The other impediment to quick criminal case disposition is the nature of the Internet itself. Technologies like TOR26 and VPN networks allow criminals to move about the Internet anonymously. Internet privacy is certainly a noble value to support and uphold, but when law enforcement is unable to acquire required data in a timely fashion, cybercrime will continue to increase because the risk/ reward equation is fundamentally skewed in their favour. The criminal response to two-factor authentication has been a continual stream of malicious code (also known as “malware”)
  • 18. 14 FREEDOM FROM FEAR - July 2010 The World Wide Web A confluence of malevolence is affecting the Web today. While “Web 2.0” represents an exciting new structure for ideas and opportunity, criminals are mirroring the optimism. Websites like Twitter and Facebook have become de facto communication tools, and criminals are leveraging the communication streams with innovative schemes. The trust models built into social media networks allow criminals to commandeer a victim’s account and subsequently communicate with all of the victim’s friends and associates. This equates to a new infection vector for bot herders. Additionally, groups specializing in criminal money movement used to create fictitious businesses online and then post reshipping and bank funds forwarding employment advertisements on employment search websites. Now these operations are migrating to social networking sites to recruit those desperate for work to participate in their ever-expanding criminal operations.27 Additionally, new web application vulnerabilities are announced almost daily with corresponding “point and click” exploit code28 and accompanied by informative tutorial videos. Vulnerable websites are easily found via Google or other search engines by searching for specific text combinations (also known as “strings”). Once a vulnerable website is identified, typically it then becomes a race to steal sensitive data first.29 Hackers understand that websites are increasingly powered by databases containing valuable data that could include customer lists, e-mail addresses, personal identifiers, credit/debit card data, etc. If a hacker is able to establish unauthorized communications with a database through a web browser, then the entire integrity of the website may be in jeopardy. Technical labels for these attacks include SQL Injection, Cross Site Scripting, Buffer Overflows, Remote File Include, etc. Many of the current web applications in development use new frameworks such as Rails and Django to simplify the development process, and history has shown that is it only a matter of time before vulnerabilities are discovered in even the newest frameworks. Miscreants use freely available “friendly use” tools to exploit vulnerable websites. Black-hat hackers may hunt for new vulnerabilities in web application source code to keep for themselves, but eventually the new information will trickle down to the malicious masses. Small business owners realize the need for a web presence and e-commerce solutions, but unfortunately security is often an afterthought, if it is considered at all. Web security also suffers because of cost. Knowledgeable web penetration testers are in demand and their services are typically out of reach for a small business. These professionals think like hackers and hunt for insecure code and configurations. Speaking of infection vectors, do you ever wonder how all of this malware actually infects a victim’s computer in the first place? Malicious e-mail attachments were once the main threat that required wariness, along with self propagating worms that exploited unpatched operating systems; and while those threats still remain, by and large the favourite infection vectors include “drive by downloads,” Peer-to-Peer network file distribution, and social network social engineering. Criminals discovered that it was becoming increasing difficult to push malware to victims so they decided to post the malware in locations where victims would naturally infect themselves on the Web. By hacking popular websites or incentivating visits to a lesser known website that hosts malicious code, criminals entice victims to download a “component” or “control” that is required for content functionality. Since many Internet users are conditioned to click through the successive dialogue boxes on these types of prompts, the malware installation occurs effortlessly. When direct e-mails are the infection vector of choice (known as “Spear Phishing”), sophisticated actors will use vulnerabilities in prolific applications such as Adobe Acrobat.30 A PDF attachment appears much more innocuous to the end user than a zip or executable file. Past attacks of this nature against US government contractors31 have started with the receipt of an e-mail from a free web e-mail account like Gmail or Hotmail where the sender’s name is that of a co- worker or superior within the company. This social engineering coupled with the latest software vulnerability is effective and difficult to prevent from a human behaviour perspective. Currently, social networks are being used to spam malicious web links that purport to originate from “friends,” when in fact the link originates with the “friends account.” Who is controlling that account is the rub. A decade of cyber security incidents has taught a level of mistrust for content received from unknown entities. When the content originates within an established trust model, often times the miscreants win. Lastly, Peer-to-Peer networks can quickly become hazardous if they are used to locate and download pirated media/software. Criminals routinely insert malware into various Peer-to- Peer networks mislabelled as frequently requested content. Peer-to-Peer networks can be especially disastrous for business computers not only because of the malicious files they are exposed to, but also because of the information shared on the computer with the rest of the network. The good news is that ISPs (Internet Service Providers) are implementing “walled gardens” in an effort to help protect their customers. Working with cyber security researchers, ISPs integrate daily lists of known CnC servers across the Internet. When a customer’s computer is observed communicating with a known CnC server, the computer is “quarantined” from the larger network and the customer is alerted. Once the customer’s computer has been cleaned of the malicious infection then the computer is reconnected to the Internet. This approach has proven effective to minimize a customer’s potential vulnerability after becoming infected. A PDF attachment appears much more innocuous to the end user than a zip or executable file Peer-to-Peer networks can be especially disastrous for business computers
  • 19. 15FREEDOM FROM FEAR - July 2010 The future While it is difficult to accurately predict the future cy- ber threat landscape, Team Cymru believes the continued adoption of smart phones represents an increasingly lu- crative target for criminals. Mobile malware that creates a “backdoor”32 or is able to perform “man in the applica- tion” functions will be able to compromise33 victims’ mobile banking activities. Additionally, maintaining secure code in mobile phone applications will remain a challenge34 for the companies providing the application storefronts such as Google, RIM, and Apple. Since thousands of applica- tions are submitted for approval on different mobile phone platforms, storeowners must continue to rigorously check each application’s code for maliciousness and ensure the company in question authorizes the application being rep- resented. Conclusion At one end of the spectrum, cybercrime appears to be in- creasing in scope and complexity, but the vexing concern is that decade old attacks still enjoy success. Well known vul- nerabilities continue to exist on the Internet and informa- tion security best practices are continually ignored. Informa- tion assurance is still regarded as a niche field of study for students and professionals who labour in back rooms. For- tunately, large cybercrime events are garnering additional publicity, and government policy makers are beginning to appreciate the constant threat to governments, businesses, and individuals constantly at risk of being victimized. The issue is crime. Fundamentally we are discussing people and their behaviours. Cybercrime is not a technical prob- lem and technology will never solve crime regardless of whether it occurs in the cyber realm or not. The incentives must be removed. The risk of attribution for cybercrime must increase through global legislative reciprocity and a substantial increase in technical law enforcement staffing and training. The good news is that law enforcement is forging partner- ships with the cyber security industry, researchers, and academics that are on the front lines in the cybercrime war. Often these individuals provide the keenest insights into particular cybercrime groups and criminal cases. The proactive partnerships are leading to noticeable arrests and that is good for the world’s 1.8 billion Internet users who hope their computer is not pwned. * Levi Gundert is a Southern California native with a background in business, technology, and security. Mr. Gundert is a former Secret Service Agent who specialized in economic and cyber crimes. He led multiple proactive cybercrime initiatives within the Electronic Crimes Task Force which resulted in world-wide arrests in cybercrimes. Mr. Gundert currently supports Team Cymru’s business intelligence group. He is a Certified Ethical Hacker (CEH), Systems Security Certified Professional (SSCP), and Certified Information Systems Security Professional (CISSP). 1 “Pwned” is criminal parlance for the act of compromising a computer or network device and gaining unauthorized access to the resources within. The term is a derivation of “owned”. 2 http://www.internetworldstats.com/stats.htm 3 Team Cymru Research NFP is a specialized Internet security research firm and 501(c)3 non-profit dedicated to making the Internet more secure. By researching the ‘who’ and ‘why’ of malicious Internet activity worldwide, Team Cymru helps organizations identify and eradicate problems in their networks. Much of Team Cymru’s time is spent identifying emerging trends within the Underground related to the monetization of compromised information. Team Cymru works with various organizations and industries affected by the Underground Economy. Many of Team Cymru’s efforts are for the benefit of Internet users, and at no cost to their partners. Team Cymru also works with Law Enforcement, where appropriate, from over 60 countries around the world. 4 On a rolling basis, over 25% of the world’s computers have probably been infected at some point. 5 http://www.paltelegraph.com/latest/6288-1000-israeli-websites-hacked- since-flotilla-attack 6 Internet Relay Chat was an early Internet protocol that allows multiple clients to connect to a server or network of servers. Channels are created within an IRC server that are akin to. 7 http://www.consumeraffairs.com/news04/2005/shadowcrew.html 8 http://news.softpedia.com/news/Former-CardersMarket-Admin- Sentenced-to-13-Years-in-Prison-134900.shtml 9 http://www.fbi.gov/page2/oct08/darkmarket_102008.html 10 http://www.msnbc.msn.com/id/37701078/ns/world_news-europe/ 11 http://datalossdb.org/incidents/1518-malicious-software-hack- compromises-unknown-number-of-credit-cards-at-fifth-largest-credit- card-processor 12 http://www.wired.com/threatlevel/2010/03/alleged-rbs-hacker-arrested/ 13 http://www.computerworld.com/s/article/9014782/TJX_data_breach_ At_45.6M_card_numbers_it_s_the_biggest_ever 14 https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml 15 http://www.owasp.org/index.php/Man-in-the-middle_attack. 16 http://www.owasp.org/index.php/Man-in-the-browser_attack 17 http://www.theregister.co.uk/2010/06/07/electronic_account_raided/ 18 http://en.wikipedia.org/wiki/Denial-of-service_attack 19 http://www.wired.com/threatlevel/2010/01/operation-aurora/ 20 http://en.wikipedia.org/wiki/GhostNet 21 A bot may poll a CnC server at different time intervals, but the bot herder maintains control of the infected computer. 22 This number includes code embedded in HTML (webpages) which tends to contain a high level of similarity to other malicious web samples. 23 http://www.infoworld.com/t/hacking/your-favorite-malware-authors-now- twitter-651 24 http://www.hurriyetdailynews.com/n.php?n=turkey-to-ink-cybercrime- treaty-2010-06-03 25 http://www.silicon.com/technology/security/2007/02/01/toxbot-hackers- sentenced-by-dutch-court-39165572/ 26 http://www.torproject.org/ 27 http://www.thenewnewinternet.com/2010/06/01/facebook-used-to-find- money-mules/ 28 http://www.theregister.co.uk/2010/06/08/padding_oracle_attack_tool/ 29 http://www.physorg.com/news194849560.html 30 http://www.adobe.com/support/security/advisories/apsa10-01.html 31 http://www.businessweek.com/magazine/content/08_16/ b4080032218430.htm 32 http://www.net-security.org/secworld.php?id=9371 http://marienfeldt.wordpress.com/2010/03/22/iphone-business-security- framework/ 33 http://www.itpro.co.uk/624025/hackers-target-windows-based-phones 34 http://online.wsj.com/article/ SB100014240527487033409045752845321ttoWhatsNewsFifth
  • 20. 16 FREEDOM FROM FEAR - July 2010 Cyber Crime and Organized Crime The current era of cybercrime is no longer dominated by hackers accessing computer systems just for fun or notoriety. The development and growth of the digital economy has changed the criminal landscape dramati- cally. High rewards combined with low risks have made digital networks an attractive environment for various types of criminal groups. In the non-digital era, organised crime sought after the safe havens offered by countries with weak governments and unstable political regimes. To- day’s organised criminal groups can benefit from national jurisdictions that do not have proper legal frameworks and technical capabilities to fight cybercrime. The easiness of communication, anonymity, and the accessibility of tools for illegal operations have transformed cybercrime into a global, fast-expanding and profit-driven industry with or- ganised criminal groups thriving behind it. Organised crime in cyberspace: changing structure Organised criminal groups are gradually moving from traditional criminal activities to more rewarding and less risky operations in cyberspace. While some traditional criminal organisations are seeking the cooperation of e- criminals with the necessary technical skills, newer types of criminal networks operating only in the area of e-crime have already emerged. The structure of these criminal organizations is different from traditional organised crime organisations. Crimi- nal activities are usually conducted within multi-skilled, multifaceted virtual criminal networks centred on online meetings. These networks are structured on “stand alone” basis, as members rarely meet each other in person and sometimes do not even have a virtual contact with other col- leagues. This sophisticated structure, together with access to the core operations granted only to trusted associates, prevents organised cybercrime groups from being detected and infiltrated by law enforcement. The networks themselves could involve from ten to several thousand members and could include affiliated networks in their structure. Regardless of the number of members and affiliates, virtual criminal networks are usually run by a small number of experienced online criminals who do not commit crimes themselves, but act rather as entrepreneurs. The leading members of the networks divide the different segments of responsibility (spamming, controlling compro- mised machines, trading data) among themselves. Some “elite” criminal groups act as closed organisations and do not participate in online forums because they have enough resources to create and maintain the value chains for the whole cycle of cyber-offences, and therefore have no need to outsource or to be engaged as outsiders into other groups. Tools and models for criminal activity Organised crime borrows and copies business models from the legitimate economy sector. Cybercriminals employ models similar to the B2B (business-to-business) for their operations, such as the highly sophisticated C2C (criminal- * Tatiana Tropina Organised criminal groups are gradually moving from traditional criminal activities to more rewarding and less risky operations in cyberspace
  • 21. 17FREEDOM FROM FEAR - July 2010 to-criminal) models, which use very effective crime tools available through digital networks. The computer systems’ vulnerabilities and software are exploited to create crime- ware such as viruses, Trojans, keyloggers. These crimeware tools offer criminal groups the flexibility of controlling, stealing and trading data. The development of botnets, networks of compromised computers running programs under external control, trans- formed some types of cybercrimes such as phishing into the worldwide underground ecosystem run by organised crime. The estimated financial gain of these criminal groups rang- es from tens of thousands to tens of millions of dollars. The trade of botnets has also become a high-revenue activity that could be also linked to organised crime. The botnets’ costs are relatively low compared to the criminals’ finan- cial gain and to the damage to individual consumers and businesses, as well as to the financial health, reputation and trust in online transactions as a whole. Crimeware is also used to deploy Crime-as-a-Service busi- ness models that represent the system of trading and deliv- ering crimeware tools. Data supplying models are also used to share the tools to commit cybercrimes. For instance, by creating “customer” systems where instruments are avail- able on demand, “users” just log into the server and choose from the range of tools suitable for fraud, phishing, and data stealing and then download them. When user data is stolen, criminals can use crimeware servers to commit organised attacks. Crimeware servers allow to control compromised computers and manage the stolen data. Addressing the problem Fighting cybercrime has always been a complex problem due to the number of ICT network users, the transnational nature of the Internet and its decentralised architecture. Cybercriminals, and especially organised criminal groups, have been and probably would always remain several steps ahead of legislators and law enforcement agencies. C2C networks benefit from anonymous communications, auto- mation of attacks and the difficulties that law enforcement agencies experience in determining the location: servers with crimeware could be in one country, while members of the network could be in another one, targeting victims across the world. In addition to strengthening the current legal frameworks, updating old legislation, harmonising laws on an interna- tional level, what is needed is also the cross-sector coopera- tion on national level as well as international cooperation in detecting, investigating and preventing e-crimes committed by organised criminal groups. The development of a com- prehensive understanding and a forward-looking approach are required since fighting organised cybercrime seems to have a moving target. Countries face the problem of addressing this international problem collectively. Some States just do not have the nec- essary tools to respond to the activities of the organised cy- bercriminals, they may lack the technical skills or have legal drawbacks. The development of a common understanding that no country could be safe alone in the global ICT net- work is very important. Future trends and responses With the absence of a global strategy to counter organised cybercrime, the problem is very likely to deepen in the fore- seeable future. With the development of ICT networks and of the opportunities they offer, criminal groups will benefit from the entire range of the tools and models available to the legitimate economy sectors. The information’s avail- ability would make it not only more accessible to organised groups, but also more easy for them to foster and automate their fraud-committing activity. It would also probably link more opportunistic criminals to existing criminal net- works. Cybercrime is transforming itself into an illegal industry, where syndicates are highly sophisticated and are very hard to identify. Some cybercrime industries would be run solely by organised criminal groups, constantly seeking the new- est technical solutions and for the creations of new markets. As a result, it would be likely for the cybercrime ecosystem to be soon dominated by criminal organisations, as cyber- crime networks that have already become international would multiply opportunities and reach the global scale by exploiting the legal frameworks’ weakness and searching for safe havens in countries with less capability to detect and fight them. This will make fighting cybercrime a more difficult task for law enforcement agencies. As markets and trading itself have always attracted organ- ised criminal groups seeking benefits from illegal activities, the growth of digital operations and services in legitimate markets are a key enabler for organised cybercriminals, both for committing traditional crimes and for developing new types of illegal activities. Using business models that have proved their effectiveness for the legal business sector, organised cybercrime groups deploy highly sophisticated tools of online criminal activities. The risk for individuals, businesses, and governments grows with the further digi- talisation of their economy. E-activity is conducted as long- term sustainable criminal operations. Due to the borderless nature of the Internet, the problem of organised cybercrime has truly global consequences when no country can ensure safety only within its borders. The sole way to address the problem is to develop long-term responses that would in- clude coordination and harmonisation of efforts on both national and international levels. * Dr. Tatiana Tropina is Senior Researcher at the Cybercrime Institute in Cologne, Germany. The sole way to address the problem is to develop long-term responses that would include coordination and harmonisation of efforts on both national and international levels
  • 22. 18 FREEDOM FROM FEAR - July 2010 Terrorist Use of the Internet and Legal Response Without doubt terrorist organisations today are using the Internet for various purposes. Unlike the early debate when the focus was on potential terrorist-related network-based attacks against critical infrastructure and the use of information technology in armed conflicts (cy- berwarfare), it is widely recognised that the range of activi- ties is more complex.1 Terrorist use of the Internet includes research, training, propaganda and communication.2 But despite more intensive research many aspects are still un- certain as reports about concrete incidents often remain classified. The following article provides an overview of the different areas of terrorist use of the Internet and the con- cept of legal response. I. Terrorist Use of the Internet 1. Propaganda While ten years ago only 12 of the 30 foreign terrorist organisations listed by the U.S. State Department main- tained websites,3 in 2004 the United States Institute of Peace reported that almost all terrorist organisations have websites.4 The Internet-related propaganda activities in- clude the distribution of video messages5 and the descrip- tions and justifications of activities.6 The Internet has sub- stituted traditional channels of distribution, particularly with regard to video messages.7 2. Collection of information The Internet has proven to be highly useful for collecting information. Millions of websites provide information that can be used for legitimate as well as illegal purposes. One example are satellite pictures. High-resolution satellite pictures, previously available only to a handful of military institutions, are today made available by various Internet services.8 Other examples include instructions on how to build bombs, and even virtual training camps, providing information on the use of weapons in an e-learning ap- proach.9 Such instructions are available on a large-scale online.10 In 2008, Western secret services discovered an Internet server that allowed for the exchange of training material and communications.11 Several websites were reported to be operated by terrorist organisations to coordinate ac- tivities.12 In addition, sensitive or confidential information that is not adequately protected from search robots can be found via search engines.13 Terrorist organizations have started to explore this technology. In 2003, the U.S. De- partment of Defense was informed about a training manu- al linked to al-Qaida providing information on how to use public sources to find details about potential targets.14 In 2005, the German press reported that investigators had found downloaded manuals on how to build explosives on the computer of two suspects, who then attempted to at- tack the German public transportation system with home- made bombs.15 3. Communication In the investigations following 9/11, it was reported that the terrorists used e-mail communication to coordinate their at- tacks.16 The press reported that detailed instructions about the targets and the number of attackers had been exchanged via e-mail.17 The threats related to a technology shift are also accentuated by the fact that the interception of Voice-over-IP calls is going along with significantly more challenge than the interception of regular phone calls.18 4. Use of information technology to prepare for “real world” attacks19 It has been reported that terrorists are using online vid- eogames as part of their preparation for attacks. Various online games simulate the “real world” by allowing the user to manipulate characters (avatars) in a virtual world. Theoretically, those online games could be used to simu- late attacks, though it is not yet certain to what extent they have been used to do so.20 * Marco Gercke, Daniel Thelesklaf The Internet-related propaganda activities include the distribution of video messages and the descriptions and justifications of activities
  • 23. 19FREEDOM FROM FEAR - July 2010 5. Attacks against critical infrastructure Over the past decades, more and more countries have turned into information societies.21 Services such as online banking and telephone communications using Voice-over-Internet- Protocol (VoIP) are very popular.22 But it is not only the communication sector that has shifted its services online: information technology and Internet services are today used to control and manage many functions in buildings, transportation systems, waterways and energy grids.23 Critical infrastructure is widely recognised as a potential target for terrorist attacks, as it is, by definition, vital for the stability of the State.24 Infrastructure is considered to be frail, and its incapacity or destruction could have a de- bilitating impact on a State’s defence or economic securi- ty.25 This concerns, in particular, electrical power systems, telecommunication systems, gas and oil storage and trans- portation, banking and finance, transportation, water sup- ply systems and emergency services. The civil disturbance caused by Hurricane Katrina highlights the dependence of developed societies on those services.26 Both the new means of communication and the use of in- formation technology to control critical infrastructure have influenced terrorist organisations’ ability to use the Inter- net for attacks against critical infrastructure and to make it more vulnerable to attacks.27 Interconnected systems that are linked by computer and communication networks are especially attractive targets.28 A network-based attack would do more than cause a single system to fail. Rather, it would bring down an entire network of systems and their related infrastructure. Even short interruptions of services would cause huge financial damage to e-commerce businesses, government service providers and the security sector.29 II. Legal Response The recognition of the threat associated with terrorist use of the Internet and the related challenges has led to various le- gal approaches to address the issue. The ones on a national level in particular show significant differences. With regard to systematic aspects, there are three different approaches of how countries are addressing the specific challenges of terrorist use of the Internet: 1. Applying existing cybercrime legislation, developed to cover non-terrorist related acts, to terrorist use of the Internet; 2. Applying existing legislation, developed to cover non-Inter- net related terrorist acts, to Internet-related acts as well; 3. Enacting specific legislation on terrorist use of the Internet. 1. Application of Cybercrime legislation Some countries are using existing cybercrime legislation that was developed to cover non-terrorist related acts to criminalize terrorist use of the Internet. One example for such provision is Art. 2 of the Council of Europe Convention on Cybercrime,30 which was developed to cover traditional cybercrime, but not specifically designed to address terror- ist related acts: Article 2 –Illegal access Each Party shall adopt such legislative and other meas- ures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system with- out right. A Party may require that the offence be com- mitted by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system. Based on the experiences with this approach, three aspects ought to be taken into consideration. Substantive criminal law provisions that were implemented to cover non-terror- ist related acts (such as illegal access31 or system interfer- ence32 ) might be applicable in terrorist-related cases, but very often the range for sentencing will differ from specific terrorism legislation. Depending on the dogmatic structure of procedural law this could influence the ability to use so- phisticated investigation instruments that are restricted to terrorist or organised crime related investigation. Secondly, and with regard to procedural instruments, the situation is slightly different. The application of cybercrime specific investigation instruments in cases of terrorist use of the Internet (such as the expedited preservation of com- puter data33 ) is going along with less challenges, since most countries do not limit the application to traditional cyber- crime offences but to any offence involving computer da- ta.34 Finally, regional instruments developed to address the challenge of cybercrime, but not specifically terrorist use of the Internet, often contain exemptions for international co- operation with regard to political offences. One example is Art. 27, paragraph 4.a of the Council of Europe Convention on Cybercrime.35 Article 27 – Procedures pertaining to mutual assist- ance requests in the absence of applicable interna- tional agreements [...] 3. Mutual assistance requests under this article shall be executed in accordance with the procedures specified by the requesting Party, except where incompatible with the law of the requested Party. 4. The requested Party may, in addition to the grounds for refusal established in Article 25, paragraph 4, refuse assist- ance if: a) the request concerns an offence which the requested Par- ty considers a political offence or an offence connected with a political offence, or b) it considers that execution of the request is likely to preju- dice its sovereignty, security, ordre public or other essential interests. [...] In 2008, Western secret services discovered an Internet server that allowed for the exchange of training material and communications
  • 24. 20 FREEDOM FROM FEAR - July 2010 The provision authorizes parties to the Convention to refuse mutual assist- ance if it concerns an offence which the requested Party considers a politi- cal offence, or connected with a politi- cal offence.36 As this is often the case when it comes to terrorist use of the Internet, such approach can hinder the investigation. To improve the situation the terrorist-specific legal frameworks, such as the 2005 Council of Europe Convention on the Prevention of Ter- rorism37 contains an exclusion of the political exception clause in Art. 20.38 With regard to the Convention on Cy- bercrime, the issue is only solved with regard to those countries that have signed and ratified both Conventions. 2.Applicationofexisting(nonInter- net specific) terrorism legislation Another approach is to use existing terrorism legislation to criminalise and prosecute terrorist use of the Internet. On example for a traditional instru- ment is the aforementioned Council of Europe Convention on the Prevention of Terrorism.39 Article 5 – Public provocation to commit a terrorist offence 1 For the purposes of this Convention, public provocation to commit a ter- rorist offence means the distribution, or otherwise making available, of a message to the public, with the intent to incite the commission of a terrorist offence, where such conduct, whether or not directly advocating terrorist offences, causes a danger that one or more such offences may be committed. 2 Each Party shall adopt such meas- ures as may be necessary to estab- lish public provocation to commit a terrorist offence, as defined in para- graph 1, when committed unlawfully and intentionally, as a criminal of- fence under its domestic law. The Convention defines several of- fences, such as the above-mentioned public provocation to commit a ter- rorist offence: however, it does not contain provisions criminalising terrorist-related attacks against com- puter systems or specific data-related procedural instruments. However, especially with regard to investigat- ing Internet-related offences, specific procedural instruments are required as the investigation process differs sig- nificantly from traditional ones, and traditional instruments would there- fore often fail. 3. Development of specific legisla- tion dealing with terrorist use of the Internet The third approach is the development of specific legislation addressing ter- rorist use of the Internet. One example is Section 4.f of the Draft ITU Cyber- crime Legislation Toolkit. Section 4. Interference and Dis- ruption [...] (f) Intent to Cause Interference or Disruption for Purposes of Terrorism. Whoever commits interference and/ or disruption pursuant to paragraphs (a) and (b) of this Section with the in- tent of developing, formulating, plan- ning, facilitating, assisting, inform- ing, conspiring, or committing acts of terrorism, not limited to acts of cy- berterrorism, shall have committed a criminal offense punishable by a fine of [amount] and imprisonment for a period of [duration]. The International Telecommunica- tion Union (ITU) is the UN organisa- tion that has most responsibility for practical aspects of cybersecurity.40 The aim41 of the Draft Toolkit is to give countries the possibility of using sam- ple language and reference material in the process of national cybercrime leg- islation development, that can assist, according to the Toolkit’s developers, the “establishment of harmonized cy- bercrime laws and procedural rules.”42 The Toolkit was developed by the American Bar Association on the ba- sis of a comprehensive analysis of the Council of Europe (CoE) Convention on Cybercrime and the cybercrime legislation developed by countries. It aims to be a fundamental resource for legislators, policy experts, and indus- try representatives, providing them with the framework to develop consist- ent cybercrime legislation. Moreover, in addition to traditional approaches, the Toolkit also contains several spe- cific terrorist-related offences.43 * Dr. Marco Gercke is the Director of the Cybercrime Research Institute. Mr. Daniel Thelesklaf is the Executive Director of the Basel Institute on Governance. 1 Gercke, ‘Cyberterrorism, How Terrorists Use the Internet’, Computer und Recht, 2007, page 62 et seq. 2 For an overview see Sieber/Brunst, Cyberterrorism – The Use of the Internet for Terrorist Purposes, Council of Europe Publication, 2007; Gercke, ‘Cyberterrorism, How Terrorists Use the Internet’, Computer und Recht, 2007, page 62 et seq. 3 ADL, Terrorism Update 1998, available at http://www.adl.org/terror/focus/ 16_focus_a.asp 4 Weimann in USIP Report, How Terrorists Use the Internet, 2004, page 3. Regarding the use of the Internet for propaganda purposes see as well: Crilley, ‘Information Warfare: New Battlefields – Terrorists, Propaganda and the Internet’, Aslib Proceedings, Vol. 53, No. 7 (2001), page 253. 5 Regarding the use of YouTube by terrorist organisations, see Heise Online News, 11 October 2006, available at http://www.heise.de/newsticker/ meldung/79311; Staud in Sueddeutsche Zeitung, 05.10.2006 6 Regarding the justification see Brandon, ‘Virtual Caliphate: Islamic Extremists and the Internet’, 2008, available at http://www. socialcohesion.co.uk/pdf/VirtualCaliphateExecutiveSummary.pdf 7 So Weimann in USIP Report, How Terrorists Use the Internet, 2004, page 5. It has been reported that terrorists are using online videogames as part of their preparation for attacks Critical infrastructure is widely recognised as a potential target for terrorist attacks, as it is, by definition, vital for the stability of the State
  • 25. 21FREEDOM FROM FEAR - July 2010 8 Levine, ‘Global Security’, 27.06.2006, available at http://www. globalsecurity.org/org/news/2006/060627-google-earth.htm; regarding the discovery of a secret submarine on a satellite picture provided by a free of charge Internet Service see Der Standard Online, ‘Google Earth: Neues chinesisches Kampf-Uboot entdeckt’, 11.07.2007, available at http://www.derstandard.at/?url/?id=2952935 9 For further reference see Gercke, ‘The Challenge of Fighting Cybercrime’, Multimedia und Recht, 2008, page 292. 10 Brunst in Sieber/Brunst, ‘Cyberterrorism – the use of the Internet for terrorist purposes’, Council of Europe Publication, 2007; US Homeland Security Advisory Council, Report of the Future of Terrorism Task Force, January 2008, page 5; Stenersen, ‘The Internet: A Virtual Training Camp?’, Terrorism and Political Violence, 2008, page 215 et seq. 11 Musharbash, ‘Bin Ladens Intranet’, Der Spiegel, Vol. 39, 2008, page 127. 12 Weimann, ‘How Modern Terrorism Uses the Internet’, 116 Special Report of the US Institute of Peace, 2004, page 10. 13 For more information regarding the search for secret information with the help of search engines, see Long, Skoudis and van Eijkelenborg, Google Hacking for Penetration Testers. 14 ‘Using public sources openly and without resorting to illegal means, it is possible to gather at least eighty per cent of information about the enemy.’ For further information, see Conway, ‘Terrorist Use of the Internet and Fighting Back’, Information & Security, 2006, page 17. 15 See Sueddeutsche Zeitung Online, ‘BKA findet Anleitung zum Sprengsatzbau’, 07.03.2007, available at http://www.sueddeutsche.de/ deutschland/artikel/766/104662/print.html 16 The 9/11 Commission Report, Final Report of the National Commission on Terrorist Attacks Upon the United States, 2007, page 249. 17 The text of the final message was reported to be: ‘The semester begins in three more weeks. We’ve obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering.’ The name of the faculties was apparently the code for different targets. For more detail see Weimann, ‘How Modern Terrorism Uses the Internet’, Journal of International Security Affairs, Spring 2005, No. 8; Thomas, ‘Al Qaeda and the Internet: The Danger of “Cyberplanning”’, 2003, available at http://findarticles.com/p/articles/ mi_m0IBR/is_1_33/ai_99233031/pg_6; Zeller, On the Open Internet, a Web of Dark Alleys, The New York Times, 20.12.2004, available at http:// www.nytimes.com/2004/12/20/technology/20covert.html?pagewanted=p rint&position=; 18 Regarding the interception of VoIP to assist law enforcement agencies, see Bellovin and others, “Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP”, available at http://www.itaa.org/news/docs/CALEAVOIPreport.pdf; Simon/Slay, “Voice over IP: Forensic Computing Implications”, 2006, available at: http://scissec.scis.ecu.edu.au/wordpress/conference_ proceedings/2006/forensics/Simon%20Slay%20-%20Voice%20 over%20IP-%20Forensic%20Computing%20Implications.pdf 19 See US Commission on Security and Cooperation in Europe Briefing, 15.05.2008, available at http://csce.gov/index. cfm?FuseAction=ContentRecords. ViewTranscript&ContentRecord_id=4 26&ContentType=H,B&ContentRecordType=B&CFID=18849146&CFTO KEN=53; O’Brian, Virtual Terrorists, The Australian, 31.07.2007, available at http://www.theaustralian.news.com.au/story/0,25197,22161037- 28737,00.html 20 Regarding other terrorist-related activities in online games see Chen/ Thoms, ‘Cyber Extremism in Web 2.0 – An Exploratory Study of International Jihadist Groups’, Intelligence and Security Informatics, 2008, page 98 et seq. 21 For more information on the information society see Masuda, The Information Society as Post-Industrial Society; Dutta/De Meyer/Jain/ Richter, The Information Society in an Enlarged Europe; Maldoom/ Marsden/Sidak/Singer, Broadband in Europe: How Brussels can wire the Information Society; Salzburg Center for International Legal Studies, Legal Issues in the Global Information Society; Hornby/Clarke, Challenge and Change in the Information Society. 22 Regarding the new opportunities see for example: Communication From The Commission To The Council, The European Parliament, The European Economic And Social Committee And The Committee Of The Regions, Challenges for the European Information Society beyond 2005, page 3, available at http://ec.europa.eu/information_society/ eeurope/i2010/docs/communications/new_chall_en_adopted.pdf. Regarding the extend of integration of ICTs into the daily lives and the related threats see Goodman, ‘The Civil Aviation Analogy – International Cooperation to Protect Civil Aviation Against Cyber Crime and Terrorism’ in Sofaer/Goodman, The Transnational Dimension of Cyber Crime and Terrorism, 2001, page 69, available at http://media.hoover.org/ documents/0817999825_69.pdf 23 Bohn/Coroama/Langheinrich/Mattern/Rohs, ‘Living in a World of Smart Everyday Objects – Social, Economic & Ethical Implications’, Journal of Human and Ecological Risk Assessment, Vol. 10, page 763 et seq., available at http://www.vs.inf.ethz.ch/res/papers/hera.pdf 24 Brunst in Sieber/Brunst, ‘Cyberterrorism – The Use of the Internet for Terrorist Purposes’, Council of Europe Publication, 2007. 25 US Executive Order 13010—Critical Infrastructure Protection. Federal Register, July 17, 1996. Vol. 61, No. 138. 26 Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve, GAO communication, July 2007, available at http:// www.gao.gov/new.items/d07706r.pdf 27 Sofaer/Goodman, ‘Cybercrime and Security – The Transnational Dimension’ in Sofaer/Goodman, The Transnational Dimension of Cyber Crime and Terrorism, 2001, available at http://media.hoover.org/ documents/0817999825_1.pdf 28 Lewis, ‘Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats’, Center for Strategic and International Studies, December 2002. 29 Shimeall/Williams/Dunlevy, Countering Cyber War, NATO Review, winter 2001/2002, available at http://www.cert.org/archive/pdf/counter_ cyberwar.pdf 30 Council of Europe Convention on Cybercrime (CETS No. 185). For more details see: Sofaer, Toward an International Convention on Cyber in Seymour/Goodman, The Transnational Dimension of Cyber Crime and Terror, page 225, Gercke, The Slow Awake of a Global Approach Against Cybercrime, Computer Law Review International, 2006, 140 et seq.; Gercke, National, Regional and International Approaches in the Fight Against Cybercrime, Computer Law Review International 2008, page 7 et. seq; Aldesco, The Demise of Anonymity: A Constitutional Challenge to the Convention on Cybercrime, Entertainment Law Review, 2002, No. 1; Jones, The Council of Europe Convention on Cybercrime, Themes and Critiques, 2005; Broadhurst, Development in the global law enforcement of cyber-crime, in Policing: An International Journal of Police Strategies and Management, 29(2), 2006, page 408 et seq. 31 See for example Art. 2 Convention on Cybercrime. 32 See for example Art. 5 Convention on Cybercrime. 33 Art. 16 Convention on Cybercrime. 34 See in this context for example Art. 14 Convention on Cybercrime: Article 14 –Scope of procedural provisions 1. Each Party shall adopt such legislative and other measures as may be necessary to establish the powers and procedures provided for in this section for the purpose of specific criminal investigations or proceedings. 2. Except as specifically provided otherwise in Article 21, each Party shall apply the powers and procedures referred to in paragraph 1 of this article to: a. the criminal offences established in accordance with Articles 2 through 11 of this Convention; b. other criminal offences committed by means of a computer system; and c. the collection of evidence in electronic form of a criminal offence. [...] 35 Convention on Cybercrime, ETS 185. 36 The requested Party may, in addition to the grounds for refusal established in Article 25, paragraph 4, refuse assistance if: a. the request concerns an offence which the requested Party considers a political offence or an offence connected with a political offence, or b. it considers that execution of the request is likely to prejudice its sovereignty, security, ordre public or other essential interests. 37 Council of Europe Convention on the Prevention of Terrorism, ETS 196. 38 Article 20 – Exclusion of the political exception clause 1 None of the offences referred to in Articles 5 to 7 and 9 of this Convention, shall be regarded, for the purposes of extradition or mutual legal assistance, as a political offence, an offence connected with a political offence, or as an offence inspired by political motives. Accordingly, a request for extradition or for mutual legal assistance based on such an offence may not be refused on the sole ground that it concerns a political offence or an offence connected with a political offence or an offence inspired by political motives. […] 39 Council of Europe Convention on the Prevention of Terrorism, ETS 196. 40 Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks, European Union, Policy Department External Policies, 2009, page 17. 41 For more information see Gercke/Tropina, From Telecommunicaiton Standardisation to Cybercrime Harmonisation? ITU Toolkit for Cybercrime Legislation, Computer Law Review International, Issue 5, 2009, page 136 et seq. 42 ITU Toolkit for Cybercrime Legislation. Draft April, 2009, page 8. Available at: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit- cybercrime-legislation.pdf 43 Sec. 2 d) (Unauthorized Access for Purposes of Terrorism), Sec. 3 f) (Unauthorized Access to or Acquisition of Computer Programs or Data for Purposes of Terrorism), Sec. 4 f) (Intent to Cause Interference or Disruption for Purposes of Terrorism), Sec. 6 h) (Intent to Furtherance of Terrorism).
  • 26. 22 FREEDOM FROM FEAR - July 2010 Foreword In the last decades the most developed countries of the world have realized a social model characterized by a high “quality of life” of their citizens. There are, in fact, many services and opportunities available to every citizen, which contribute to satisfying their needs or expressing their attitudes. Energy provision, healthcare, transportation and financial systems represent some of the fundamental pillars of this “quality of life” model. The availability of those services is perceived as a natural fact, to the extent that if they were no longer accessible, most of us wouldn’t know what to do in many circumstances. The current situation has changed profoundly since the beginning of 20th Century, when every family heated its house with lumber collected by the family members and possessed autonomous transportation means (horses, mules etc.), or when an entrepreneur would have to install autonomous power generation mechanisms for its manu- facture. Moreover, in the last years there has been an increasing attention to the dependence on those infrastructures al- lowing the provision of services, and whose unavailability would unacceptably compromise the quality of our lives. Those infrastructures have been dubbed as “critical,” and the need to protect their existence and enduring function- ing became a synonym of the need of protecting our “qual- ity of life.” CI Protection Initiatives Following the terrorist attacks that shocked the world in the first years of the new Millennium, both in North America and in Europe, many advanced countries started to consider the protection of their critical infrastructures (CI) in a more organic way, taking into account potential intentional attacks against them. * Marco Carbonelli, Luisa Franchina, Laura Gratta, Fabio Guasconi, Daniele Perucchini Defending Quality of Life through Critical Infrastructure Protection ©NASA
  • 27. 23FREEDOM FROM FEAR - July 2010 Among the first countries to take action, the U.S.A. estab- lished the Department of Homeland Security (DHS) right after the attacks of 11 September 2001. This entity imme- diately outlined the protection of critical infrastructures and key assets among its critical mission areas, drafting the National Infrastructures Protection Plan (NIPP), which provides a unified nation-wide strategy for its national pro- tection. The DHS is also mandated to guide, integrate and coordi- nate the national efforts for improving the protection of critical infrastructures, developing and implementing pro- grammes and methodologies of risk assessment, inter-sec- tor guidelines and metrics. By the end of 2004 the European Union followed this rising interest and launched the European Programme for Criti- cal Infrastructure Protection (EPCIP). Such programme also addresses prevention, preparedness and response to terrorist attacks, and it is still supporting many initiatives promoting critical infrastructures’ security. The directive 114/2008 of the European Commission repre- sents instead a first step for harmonizing the protection of European critical infrastructures (ECI) around a common baseline of measures. The first step of this baseline is the identification of the critical infrastructures, applying cross- cutting criteria based on the ex ante assessment of human casualties, economic consequences and public effects due to a possible outage of candidate infrastructures. After identifying and designating the ECIs, each of these must provide a liaison officer and complete an “operator security plan” based on the most widely accepted risk man- agement concepts. Every EU country must also designate a national contact point on the matter and periodically report to the Commission. This directive initially applies to criti- cal infrastructures in the energy and transportation sectors, and will be extended to other sectors in the near future. CI Threats and Impacts Critical infrastructures are managed by a constellation of private and public organizations which are naturally prone to a wide variety of threats that can impact the citizens’ “quality of life,” depending on their own characteristics in terms of processes, assets etc. Some of those organizations, for example, might rely more on information systems than others and will thus be more susceptible to cyber attacks, as in the cases where SCADA (Supervisory Control And Data Acquisition) systems are involved. In this latter situation, constantly growing in number, the continuous functioning of large infrastruc- tures (power plants, oil sewage, air traffic sensors etc.) can be consistently assigned to automated or semi-automated systems interconnected by distributed networks. Nowa- days, many industrial processes (like automobile construc- tion, food production and even goods’ distribution) are also being progressively controlled by SCADA or ICT (Informa- tion and Communication Technology) systems, which help cutting operational costs and increasing efficiency. In all of these contexts, a cyber attack could not only have the same consequences as a physical sabotage, but it could prove to be even tougher because of the possibility of reaching a large number of similar systems via remote links. Since the ultimate goal is to protect the frequently cited “quality of life,” critical infrastructure must be protected not only against all types of intentional attacks. These may range from retaliation sabotage by a disgruntled employee up to terrorists attacks aimed at waging fear and damage in a region or country, but also from natural events and dis- asters to mechanical failures and the omnipresent human errors. Every one of those threat families is composed by a vast number of possible actions performed by different actors (threat agents), which, as a part of the risk management discipline, are then connected to specific impacts. Those impacts are related to the simple question “what would happen if,” and are thus strongly coupled with threats. In any case, most of the approaches used worldwide to identify critical infrastructures are “all hazard;” this means that the criticality assessment is based on the impact of a breakdown of the infrastructure leading to the interruption of the serv- ice provision, irrespectively of the specific threat scenario that would lead to the breakdown itself. The most widely recognized high-level impact is the loss of human lives, but the “quality of life” goes well beyond the “survival” concept, thus bringing into consideration other impacts like social and political stability, economic losses, pollution, confidence in institutions, psychological suffer- ing and many others, which, in turn, may be generated by a large number of possible threats. CI Protection Solutions Prevention is a key factor and, in fact, all modern critical infrastructure protection programmes mandate in their very core some kind of risk assessment activity, identifying the critical assets, evaluating the threats to which they are prone and the effectiveness of the adopted protecting coun- termeasures. If the results of this activity show an insuffi- cient protection, it must be remedied through the adoption of additional countermeasures. Indeed, most operators of major critical infrastructures al- ready implement effective risk management and business Critical infrastructures are managed by a constellation of private and public organizations which are naturally prone to a wide variety of threats Every one of those threat families is composed by a vast number of possible actions performed by different actors (threat agents)
  • 28. 24 FREEDOM FROM FEAR - July 2010 Figure 1 Combined approach to CI protection Time and costs behind those words are really not negligible but it must be considered that resources spent in the correct preventive measures have a proven favorable return of investment with respect to those spent to recover from an incident and to sustain its consequences. continuity plans. In many sectors, specific rules are in place to guarantee operational continuity. Nevertheless, due to the highly interconnected nature of critical infrastructures, a fault in a “minor” infrastructure, perhaps not properly se- cured, could cause an unexpected cascading affect, leading to the progressive breakdown of other infrastructures. This circumstance calls for an enhancement of the overall level of security, guaranteeing a “basic” operational continuity for all the infrastructures contributing, even indirectly, to the citizens’ “quality of life.” Since the impacts to the life quality are so wide-ranging and different, conducting a realistic risk assessment is neither an easy task nor is it something that many organizations are used to doing. Luckily there are some contexts in which those topics are adequately addressed, as within “manage- ment systems.” Those organizational frameworks are sets of requirements, established by some national or international standard, aimed at correctly managing a specific topic in a documented and improvement-oriented way. Some exam- ples of management systems relevant for critical infrastruc- tures include: • ISO 22399 on incident preparedness and operational continuity; • ISO/IEC 27001 on information security; • OHSAS 18001 on occupational health and safety; • ISO 14000 on environment. All those management systems are based on risk assess- ment concepts and they are interoperable between them. Moreover, they are mature objects supported by competent communities, dedicated tools and they even offer control and certification capabilities. Most importantly, every one of them separately addresses some of the relevant impacts to the “quality of life.” Rather than inventing new solutions to already addressed problems, the correct joint application of those sound meth- odologies could be a huge step forward in the protection of critical infrastructures. This fact, opportunely coordinated in its application by local and interstate governments, even in a gradual step-by-step way, should ultimately be able to bring our society to a more stable and sustainable state of “quality of life.” * Marco Carbonelli, Laura Gratta work in the Interministerial Coordination Secretariat for Critical Infrastructure Protection, within the Italian Presidency of the Council of the Ministers, and are in charge of the Critical Infrastructure modelling and the Directive 114/08 CE national implementation areas, respectively. Luisa Franchina is Director General of the Team on CBRN attack risk of the Italian Department of National Civil Protection, and is the Head of the Interministerial Coordination Secretariat for Critical Infrastructure Protection, within Italian Presidency of the Council of the Ministers. Fabio Guasconi is a Team Manager for @ Mediaservice.net S.r.l., a Security Advisory firm and is the chairperson of the Italian ISO/IEC JTC1/SC27 committee. Daniele Perucchini is the Leader of the Critical Infrastructure Protection Area within Fondazione Ugo Bordoni. The correct joint application of those sound methodologies could be a huge step forward in the protection of critical infrastructures
  • 29. 25FREEDOM FROM FEAR - July 2010 UNHCR/B.Heger/LBR.2002 WWW.UNHCR.ORG
  • 30. 26 FREEDOM FROM FEAR - July 2010 * John Carr Online Crimes against Children The emergence of the Internet as a mass consumer product has not necessarily created any entirely new genres of crime, but it has certainly given a new twist to some very old and familiar ones
  • 31. 27FREEDOM FROM FEAR - July 2010 The emergence of the Internet as a mass consumer prod- uct has not necessarily created any entirely new genres of crime, but it has certainly given a new twist to some very old and familiar ones. Above all it has changed the scale on which a number of offences are carried out. Crimes against children are a classic example. Crimes involving the production and distri- bution of child abuse images1 are a very specific case in point. Prior to the arrival of the Internet, in most parts of the world it was extremely difficult to get hold of child abuse images. Usually, a person interested in acquiring any had to know someone who already had some, otherwise they had to go to great trouble and take several risks. This led one distin- guished expert on child protection to describe the exchange of child abuse images at that time as being “a cottage industry.”2 Today, however, the images can be a mouse click away. It is a global industry worth millions of dollars to those who engage in it for financial gain.3 Numbers Taking 1995 as “Year 0” (the last year before the Internet boom erupted in many countries), Interpol at that time knew of around 4,000 child abuse images in total. Figures recent- ly supplied by Interpol and other data published in the UK4 and Italy5 suggest that today the number of known images is around 1,000,000, and the number of children abused to make them runs in the tens of thousands. There is a marked growth in images of younger children being subjected to ever more violent and depraved sexual acts.6 It is anybody’s guess how often the images and their duplicates are downloaded or exchanged online and off, but it is likely to run into billions. Another indication of the change in the scale of offending comes from an examination of the numbers of images seized by the police when arresting suspects. Prior to the Internet, typically police officers would arrest individuals with only a handful of images in their possession, or in unusual cases maybe hundreds. In the whole of 1995 the police in Greater Manchester in the UK seized the grand total of 12.7 In June 2009 in a single action the police in Mexico arrested one man, Arthur Leland Sayler, who possessed 4 million images. The trend in convictions is another useful signifier. Taking 1995 once more as the baseline, in the UK 142 people were cautioned or proceeded against for child abuse image offenc- es. In 2007 it was 1,402.8 Precise comparisons between 1995 and 2007 in terms of Internet usage are not very meaning- ful because broadband barely existed in 1995, while by 2007 it had become commonplace.9 In 1995 fewer than two mil- lions UK households had Internet access (primarily dial-up), whereas by 2007 the number of households with Internet ac- cess was up to 15.23 millions, of whom 84% had broadband.10 The inference is pretty clear. There is a strong link between Internet crimes of this kind and the growth in the number of Internet connections within a country. No nation appears to be exempt. The scale of activity addressed There are well established procedures for notifying hosting companies of the presence on their web servers of illegal images. These procedures normally work very well and the Prior to the arrival of the Internet, in most parts of the world it was extremely difficult to get hold of child abuse images
  • 32. 28 FREEDOM FROM FEAR - July 2010 images are removed swiftly when the hosting company is in the same jurisdiction as the person reporting it; however, if the image is on a web site housed in a foreign jurisdiction there can be inordinate delays,11 while the images remain on view. This has led to the development of a practice known as “blocking,”12 which renders the image inaccessible in the reporting country. Blocking has afforded an opportunity to gain a rare insight into the overall level of illegal activity taking place in this space. Five months after blocking was launched in Denmark in 2006 the Danish police estimated 238,000 users had at- tempted to reach known illegal child abuse sites.13 In Nor- way blocking was stopping between 10 and 12,000 attempts per day. In Sweden it was 20 – 30,000 attempts per day.14 In 2009, British Telecom (BT) estimated their solution was preventing 40,000 attempts per day to access known child abuse web sites over their broadband network. Extrapolated across the whole UK broadband network this suggests block- ing is preventing up to 58 million attempts per year.15 These are substantial numbers. The rise of Peer2Peer networks For the foreseeable future, the worldwide web will remain a key medium for the distribution of child abuse images, but Peer2Peer networks such as Limewire and Gnutella are rap- idly growing in importance. In an in-depth documentary broadcasted on Irish TV on 31 May 2010,16 it was disclosed that in the past six months a US technology company17 had traced 1.2 million people in all parts of the world who had accessed child abuse images over a number of Peer2Peer networks. Ireland itself is a small country, with a population of around 4.25 millions and about only 2.8 million Internet users.18 Yet in a period of 30 days the same US company detected roughly 1,000 individuals in Ireland trading or downloading child abuse images. Downloading child abuse images is a serious offence against the children depicted and it deserves police attention entirely in its own right, but there is also evidence which suggests that people who get involved in downloading such images may find themselves on a path that ultimately leads them to com- mit new offences against children, either in the real world or online. This is another major reason for wanting such im- ages to be removed from public view as quickly as possible: it helps reduce the numbers of potential new online and offline child abusers. Internet is not to blame The Internet itself is not to blame for any of this. At the end of the day the decision to engage in criminal conduct is the re- sult of a conscious choice made by individuals. But this data underlines the singular role that technology plays in facilitat- ing a range of crimes against children. It reminds us also of the vital importance of law enforcement agencies across the world having the capacity to understand how the technology works, and having trained personnel at hand who can put that knowledge to work to protect children. * John Carr is Secretary of the UK Children’s Charities’ Coalition on Internet Safety and a Senior Expert Adviser to the ITU’s Child Online Protection initiative. He is also a member of the Executive Board of the UK’s Council for Child Internet Safety and a member of the Advisory Council of INHEOP, the global association of internet hotlines. 1 The terms “child abuse images” is used rather than “child pornography” because this more accurately reflects the nature of the content. 2 People Like Us, Sir William Utting, HMSO, London, 1997. 3 See http://www.justice.gov/opa/pr/2001/August/385ag.htm where “In just one month, the (web site) grossed as much as $1.4 million.” However there is also a substantial trade in the images between collectors who swap rather than sell to each other. 4 http://www.official-documents.gov.uk/document/cm77/7785/7785.pdf 5 Telefono Arcobaleno speak of 36,000 children of whom ‘42% are under 7 years of age and 77% are under the age of 12’ www.telefonoarcobaleno. org/pdf/tredicmoreport_ta.pdf 6 Correspondence with the author. 7 Correspondence with the author. 8 Offending and Criminal Justice Group (RDS), Home Office, Ref: IOS 503-03. 9 Broadband access is important because it facilitates rapid and cheap access to large files. Typically child abuse images and videos will be large files. 10 http://www.statistics.gov.uk/pdfdir/inta0807.pdf 11 http://tinyurl.com/claytondelays 12 Currently blocking is operational in Italy, Denmark, Sweden, Norway, Malta, UK, Finland, Iceland, South Korea, the USA and Australia. In March 2010 the Commission of the EU published a proposal which, if adopted, will see every EU Member State becoming engaged with blocking. 13 http://www.politi.dk/da/aktuelt/nyheder/2006boernepornofilter_24052006.htm 14 http://www.politi.dk/da/aktuelt/nyheder/2005/filter_181005.htm 15 http://www.theregister.co.uk/2009/04/07/bt_cp_figures/ 16 “Prime Time Investigates.” 17 http://www.tlo.com 18 https://www.cia.gov/library/publications/the-world-factbook/geos/ei.html There is a marked growth in images of younger children being subjected to ever more violent and depraved sexual acts Prior to the Internet, typically police officers would arrest individuals with only a handful of images in their possession The Internet itself is not to blame for any of this. At the end of the day the decision to engage in criminal conduct is the result of a conscious choice made by individuals
  • 33. 29FREEDOM FROM FEAR - July 2010 Estimating and Interpreting the Prevalence of across the World Survey-based Estimates The International Crime Victimisa- tion Survey (ICVS) is a standardized survey on experiences of crime that has been carried out five times since 1989 in a large sample of European countries, in the USA and in Canada. The last round of the ICVS was coordinated by UNICRI (Van Dijk, Van Kesteren & Smit, 2008). In developed countries the ICVS consisted of computer-assisted telephone interviews of probability samples of 2.000 inhabitants per country. The questionnaire includes questions about victimization experi- ences in the course of last year covering various forms of fre- quently occurring types of crime (e.g. burglary, robbery and assaults). The ICVS asked about consumer fraud for the first time in the 1992 sweep in developed countries. People were asked whether someone selling them something or deliver- ing a service had cheated them in terms of quantity or quality of the goods or services during the past year. Although the question does not exclude serious incidents of fraud, most of the incidents reported probably amount to simple forms of cheating in shops. In the fifth sweep of the ICVS, carried out among samples from 30 countries and 33 capitals or main cities, those who reported being victims of fraud were asked whether this happened while shopping on the Internet. An- swers to the latter question are the source of the results pre- sented here. On average, 11% of respondents in the participating coun- tries said they had experienced some type of consumer fraud in the course of last year (2005). Victims of consumer fraud were asked where the incident had taken place. At a nation- al level, 45% of victims said the fraud had taken place in a shop; 11% was the victim of a fraud during either building or construction work or by a garage, while 9% mentioned it had happened while shopping online. This implies that 1% of the national inhabitants of developed countries had been victim- ized by a case of E-fraud in the course of one year. Among inhabitants of capital cities, the victimization rate by E-fraud was 1,5% in one year. Table 1 illustrates these details. * Jan Van Dijk E-fraud
  • 34. 30 FREEDOM FROM FEAR - July 2010 Victimization by Internet-based consumer fraud is most com- mon in the USA, Poland, Germany, Bulgaria and the United Kingdom. Prevalence rates are lowest in Italy, Finland and Greece. Among the capitals Lima (Peru), Berlin, New York and London stand out with comparatively high rates of vic- timization. In a second follow-up question, respondents reporting fraud were asked whether it had been a case of credit card fraud. It was so in 7% of all cases of fraud and in 27% of all cases of E-fraud. The latter finding shows that a major part of E- fraud consists of Identity Theft with the use of credit cards (Identity Fraud.)1 Furthermore, the ICVS results showed that only 10% of all frauds are ever reported to the police. Cases of E-fraud are presumably more often reported to other agen- cies such as banks. According to UNDP’s 2006 Human Development Report, between 50 and 70% of the population in industrialised countries had access to the Internet in 2005. This implies that around 2% of Internet users had been victim of Internet- based fraud annually. In many developed countries in 2005 Internet-based frauds had reached prevalence levels similar or above those of conventional property crimes such as car theft or pick pocketing. Prevalence rates were, as mentioned, especially pronounced among inhabitants of main cities. Since 2005, both Internet access and E-commerce (the use of Internet for shopping) have become more common. It is therefore likely that prevalence rates of Internet-based frauds have gone up significantly as well. In fact E-fraud might well be on its way to becoming the most common form of prop- erty crime affecting citizens of the industrialised world. Table 1: Victims of E –fraud. One year prevalence rates for fraud while buying something on the Internet (percentages) in countries and main cities. 2005 ICVS Fraud while shopping on the Internet (%) Fraud while shopping on the Internet (%) USA 3.3 Lima (Peru) 10.7 Poland 3.0 Berlin (Germany) 3.8 Germany 2.7 New York (USA) 3.7 Bulgaria 2.6 London (England) 3.2 United Kingdom 2.4 Paris (France) 2.7 England & Wales 2.2 Copenhagen (Denmark) 1.5 Norway 1.5 Edinburgh (Scotland) 1.0 Denmark 1.4 Madrid (Spain) 1.0 New Zealand 1.3 Vienna (Austria) 0.9 Sweden 1.2 Hong Kong (SAR China) 0.9 Northern Ireland 1.2 Amsterdam (Netherlands) 0.9 Austria 1.1 Dublin (Ireland) 0.7 Scotland 1.0 Stockholm (Sweden) 0.7 Spain 0.7 Brussels (Belgium) 0.6 Ireland 0.7 Tallinn (Estonia) 0.6 Canada 0.7 Belfast (Northern Ireland) 0.5 Estonia 0.6 Athens (Greece) 0.4 Portugal 0.5 Oslo (Norway) 0.4 Luxembourg 0.5 Reykjavik (Iceland) 0.3 Iceland 0.4 Greater Johannesburg (RSA) 0.3 France 0.4 Lisbon (Portugal) 0.2 Belgium 0.4 Helsinki (Finland) 0.0 Netherlands 0.3 Budapest (Hungary) 0.0 Mexico 0.2 Rome (Italy) 0.0 Greece 0.1 Finland 0.1 Italy 0.0 Average 1.1 Average 1.5 1 The 2003 US National Crime Victim Survey investigated victimization by credit card fraud as a subcategory of identity theft. This study showed a one-year prevalence rate of victimization by credit card fraud of 2.4%. The Australian version of the ICVS, which used a somewhat different set of questions on E-fraud, showed that 5% of the national public had been victimized by credit card fraud while doing transactions on the Internet (Johnson and Krone, 2007). The British Crime Survey has included a question on credit card fraud in its questionnaire since 2006. The national prevalence rate has gone up from 3.7% in 2005 to 6.4% in 2009 (Walker et al, 2009).
  • 35. 31FREEDOM FROM FEAR - July 2010 Discussion: Is E- fraud Security Driven? Countries or cities with comparatively high rates of victimiza- tion by Internet-based frauds are a mixed group in terms of Internet use. It comprises both countries where Internet is most widely used (the USA and the UK) and countries that are technologically less advanced (Bulgaria and Peru). Locations with low victimization rates also appear to be heterogeneous in terms of Internet use. For example, the use of Internet for com- mercial transactions is very common in Iceland and Finland where Internet-based fraud is rare. On the face of it, there is no strong relationship between the prevalence of E-commerce in national populations and the prevalence of E-fraud. According to criminal opportunity theory E-crimes are likely to be driven by the extent of E-commerce. The lack of an obvious positive correlation is therefore somewhat surprising. One possible ex- planation for the lack of such relationship is an inter-country variation in the legal and technical security measures against E-fraud. Examples are differences in the authentication pro- cedures for the use of credit cards or for online banking. In some countries the use of pin codes has been made obligatory for the use of credit cards, while in others it is not. In the USA, authentication for online banking has remained relatively simple (use of a single password), compared to, for example, the Netherlands where the Central Bank has imposed more stringent security procedures on banks (Vermeulen, 2010). The variation in security provisions might determine preva- lence of E-fraud more strongly than differences in the level of E-commerce per se. This “security hypothesis” merits further testing in comparative international studies such as the 2010 round of the ICVS. Literature Dijk, J.J.M van, J. van Kesteren & P. Smit (2007), Criminal Victimisation in an International Perspective; key findings from the 2004-2005 ICVS and EU ICS, The Hague: Ministry of Justice/WODC (www. WODC.nl/publicaties). Johnson, H. & T. Krone (2007), Internet purchasing: perceptions and experiences of Australian households, Trends and issues in crime and criminal justice, no.330, Canberra: Australian Institute of Criminology. Vermeulen, N.S. (2010), Fertile Grounds: the Facilitation of Financial Identity Theft in the United States and The Netherlands, PhD thesis Tilburg University. MAKLU Publishers Walker, A. et al. (2009), Crime in England and Wales 2008/2009, Vol 1 Findings from the British Crime Survey and police recorded crime, Home Office, July 2009. * Prof. Dr. Jan Van Dijk was the director of the Research and Documentation Centre of the Dutch Ministry of Justice and professor of Criminology at the University of Leiden. In 1987 he launched the International Crime Victims Surveys. Between 1998 and 2005 he worked for the United Nations in Vienna and Turin (as Head of Research of UNICRI). In 2008 he received the Sellin-Glueck Award of the American society of Criminology for his lifelong contribution to international criminology. He currently holds the Pieter van Vollenhoven chair in Victimology and Human Security at the University of Tilburg (The Netherlands) and acts as consultant for Eurostat on the design of the European Union Survey on Public Safety to be conducted in 2013.
  • 36. 32 FREEDOM FROM FEAR - July 2010 Avoid Becoming a Victim of Cybercrime * Scot Huntsberry The news is full of reports detailing the stories of victims who have lost thousands, even millions, of dollars at the hands of cyber criminals. Many of us know someone who has already been the victim of one of these crimes. As widespread as cybercrime appears to be, it would be easy to conclude there is little anyone can do to avoid becoming a victim. However, the prevalence of cybercrime does not mean that victimization is inevitable or that people should avoid using the Internet. Users can make themselves aware of the vulnerabilities its use creates and can take steps to reduce their risks. Computer users can take measures to decrease their risk of becoming the victim of cybercrime by adhering to a few sim- ple Internet usage rules. First, users should remember to log off and shut down their computers when they are not being used. Cyber criminals often scan networks searching for “al- ways on” computers, which they consider readily accessible and unattended targets. By minimizing the amount of time computers are powered on and connected to the Internet, people can reduce their vulnerability to hacking attacks. Next, users should install and maintain both antivirus and firewall programs. These applications serve as a first line of defence against viruses and other malicious computer pro- grams designed to circumvent security features within com- puters’ operating systems. Additionally, operating system de- velopers regularly release updates or “patches.” To increase their computer’s security, users should install these updates as soon as they become available. Cyber criminals frequently disguise malicious software as images or documents attached to email messages, so users should never open or download email attachments from unknown senders. Many people now use wireless networks in their homes. Strong encryption within a wireless router’s settings can prevent cyber criminals from accessing and exploiting data stored on computers. Unprotected, or “open” wireless net- works that do not utilize encryption to protect network traffic are very popular targets for cyber criminals. By intercepting this wireless network traffic, crooks can quickly glean per- sonal information, passwords, and other data they can then use to perpetrate various cyber crimes. Even worse, they sometimes abuse their access to other people’s networks to make it seem like the victims are com- mitting cyber crime. If you have an unencrypted wireless network in your home, don’t be surprised if the police shows Money is typically transferred via wire transfers, leaving little recourse for the victim. The most recent trend is an increase in bank-to-bank wire transfers Users should remember to log off and shut down their computers when they are not being used
  • 37. 33FREEDOM FROM FEAR - July 2010 up at your door to find out whether you have been hacking into computers, committing online fraud, or distributing contraband. Many people maintain accounts on literally dozens of dif- ferent websites, so they create easy to remember passwords. While this means you’re less likely to forget an infrequently used password, these simple passwords are quickly compro- mised by savvy cyber criminals. Moreover, many people use the same password on their social networking websites and their banking and brokerage accounts. When cyber crooks steal passwords for social networking websites, they often try to use them to access financial accounts. In order to avoid such problems, people should use unique and complex pass- words for each of their accounts. These simple rules provide baseline security for most Inter- net users. However, there are additional precautions people can take to further reduce their risk of becoming the victim of a cyber crime. Understanding and recognizing some of the more common criminal schemes can help people avoid fall- ing prey to them. In one prevalent scheme, cyber criminals send phishing emails. These emails falsely claim to be from legitimate send- ers and contain documents meant to dupe the unsuspecting recipient into divulging personal, sensitive information such as passwords, credit card numbers, and bank account infor- mation. Some phishing emails have links to fake websites that look just like sites the victims use regularly. After trick- ing victims into providing banking credentials or other sensi- tive information, the criminals utilize a number of different methods to access and steal the victim’s money. Internet auction fraud is very common. Cyber criminals satu- rate the Internet auction sites and offer almost every product people are looking for. The postings often make it appear the seller is located in the same country as the buyer, and the criminal then advises the victim to send money to a business partner, associate, sick relative, a family member, etc. Money is typically transferred via wire transfers, leaving little recourse for the victim. The most recent trend is an increase in bank-to-bank wire transfers. Most significantly, these wire transfers go through large banks but are then routed to banks in other countries. Similarly, sellers also occasionally direct the victims to pay using phony escrow services. Sometimes they even hijack legitimate escrow websites to make themselves ap- pear even more bonafide. Once the funds are wire transferred to the escrow website, the seller usually discontinues contact. Another popular scheme is the passing of counterfeit cash- ier’s checks. This scheme targets people who use Internet classified advertisements to sell merchandise. Typically, an interested party contacts a seller. The seller is told the buyer has an associate in the victim’s country who owes him mon- ey. As such, he will have the associate send the victim a cash- ier’s check for the amount owed to the buyer. The amount of the cashier’s check is frequently thousands of dollars more than the price of the merchandise and the victim is told the excess amount will be used to pay the shipping costs associ- ated with getting the merchandise to his location. The victim is instructed to deposit the check, and as soon as the funds are credited to their account, to wire the excess funds back to the criminal or to another associate identified as a ship- ping agent. Because a cashier’s check is used, banks typically release the funds immediately, or after a one or two day hold. Falsely believing the check to be genuine, the seller wires the money as instructed. Ultimately, the bank discovers the cashier’s check is fraudulent and removes these funds from the victim’s account. Some people become unwitting accomplices of cyber crimi- nals. Criminals post work-at-home job offers on popular In- ternet employment sites. These jobs are advertised as “finan- cial manager” or “payment processor” positions. People who accept these positions are told to open bank accounts and provide the account numbers to their employers. They re- ceive transfers to these accounts and are instructed to with- draw this money and transfer it (minus their commission, of course) to designated recipients in foreign countries. When approached by law enforcement, these people are often sur- prised to learn they have been playing the role of “money mule” for cyber criminals. By acting as a third party receiver of funds, these people have facilitated the transfer illegal pro- ceeds directly to cyber criminals in foreign countries. Although the threat posed by cyber criminals is real, through the use of a few basic Internet security practices and an awareness of the more common cyber criminal schemes, in- dividuals can reduce their risk of becoming a victim. Users should remain aware of the latest online fraud scams, many of which are described at www.lookstoogoodtobetrue.com. However, if an individual believes he has already been the victim of a cyber crime, he should notify the appropriate law enforcement agency as soon as possible, and may file a com- plaint online from anywhere in the world at www.ic3.gov, a partnership between the Federal Bureau of Investigation and the White Collar Crime Center. Providing timely and thor- ough information detailing the particulars of the scheme and identifying characteristics of the criminals helps law enforce- ment develop an effective investigative strategy. * Scot Huntsberry is a Supervisory Special Agent who most recently has been working for the FBI in the Cyber Division in Washington, D.C. The FBI’s Cyber Division is dedicated to applying the highest level of technological capability and investigative expertise toward combating cyber-based terrorism, hostile foreign intelligence operations conducted over the Internet, and cyber crime. The work of the Cyber Division allows the FBI to stay one step ahead of the adversaries technologically threatening the United States. The Cyber Division addresses all violations with a cyber nexus, which often have international facets and national economic implications, and simultaneously supports FBI priorities across program lines, assisting counterterrorism, counterintelligence and other criminal investigations when aggressive technological investigative assistance is required. People should use unique and complex passwords for each of their accounts
  • 38. 34 FREEDOM FROM FEAR - July 2010 U N D P
  • 39. 35FREEDOM FROM FEAR - July 2010 * Marco Gercke From Encryption to Failure of Traditional Investigation Instruments the Challenges of Fighting Cybercrime The shift from industrial societies to information societies,1 and the related dependence of the society as well as the economy on the availability of Internet services have moved the attention of politics towards the cybercrime topic. While in other emerging areas of crime it is possible to use traditional crime prevention and investigation strategies, the fight against cybercrime faces unique challenges that require a special at- tention from both investigators and lawmakers. This article provides an overview of some of those challenges. 1. Availability of tools and instructions to commit Cybercrime In the early days of computer crimes, committing an offence required a significant amount of technical understanding. Nowadays however, offenders can commit cybercrimes by using software devices that do not require in-depth technical knowledge, such as software tools2 designed to locate open ports or break password protection.3 Due to mirroring tech- niques and peer-to-peer exchange, it is difficult to limit the widespread availability of such devices4 that can potentially turn any computer user into a cybercriminal. Furthermore, offenders can use the Internet to find instruc- tions on how to commit crime, both online and offline. For ex- ample, the term “Googlehacking” (or “Googledorks”) describes the use of complex search engine queries to filter many search results for information on computer security issues.5 Several reports emphasised the risk of the use of search engines for illegal purposes.6 An offender planning an attack can find de- tailed information on the Internet explaining how to build a bomb by using only chemicals that are available in regular su- permarkets.7 2. Resources Offenders can use sophisticated methods to increase their re- sources. An example of this is represented by botnet attacks such as those used in 2007 against computer systems in Es- tonia.8 An analysis of the attacks suggests that they were com- mitted by thousands of computers within a “botnet,”9 a group of compromised computers running programs under external control.10 Over recent years, botnets have become a serious risk for cybersecurity.11 The size of a botnet can vary, from a few computers to more than a million computers.12 3. Difficulties in tracing offenders Although users leave multiple traces while using Internet services, offenders can hinder investigations, and in particular their identification, by resorting to special services. For exam- ple, if they use public Internet terminals that do not require identification, investigations will often falter. Offenders can also make use of open wireless networks to hide their identity. While difficulties in identifying Internet users have the poten- tial to support democratic processes, they also go along with fears of abuse perpetrated by offenders. 4. Failure of traditional investigation instruments An effective fight against terrorist use of the Internet requires Internet-specific tools that enable competent authorities to carry out investigations. In a growing number of Internet- related cases, traditional investigation instruments are not sufficient to indentify an offender. One example is the inter- ception of Voice-over-IP (VoIP) communication.13 In the last
  • 40. 36 FREEDOM FROM FEAR - July 2010 decades, States have developed investigation instruments (such as wiretapping) that enable them to intercept landline as well a mobile phone communication.15 The interception of traditional phone calls is usually carried out through telecom providers.16 Applying the same principle to VoIP, law enforce- ment agencies would operate through ISPs and service provid- ers supplying VoIP services. However, if the service is based on peer-to-peer technology, service providers may generally be unable to intercept communications, as the relevant data are transferred directly between the communicating part- ners.17 Therefore, new techniques, as well as the related legal instruments, might be needed. 5. Missing control instruments The Internet was originally designed as a military network18 based on a decentralised network architecture that sought to preserve the main functionality intact and in power, even when individual components of the network were attacked. Carrying out investigations in this environment goes along with challenges, as the designer of the network did not include control instruments.19 Recent trends to implement technology blocking access to websites20 are an approach to compensate the absence of control instruments. Norway,21 Sweden,22 Switzerland,23 the United Kingdom,24 Italy,25 China,26 Iran27 and Thailand28 are among those countries that require or encourage blocking ac- cess to illegal contents stored outside the country. While this in general seems like an example of the possibility of introduc- ing control instruments, the ability of users to circumvent fil- ter technology29 using encrypted anonymous communication services shows the limitation of such approach. 6. Transnational nature of the offence The Internet is a good example of globalisation, with services generally available to all Internet users. As a consequence, many data transfer processes affect more than one country.30 If offenders and targets are located in different countries, cybercrime investigations require the cooperation of law en- forcement agencies in all the countries affected,31 as national sovereignty does not permit investigations within different States territories without the permission of local authorities.32 The related formal requirements and time needed to col- laborate with foreign law enforcement agencies often hinder investigations,33 which often occur in very short timeframes. Offenders may deliberately include third countries in their at- tacks to make investigation more difficult.34 7. Independence of location and presence at the crime site One constituting fact common to all types of cybercrimes is the fact that offenders do not need to be present at the same location as the victim. Offenders can therefore act from loca- tions where there is either no effective legislation in place or it is not enforced.35 Preventing such “safe havens” has there- fore become a key intention of international approaches in the fight against cybercrime.36 8. Encryption technology Another challenge is the use of encryption technology by of- fenders.37 Encryption is a classic example of a neutral technol- ogy, since as it is not only used to hinder investigations but also to prevent unauthorised access to information. It is there- fore considered a key technical solution for ensuring cyberse- curity.38 The latest operating systems offer the possibility to encrypt computer data with the click of a mouse, making it difficult for law enforcement agencies to break the encryption and access the data.39 It is uncertain to what extent offenders already use encryption technology to mask their activities, but it has been reported, for instance, that terrorists are already using encryption technology.40 * Dr. Marco Gercke is the Director of the Cybercrime Research Institute. 1 For more information on the information society see Masuda, The Information Society as Post-Industrial Society; Dutta/De Meyer/Jain/ Richter, The Information Society in an Enlarged Europe; Maldoom/ Marsden/Sidak/Singer, Broadband in Europe: How Brussels can wire the Information Society; Salzburg Center for International Legal Studies, Legal Issues in the Global Information Society; Hornby/Clarke, Challenge and Change in the Information Society. 2 “Websense Security Trends Report 2004”, page 11; Information Security - Computer Controls over Key Treasury Internet Payment System, GAO 2003, page 3; Sieber, Council of Europe Organised Crime Report 2004, page 143. 3 Ealy, “A New Evolution in Hack Attacks: A General Overview of Types, Methods, Tools, and Prevention”, page 9. 4 In order to limit the availability of such tools, some countries criminalise the production and offer of such tools. An example of such a provision can be found in Art. 6 of the European Convention on Cybercrime. 5 For more information, see: Long/Skoudis/van Eijkelenborg, “Google Hacking for Penetration Testers, 2005”; Dornfest/Bausch/Calishain, “Google Hacks: Tips & Tools for Finding and Using the World’s Information”, 2006. 6 See Nogguchi, “Search engines lift cover of privacy”, The Washington Post, 09.02.2004. 7 One example is the “Terrorist Handbook” – a pdf-document that contains detailed information how to build explosives, rockets and other weapons. 8 Regarding the attacks, see: Lewis, “Cyber Attacks Explained”, 2007, “A cyber-riot”, The Economist, 10.05.2007, available at: http://www. economist.com/world/europe/PrinterFriendly.cfm?story_id=9163598; “Digital Fears Emerge After Data Siege in Estonia”, The New York Times, 29.05.2007. 9 See: Toth, “Estonia under cyber attack”, http://www.cert.hu/ dmdocuments/Estonia_attack2.pdf 10 See: Ianelli/Hackworth, “Botnets as a Vehicle for Online Crime”, 2005, page 3. 11 See “Emerging Cybersecurity Issues Threaten Federal Information Systems”, GAO, 2005, available at: http://www.gao.gov/new.items/ d05231.pdf 12 Keizer, Duch “Botnet Suspects Ran 1.5 Million Machines”, TechWeb, 21.10.2005. 13 This was as well highlighted by the drafters of the Council of Europe Convention on Cybercrime that contains a set of essential investigation instruments. The drafters of the report point out: “Not only must substantive criminal law keep abreast of these new abuses, but so must criminal procedural law and investigative techniques“ see: Explanatory Report to the Council of Europe Convention on Cybercrime No. 132. Regarding the substantive criminal law provisions related to Cybercrime see above: Chapter 6.1. 14 The term “Voice over Internet Protocol” (VoIP) is use to describe the transmission technology for delivering voice communication by using
  • 41. 37FREEDOM FROM FEAR - July 2010 packet-switched networks and related protocols. For more information see: Swale, Voice Over IP: Systems and Solutions, 2001; Black, “Voice Over IP”, 2001. 15 Regarding the importance of interception and the technical solutions see: Karpagavinayagam/State/Festor, “Monitoring Architecture for Lawful Interception in VoIP Networks, in Second International Conference on Internet Monitoring and Protection” – ICIMP 2007; Regarding the challenges related to interception of data communication see: SwaleChochliouros/Spiliopoulou/Chochliouros, “Meassures for Ensuring Data Protection and Citizen Privacy Against the Threat of Crime and Terrorism – The European Response”, in Janczewski/Colarik, “Cyber Warfare and Cyber Terrorism”, 2007, page 424. 16 Regarding the differences between PSTN and VoIP communication see: Seedorf, “Lawful Interception in P2P-Based VoIP System”s, in Schulzrinne/State/Niccolini, Principles, Systems and Applications of IP Telecommunication. Services and Security for Next Generation Networks, 2008, page 217 et seq. 17 Regarding the interception of VoIP by law enforcement agencies, see Bellovin and others, “Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP”; Simon/Slay, “Voice over IP: Forensic Computing Implications”, 2006; Seedorf, “Lawful Interception in P2P-Based VoIP Systems”, in Schulzrinne/State/Niccolini, Principles, Systems and Applications of IP Telecommunication. Services and Security for Next Generation Networks, 2008, page 217 et seq. 18 For a brief history of the Internet, including its military origins, see: Leiner, Cerf, Clark, Kahn, Kleinrock; lynch, Postel, Roberts, Wolff, “A Brief History of the Internet”, available at: http://www.isoc.org/internet/history/brief. shtml 19 Lipson, “Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues”. 20 Callanan/Gercke/De Marco/Dries-Ziekenheiner, Internet Blocking - Cybercrime Response in Democratic Societies, 2009. 21 Telenor Norge: Telenor and KRIPOS introduce Internet child pornography Filter.“ Telenor Press Release, 21 Sep 2004; Clayton, Failures in a Hybrid Content Blocking System in: Privacy Enhancing Technologies, 2006, page 79; Stol/Kaspersen/Kerstens/Leukfeldt/Lodder, Filteren van kinderporno op internet, 2008, page 46 et seq.; The Cybercrime Convention Committee (T-CY), Examples of how the private sector has blocked child pornograpyh sites, T-CY (2006) 04, page 3. 22 Swedish Providers are using a tool called „Netclean“. See Netclean Pro Active, available at: http://www.netclean.com/documents/NetClean_ ProActive_Information_Sheet_EN.pdf; Telenor and Swedish National Criminal Investigation Department to introduce Internet child porn filter, Telenor Press Release, 17 May 2005, available at: http://press.telenor. com/PR/200505/994781_5.html; Stol/Kaspersen/Kerstens/Leukfeldt/ Lodder, Filteren van kinderporno op internet, 2008, page 59 et seq.; The Cybercrime Convention Committee (T-CY), Examples of how the private sector has blocked child pornograpyh sites, T-CY (2006) 04, page 3; Edwards/Griffith, Internet Censorship and Mandatory Filtering, NSW Parliamentary Library Resarch Service, Nov. 2008, page 6. 23 Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 55; Schwarzenegger, Sperrverfuegungen gegen Access-Provider in: Arter/ Joerg, Internet-Recht und Electronic Commerce Law, page 250. 24 Edwards/Griffith, Internet Censorship and Mandatory Filtering, NSW Parliamentary Library Resarch Service, Nov. 2008, page 4; Stol/ Kaspersen/Kerstens/Leukfeldt/Lodder, Filteren van kinderporno op internet, 2008, page 64 et seq.; The Cybercrime Convention Committee (T-CY), Examples of how the private sector has blocked child pornograpyh sites, T-CY (2006) 04, page 3; Eneman, A Critical Study of ISP Filtering of Child Pornography, 2006, available at: http://is2.lse.ac.uk/ asp/aspecis/20060154.pdf 25 Lonardo, Italy: Service Provider’s Duty to Block Content, Computer Law Review International, 2007, page 89 et seq.; Edwards/Griffith, Internet Censorship and Mandatory Filtering, NSW Parliamentary Library Resarch Service, Nov. 2008, page 6 et seq.; Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 54. 26 Clayton/Murdoch/Watson, Ignoring the Great Firewall of China, available at: http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf; Pfitzmann/Koepsell/ Kriegelstein, Sperrverfuegungen gegen Access-Provider, Technisches Gutachten, available at: http://www.eco.de/dokumente/20080428_ technisches_Gutachten_Sperrvervuegungen.pdf; Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 53; Stol/Kaspersen/Kerstens/ Leukfeldt/Lodder, Filteren van kinderporno op internet, 2008, page 73; 27 Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 53; Stol/ Kaspersen/Kerstens/Leukfeldt/Lodder, Filteren van kinderporno op internet, 2008, page 73. 28 Sieber/Nolde, Sperrverfuegungen im Internet, 2008, page 55 29 Regarding filter obligations/approaches see: Zittrain/Edelman, Documentation of Internet Filtering Worldwide, available at: http://cyber. law.harvard.edu/filtering/; Reidenberg, States and Internet Enforcement, University of Ottawa Law & Technology Journal, Vol. 1, No. 213, 2004, page 213 et. Seq., available at: http://papers.ssrn.com/sol3/papers. cfm?abstract_id=487965; Regarding the discussion about filtering in different countries see: Taylor, Internet Service Providers (ISPs) and their responsibility for content under the new French legal regime, Computer Law & Security Report, Vol. 20, Issue 4, 2004, page 268 et seq. ; Belgium ISP Ordered By The Court To Filter Illicit Content, EDRI News, No 5.14, 18.06.2007, available at: http://www.edri.org/edrigram/number5.14/ belgium-isp; Enser, Illegal Downloads: Belgian court orders ISP to filter, OLSWANG E-Commerce Update, 11.07, page 7, available at: http:// www.olswang.com/updates/ecom_nov07/ecom_nov07.pdf; Standford, France to Require Internet Service Providers to Filter Infringing Music, 27.11.2007, Intellectual Property Watch, available at: http://www.ip- watch.org/weblog/index.php?p=842; Zwenne, Dutch Telecoms wants to force Internet safety requirements, Wold Data Protection Report, issue 09/07, page 17, available at: http://weblog.leidenuniv.nl/users/zwennegj/ Dutch%20telecom%20operator%20to%20enforce%20Internet%20 safety%20requirements.pdf; The 2007 paper of IFPI regarding the technical options for addressing online copyright infringement , available at: http://www.eff.org/files/filenode/effeurope/ifpi_filtering_memo.pdf; Regarding self-regulatory approaches see: ISPA Code Review, Self- Regulation of Internet Service Providers, 2002, available at: http://pcmlp. socleg.ox.ac.uk/selfregulation/iapcoda/0211xx-ispa-study.pdf 30 Regarding the extent of transnational attacks in the most damaging cyberattacks, see: Sofaer/Goodman, “Cyber Crime and Security – The Transnational Dimension” in Sofaer/Goodman, “The Transnational Dimension of Cyber Crime and Terrorism”, 2001, page 7. 31 Regarding the need for international cooperation in the fight against Cybercrime, see: Putnam/Elliott, “International Responses to Cyber Crime”, in Sofaer/Goodman, “ Transnational Dimension of Cyber Crime and Terrorism”, 2001, page 35 et seq; Sofaer/Goodman, “Cyber Crime and Security – The Transnational Dimension” in Sofaer/Goodman, “The Transnational Dimension of Cyber Crime and Terrorism”, 2001, page 1 et seq. 32 National Sovereignty is a fundamental principle in International Law. See Roth, “State Sovereignty, International Legality, and Moral Disagreement”, 2005, page 1. 33 See Gercke, “The Slow Wake of A Global Approach Against Cybercrime”, Computer Law Review International 2006, 142. For examples, see Sofaer/ Goodman, “Cyber Crime and Security – The Transnational Dimension”, in Sofaer/Goodman, “The Transnational Dimension of Cyber Crime and Terrorism”, 2001, page 16. 34 See: Lewis, “Computer Espionage, Titan Rain and China”, page 1, available at: http://www.csis.org/media/csis/pubs/051214_china_titan_ rain.pdf 35 Gercke, “Understanding Cybercrime: A Guide for Developing Countries”, ITU 2009, page 71. 36 This issue was addressed by a number of international organisations. The UN General Assembly Resolution 55/63 points out: “States should ensure that their laws and practice eliminate safe havens for those who criminally misuse information technologies”. The full text of the Resolution is available at: http://www.unodc.org/pdf/crime/a_res_55/res5563e.pdf. The G8 10 Point Action plan highlights: “There must be no safe havens for those who abuse information technologies”. 37 Regarding the impact on computer forensic and criminal investigations, see: See Huebner/Bem/Bem, “Computer Forensics – Past, Present And Future”, No.6. 38 With regard to the importance of encryption technology see: OECD Report on Background and Issues of Cryptography Policy, 2007; The importance of encryption is further highlighted by the fact that 74 per cent of respondents of the 2006 E-Crime Watch Survey mentioned encryption technology as one of the most efficient e-crime fight technologies. For more information, see: “2006 E-Crime Watch Survey”, page 1. 39 Regarding the consequences for the law enforcement, Denning observed: “The widespread availability of unbreakable encryption coupled with anonymous services could lead to a situation where practically all communications are immune from lawful interception and documents from lawful search and seizure, and where all electronic transactions are beyond the reach of any government regulation or oversight. The consequences of this to public safety and social and economic stability could be devastating”. Excerpt from a presentation given by Denning, “The Future of Cryptography”, to the joint Australian/OECD conference on Security, February, 1996. Regarding practical approaches to recover encrypted evidence see: Casey “Practical Approaches to Recovering Encrypted Digital Evidence”, International Journal of Digital Evidence, Vol. 1, Issue 3. 40 Regarding the use of cryptography by terrorists, see: Zanini/Edwards, “The Networking of Terror in the Information Age”, in Arquilla/Ronfeldt, “Networks and Netwars: The Future of Terror, Crime, and Militancy”, page 37Flamm, “Cyber Terrorism and Information Warfare: Academic Perspectives: Cryptography”, available at: http://www.terrorismcentral. com/Library/Teasers/Flamm.html
  • 42. 38 FREEDOM FROM FEAR - July 2010 ITU (International Telecommunication Union) recogniz- es that information and technology security are critical priorities for the international community. Cybersecurity is in everyone’s best interest and this can only be achieved through collaborative efforts. Cyber threat issues are global and therefore their solutions must be global too. It is vital that all countries arrive at a common understanding regard- ing cybersecurity, namely by providing protection against unauthorized access, manipulation and destruction of criti- cal resources. ITU believes that in developing a solution one must identify all existing national and regional initiatives, in order to foster collaboration with its multiple stakeholders and avoid duplication of efforts. With its 191 Member States and more than 700 Sector Members, ITU is uniquely placed to propose a framework for international cooperation in cy- bersecurity and assist in tackling cybercrime. The World Summit on the Information Society (WSIS), which met in Geneva in 2003 and in Tunis in 2005, called upon ITU to act as the sole Facilitator of Action Line C5, “Building con- fidence and security in the use of ICTs”. On 17 May 2007, ITU Secretary-General, Dr. Hamadoun I. Touré, launched the Global Cybersecurity Agenda (GCA) which is a framework for international cooperation aimed at enhancing confidence and security in the information society. A multi-stakeholder High Level Experts Group (HLEG) comprising of more than one hundred experts from Governments, Industry, In- ternational organizations, NGOs and academic institutions was established to further develop main goals, analyse cur- rent developments in all areas of cybersecurity and formu- late proposals on possible long-term strategies and emerging trends in cybersecurity. In 2008, the HLEG put together the Global Strategic Report which provided recommendations on key steps forward for all five pillars of the GCA. The GCA is a multi-stakeholder approach designed to pro- mote collaborative work across the sectors of ITU namely, the Radiocommunication Sector (ITU-R), the Standardiza- tion Sector (ITU-T) and the Telecommunication Develop- ment Sector (ITU-D). It has fostered initiatives such as Child Online Protection, launched the Cybersecurity Gateway and through its partnership with IMPACT and with the support of leading global players is currently deploying cybersecurity solutions to countries around the world. The GCA is built upon five strategic pillars, also known as work areas, and made up of seven main strategic goals. The Five Pillars/Work Areas: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structures 4. Capacity Building 5. International Cooperation Legal Measures To better understand the legal aspects of cybersecurity ITU has devised cybercrime legislation resources. With these re- sources, ITU is working to assist countries in moving towards harmonizing legal frameworks. This activity also addresses the ITU-D Study Group Q22/1 approach for organizing na- tional cybersecurity efforts, highlighting that establishing the appropriate legal infrastructures is an integral component of a national cybersecurity strategy. The ITU cybercrime legislation resources currently consist of two main deliverables, the ITU publication titled ITU Toolkit for Cybercrime Legislation and Understanding Cybercrime: A Guide for Developing Countries. Global Cybersecurity Agenda
  • 43. 39FREEDOM FROM FEAR - July 2010
  • 44. 40 FREEDOM FROM FEAR - July 2010 ITU- IMPACT Collaboration As the world’s first non-profit comprehensive global public-private partnership against cyber threats, the International Mul- tilateral Partnership Against Cyber Threats (IMPACT) is well positioned to assist partner countries, especially developing nations who are broadening their Internet capabilities. On 3 September 2008, IMPACT and the ITU formally entered into a Memorandum of Understanding (MoU) in which IMPACT’s state-of-the-art Global HQ in Cyberjaya, Malaysia, effectively became the physical and operational home of the GCA. Under this landmark collaboration, IMPACT pro- vides the ITU’s 191 Member States with the expertise, facilities and resources to effec- tively address the world’s most serious cy- ber threats. The partnership provides: • Real-time analysis, aggregation and dis- semination of global cyber-threat infor- mation; • Network Early Warning System (NEWS) and emergency response to global cyber- threats; and • Training and skills development on the technical, legal and policy aspects of cy- bersecurity. Current Deployment Status
  • 45. 41FREEDOM FROM FEAR - July 2010 Below is an alphabetical list of countries which have already joined ITU-IMPACT collaboration: Child Online Protection (COP) Under the GCA umbrella, the ITU launched the Child Online Protection (COP) initiative in November 2008. The COP ini- tiative has been established as an international collaborative network for action to promote the online protection of chil- dren and young people worldwide by providing guidance on safe online behaviour in conjunction with other UN agencies and partners. It addresses the legal, technical, organizational and procedural issues as well as capacity building and inter- national cooperation. Since its launch, COP has attracted the support and recog- nition of leaders and experts from around the world. More recently, the President of Costa Rica Mme. Laura Chinchilla accepted the invitation to be the Patron of this initiative. The key objectives of the initiative are to: 1. Identify the key risks and vulnerabilities to children and young people in cyberspace; 2. Create awareness of the risks and issues through multiple channels; 3. Develop practical tools to help governments, organiza- tions and educators minimize risk; 4. Share knowledge and experience while facilitating inter- national strategic partnerships to define and implement concrete initiatives. Cybersecurity Gateway The purpose of the ITU Cybersecurity Gateway is to provide an easy-to-use information resource on national, regional and international cybersecurity-related initiatives world- wide. In today’s interconnected world of networks, threats can originate anywhere, and thus our collective cybersecurity depends on the security practices of every connected coun- try, entity, business, and citizen. National and international cooperation is needed among those who seek to promote, develop and implement initiatives for a global culture of cy- bersecurity. Through the Cybersecurity Gateway, ITU aims to enable information access, dissemination and online col- laboration among stakeholders working in cybersecurity and related areas. The Gateway provides a platform to share in- formation between partners in civil society, the private sec- tor, governments and international organisations working on enhancing cybersecurity. The ITU invites all interested par- ties to explore the vast resources and links available through the Cybersecurity Gateway and join in partnership with the ITU and others to build confidence and security in the use of ICTs. The Cybersecurity Gateway has been recently updated with a newer version. Conclusion It is undeniable that ICTs form an integral part of society to- day and that they will continue to do so in the future, with the Internet connecting ever more parts of the world. ICTs are constantly evolving, progressing and improving many aspects of our lives. This also rings true for cyber threats as they are intrinsically linked to ICT evolution. The ITU is very serious towards its responsibility for WSIS Action Line C5, “Building confidence and security in the use of ICTs”, and is working hard to address the emerging challenges of the Information Society. The Global Cybersecurity Agenda as an international framework has helped ITU take a leadership role in both cybersecurity issues and in WSIS implementa- tion. It has helped build awareness of ITU’s activities among experts within the field and won their commitment and own- ership of the strategies developed by the HLEG. The GCA continues onwards, forming partnerships and ena- bling ITU Sectors to implement these strategies through con- crete activities. Much has been achieved but cybersecurity is a constantly evolving challenge, which needs to be continu- ally addressed due to the ever changing nature of ICTs. ITU will persistently work to build confidence and trust to ensure a safe and secure cyber environment for all. For more information log on to: www.itu.int/cybersecurity Contact: [email protected]
  • 46. 42 FREEDOM FROM FEAR - July 2010 European Union
  • 47. 43FREEDOM FROM FEAR - July 2010 * Bruce Schneier The Internet Anonymous Forever Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argu- ment goes; and if we abolish it, we can ensure only the proper people have access to their own information. We will know who is sending us spam and who is trying to hack into corpo- rate networks. And when there are massive denial-of-service attacks, such as those against Estonia or Georgia or South Korea, we will know who was responsible and take action ac- cordingly. The problem is that it will not work. Any design of the In- ternet must allow for anonymity. Universal identification is impossible. Even attribution - knowing who is respon- sible for particular Internet packets - is impossible. At- tempting to build such a system is futile, and will only give criminals and hackers new ways to hide. Imagine a magic world in which every Internet packet could be traced to its origin. Even in this world, our Inter- net security problems would not be solved. There is a huge gap between proving that a packet came from a particular computer and that a packet was directed by a particular person. This is the exact problem we have with botnets, or pedophiles storing child porn on innocents’ computers. Any design of the Internet must allow for anonymity. Universal identification is impossible
  • 48. 44 FREEDOM FROM FEAR - July 2010 In these cases, we know the origins of the DDoS packets and the spam; they are from legitimate machines that have been hacked. Attribution is not as valuable as you might think. Implementing an Internet without anonymity is very diffi- cult, and causes its own problems. In order to have perfect attribution, we would need agencies - real-world organiza- tions - to provide Internet identity credentials based on other identification systems: passports, national identity cards, driver’s licenses, whatever. Sloppier identification systems, based on things such as credit cards, are simply too easy to subvert. We have nothing that comes close to this global identification infrastructure. Moreover, cen- tralizing information like this actually hurts security be- cause it makes identity theft that much more profitable a crime. And realistically, any theoretical ideal Internet would need to allow people access even without their magic creden- tials. People would still use the Internet at public kiosks and at friends’ houses. People would lose their magic In- ternet tokens just like they lose their driver’s licenses and passports today. The legitimate bypass mechanisms would allow even more ways for criminals and hackers to subvert the system. On top of all this, the magic attribution technology does not exist. Bits are bits; they do not come with identity information attached to them. Every software system we have ever invented has been successfully hacked, repeat- edly. We simply do not have anywhere near the expertise to build an airtight attribution system. Not that it really matters. Even if everyone could trace all packets perfectly, to the person or origin and not just the computer, anonymity would still be possible. It would just take one person to set up an anonymity server. If I wanted to send a packet anonymously to someone else, I would just route it through that server. For even greater anonym- ity, I could route it through multiple servers. This is called onion routing and, with appropriate cryptography and enough users, it adds anonymity back to any communica- tions system that prohibits it. Attempts to banish anonymity from the Internet will not affect those savvy enough to bypass it, would cost billions, and would have only a negligible effect on security. What such attempts would do is affect the average user’s access to free speech, including those who use the Internet’s ano- nymity to survive: such as dissidents in countries violating human rights. Mandating universal identity and attribution is the wrong goal. Accept that there will always be anonymous speech on the Internet. Accept that you will never truly know where a packet came from. Work on the problems you can solve: software that’s secure in the face of whatever packet it receives, identification systems that are secure enough in the face of the risks. We can do far better at these things than we are doing, and they will do more to improve secu- rity than trying to fix insoluble problems. The whole attribution problem is very similar to the copy- protection/digital-rights-management problem. Just as it is impossible to make specific bits not copyable, it is im- possible to know where specific bits came from. Bits are bits. They do not naturally come with restrictions on their use attached to them, and they do not naturally come with author information attached to them. Any attempts to circumvent this limitation will fail, and will increasingly need to be backed up by the sort of real-world police-state measures that the entertainment industry is demanding in order to make copy-protection work. Just as the music industry needs to learn that the world of bits requires a different business model, law enforce- ment and others need to understand that the old ideas of identification do not work on the Internet. For good or for bad, whether you like it or not, there is always going to be anonymity on the Internet. http://www.schneier.com/essay-308.html This essay previously appeared in Information Security and in Forbes as the first half of a point-counterpoint with Marcus Ranum (counterpoint which can be found at http://searchsecurity.techtarget.com/magazinePrintFriendly/0,2 96905,sid14_gci1380347,00.html) This article was republished with the author’s permission. * Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a “security guru”, he is the author of Applied Cryptography, Secrets and Lies, Beyond Fear and Schneier on Security. Regularly quoted in the media - and subject of an Internet meme - he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post. Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. Schneier is the Chief Security Technology Officer of BT. More from the author can be found at www.schneier.com Imagine a magic world in which every Internet packet could be traced to its origin. Even in this world, our Internet security problems would not be solved Implementing an Internet without anonymity is very difficult, and causes its own problems
  • 49. 45FREEDOM FROM FEAR - July 2010 Improve Maternal Health For any enquiries contact: UN Millennium Campaign, Africa Office, Bishop Josiah Kibira House, All Africa Conference of Churches, Waiyaki Way, Westlands, Nairobi, Kenya. Tel: 254 - 20 - 4453440 Fax: 254 - 20 - 4453444, Cell: +254 729 - 467197 Email: [email protected] Website: www.endpoverty2015.org Millennium Development Goals You and I Can Make It HappenYou and I Can Make It Happen
  • 50. 46 FREEDOM FROM FEAR - July 2010 * Giuseppe Vaciago Privacy vs. Security? A Dilemma of the Digital Era Over the coming years a crucial issue in dealing with cy- bercrime will be the delicate balance that must neces- sarily be struck between personal data protection, public order, and security. If the stellar growth in e-commerce in the last decade, was accompanied by increasing alarm about the attendant potential for fraud (from e-bay scams to credit- card cloning), the next ten years seem bound to be beset by the headaches of cloud computing: who knows what dormant dangers may be inadvertently aroused merely by surfing the web, even without posting personal data online, or using so- cial networks (all of which are exposed to data mining)? In this specific context, given the enormous wealth and value of the information that can be gleaned from the hard drives of individual PCs, from mere web searches, not to mention electronic intercepts, digital forensics and cloud comput- ing which will certainly play an ever more decisive role in criminal investigations. This trend, already underway, was recently most singularly highlighted in the capture of a fugi- tive member of the “N’drangheta” (a Mafia-type organization operating in Calabria), one of Italy’s 100 most-wanted crimi- nals, arrested because he frequently logged on to his personal Facebook account using the nickname “scarface.” Over the coming years a crucial issue in dealing with cybercrime will be the delicate balance that must necessarily be struck between personal data protection, public order, and security ©PavelMaximov
  • 51. 47FREEDOM FROM FEAR - July 2010 Social networks and digital data in the public domain Digital data useful for law-enforcement purposes, may be broadly divided into information identifying a suspect (IP Address), data retracing the latter’s web-browsing history (server logs) and the content of the suspect’s online corre- spondence (electronic intercepts). This type of data is indis- pensable for identifying a person in the course of digital in- vestigations. Although this kind of information is accessible, as a general rule, only on the basis of warrants, subpoenas or other discovery orders issued by the relevant authorities against Internet service providers, a great deal of the data in question may, in fact, be obtained indirectly through simple web searches. Corporations such as Intelius Inc., offer an impressive array of highly effective services, supplying, for a fee ranging from $1 to $10, information on each and every US citizen, includ- ing residential address, fixed-line and cell phone numbers, e-mail address, criminal records, creditworthiness, employ- ment history and level of education. Date Check, one of Intelius’ cell-phone supported services, for instance, provides users with a full profile of potential dates, with nothing more to start with than their telephone number. The information offered includes not only personal data, but also the target’s criminal record, if any, as well as his or her earnings and assets, academic qualifications, and most crucially, current marital status, all delivered in a mat- ter of seconds and a few clicks on users’ mobile handsets, so as to help them decide whether to start or continue a roman- tic relationship. Intelius Inc. states on its website that all the information it provides is gleaned from public records: if true, this means that public data placed online on a daily basis, holds the keys to a vast variety of significant information which, until very recently, was considered beyond the reach of prying eyes. The user profiles on Facebook or any other social network can be mined not only to reveal the account holder’s identity, but also to “intercept” all the chats, posts and data passing through the account, so as to analyze their content for infor- mation useful to law enforcement agencies. It is, therefore, obvious that data must also be classified on the basis of whether or not they are accessible to the public. The need for such a distinction is all the more pressing given that, so far, it has received scant consideration at European level. The U.S. Supreme Court has held that “the Fourth Amend- ment does not prohibit “the obtaining of information revealed to a third party and conveyed by him to Government authori- ties, even if the information is revealed on the assumption that it will be used only for a limited purpose.” If these princi- ples are to be applied unmitigated in their present form to the emergent reality of Web 2.0, they would enable intelligence and law-enforcement agencies to indiscriminately mine all information posted on social networks. According to the results of a survey of over 2,000 Canadian undergraduates by Toronto-based Ryerson University’s Pri- vacy and Cybercrime Institute, young people overwhelm- ingly tend to believe that information shared over personal networks was automatically protected by a sort of “network privacy” that did not however extend to content posted on websites. In sharp contrast with this view, the same study found, businesses and academic institutions recognize no such notion and consider all information posted online, fully in the public domain and undeserving of protection. As the online information that could prove useful for solv- ing, fighting and thwarting crime continues to grow in both quality and quantity at a breathtaking pace, law-enforcement agencies are bound to increase their reliance on data-mining techniques. It is therefore urgent that at least the courts fo- cus greater attention on the type and manner of acquisition of online data deemed admissible as evidence in criminal trails. Lastly, as European data protection agencies have repeatedly pointed out, it is also important for users, both young and not-so-young, to take greater responsibility for the type of content they post on these “virtual private premises.” Data retention and Digital wiretapping: US and Europe have adopted two different approaches Besides playing a crucial role in digital investigation, IP ad- dresses can also be used to profile users for commercial pur- poses, especially in combination with cookies, as underscored in the recent European e-privacy Directive (2009/136/EC). In 2008, the German data protection commissioner, Peter Schaar, who headed the Article 29 Data Protection Working Party (comprising all European privacy authorities), expressed the view that IP addresses constitute personal data, and as such, are protected under the European e-privacy Directive. His remarks sparked a lively debate with certain US corpora- tions which argued, on the contrary, that since an IP address did not, in itself, identify the user, so it could not be deemed personal information meritorious of protection under pri- vacy regulations. Torn between demands from European data protection au- thorities and US privacy rights groups to curtail data reten- tion on the grounds that corporations like Microsoft, Google and Yahoo currently store far too much identification data for Data must also be classified on the basis of whether or not they are accessible to the public The online information that could prove useful for solving, fighting and thwarting crime continues to grow in both quality and quantity
  • 52. 48 FREEDOM FROM FEAR - July 2010 far too long, on the one hand, and calls by law-enforcement agencies for even more data be stored for ever longer periods of time, on the other, ISPs are at a loss to decide which direc- tion to take. Although Europe has opted for highly detailed data retention regulations (Directive 2006/24/EC, Article 5 states that IP addresses and server logs may not be stored for less than six months or more than two years), the issue is by no means settled. Calls for similar regulations in the U.S. were met with vigorous opposition and loud protests by both the EPIC (Electronic Privacy Information Center) and the EFF (Elec- tronic Frontier Foundation). There was no dearth of criticism in Europe either: Article 29 of the Working Party’s document entitled “The Future of Pri- vacy” noted that the Directive not only lacked some adequate and specific safeguards as to the treatment of communica- tion data, including provisions requiring an indication of the purposes for which the data are stored, or of the persons and parties authorized to access the retained information, but also failed to clarify the types of data that may in no event be law- fully stored or retained by ISPs and connectivity providers. Recently, the German Constitutional Court outlawing the national legislation on mass storage of telephone and web traffic data, passed in implementation of the Directive. The practical repercussions of this scenario are clear: when deal- ing with an ISP in a jurisdiction bereft of data retention regu- lations, such as the U.S., or Germany, law-enforcement of- ficers could never be sure if the information they seek has long been cancelled or is still in storage and admissible as evidence. Electronic interceptions of online communications are even greater cause for concern in terms of privacy protection, than merely identifying a user and perusing his/her web-browsing history. Unlike phone calls, e-mails can be immediately in- dexed using specific tags, and often contain exceedingly use- ful attachments as well as other information shedding light on the context of the exchange. The fact that electronic intercepts make it possible to glean in- formation which is undeniably more useful than that obtained from telephone wiretaps does not seem to foster forms of tran- snational cooperation that are more effective than the bilateral instruments on mutual legal assistance currently in force. This issue is particularly delicate since the world’s largest “holders” of digital information are US-based corporations. In a comment made at the 2001 Cybercrime Convention (which was also ratified by the United States), the Council of Europe laconically presented the issue of a Party permitted to unilaterally access computer data stored in another Party without seeking mutual assistance, stating that such a case is particularly complex and could not be resolved “in part (...) due to a lack of concrete experience with such situations to date.” Conclusions While this article is intended to highlight the differences be- tween the European and US approaches to privacy rights and public order and security, and to spark further research and debate on the issues involved, it does however lead to three preliminary conclusions. First and foremost, there are no winners or losers in the ef- forts to strike a balance between personal rights and public order and security, as these two following examples illus- trate. On the one side, Europe adopted a data retention poli- cy necessitating clearer definitions of the types of offences in connection to which stored personal data may be subjected to disclosure. On the other side, during the Bush administra- tion the National Security Agency struck a deal with the main national telecommunications carriers to set up a database of the records of all the phone calls and online activities of American citizens. Secondly, the EU-US joint statement released in Washington on 28 October 2009, as well as the Stockholm Program of 2 December 2009, are and must be treated as urgent calls for the active implementation of the Cybercrime Conven- tion. Without wishing to belittle the importance of this Con- vention, however, it is clear that in an area such as Internet which connects the entire world, Intergovernmental Organi- sations also need to intervene, endeavouring to include as many countries as possible. The third and last conclusion is more of a hope: the huge po- tential of the Internet cannot be exploited merely to keep in touch with old classmates or make free video calls to family and friends. It is precisely as a result of the global intercon- nectivity it offers, allowing people from different countries and backgrounds to share information and exchange ideas, that the Internet must serve as the starting point for setting up a framework of rules that reconciles privacy protection with the public interest in detecting, investigating and pre- venting crime both online and offline, in a manner satisfac- tory to all. We managed to draw up the Universal Declara- tion of Human Rights without the benefit of the Internet as a universal instrument of peace. Imagine what we can now do, with it. * Giuseppe Vaciago is a lecturer in IT Law at University of Milan, focusing his research on cybercrime and computer forensics. Electronic interceptions of online communications are even greater cause for concern in terms of privacy protection The huge potential of the Internet cannot be exploited merely to keep in touch with old classmates or make free video calls to family and friends
  • 53. 49FREEDOM FROM FEAR - July 2010 * Bruce Schneier Cyberwar Myth or Reality? The biggest problems in discussing cyberwar are the defi- nitions. The things most often described as cyberwar are really cyberterrorism, and the things most often described as cyberterrorism are more like cybercrime, cybervandalism or cyberhooliganism - or maybe cyberespionage. At first glance there is nothing new about these terms except the “cyber” prefix. War, terrorism, crime and vandalism are old concepts. What is new is the domain; it is the same old stuff occurring in a new arena. But because cyberspace is dif- ferent, there are differences worth considering. Of course, the terms overlap. Although the goals are different, many tactics used by armies, terrorists and criminals are the same. Just as they use guns and bombs, they can use cyberat- tacks. And just as every shooting is not necessarily an act of war, every successful Internet attack, no matter how deadly, is not necessarily an act of cyberwar. A cyberattack that shuts down the power grid might be part of a cyberwar campaign, but it also might be an act of cyberterrorism, cybercrime or even - if done by some 14-year-old who does not really un- derstand what he is doing - cyberhooliganism. Which it is depends on the attacker’s motivations and the surrounding circumstances, just as in the real world. For it to be cyberwar, it must first be war. In the 21st Century, war will inevitably include cyberwar. Just as war moved into the air with the development of kites, balloons and aircraft, and into space with satellites and ballistic missiles, war will move into cyberspace with the development of specialized weapons, tactics and defenses. I have no doubt that smarter and better-funded militaries are planning for cyberwar. They have Internet attack tools: denial-of-service tools; exploits that would allow military in- telligence to penetrate military systems; viruses and worms similar to what we see now, but perhaps country- or network- specific; and Trojans that eavesdrop on networks, disrupt op- erations, or allow an attacker to penetrate other networks. I believe militaries know of vulnerabilities in operating sys- tems, generic or custom military applications, and code to exploit those vulnerabilities. It would be irresponsible for them not to. The most obvious attack is the disabling of large parts of The biggest problems in discussing cyberwar are the definitions ©NASA
  • 54. 50FREEDOM FROM FEAR - July 2010 Council of Europe campaign www.coe.int/antidiscrimination
  • 55. 51FREEDOM FROM FEAR - July 2010 the Internet, although in the absence of global war, I doubt a military would do so; the Internet is too use- ful an asset and too large a part of the world economy. More interesting is whether militaries would disable national pieces of it. For a surgical approach, we can imagine a cyberattack against a military headquarters, or networks handling logistical information. Destruction is the last thing a military wants to ac- complish with a communications network. A military only wants to shut down an enemy’s network if it isn’t acquiring useful information. The best thing is to in- filtrate enemy computers and networks, spy on them, and surreptitiously disrupt select pieces of their com- munications when appropriate. The next best thing is to passively eavesdrop. After that, perform traffic analysis: analyze the characteristics of communica- tions. Only if a military can not do any of this would it consider shutting the thing down. Or if, as sometimes but rarely happens, the benefits of completely denying the enemy the communications channel outweigh the advantages of eavesdropping on it. Cyberwar is certainly not a myth. But you have not seen it yet, despite the attacks on Estonia. Cyberwar is warfare in cyberspace. And warfare involves mas- sive death and destruction. When you see it, you will know it. http://www.schneier.com/essay-201.html This essay first appeared on Information Security as the second half of a point/counterpoint with Marcus Ranum (which can be found at http:// searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_ gci1280052_idx1,00.html) This article was republished with the author’s permission. * Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a “security guru”, he is the author of Applied Cryptography, Secrets and Lies, Beyond Fear and Schneier on Security. Regularly quoted in the media - and subject of an Internet meme - he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post. Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto- Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. Schneier is the Chief Security Technology Officer of BT. More from the author can be found at www.schneier.com www.unodc.org/blueheart “Wear” the Blue Heart on your website, your Facebook profile, your products, your publications — above all “wear” it on your heart! Don´t let us forget those without a voice. Join with us in this fight! For more information on what you can do to support the campaign and “wear” the Blue Heart: www.unodc.org/blueheart Photos: Kay Chernush for the U.S. State Department Printed in Austria April 2009 Destruction is the last thing a military wants to accomplish with a communications network
  • 56. 52 FREEDOM FROM FEAR - July 2010 The rapidly changing nature of information and communications technologies suggests that as soon as new hardware, software or other applications are introduced, they will be exploited in some form or fashion by international criminal organisations. The speed at which criminals can exploit these technologies is truly remarkable. Unfor- tunately, law enforcement and the criminal justice system, bound by limited budgets, finite training, and traditional legal regimes are much slower in their abilities to respond. Cybercrime has, and will continue, to evolve overtime. From the early days of phone phreaking and the hacking of Bulletin Board Systems (BBS’s), information technology crime has transformed itself to in- clude a much broader spectrum of criminal activities comprising pre- viously unimagined technical forms of malfeasance, such as computer viruses, worms and Trojans; hacktivism, phishing, botnets, critical in- formation infrastructure attacks and even cyber-terrorism. Given the significant advances in computer processing power and the growing number of Internet users around the world, it should come as no surprise that newer forms of criminal conduct in cyberspace are surfacing, to include crime and disorder in “virtual worlds”1 as well. * Marc Goodman Crime and Policing in Virtual Worlds What are virtual worlds? The concept of “virtual reality” is new to law enforcement agencies around the world. Yet every day, millions of people connect in these 3-D worlds to socialise, shop and learn. Unfortunately, lawbreakers have also joined these virtual worlds and the full range of criminal activities is now also present. Common “real world” crimes are occurring every day in virtual worlds, including money- laundering, theft of intellectual property, exchange of child abuse images and even suspected terrorist activities. For these reasons, new virtual worlds and communities pose a unique set of challenges for the criminal justice system. Moreover, the near total lack of requisite jurisprudence means that criminals are often free to act with impunity. On the Ever-Evolving Nature of Cybercrime
  • 57. 53FREEDOM FROM FEAR - July 2010 Features of Virtual Worlds Virtual Worlds can often be classified according to their specific features. The most commonly seen types of virtual worlds break down into two general categories: game-playing and community-based, although they of- ten share some characteristics of the other. One of the interesting develop- ments with certain Virtual Worlds is the possibility of transforming gains generated within these online spaces into real world money. As a result, a whole new breed of en- trepreneurs has developed and several “virtual industrialists” have turned virtual world activities into real world profits. Perhaps the most famous of these virtual world entrepreneurs is an individual whose Second Life charac- ter is known as Ailin Graef, but in re- ality is controlled by Chinese national Anshe Chung. Chung created a real es- tate company within Second Life and as a result became the first “real world” millionaire based solely upon her ac- tivities in virtual worlds.2 In short, “virtual worlds” create an al- ternative reality where users can rep- resent themselves as they wish, in just about any format they desire through their “avatars.” Men can become wom- en, women men, adults may become children and human beings may trans- form themselves into animals, super- heroes or monsters. Virtual worlds often contain elements common to other types of online activi- ties, such as MMORPGs (Massive Mul- tiplayer Online Role-Playing Games). MMORPG’s are videogames that allow thousands of players to simultaneously enter a virtual world and interact with one another. Players can run their own “cities and countries,” stand up armies to win battles and go on any variety of “quests” with their own avatars. These avatars are completely customizable. Within MMOG’s participants may communicate with each other through a variety of means, including text chat or real time voice communication, us- ing technologies such as VOIP to carry their messages. Psychology of Virtual Worlds To many that live in the “First World,” the concept of a Second or Virtual World may not make much sense at all. Many criminal justice officials may be asking themselves why individu- als would spend so much time in these simulated environments. The answers are complex and are not yet fully un- derstood by psychologists. To many, virtual worlds offer not just a form of entertainment, but also a means of es- capism, a way of creating an alternative environment that is much more attuned to the user’s liking. The fantasy lives permitted via these virtual worlds cre- ate almost unlimited opportunities for escapism, starting from the fact that an avatar does not need to have any verisi- militude to how one appears or behaves in real life. In order for any investigator to under- stand virtual worlds, the crimes that take place therein, and the suffering of victims of “virtual crimes,” it is critical that the investigator gain insight into the mindset of virtual spaces’ “inhabit- ants.” Many of them sincerely see their “second lives” as “first lives,” to the ex- tent that, for the more extreme partici- pants (about 20% of MMORPG gam- ers), the real world (a.k.a. “meatspace”) is nothing more than a secondary home in which to eat and sleep, while the vir- tual world clearly represents in their minds their first place of residence and interaction.4 Until one fully grasps the how real the “reality” in virtual worlds is to its par- ticipants, it will be impossible to suc- cessfully understand the mindset of both the criminals and the victims who participate in these new virtual com- munities. Only by understanding this mindset can one begin to comprehend why somebody might show up at their police station to report a virtual rape, a virtual assault, a virtual burglary or a virtual suicide. Economics Millions and millions of euros are spent each year in various online vir- tual worlds. While the idea of a “virtual economy” versus a real world economy might sound strange at first, most vir- tual worlds allow for some exchange of goods and services, either through bar- tering systems, or by overcoming vari- ous game challenges or through the use of “virtual currency.” While previously many of these econo- mies were strictly virtual, recently there has been a cross over between vir- tual worlds’ economies and real world economies. Some virtual worlds actu- Common Virtual Worlds There are dozens, if not hundreds, of virtual worlds and MMORPG’s in existence today, with new ones emerging increasingly frequently. Perhaps one of the most popular virtual worlds is Second Life (SL), which was established by Linden Labs in 2003. SL has grown significantly over the past years and has an international reputation as one of the preeminent non-game based virtual reality worlds. Among MMORPG’s, the World of Warcraft (WoW) is perhaps the most popular worldwide. Players control a character/ avatar within the game world, exploring the landscape, fighting monsters, completing quests and interacting with Non-Player Characters (NPCs ) or with other players. Other common virtual worlds and MMORPG’s include Club Penguin, Lineage II, Habbo, HiPiHi, Runescape, Entropia Universe, Gaia Online and IMVU. The number of users in virtual worlds is impressive, with tens of millions of individuals visiting these spaces every month. Blizzard Entertainment’s World of Warcraft alone has over 11 million active subscribers:3 if WoW were it’s own country, it would be the 75th largest in the world, surpassing Belgium, Portugal, Sweden, Austria and Switzerland in terms of population size.
  • 58. 54 FREEDOM FROM FEAR - July 2010
  • 59. 55FREEDOM FROM FEAR - July 2010 ally have currency exchange rates with real world currencies such as dollars, pounds, RMB and euros. That means it is possible to buy Linden Dollars or En- tropian dollars with Swedish krona or Brazilian reals. Often virtual currencies trade with or without authorization in a booming secondary market, which op- erates without any regulations, opening the door to further criminal opportuni- ties. Real Crimes in Virtual Worlds Many police officials, including sea- soned and experienced cybercrime investigators, may not have yet inves- tigated a case involving a virtual world or MMORPG. Faced with already over- whelming caseloads from traditional forms of cybercrime, such as hacking, Internet fraud and online child abuse images, few investigators want addi- tional work from virtual cases. That said, we believe that virtual world crimes merit further examination given their inevitable emergency into the dai- ly workload of cybercrime investigators around the world. While it might be tempting to ignore MMORPG crimes as being purely vir- tual in nature, and thus not “real,” the vast majority of virtual crimes have real world victims. While one can certainly argue whether “virtual rape” indeed con- stitutes “real rape,” let there be no doubt about the economic or psychological effect of these crimes on their victims, since these virtual spaces are every bit as real to their inhabitants as is the physi- cal world to most investigators. Economic Crimes Given the size of virtual world econo- mies, it should not be surprising that many of the crimes committed in virtu- al spaces involve financial fraud or oth- er nefarious activities for criminal eco- nomic gain. Virtual World economist Edward Castronova has estimated the value of all the goods and services pro- duced in virtual worlds to be between 7-12 billion US dollars per annum. He further noted the economic transfer of at least 1 billion dollars in virtual cur- rencies per annum as of May 2009.5 As such, the virtual economy dwarfs the “real world” economy of dozens of countries around the world. The proliferation of virtual currencies, such as Linden Dollars, WoW gold, QQ coins and so many others, has cre- ated an attractive economic target for international organised crime groups. Long gone are the days where hackers engaged in criminal activities merely for the “fun” or “challenge” of the mat- ter. Modern organised crime seeks first and foremost financial gain and the amount of money in MMORPG’s poses an incredibly enticing target for them and the millions of MMORPG users can become to organised crime a read- ily accessible victim-base. The emer- gence of some dominant companies in the MMORPG field, such as Second Life and World of Warcraft, has meant that criminals can now create computer malware and social engineering scams to specifically locate and target large numbers of potential victims. Financial Frauds There are several tried and tested ways of committing financial fraud in virtual worlds, including social engineering, exploiting or hacking MMORPG servers and the introduction of malicious com- puter code into an individual’s virtual world environment.6 Social engineering attacks occur when cyber criminals en- ter an MMORPG or an associated, but independent, gaming forum where they search out users and offer them help or various bonuses to help “improve” their user experience or increase their gam- ing level. In exchange they solicit user names and passwords so that they can carry out the purported helpful work. The Role of Malware These malicious programs or computer Trojans enable a wide variety of crimi- nal activities in MMORPG’s, including the theft of virtual goods and money. The number of malware programs spe- cifically directed at virtual worlds and online gaming has increased dramati- cally over the past few years. In fact, ac- cording to computer security company Kaspersky Laboratories, over 30,000 new malicious programs specifically targeting online games were introduced in 2008.7 Money laundering Over the past decade, a number of new alternative forms of payment have been introduced throughout the world to keep up the growing volume of elec- tronic commerce. The most famous of these companies is PayPal, which be- came a wholly owned subsidiary of eBay in 2003. PayPal made it easier for pay- ments to be made through the Internet and serves as an electronic alternative to traditional paper money, checks or bank money orders. It can be very use- ful for the vast majority of the planet’s inhabitants that do have access to a credit card. Of course alternative pay- ment systems also open up the doors to alternative forms of money laundering. While PayPal was certainly revolution- ary in its approach, it always settled transactions in well-established forms of national currency, such as dollars, yen or euros. Over the past few years however, a number of virtual worlds have begun to issue their own forms of currency. With names like the Linden Dollar (used by Linden Lab’s Second Life), World of Warcraft Gold (from Blizzard Entertainment) or QQ Coins (by Tencent Limited), these virtual cur- rencies are being used by literally tens of millions of people worldwide. There have been various estimates of the size of the virtual world economy, but some estimates have placed it in the billions of (US) dollars. Given the vast sums of money being transferred among parties around the world, it should not be surprising of course that criminals would want to take advantage of this money flow. With little if any regulation, virtual world economies are ripe for exploita- tion by organized crime, terrorists and others who wish to launder large sums of money. While virtual world money laundering has theoretically been a possibility for some time, the following case clearly shows that theory has now been put into practice, to the tune of $38 million US dollars. As the Seoul Metropolitan
  • 60. 56 FREEDOM FROM FEAR - July 2010 Police Agency (SMPA) demonstrated, a group of Chinese and Korean crimi- nals were able to successfully defraud Korean game players and then launder the funds through a number of busi- ness front companies back in mainland China. Extortion In further evidence demonstrating the growing value of virtual world goods, a court in China handed down a 3-year prison sentence in mid-2009 to a known gang member for extort- ing virtual goods. According to Chinese officials, three suspects cornered the victim in a cyber café and noticed he had a particularly large balance of vir- tual goods in his QQ-Tencent account. An assault ensued and the victim was forced to turn over the equivalent of nearly 100,000 RMB of the virtual cur- rency QQ coins.8 This case is interesting in that it shows that virtual goods must be of value in order for the arrest and prosecution to have occurred. As vir- tual goods proliferate, more and more individuals could become victims of virtual thefts and extortions. Possession of Child Abuse Images By the very nature of their entertainment value, virtual worlds and MMORPGs are attractive to people of all ages, and in particular to young people. The enticing cartoon-like graphics, the gaming poten- tial and the entertainment value all make virtual worlds of interest to a younger audience. Of course this is not to say that children are the only ones using virtual worlds. In fact, across the board, most users in MMORPG’s are in the 20’s and 30’s, but average ages vary greatly from game to game. Second Life tends to draw an older crowd than Disney’s Club Pen- guin for example, which targets children from 6 to 14 years of age. Many virtual worlds allow for outside connections and communications: text chats, real-time voice over internet pro- tocol (VOIP) conversations, exchanges of photographic and video images with one another. While friends might want to do this for legitimate purposes, there certainly could be criminal implications as well. For example, a number of paedophiles could create avatars in Second Life pro- viding false identification details. They could meet each other in various chat rooms/islands dedicated to “child love” or “Lolita” or any other such keyword and begin socializing with each other. One of the paedophiles (represented by his avatar) could readily build a movie theatre on the island of his choice and show whatever streaming video file he chooses. So in effect, it would be en- tirely possible to have a virtual room full of paedophiles watching real child abuse images (photos, videos, etc) of real children. Age Play While few would argue that the ex- change of real child abuse images, whether done in person, on IRC (In- ternet-relay chat) or in a virtual world should be a criminal matter, the de- piction of virtual children engaging in sexual activity proves much more dif- ficult. For example, in Second Life, you can choose and dress you avatar as you wish, thus a 56 year old man could in- habit the avatar of a 12 year old girl and could then script that avatar to engage in various sexual activities. To those ob- serving in Second Life, it would look as if the “12 year old girl” was engaging in sexual activities, while in reality it is the older man using the avatar for his own sexual purposes. Shouldsuchactivitiesbeacrime?Across the world, government legislatures are answering this question differently. In Germany, Ireland and many other European countries the possession of “virtual child pornography” is consid- ered the legal equivalent of possessing “real” child pornography and is equally punishable by law. In the United States the courts have ruled that “virtual” child sex depictions are a form of fan- tasy and, as such, they do not constitute criminal behaviour because no actual child was ever abused or photographed in the production of those virtual child abuse images. Others have argued that only somebody predisposed to abus- ing a real world child would want to act out sexually as a virtual child. Those in opposition responded that democratic societies should not have “thought po- lice” and that a fantasy life that does not cross the threshold into harming others should not be criminalized. One of the largest and most infamous cases of age play occurred in Second Life in an area known as “Wonderland.” There, young “children” avatars were offering sex in a playground environ- ment. The young children were in this context not real children, but graphical representations, the so-called avatars, and the playground was a virtual play- groundcreatedwithcomputersoftware. The case created a strong rebuke from law enforcement authorities and pros- ecutors in Germany opened a criminal case in the matter. Another such case was investigated by the British police. Rape/Sexual Assault Perhaps no other form of virtual world crime endangers quite as much passion amongst participants as the discussion of“virtualrape.”Tosome,itisverymuch a crime as “real” world rape. Doubters dismiss the possibility outright, noting that rape is impossible without a human victim who has been physically attacked or violated. Despite the differences, more and more police agencies around the world are having victims of these types of crimes present themselves and demanding police redress. A “virtual rape” occurs when one per- son’s avatar is forced into a sexual situation against his/her desire. To be clear, this type of crime is differ- ent from consenting adults acting out a fantasy version of rape for whatever reasons. Virtual world rape is alleged when one of the participants is an un- willing participant in the act. Graphics in MMORPG’s and virtual worlds have progressed enormously, to the point that they can accurately represent real world scenarios fairly well. As such, an involuntary sexual assault could be perceived as having verisimilitude to the actual real world act. While many virtual worlds such as Second Life have built-in technical protections to prevent such activities from occurring, they can occur elsewhere through the introduc-
  • 61. 57FREEDOM FROM FEAR - July 2010 A NEW AND ADDICTIVE DRUG C O R R U P T I O N The phenomenon of corruption has always existed, nonetheless it is only in recent years that awareness of it has grown at the international level. Corruption is a phenomenon that is not limited by politics or geography. It exists in rich countries and in poor countries. The economic impact of corruption is difficult to establish with precision; in fact, available data is often inconsistent. On the international level, the fight against corruption requires that people work together to increase transparency in eco- nomic and financial transactions and to enact within different countries uniform legislation in this area. INTERNATIONAL LEGALRESEARCHGROUP Call for Applicants Applications are invited from all ELSA members, coming from the Mediterranean Countries, whether new or experienced. However, you will need to show evidence of commitment to the values and goals of ELSA. Applicants must also have sufficient knowledge and interest in the topic, but no specific area of Law is pri- vileged, as the corruption phenomenon can involve any legal field. Evidence of previous dissertations or researches will also help your application. Participants are expected to work on the issue from December 2010 to July 2011. They will need regular access to e-mail and the internet; it is advised to keep a good communication flow, exchanging emails on a regular basis. REGISTRATIONDEADLINE:20THNOVEMBER2010 Fill in the Application Form (www.elsa.org) Send it to your Local VP AA For further information: [email protected] & www.elsa.org
  • 62. 58 FREEDOM FROM FEAR - July 2010 tion of malicious code that forces an avatar to do something against its will. Again a review of the psychology of virtual worlds is critical here. To an individual who spends 12 hours a day inside a MMORPG living through their avatar, any activity that occurs to that avatar against its owner’s will can be troubling. For some seeing one’s avatar undergo a graphic representation of a violent sexual attack clearly would have a negative impact to the psyche of the avatar’s owner. Whether this harm is as serious as a “real world rape” is very much debated openly and is beyond the scope of this report. That said, many such cases are occurring and are being reported to law enforcement around the world. In Belgium recently, federal prosecu- tors asked the Belgian Federal Compu- ter Crime Unit to travel to the scene of a crime in Second Life for the purpose of investigating a “virtual rape” involving a Belgian victim.9 This type of activity has been around for a very long period of time. The first most widely reported case of virtual rape was documented in 1993, long before today’s MMORPG’s existed. Despite how police may or may not feel about such cases, one thing is certain, they will be increasingly reported to po- lice. As such, law enforcement should have a plan in place to deal with them and to secure any potential crime scene in search of evidence of criminal activity. Stalking/Griefing One of the most common complaints and potential criminal activities in virtual worlds/MMORPG’s is that of harassment, intimidation or stalking. This often occurs when an individual becomes the subject of unwanted atten- tion or focus by another person (avatar) or group of them. In virtual worlds, this type of activity is commonly referred to as “griefing.” Perhaps it is not surprising that all the pettygrievances,insults,argumentsand disorders that occur in the “real world” also occur in “virtual world” spaces. A griefer is not playing an online game or inhabiting an MMORPG for any useful purpose, except to harass or intimidate others. They may have uncovered un- documented technical aspects of the virtual world software and exploit these glitches or features to purely harass other players or inhabitants. For those victimized by such behaviour, it can be extremely annoying and it could feel like the real world equivalent of stalk- ing or harassment. Prostitution Prostitution is certainly common in virtual worlds and MMORPGs, but one must be careful about how one defines the term. Some individuals are will- ing to pay for their avatar to engage in simulated sexual conduct with another avatar for money (virtual currency or real). While this may or may not vio- late the terms of service of the virtual world itself, it would not be a criminal offense in many jurisdictions, assum- ing all parties were consenting adults. In other jurisdictions, even simulated sexual contact in exchange for money would be criminal. While most police forces might not pur- sue strictly virtual prostitution between adults (especially when all activities were purely online within the MMOR- PG), there are many overlapping tech- nologies that can make this type of ac- tivity a hybrid cross between the virtual and the real. For example, many virtual worlds allow users to incorporate VOIP communication into the MMORPG en- vironment. Thus the addition of voice communication as part of the prosti- tution scenario might further push the boundaries of what is legal in some ju- risdiction. In other cases, pure acts of prostitu- tion in the real world have taken on a virtual world component. In one of the most famous cases known as the “Epic Mount” case, a woman offered sexual encounters in the real world in exchange for money: 5,000 pieces of World of Warcraft gold. The woman claimed she needed the money to pur- chase her “epic flying mount.” Since WoW gold can be exchange for real world currency (euros, dollars or yen) it has a real world value based on mar- ket conditions, and given the exchange of said currency for a real-world sexual act, that woman could be punishable in many jurisdictions. Riots/Public Disorder Though it might seem odd to talk about riots or public disorder issues in virtual worlds, they are in fact, not that un- common. For example, during the most recent round of elections in Spain, most politicians had established a virtual presence in Second Life. Some politi- cians had even established their own avatars, which in turn campaigned, held rallies and put up election posters in virtual spaces. While things worked well for a while, politicians from one party were quickly overwhelmed with griefing by opposition supporters. This is of course not the first time such a thing has happened. During a recent political rally by a far-right French poli- tician, his posters were defaced, he had “exploding virtual pigs” hurled at him and Nazi swastikas were painted on campaign headquarters.10 Surely when incidents as these occur, especially when they involve high-level politicians, law enforcement will be contacted. Whether or not police are able to respond to such matters under national law is another question. The fact is, however, that the public will in- creasingly expect their police service to handle incidents such as these.
  • 63. 59FREEDOM FROM FEAR - July 2010 Conclusions The evolving nature of modern science portends that as new information and communications technology tools are introduced, so too will criminal exploits for these technologies. The aforementioned focus on virtual world crime was provided to highlight how a simple new tech- nology can be utilized by criminals to commit a wide va- riety of offenses. As has been noted, almost any crime that can occur in the real world can also be committed in virtual spaces. From child abuse to terrorist attacks, po- lice will increasingly encounter a plethora of offences in virtual spaces. In order to keep these virtual spaces safe and crime free, criminal justice professions should con- tinue to work with industry and academia to ensure the greatest possible cooperation in trying to minimise any social harm resulting from these technological develop- ments. The size of the financial gain to be made by mod- ern criminals will ensure that virtual worlds continue to be targeted for illicit purposes. Moreover, as human so- cial interactions increasingly migrate from “real space” to virtual space, so too will the panoply of social ills and harms. Given the complexity of the issues involved, now is the time to begin thinking about and responding to these concerns before the virtual crime wave spills over into the real world. * Marc Goodman is a visiting researcher at the University College Dublin’s Centre for Cybercrime Investigation. He also serves as a Senior Advisor to Interpol’s Steering Committee on Information Technology Crime, where he chairs the organisation’s working group on Next Generation Cyber Threats. 1 A virtual world is a type of online community that often takes the form of a computer-based simulated environment, through which users can interact with one another and use and create objects, often in 3D virtual environments. In virtual worlds, users often take the form of avatars visible to others as graphical representation of the users. 2 According to: www.el-universal.com.mx/articulos/36445.html. See also Business Week Magazine’s feature article on Chung: http://www.businessweek. com/magazine/content/06_18/b3982001.htm 3 http://en.wikipedia.org/wiki/World_of_Warcraft 4 http://motherjones.com/politics/2007/05/even-better-real-thing 5 http://edition.cnn.com/2009/TECH/05/19/online.currency/index.html 6 For a good overview of fraud in online gaming environments, see the white paper by Kaspersky Labs entitled “Online games and fraud: a source of easy money,” available at: http://www.kaspersky.com/au/reading_room?chapter=207716493 7 http://www.kaspersky.com/au/reading_room?chapter=207716493 8 http://www.virtualgoodsnews.com/2009/05/chinese-man-faces-three-year-sentence-for-virtual-currency-extortion.html 9 Source: http://virtuallyblind.com/2007/04/24/open-roundtable-allegations-of-virtual-rape-bring-belgian-police-to-second-life/ 10 http://www.guardian.co.uk/technology/2007/jan/20/news.france
  • 64. 60 FREEDOM FROM FEAR - July 2010 Most governments and founding char- ters originated at least 200 years ago: the United States Constitution (which then also served as a basis in most Latin Ameri- can countries), and democratic governments such as those of the United Kingdom and France. Moreover, the concept of democracy is even older than that, dating back to the ideas of Socrates, Plato and Aristotle. Cybernetics, however, which is literally the science of gov- ernment as it studies the structure of regulatory systems, is only about 63 years old. Many years ago I asked myself: What are current governments doing right or missing? What does Cybernetics have to do with the world of Law, given that laws are about controlling people’s behaviour? Rather than telling you the long-winded story, I want to “in- fect” you with a quick and valuable insight and an example of my findings. If you think that “systems” have been around for a long time and that they have had their chance to make their impact on the world, please reconsider. Reductionist thinking has be- come so engrained in our culture that it has become invisible. We think that just because we are able to take things apart, we know how they work. Complex systems though are inher- ently tricky. Systems thinking, the process of analyzing and understand- ing how things work and how they influence each other, is something absolutely necessary when designing a govern- ment, otherwise it just won’t work. I learned about manage- ment cybernetics (the science of managing organizations) under Stafford Beer’s guidance, who first introduced this concept of analyzing management and organizations in the late 1950s. I discovered with great joy for instance, that the American Constitution can be mapped in detail by his Viable System Model (VSM). Stafford built this model after stand- ing on the shoulders of the giants of cybernetics such as Nor- bert Wiener, W. Ross Ashby and others. * Javier Livas Cybernetics and Law What are current governments doing right or missing? What does Cybernetics have to do with the world of Law, given that laws are about controlling people’s behaviour?
  • 65. 61FREEDOM FROM FEAR - July 2010 The modern state is a highly complex system. Stafford Beer discovered that nature and living things seem quite multifarious, but not as much as they would appear to be. Nature’s secret for creating complexity is a little magic trick called recursiveness, of which the human body is the best and closest ex- ample: cells, tissues, organs, each of these are a living entity working togeth- er as one. Living things have evolved thanks to genetic evolution. Ideas and concepts evolve too. Lately, we speak about me- mes (copiable packages of information), and about memetic evolu- tion, which results from meme mutation. Brains or minds copy memes and change them; the amount of copying done by autono- mous agents depends on the meme’s usefulness. De- mocracy, for instance, was a meme originally created by the Greeks, but it has come to mean many other things now. Legal solutions and insti- tutions are memetic super packages. They are meme complexesthathaveevolved slowly: from Greece to the Middle Ages, through the Industrial Revolution, and the Atomic Era. If you research what a legal system is, you will find it de- fined as a system of rules, or norms or some other kind of order, but you are never referred to its ultimate essence: information. The legal realm is a world of guidelines with which to govern. Laws and constitutions are like instruction manuals telling people what to do in many different situations. As such, they resort to previous agree- ments, such as the meanings contained in a dictionary, in order to be under- stood and obeyed. The Viable System Model (VMS) ex- plains in great detail how several sys- tems connect to one another to create a greater one, a whole which emerges from simpler parts and can do things that the individual components cannot do themselves. Building these connec- tions and communication lines is what the law has been doing for many cen- turies now. Furthermore, emergence is what makes a system behave consist- ently. Businesses use the holistic syn- ergy (2+2=5) to signify that the whole is greater than the sum of its parts. Cybernetics was born as a strictly math- ematical science, using sophisticated statistical methodologies discovered by Norbert Wiener when he was studying Brownian motion in gases (the seem- ingly random movement of gas parti- cles). When cybernetics evolved to be- come a scientific paradigm, it did not discard its mathematical foundations, but it simply built on top of them. Man- agement Cybernetics, Stafford Beer’s brainchild, is built on Set Theory and on Ashby’s Law of Requisite Variety, which states that the regulator must match the variety of the regulated sys- tem in order to assure control. The variety of a system has been defined as the number of different states that the system is capable of showing. When you have a system as large and com- plex as the nation-state, the number of potential individual behaviours is un- imaginable and yet, somehow, control and an ordered society manage to make its way through. This is thanks to the facts that laws have evolved following certain cybernetic control principles in- tuitively. This is not a small merit of the legal system. Therefore, if we opt for redesigning governance, we can do so with a very clear knowledge of how not to produce unwanted side effects. We can map the interactions and identify the positive and negative control loops. Positive feedback is like the acceleration made possible by a car’s engine, while nega- tive feedback is used for con- trol, such as the brakes and the steering wheel. Legal systems use circular causality, even if lawyers do not identify it as such. For instance, the legislative proc- ess is an example of a circular causality system. It is assumed that laws are not approved to work forever: lawmaking presupposes the need to go back and adapt legislations to the changing circumstances. These are clearly cybernetic mechanisms at work. When I say that Law has dis- covered the VSM without any knowledge of cybernetics it is because trial and error leads to solving governance prob- lems and, eventually, a system of checks and balances has proved to be a wise solution. Well, checks and balances is another word for homeostats, which nature uses to get results while maintaining an internal stability. What many people have not noticed is that legal systems use contradictory values to balance the performance of the system. Some jurists are aware of the contradictions within the process, which can imply as- sumptions such as: justice is the enemy of certainty; liberty is the enemy of or- der and so on. Lawyers are proud users of Aristotelian logic, the syllogistic logic of “All men are mortal; Socrates is a man; therefore Socrates is mortal.” This is the supreme Focus on
  • 66. 62 FREEDOM FROM FEAR - July 2010 tool of the legal process, also used in defining the burden of proof. However, what may seem as a chain of syllogistic reasoning could create an aberration. Consider the rules of “probable cause,” which have degenerated into a bureaucratic mess that hinders the expedition of search warrants. Why not use a more systemic approach to the problem? What if several neighbours were given the power to request a police search? Individuals do not have “requisite variety,” but the neigh- bourhood “system” does! Peer monitoring by neighbours would, for instance, dissuade the existence of crack houses. Has the Law realized that making finer and finer distinctions creates exactly the opposite effect? Law has not used the power of dispersed information. Our ideas of individuality do not allow the current system of jus- tice to know what is going on. A family knows its members better that any police ever will. Why not tap into this wealth of information? We disapprove the public lashing of graffiti violators in certain countries, but the truth is that the very existence of the rule produces a behaviour that seldom re- quires the punishment to take place at all! If you compare this to the high occurrence of rapes in some countries’ pris- ons, we can deduce that it is not the severity of the crime per se that determines the frequency of said crime, but it is instead the entire system variables that affect the behaviour of the potential perpetrators. Another “systemic solution” is the way the Iroquois, an indig- enous tribe in North America, fought the unwanted behavior of their members. They sat the culprit in the middle of the tribe assembly and said: “We are going to do nothing and stay here until you convince us that you have repented be- cause your behavior is something we cannot live with.” This social pressure and the resulting bonding produced a society with virtually no crime! The Iroquois did not have jails, and those that repeated extreme cases of disobedience were de- clared “invisible,” which meant that nobody could ever speak to them again or help them in any way. Without the tribe’s support they would usually die or be killed by enemy tribes. Therefore we must look “at the whole” system before making choices. Living systems are awash with paradoxical situations. Cyber- netics embraces paradoxes such as homeostatic checks and balances. The final analysis should answer the question: is the system doing what we want it to? Is filling jails with two million people the purpose of the system? This is what the complex system does. We can change that through the use of the systems’ knowledge. It is sad that defenders of minorities do not have their cyber- netics in place. As they demand more and more safeguards of individual rights, they are giving proof of the counterintui- tive nature of complex systems. Take note that I have said nothing here about those attorneys and judges’ self-interested role in perpetuating the mess. My analysis does not take into account the role played by those taking advantage of the perpetuation of this mess for self interest or political gain. Corruption is, for instance, a very important component in the system’s performance and it can generate errors which negatively impact the communities in their functioning and in their daily lives. For more information on the topic, see Law & Cybernetics on YouTube. * Javier Alfredo Livas Cantú is an attorney with an MBA from ITESM (Monterrey Tech). Has spent most of his time as a political activist for democracy and freedom in Mexico, and as an attorney with legislative initiatives to change laws regarding civil procedures, transparency and elections. Livas is an expert in cybernetics, a discipline first applied to management by the British cybernetician Stafford Beer. He is the author of many books, among which Cibernética, Estado y Derecho, The Cybernetic State, Más allá de la Psicocibernética, el Libro del Poder Personal, Batallas por la Democracia. He has also been writing a weekly political column in El Norte newspaper for more than 25 years and has published more than 50 videos on YouTube. Corruption is, for instance, a very important component in the system’s performance and it can generate errors which negatively impact the communities in their functioning and in their daily lives
  • 67. 63FREEDOM FROM FEAR - July 2010 We are all citizens of the same World Please stand up for justice and equality
  • 68. 64 FREEDOM FROM FEAR - July 2010 ©APOPO For decades, the international community’s approach to issues of nuclear proliferation on the one hand, and of the use of criminal law mechanisms on the other, has hardly been an integrated one. In the post-Cold War environment, the events of 9/11 have acted as a powerful catalyst for change. The conceptual bor- ders within which these two areas (nuclear proliferation and criminal law) were “locked” have been challenged. However, only recently has this change begun to be reflected in specific international legal instruments. Two major changes, closely linked to each other, have con- tributed to explain the convergence: a) First major change: non-State actors are increasingly perceived as having the potential to become fully fledged “nuclear proliferators,” in the same way as State entities. It is true that some legal instruments adopted during the Cold War, such as the 1979 Convention on the Physical Pro- tection of Nuclear Material, require the criminalization of certain conducts involving the unlawful handling and theft of nuclear material. It was certainly recognised that such material may fall into the hands of individuals for malevo- lent purposes, including terrorist ones. However, the overall consensus at that time was that only States would be capa- ble and/or willing to manufacture and use nuclear weapons. This is evident in the language of the only multilateral legal instrument which continues to represent the cornerstone of global nuclear non-proliferation efforts: the 1968 Treaty on the Non-Proliferation of Nuclear Weapons (NPT). One of the core requirements of the NPT is the prohibition for non- nuclear-weapon States (NNWS) to receive nuclear weapons, and a corresponding prohibition for nuclear-weapon States to carry out such transfers to NNWS. (In a nutshell, “nuclear proliferation” can be defined as the spread of nuclear weapons to States that did not previously possess them, i.e. “horizontal proliferation”, and the increase in the number of weapons by States already possessing them, i.e. “vertical proliferation”). * Stefano Betti The New Convergence between International Criminal Law, Nuclear Non-Proliferation and Maritime Security ©UNPhoto/IndobattMPIO In a nutshell, “nuclear proliferation” can be defined as the spread of nuclear weapons to States that did not previously possess them, i.e. “horizontal proliferation”, and the increase in the number of weapons by States already possessing them, i.e. “vertical proliferation”
  • 69. 65FREEDOM FROM FEAR - July 2010 When the NPT was adopted, it was sim- ply unthinkable that individuals acting outside State direction could ever gath- er the high level of skills and technolog- ical awareness necessary to pose a seri- ous and direct global threat. Crucially, the NPT lacks a provision equivalent to the ones contained in more recent non- proliferation instruments, such as the Chemical Weapons Convention, which requires that activities prohibited for States Parties also be the object of a prohibition for natural or legal persons acting on their territory. The events of 9/11 suddenly brought to the attention of the world community a new possibility: criminal organisations could develop an autonomous capacity to acquire,manufacture, use and threat- en to use nuclear weapons. Intelligence reports started to document attempts by the Al-Qaida network to come into possession of nuclear materials and the know-how. Osama Bin Laden has even been reported stating that the acquisi- tion of weapons of mass destruction constitutes a religious duty. In 2002, the UN General Assembly adopted the first of a series of resolutions on “Meas- ures to Prevent Terrorists from Acquir- ing Weapons of Mass Destruction.” In this process, Resolution 1540 can be considered a landmark instrument since, for the first time, the Security Council used its prerogatives under Chapter VII of the UN Charter to en- trench a requirement for all States to “prohibit any non-State actor to manu- facture, possess, develop, transport, transfer or use nuclear, chemical or biological weapons and their means of delivery, in particular for terrorist pur- poses, as well as attempts to engage in any of the foregoing activities, partici- pate in them as accomplice, assist or fi- nance them” (para.2). b) Second major change: Interna- tional criminal law is increasingly being used to control nuclear proliferation. Resolution 1540 has provided the po- litical impetus and legal framework for the adoption of the 2005 Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (2005 SUA Pro- tocol). Whereas the original 1988 SUA Con- vention deals exclusively with direct threats to a ship and its passengers (tak- ing the Achille Lauro case as the para- digmatic situation), the new Protocol goes well beyond the goal of strength- ening maritime security. By defining new offences of transporting nuclear weapons and related materials in vio- lation of the NPT’s legal framework, it promotes criminal law as a central ele- ment in the global non-proliferation ef- fort and recognizes the dangers posed by non-State actors beside “traditional” State-driven proliferators. The techni- cal complexity of the new legal regime, merging criminal law, nuclear law and the law of the sea, reflects an attempt to face an increasingly intricate and vola- tile security environment. What are the implications of the new approach, and what developments can be expected in the next few years? Al- though it is impossible to make predic- tions, some trends can already be an- ticipated. First of all, the 2005 SUA Protocol is set to enter into force at the end of July 2010 (having now been ratified by twelve States). Although many more instruments of ratification will have to be deposited before the Protocol can achieve the sort of “universal charac- ter,” a pre-requisite for its usefulness as a truly global cooperation platform, the focus of the international commu- nity will gradually move to issues of implementation. The multidisciplinary nature of the new legal regime will re- quire that domestic agencies acquire a particularly high level of specialization for the purpose of incorporating inter- national standards into domestic legal systems and enabling the law enforce- ment community to act effectively. The innovative approach taken in the 2005 SUA Protocol is not going to re- main an isolated case. In August this year, a Diplomatic Conference under the aegis of the International Civil Aviation Organization is set to amend the existing international legal regime governing illicit acts affecting civil avia- tion. As things stand now, it is likely that new instrument(s) will envisage a central role for criminal law in the area of transport of nuclear weapons and materials (as well as other weapons of mass destruction) by air. Consequently, lessons learned during the implemen- tation phase of the 2005 SUA Proto- col may facilitate the understanding of similar provisions in the field of civil aviation. Several international agencies will have to play a leading role in promoting ac- ceptance and understanding of the new approach, and they will have to do so as a joint endeavor. Natural candidates are the International Maritime Organi- zation, the International Atomic En- ergy Agency and the United Nations Office on Drugs and Crime. The need to achieve better coordination among international bodies in delivering tech- nical assistance, particularly to devel- oping countries, will become more and more pressing. Handling the complex security envi- ronment of the 21st Century will make it inevitably necessary for deeds to fol- low words. * Stefano Betti, Terrorism Prevention Expert, United Nations Office on Drugs and Crime (UNODC). The views contained in this paper do not necessarily reflect those of the United Nations. Several international agencies will have to play a leading role in promoting acceptance and understanding of the new approach ©NASA Insight
  • 70. 66 FREEDOM FROM FEAR - July 2010 ©UNPhoto/AlbertGonzalezFarran Once upon a time there was journalism. Many have recit- ed the de profundis for the reporting profession over the last few years. Because of the economic crisis, which has been stifling newspapers for the last two years. And before that, in an even more substantial way, because of how conflicts in the post 9/11 world have changed the way of telling History and the stories of those who are called upon to cover them. In the future, journalism handbooks will still exist, along with the profession itself. They will still be written, perhaps not on paper, but, in my opinion, they will nevertheless be published digitally and read on Kindle. These manuals of the future will dedicate an important chapter to that sunny morning in Manhattan: 9/11 changed the world as we knew it, but it also changed journalism. Until that day, the men and women with notebooks had lived in a sort of limbo: the pen and the recorder had al- most always granted them a sort of immunity and a form of respect, albeit vague, from the factions in conflict. This, however, did not always work: during the fifteen years of bloody civil war in Lebanon, saying sahafie (journalist) at checkpoints wasn’t enough to avoid being stopped and tak- en hostage, sometimes even for years. Nevertheless, these cases were always conceived as marginal ones that did not tarnish the overall concept of immunity. Reporting in Times of War * Francesca Caferri
  • 71. 67FREEDOM FROM FEAR - July 2010 Close up However, everything changed with the wars in Afghanistan and Iraq: journal- ists slowly understood that the press label wasn’t enough, that the guarantee of impartiality was no longer the same, and that even those who took sides with the “victims” (the civilian population in those countries) were no longer safe. That was because they were rec- ognized as westerners first and jour- nalists later: they were therefore, by definition, either targets for revenge or sources of economic revenue. Many colleagues from notorious newspapers have lost their lives in this context, Corriere della Sera and El Mundo lost Maria Grazia Cutuli and Julio Fuentes; but papers typically associated with leftist and anti-war ideologies were also affected, such as Manifesto’s Giuliana Sgrena and Libération’s Florence Aube- nas, who were kidnapped and held hostage for several weeks. It was therefore almost natural for colleagues to resort to a type of journalism that has been forcefully establishing itself: embedded journalism. This Ameri- can expression has been applied to reporters travelling with military units, following them everywhere and reporting their work, taking advantage of the security bubble that they (sometimes) offer. In 2006, embedded journalism was basically the only type that had survived in Iraq, telling us of the battle of Fallujah and of the bloodsheds that brought the country on the verge of a civil war. In those months, many criticized the media accusing it of a lack of objectivity, and many took up the cudgels in its defence. I believe that the ultimate answer was given by Kevin Sites, an embedded correspondent for NBC who had filmed a group of marines shooting the final rounds against a wounded insurgent in a mosque in Fallujah. The footage was aired, provoking outrage and making a few heads roll. The journalist was overwhelmed by criticism: many accused him of having betrayed the pact that had bound him for weeks to the troops he was embedded with, who had fought to save his life too, just to be then paid back with that video. Sites defended himself, explaining that the real pact was the one he had with his job: telling reality without filters or constrictions. And in that case, reality was represented by those deadly shots against a wounded man lying on the ground. In my opinion, that reporter saved the soul of today’s journalism, demonstrat- ing that the press can benefit from the troops’ protection to reach areas other- wise inaccessible, but that this does not necessarily imply embracing the mili- tary’s point of view on everything. This lesson is far too frequently forgotten (particularly in the Italian context, which is the one I know best) in favour of a more servile and slovenly way of reporting: one that is not very useful to the writers, to the sources or to the readers, and one that runs the serious risk of proving right the doomsday prophets of the demise of journalism. * Francesca Caferri is Vice-Editor (World affairs section) of La Repubblica, one of the main Italian newspapers. She has provided extensive coverage on the Middle East, USA, Africa, Europe and Latin America, specializing in development issues and major international events, with an emphasis on the Middle East. Previously, she has also worked for CNN covering humanitarian issues, international organizations and European Union issues. Francesca Caferri is a Professor of International Organizations and Foreign Affairs. In 2005 she was awarded the highest prize for Italian journalists (Saint Vincent Journalism Prize) for reporting from Cuba during the first meeting of the Cuban opposition. Translated by Olivia Jung, UNICRI Many have recited the de profundis for the reporting profession over the last few years Many colleagues from notorious newspapers have lost their lives ©UNPhoto/ArminehJohannes
  • 72. 68 FREEDOM FROM FEAR - July 2010 * Laura Boldrini Op-ed Idecided to write a book in the summer of 2009 when the Ital- ian government start- ed intercepting and turning back migrants at sea. I thought it would have helped me analyse what has been going on these years and what is not happening nowadays. Despite the apparent calm that was looming over the wa- ters of the Mediterranean in the absence of disembark- ments, apprehension still arose from the many stories of the men and women who had reached, one after the other and throughout the years, the Favarolo dock of Lampedusa and the southern coasts of Italy. Those stories echo in my ears, hindering me from find- ing even just a single positive aspect of the “pushbacks” in high waters. All back, the same solution was applied to all of them: indiscriminately pushed back regardless of the individual causes behind their escape. A single offhanded sentence without appeal. Notwithstanding if you are in the middle of the sea because your country is torn apart by war, or if you are in a rubber dinghy because staying at home would have meant being tortured. On this side of the Mediterranean, the distinctions are no longer taken into account. And the reaction of a substantial portion of the public opinion applauding this initiative with- out considering the price paid by those migrant also makes me feel uneasy. Those pushed back, including the children, end up in detention centres in Libya, where they remain for months or perhaps years, without having committed any crime whatsoever. They are only human beings who do not have the privilege of living at home and who have to look for peace and security elsewhere. Moreover, those returned also run the risk of being sent back further south, in the middle of the desert. How can we agree with all this? Very few of the stories of the many men and women I have met throughout the years working as a spokesperson for the United Nations High Commissioner for Refugees (UNHCR) are devoid of suffering. The condition of person on the run is almost never resolved without traumas. Most of these people endure a genuine ordeal of pain and solitude. But it is not necessarily the cruelest stories that have left Humankind’s Suffering is Not Something One Can Get Used to Everybody Back! ©UNPhoto/RLeMoyne
  • 73. 69FREEDOM FROM FEAR - July 2010 more of a mark in my mind. There are situations where someone else’s anguish is so overwhelming that it is hard even for the listener to contain it. This transposed sense of malaise can be comforted only with a concrete ac- tion to help those people, to instill in them a glimmer of hope in the future. Humankind’s suffering is not some- thing that one can get used to. Going back through the years, my memory takes me to Afghanistan, one of the most spectacular places on the planet. A place where you can perceive the in- tolerable dissonance between nature’s beauty and the horrific stories told by women annihilated by violence; the immaculate white peaks of the Hindu Kush and the nefarious crimes per- petrated against entire generations of women and girls, silent and invisible. From the Balkans, the images im- pressed in my mind are those of the elderly kicked out of the hospitals in Kosovo and transported in hand-carts by their relatives through impervious mountain paths under the pouring rain. In pain and quiet are the aghast looks of those seniors who would have died rather than endure that tribula- tion, or the looks of those skeletal pris- oners released at a frontier post after having been used as human shields to protect the enemy’s military posts. It is also difficult to forget the long lines of Eritrean women and children, envel- oped in the sandy winds overshadow- ing the sky. After walking for hours un- der the implacable sun and blistering temperatures reaching 50°C (122°F), they arrive exhausted and parched at the first refugee camp of Kassala, just beyond the Sudanese border. A few years later, other stories of refu- gees, this time told in Italy, opened my eyes on the ultimate frontier of des- peration. They revealed an actual Rus- sian roulette managed by smugglers of human beings, the real warlords of the war fought in the Mediterranean. Being forced on a ramshackle rubber dinghy or on a fiberglass skiff to cross the 160 miles separating Libya from Lampedusa basically means being willing to pay the ultimate price. But, when you are without papers, or with- out an entry visa for a safe country, you have no choice. But what do we know of these people and of their arduous existence? In my opinion, not enough. In the media, and consequently in the public opin- ion, those arriving from the sea are commonly and hastily called “illegal aliens” (or, in Italian, clandestini). It is a term loaded with prejudice, a word evoking something dangerous that has to hide from justice, even though most of the people arriving on the Italian shores are seeking asylum. This is why I consider each of these stories a legacy handed over to me, an extremely valu- able patrimony in which to invest con- stantly through my work. Refugees do not have the privilege of living at home, and many of them wish to return there as soon as possible. When migrants are repatriated, ei- ther because they entered or are stay- ing in the country irregularly, they do not run the risk of being imprisoned, tortured or killed; at most, they can in- cur in some sanction, but nothing that would put their lives on the line. But if it is a refugee who is being pushed back to his or her country of origin af- ter having fled from it because of per- secutions, being repatriated basically means being forced back into the lion’s den. There are about 35 million peo- ple in the world who live this condition of forced rootlessness, and the United Nations High Commissioner for Refu- gees is there to look after them. The media doesn’t give much space to the ‘other side’ of these disembark- ments, so the public opinion often neglects the tragedy behind their es- capes: it is too easy to take advantage of this situation and to play on peo- ple’s fear. In doing so, a victim need- ing help becomes a menace, a person who is frightening just because he or she arrived in this country irregularly, perhaps by sea. Common sense can do little in front of fear, especially when it is fuelled in such a misleading way, spreading it and turning it into something col- lective. This perception, so arbitrary and deceptive, does not do justice to the women, men and children who have reached the Italian coasts in these years. Nor does it do justice to an Italy that is invisible, yet real: that of those who, in their everyday lives and through their jobs, promote a mutual understanding and a civil coexistence. I think of the teachers who, with the lit- tle resources given, support young for- eigners in their difficult academic path and who prepare the young Italians to live in the global village. I think of the many fishermen who have risked their own lives to save hundreds of people in the Mediterranean in the past few years. I think of the Italian families who get to know and learn from this new resource, who respect their dig- nity and their rights. It is in these contexts that the society of the future is developing, and it is thanks to these ordinary heroes that integration becomes a concrete thing, in a spontaneous and almost uncon- scious way, while too often it still re- mains a vague and abstract objective for the institutions. * Laura Boldrini is the Italian spokesperson for the United Nations High Commissioner for Refugees (UNHCR) and author of the book Tutti indietro (ed. Rizzoli, 2010). Translated by Olivia Jung, UNICRI But what do we know of these people and of their arduous existence? In my opinion, not enough In the Spotlight ©UNPhoto/EricKanalstein
  • 74. 70 FREEDOM FROM FEAR - July 2010 On the Interna 01-04September 2010 Summer Programme on Disarmament and Non-Proliferation of Weapons of Mass Destruction The T.M.C. Asser Institute organizes a summer programme in close cooperation with the OPCW (the Organisation for the Prohibition of Chemical Weapons), the CTBTO Preparatory Commission, the BWC-ISU (Biological Weapons Convention Implementation Support Unit of the United Nations Office for Disarmament Affairs) and the IAEA (International Atomic Energy Agency). The objective of this one-week summer programme is to raise interest among the younger generation in pursuing careers in disarmament and non-proliferation as part of the larger process of enhancing stability and security in the world. More Information: www.asser.nl/events.aspx?id=115 01-04September 2010 International Conference on the Treatment of Sex Offenders The biennal International Conferences on the Treatment of Sexual Offenders aim to the dissemination of new research, treatment methods and to provide continuing education and networking opportunities. The Conferences also promote advocacy of humane, dignified, comprehensive, ethical and effective treatment of sexual offenders throughout the world. More Information: www.iatso.org/Oslo The Hague, The Netherlands Oslo, Norway 23-24 September 2010 International Conference on “Freedom, Security and Justice” 50th Anniversary of the Foundation of the National Institute of Criminology (NIC) “Freedom, Security and Justice” is the title of the closing conference of the NIC Anniversary Year, with invited speakers from Hungary and abroad. The conference aims both to report on the events and achievements of the Anniversary Year, and to provide a frame for programmes on the topics of freedom, security and justice. More information: http://en.okri.hu/content/view/123/9/ Budapest, Hungary 08-11September 2010 10th Annual Conference of the European Society of Criminology The Conference aims to foster a Criminology that works on the double level of analysis (crime committed by a single person or by individuals linked by various kinds of relationships) and to stimulate bridges between them. The Conference will embrace most of the issues about crime, crime prevention and deviance. It will also try to enhance exchanges and cooperation between scholars, academics and other institutions (both public and private). More Information: www.eurocrim2010.com Liege, Belgium
  • 75. 71FREEDOM FROM FEAR - July 2010 ational Agenda 13-15October 2010 The 13th World Conference of the International Institute for Restorative Practices The interdisciplinary conference will spotlight the city of Hull, which is bringing restorative practices training to its 23,000 professionals and volunteers who work with children and young people. Beginning with educators, police, social workers and others in the Riverside section of Hull, and expanding to a wide variety of agencies throughout the city, the Hull Centre for Restorative Practices is using training programs developed by the International Institute for Restorative Practices. The conference. will also include educationalists, social care and criminal justice professionals from many countries who, in small breakout sessions, will share their experiences in effectively using restorative practices. More information: http://www.iirp.org/hull10/ 18-22October 2010 Conference of the Parties to the United Nations Convention against Transnational Organized Crime and its Protocols - (CTOC/COP) Pursuant to article 32 of the United Nations Convention against Transnational Organized Crime, a Conference of the Parties to the Convention was established to improve the capacity of States Parties to combat transnational organized crime and to promote and review the implementation of this Convention. More information: http://www.unodc.org/unodc/en/treaties/CTOC/CTOC-COP.html 08-12November 2010 6th United Nations Conference to review the UN set on competition Policy The Sixth UN Review Conference will mark the 30th anniversary of the adoption of the United Nations Set of Multilaterally Agreed Equitable Principles and Rules for the Control of Restrictive Business Practices (United Nations Set). The UN Set is a multilateral agreement on competition policy that: provides a set of equitable rules for the control of anti-competitive practices; recognizes the development dimension of competition law and policy; provides a framework for international operation and exchange of best practices. More information: http://www.unctad.info/en/6th-UN-Conference-on-Competition-Policy/ Hull, England, UK Vienna, Austria Geneva, Swizerland
  • 76. 72 FREEDOM FROM FEAR – July 2010 Challenging Ideas An essential reference for scholars and others whose work brings them into contact with managing, policing and regulating online behaviour, the “Handbook on Internet Crime” emerges at a time of rapid social and technological change. Amidst much debate about the dangers presented by the Internet and intensive negotiation over its legitimate uses and regulation, this is the most comprehensive and ambitious book on cybercrime to date. “The Handbook on Internet Crime” gathers together the leading scholars in the field to explore issues and debates surrounding internet-related crime, deviance, polic- ing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime research and scholarship, combining contributions from many of those who have established and de- veloped cyber research over the past 25 years and who continue to shape it in its current phase, with more recent entrants to the field who are building on this tradition and breaking new ground. Contribu- tions reflect both the global nature of cybercrime problems, and the international span of scholarship addressing its challenges. - Amazon editorial review Handbook of Internet Crime Yvonne Jewkes, Majid Yar - Willan Publishing (November 2009) Cyber War goes behind the “geek talk” of hackers and computer scientists to explain clearly and con- vincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. From the first cyber crisis meeting in the White House a decade ago to the boardrooms of Silicon Valley and the electrical tunnels under Manhat- tan, Clarke and coauthor Robert K. Knake trace the rise of the cyber age and profile the unlikely charac- ters and places at the epicenter of the battlefield. They recount the foreign cyber spies who hacked into the office of the Secretary of Defense, the control systems for U.S. electric power grids, and the plans to protect America’s latest fighter aircraft. - Amazon editorial review Cyber War: The Next Threat to National Security and What to Do About It Richard A. Clarke, Robert Knake - ECCO Press, U.S. (May 2010) Cybercrime sets out to explain two things: what cybercrime is, and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and a discussion of the legal issues surrounding it. Enhancing her narrative with real life stories, author Susan Brenner traces the rise of cybercrime from mainframe computer hacking of the early days, to the organized, profes- sional, often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyses the challenges cybercrime poses to law enforcement at national and international levels. - Amazon editorial review Cybercrime: Criminal Threats from Cyberspace David G. Raffaelli, Christopher L. J. Frid (Editors) - Cambridge University Press (2010)
  • 77. 73FREEDOM FROM FEAR - July 2010 This book fully defines computer-related crime and the legal issues involved in its investigation. Re-or- ganized with different chapter headings for better understanding of the subject, it provides a framework for the development of a computer crime unit. Updated with new information on technology, this book is the only comprehensive examination of computer-related crime and its investigation on the market. It includes an exhaustive discussion of legal and social issues, fully defines computer crime, and pro- vides specific examples of criminal activities involving computers, while discussing the phenomenon in the context of the criminal justice system. Computer Forensics and Cyber Crime 2e provides a compre- hensive analysis of current case law, constitutional challenges, and government legislation. New to this edition is a chapter on Organized Crime & Terrorism and how it relates to computer related crime as well as more comprehensive information on Processing Evidence and Report Preparation. - Amazon editorial review Computer Forensics and Cyber Crime: An Introduction Marjie T. Britz - Prentice Hall, 2nd edition (October 2008) This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. - Amazon editorial review Computer and Information Security Handbook (Morgan Kaufmann Series in Computer Security) John R. Vacca - Morgan Kaufmann (July 2009) This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion industry and is growing rapidly. It examines economic and institutional processes in the cybercrime industry, provides insights into the entrepreneurial aspect of firms engaged in cyber-criminal activities, takes a close look at cybercrime business models, explains the global variation in the pattern of cyber- crimes and seeks to understand threats and countermeasures taken by key actors in this industry. This book’s distinguishing features include the newness, importance, controversiality and complexity of the topic; cross-disciplinary focus, orientation and scope; theory-based but practical and accessible to the wider audience; and illustration of various qualitative and quantitative aspects of the global cybercrime industry. - Amazon editorial review The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives Nir Kshetri - Springer, 1st Edition (May 2010) for Challenging Times
  • 78. 74 FREEDOM FROM FEAR – July 2010 In this book an international panel of experts analyzes current trends and new developments in law enforcement and legal systems throughout the continent, including material from non-English- speaking countries that is seldom available to the broader academic community. Offering a succinct overview with special focus on criminal law, police procedure, immigration law, and human rights, the book provides unique insight into what the war on terror means to EU member and non-member countries; state supporters and critics of American anti-terrorist policy; nations with recent histories of outside terrorist attacks and those facing threats from homegrown entities. This comparative approach gives readers three levels of understanding: by country, as affecting the European Union as a whole, and in the context of the UN. - Amazon editorial review A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications Marianne Wade, Almir Maljevic - Springer (November 2009) “The Handbook of Crime” is a comprehensive edited volume that contains analysis and explanation of the nature, extent, patterns and causes of over 40 different forms of crime, in each case drawing atten- tion to key contemporary debates and social and criminal justice responses to them. It also challenges many popular and official conceptions of crime. This book is one of the few criminological texts that takes as its starting point a range of specific types of criminal activity. It addresses not only ‘convention- al’ offences such as shoplifting, burglary, robbery, and vehicle crime, but many other forms of criminal behaviour - often an amalgamation of different legal offences - which attract contemporary media, public and policy concern. These include crimes committed not only by individuals, but by organised criminal groups, corporations and governments. - Amazon editorial review Written by a journalist and a lawyer (the brothers Antonio and Silvio Scuglia, respectively), Toto Truffa (the lottery of frauds) presents various tricks and techniques used to fraudulently deceive people. The offenders present themselves with thousands of different scams and costumes: fake Municipality em- ployees, fake gas technicians or electricians, even fake priests… The swindlers are everywhere, they strike at home and in the streets, they empty out their victims’ bank accounts with a simple click of a mouse. But for every trap there’s a way out. The book Toto Truffa is a collection of 150 different types of tricks and, above all, a practical manual to avoid being deceived. - Felici Editore review Handbook of Crime Fiona Brookman, Mike Maguire, Harriet Pierpoint, Trevor Bennett - Willan Publishing (February 2010) Toto Truffa Antonio Scuglia and Silvio Scuglia - Felici Editore (April 2009)