Why Is It So Difficult To Convict Cyber Criminals?

Hacking and ransomware cyber attacks and are now constant and these crimes are increasing. The current figures suggest that there has been earnings of $860bn from online criminal markets. But police and law enforcement often fail to bring these criminals to justice., even when suspects are caught, it is often rare for cases to result in convictions.

Currently for most police forces there is a lack of cyber sophistication. Also, most cyber crime originates from abroad, with China, Russia and the USA among the top offenders. Not only does this make it more difficult to identify hackers, it means the police can't apprehend them without appropriate authorisation, which is often very difficult.

It might be mutually beneficial for governments to work together to help reduce cyber crime, but that does not often happen. Most countries don’t like leaving their citizens at the mercy of foreign justice systems, and without extradition treaties in place, the authorities in other countries tend to be uncooperative. Another problem is that a good proportion of cyber crime is government sponsored.

Cyber criminals often go to great lengths to hide their identity and their location. As well as using online pseudonyms known as ‘handles’, they will often do business on the Dark Web, which makes it hard to track them. 

Cyber-crime is big business - Surrey University has estimated that in 2018 that the global criminal profit total was $1.5 trillion. With so much money to be made and so little chance of being caught, it’s easy to see how cyber-crime is likely to thrive in future. For businesses, that means protecting themselves is going to be ever more important. In addition to cybersecurity and disaster recovery technology, firms should also give consideration to cyber insurance, which can help to recover any financial losses incurred through breaches.

If cyber crime were a country, then it would have the 13th highest Gross Domestic Profit (GDP) in the world, according to the study commissioned by virtualisation-based security firm Bromium.

There are too many cybersecurity incidents and too little law enforcement resources available to keep up with the crime. To add more complexity to the issue, there are jurisdictional boundaries that prevent criminals from being prosecuted. Due to legislative changes such as the GDPR, law enforcement may be denied access to data or may only be able to access very limited data as part of a criminal investigation.

Increasing technological development and internet use also presents a challenge for law enforcement, resulting in extremely large amounts of data where it is difficult to distinguish a specific user.

For police there is a real problem hiring officers with the technical expertise needed for these complex investigations and this is becoming a major obstacle, however, things are beginning to change. Recently more than 800 criminals have been arrested by the FBI in an organised crime sting. This was done by the FBI using an encrypted data operation and agencies made arrests in 18 countries, including the USA, UK, Germany, Sweden, Australia, New Zealand and the Netherlands.

Surrey University:     CCRC:       Cipher:     TMB:     Computer Weekly:    ITPro

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Protecting Critical Infrastructure
Cyber Attacks Are The New Cold War »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

MER Group

MER Group

MER Group is a world-leading solutions provider specializing in Homeland Security (HLS), Cyber and Intelligence, Communication Infrastructure and Tactical Communication Systems.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

FutureRange

FutureRange

Specialising in IT Managed Services, Cybersecurity and Digital Transformation, FutureRange experts provide professional IT services for clients throughout Ireland and beyond.