Sie sind auf Seite 1von 6

Internet crimes

Given the global reach of the Internet, the posting of child abuse material online constitutes an
international crime and demands concerted collaboration worldwide.
At INTERPOL, we work very closely with many partners to increase awareness, enforce laws and to
prevent crime in this area. We also work with organizations such as the Internet Corporation for
Assigned Names and Numbers (ICANN) and the Internet Governance Forum (IGF) to improve safety
and security online.
We run many initiatives,including the development of a victim identification network and the
coordination of international operations. Key to identifying victims is the International Child Sexual
Exploitation database.
A key project involves the monitoring of websites to develop the "worst of" list of sites that are illegal in
all countries. We then work with Internet Access Service Providers (ASPs) to block access to sites
containing child abuse material.

Identifying videos of abuse


To aid law enforcement in fighting crimes against children, a new forensic technology has been
developed to assist in finding and removing the most explicit videos of child sexual exploitation from
the Internet.
Created by online security technology provider Friend MTS and donated to the International Centre
for Missing and Exploited Children, the technology generates a unique digital signature, like a
fingerprint, of child sexual abuse videos, which can then be compared with other videos to detect
matching fingerprints.
Once a video is given a fingerprint, police and Internet service providers can quickly and easily
identify full or partial copies of the video wherever they are hosted online. This enables online
providers to filter and block known child sexual abuse material, and helps police to investigate cases
of online child abuse more efficiently.

Baseline
The Baseline system allows partners in the public and private sectors to recognize, report and remove
child sexual abuse material from their networks.
They can do this by checking images and videos on their networks against the Baseline list of digital
signatures, which is calculated from some of the worst child abuse images and videos recorded in
INTERPOLs International Child Sexual Exploitation database.
In the case of a match, the network operators alert the police and can remove the material, thereby
limiting its circulation.
The Baseline list is made up of hash codes, and does not include the images and videos themselves.
A digital signature is only added to the Baseline list following agreement by three different members
of INTERPOLs specialist network of investigators as meeting strict criteria in terms of the severity of
the image content, for example those believed to feature children aged 13 and under. The strict
criteria ensure that the Baseline list refers only to images and videos which would be considered as
illegal in any country.

Cyber-Attacks: The drumbeats of cyberwarfare have been sounding for years. Network
intrusions are widely viewed as one of the most serious potential national security, public
safety and economic challenges. Technology, in this case, becomes a double-edge sword.
The very technologies that empower us to lead and create also empower individual criminal
hackers, organized criminal groups, terrorist networks and other advanced nations to disrupt
the critical infrastructure that is vital to our economy, commerce, public safety, and military,
the White House says.
The cybersecurity marketplace is flooded with products that promise quick fixes but it is
becoming clear that the increasing persistence and sophistication of attacks will require
solutions beyond the traditional.
Transnational Crime: U.S. defense and law-enforcement agencies see transnational
criminal networks as national security challenges. These groups cause instability and subvert
government institutions through corruption, the administration says. Transnational criminal
organizations have accumulated unprecedented wealth and power through the drug trade,
arms smuggling, human trafficking, and other illicit activities. They extend their reach by
forming alliances with terrorist organizations, government officials, and some state security
services. Even the United States sophisticated surveillance technology is not nearly enough
to counter this threat, officials say

The Future of Cyber-Wars


Army Gen. Keith Alexander, commander of U.S. Cyber Command, sees a day in the not too
distant future when attacks on computer networks cross the line from theft and disruption to
destruction.
And this chaos will not all take place in the digital world of ones and zeroes. He is referring to
remote adversaries taking down infrastructure such as power grids, dams, transportation
systems and other sectors that use computer-based industrial controls.
The last decade has seen mostly exploitation by adversaries, or the theft of money and
intellectual property. Next came distributed denial of service attacks when hackers overwhelm
networks and disrupt operations of businesses or other organizations, Alexander said at a
recent Woodrow Wilson Center panel discussion on cybersecurity.
Other than intercontinental ballistic missiles and acts of terrorism, an adversary seeking to
reach out and harm the United States has only one other option: destructive cyber-attacks,

Alexander said.
This could result in loss of life and damage to the economy on par with what occurred after
9/11.
All of that is within the realm of the possible, he said. I believe that is coming our way. We
have to be out in front of this, Alexander said.
How to thwart such attacks is the problem the nation is facing.
Most of the Internets infrastructure through which malware is delivered is in the private
sectors hands. So too are the banking, energy, transportation and other institutions that are
vulnerable to the attacks.
During the past year, there have been 200 attacks on core critical infrastructures in the
transportation, energy, and communication industries reported to the Department of
Homeland Security, said Sen. Susan Collins, R-Maine, and ranking member of the Senate
Homeland Security and Governmental Affairs Committee.
And that is only the tip of the iceberg. Undoubtedly there are more that have not been
reported, she said during the panel.
In this case, the dots have already been connected. The alarm has already been sounded,
and we know it is only a matter of when, not whether we have a catastrophic attack, she
said.
Alexander, Collins and others are advocating for a more coordinated national effort to share
information on cyberthreats. Cyber Command and the National Security Agency have loads of
expertise, but cant always share classified information, or cross lines when it comes to the
privacy of U.S. citizens. The rest of the federal government has bits and pieces of
information, and different responsibilities. Private sector companies are sometimes reluctant
to disclose attacks for fear of upsetting shareholders or opening themselves up to lawsuits.
Legislation co-sponsored by Collins to help pave the way for better information sharing died
in Congress last summer.
Despite having poured countless amounts of money into cybersecurity on both the federal
and private levels, there is still a lot to be learned about the threat, said one analyst.
Why do we have a cyberwar community? Because we havent mastered cyber, said Martin
Libicki, senior management scientist at Rand Corp. The main problem is that computers were
originally seen as something to be tinkered with, Libicki said.
Weve built the most important infrastructure on things that were made to be toys, said
Libicki. Being toys, computer systems from the start have gaps and vulnerabilities needing to
be patched.
Every cyber-attack is a reflection of some vulnerability in the system, said Libicki.
Greg Giaqunito, an analyst at Forecast International, said its not enough to defend the nation
from attacks, offensive capabilities are required.
Increasingly, the United States is taking more proactive measures against adversaries and
initiating activity, Giaqunito said.

We are actually taking proactive action against other adversaries, so its not only protecting
ourselves, but the U.S. taking more proactive stances and actually initiating some activity
against U.S. adversaries, he said.
Over the next few years, the hackers will become more sophisticated, said Charles Croom,
vice president of cyber security solutions at Lockheed Martin Information Systems & Global
Solutions. This doesnt necessarily mean that the technologies are becoming more advanced
even the most sophisticated threats often use known vulnerabilities and malware, Croom
said but the adversaries have become more effective.
Lockheed Martins Security Intelligence Center has over the last 10 years compiled a
database of patterns and hacking groups. This information can help analysts as they work to
stop threats.
While innovation in technology is important, Croom said the backbone of its security system
is its analysts.
A shortage of network security experts continues to be a problem in both government and
the private sector. Alexander said because of the poor economy, he isnt having a problem
attracting and retaining service personnel and civilian employees to Cyber Command now,
but that wont always be the case. Incentives and bonuses may be needed to retain experts,
he said.
Duke Ayers, program manager of SAICs CyberNEXS initiative, a live-training program that
focuses on cyber education, said, We know that were not developing people fast enough in
cyber or the technical skills. SAIC, along with other partners such as the University of Texas
at San Antonio, developed the CyberNEXS program that gives immediate feedback to
participants as they pursue cyber-education.
Industry, the Defense Department and the Air Force Association have also teamed up to work
on the CyberPatriot program, a nationwide high school-level competition intended to motivate
high school students to get involved in the cybersecurity sector early and to cultivate talent.
Industry has also formed partnerships with academia to help stop attacks. In 2009, Northrop
Grumman started its Cybersecurity Research Consortium, which includes Carnegie Mellon,
MIT and Purdue University. There they investigate the various security threats that face the
economy and national security and work on solutions that can help stop them, said Mike
Papay, vice president of Cyber Initiatives at Northrop Grumman Information Systems.
With cybersecurity, Papay said, government and industry need to work together from the
beginning during the procurement process. This, he said, is one way to reduce costs and
achieve better cybersecurity.
Its not just about acquiring pure cybersystems anymore; its about acquiring UAVs, radars,
ships, etc, where cyber needs to be embedded to ensure mission success. Government and
industry need to consider cyber in almost everything they do, said Papay.
Despite all these initiatives, Collins struck a pessimistic tone, especially when it comes to the
federal governments response.

By Natalie Burg
For breaking and entering, theres local law enforcement. For
corporate fraud, theres the FBI. But who is there for companies
forced to pay a cybercriminal following a ransomware attack?
The scheme has netted more than $200 million this year.
Soon, the answer will be the National Cybersecurity
Intelligence Center in Colorado Springs, Colorado, state officials say.
The public-private project, the first of its kind, will mount a three-pronged attack on cybercrime by
conducting research, helping companies respond to attacks and educating government leaders
how to best prepare and respond.
Awareness of cybercrime by those in government typically doesnt go beyond whats reported in
the news, Colorado Gov. John Hickenlooper said.
And yet, this is an issue that is far more troubling and offers a far greater risk to our country
than most of the things we spend much more time on, he said.
Defense On Three Fronts
The Colorado legislature recently approved spending $8 million to renovate a former Colorado
Springs manufacturing plant that will house the center. The partnership leading the effort
comprises industry executives, nonprofits, government entities and academics.
The center, which could be partially operational as early as the fall, will include three divisions,
each representing a different goal of the center.

The Cyber Institute will educate public officials and executives on how to protect their
technology infrastructures. Understanding the principles of cybercrime is crucial for
them because they are in charge of allocating the funds to protect it. Technology is one of
the black arts, said Michael Marcotte, board chairman and CEO of the Colorado Technology
Association. If youre not a subject matter expert, you know nothing about it.

The Rapid Response Centerwill give organizations the resources and support they need
to fight off an attack and recover. The aim is to mitigate damage sustained by the targeted
business and any customers or business partners caught up in the breach. We have all
learned that we cant do this alone, said Jonathan Trull, chief security advisor and strategist
for Microsoft. Were also hoping to be able to contribute to the efforts of the center and help
governments and commercial enterprises protect, detect and respond to cyberattacks.

The Cyber Research, Education and Training Center, which will analyze data about
cybercrimes, aims to play a critical role helping researchers and companies develop solutions
to fight back. Our adversaries are constantly trying to innovate and find ways to get around
the defenses that were putting in place, Trull said. We definitely hope to consume and
contribute to the research being performed at the center.

The University of Colorado Colorado Springs is a major player in the cybersecurity center, but
perhaps its most visible role will be in education and training. The school will focus on
cybersecurity workforce development, both through degree programs and professional
development initiatives. One of the challenges in cybersecurity is trying to stay ahead of the
curve, said Martin Wood, vice chancellor for university advancement and development for the
University of Colorado Colorado Springs. Trying to keep a trained workforce up to speed is
challenging.
http://www.nationaldefensemagazine.org/archive/2012/november/pages/topfivethreatstonationalse
curityinthecomingdecade.aspx

http://www.forbes.com/sites/colorado/2016/06/10/hackers-beware-national-cybersecurity-centerboots-up-in-colorado/#47726dd177d8

Das könnte Ihnen auch gefallen