Why Is It So Difficult To Convict Cyber Criminals?

Hacking and ransomware cyber attacks and are now constant and these crimes are increasing. The current figures suggest that there has been earnings of $860bn from online criminal markets. But police and law enforcement often fail to bring these criminals to justice., even when suspects are caught, it is often rare for cases to result in convictions.

Currently for most police forces there is a lack of cyber sophistication. Also, most cyber crime originates from abroad, with China, Russia and the USA among the top offenders. Not only does this make it more difficult to identify hackers, it means the police can't apprehend them without appropriate authorisation, which is often very difficult.

It might be mutually beneficial for governments to work together to help reduce cyber crime, but that does not often happen. Most countries don’t like leaving their citizens at the mercy of foreign justice systems, and without extradition treaties in place, the authorities in other countries tend to be uncooperative. Another problem is that a good proportion of cyber crime is government sponsored.

Cyber criminals often go to great lengths to hide their identity and their location. As well as using online pseudonyms known as ‘handles’, they will often do business on the Dark Web, which makes it hard to track them. 

Cyber-crime is big business - Surrey University has estimated that in 2018 that the global criminal profit total was $1.5 trillion. With so much money to be made and so little chance of being caught, it’s easy to see how cyber-crime is likely to thrive in future. For businesses, that means protecting themselves is going to be ever more important. In addition to cybersecurity and disaster recovery technology, firms should also give consideration to cyber insurance, which can help to recover any financial losses incurred through breaches.

If cyber crime were a country, then it would have the 13th highest Gross Domestic Profit (GDP) in the world, according to the study commissioned by virtualisation-based security firm Bromium.

There are too many cybersecurity incidents and too little law enforcement resources available to keep up with the crime. To add more complexity to the issue, there are jurisdictional boundaries that prevent criminals from being prosecuted. Due to legislative changes such as the GDPR, law enforcement may be denied access to data or may only be able to access very limited data as part of a criminal investigation.

Increasing technological development and internet use also presents a challenge for law enforcement, resulting in extremely large amounts of data where it is difficult to distinguish a specific user.

For police there is a real problem hiring officers with the technical expertise needed for these complex investigations and this is becoming a major obstacle, however, things are beginning to change. Recently more than 800 criminals have been arrested by the FBI in an organised crime sting. This was done by the FBI using an encrypted data operation and agencies made arrests in 18 countries, including the USA, UK, Germany, Sweden, Australia, New Zealand and the Netherlands.

Surrey University:     CCRC:       Cipher:     TMB:     Computer Weekly:    ITPro

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Protecting Critical Infrastructure
Cyber Attacks Are The New Cold War »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

UMCA Technologies

UMCA Technologies

UMCA Technologies provide an AI-based solution that helps financial institutions reduce and block fraudulent financial transactions and prevent account takeovers in real time.