Crime in cyberspace is known now as an International issue and most contries are busy to finda way to fight it back in a legal sytem,
Following is a translation about how Dutch Police fight CyberCrime
"Digital Blue ... Getting started with digital Inspecting!" Under this slogan was launched by the Board of Police Commissioners in mid-2001 the National Action Plan, that knowledge of digital detection across police should increase. Besides the seven inter-regional expertise’s digital agencies already working with the police, the coming years the expertise at the regional level significantly expanded.
In each of the 25 regional police forces are all trained police officers generally, there are more skilled investigators and IT specialists, and there will be more use of external expertise. The national unity in the National Police Services (Cyber Cops) already on the Internet surveilleert, get a final status. The prosecution is preparing for these developments. Pilot programs are launched to the public prosecutor's expertise to build. And for the investigation and prosecution may ask the officers in the near future, contact a national ICT expertise.
In this article I take you along on a virtual trip inside the fascinating and dynamic world of digital Inspecting. It is a relatively new field for the Dutch police. Crime in cyberspace has many faces. Whoever thinks that such crime only to do with the Internet is quickly disappointed. The same goes for those who think that modernity does his nose at will. Thus, we must simultaneously consider whether there is a new era and that "cyberspace" is something other than "real space" where other rules of law should apply.
Was it a half ago to a question whether someone had an email address, today it is almost as common as asking for a mobile phone. Who have never looked on the Internet or e-mail sent, may feel comfortable to ask whether he or she is the future ICT developments will still be able to keep. It is likely therefore a growing gap to emerge between the 'digiweters' and 'digital divide' within Dutch society and beyond.
The 'fourth' dimension
Besides the land, water and air is fourth dimension in our lives come and the virtual world with its electronic highways. Information networks - and the Internet in particular - are the backbone of the modern information society. Pressure groups are preparing for their actions and companies are finding their suppliers and customers. For the citizen it is a source of knowledge, entertainment and sometimes destruction.
The dependence on information networks also brings new social risks with it.In the first place on the digital plane.Of intrusions into computer systems, spreading viruses and forms of destruction. Think of "denial of service attacks", "Trojan horses", "logic bombs", etc. In addition, information networks to traditional crimes to commit, such as property crimes (fraud, money laundering), expressed offenses (child pornography and discrimination) and copyright offenses. These are more traditional crimes in a new digital jacket.
It appears that the interest of criminals to use the latest communication and computer systems has increased significantly in recent years. Whether it's seasoned hackers or fraudsters sly even without knowledge of ICT skillful use of the knowledge of others to their impact on the electronic highway to save it.
Many vital societal functions are more or less dependent on IT, banks, energy, hospitals, defense, police and judiciary. In fact, a current social life is unthinkable without ICT. Activities in the field of cyber-vandalism and cyber terrorism demonstrate the vulnerabilities of the spine to The Internet, in practice an effective means to carry out terrorist activities, which could lead to a true "information war."
The attacks on September 11 in America have made it clear those terrorists in their preparation and execution of transactions skillful use of the electronic highway. Request it by email by possible perpetrators of the terrorist attack in order to take lessons at a flight school there is a good example. However, the invisibilities technics (steganography) believed applied to secret information invisible to incorporate into electronic files when sending messages to each other, shows those terrorist groups like bin Laden who use the most modern information and communication. The massive FBI investigation and that of intelligence and security immediately after the attacks have therefore played an important part in a world of bits and bytes. Not be excluded that even terrorists from the West in its most vital place to get information: the information networks.
Or, in a society where we increasingly face the dark side of the information, the organization of the Police and Justice increasingly detection technical knowledge of information and communication technology (ICT) within the regular work processes bring.
Rural Digital Project Inspecting
The National Digital Project Inspecting on July 1, 2001 officially started, is currently busy with the implementation process of digital Inspecting. It is developing a model implementation plan for regional forces and the development of general and specialist training modules for the 2002 new police education top priority. Work is ongoing to build a Police Knowledge net site and content is given to the development of innovative digital investigative tools and techniques for the period 2002-2003.In some major projects working closely with industry and science. The structure plan aims to one year cycle in which all major and minor development projects are based on practical needs.
It is also an anti-hacker unit was operated for a decisive and effective action in emergencies where critical IT infrastructures deliberately targeted by hackers or crackers (destructive hackers).
The nationwide project Exist out 10 people. The key strategic partners from the police and OM are represented in field. Thus, the team consists of a prosecutor of the National Prosecution Service, Mr. Mr. Stein and his managers by the LSOP, NFI digital technology division, KPLD, the regional police forces and the Ministry of Interior.
In addition, from the police side firm worked with the Department of Digital Technology of the Dutch Forensic Institute, the Ministry of Justice, the Prosecutor and the special investigative services (FIOD, ECD, etc.) but also the Royal Military Police, the Federal and other partners of the Police in this area.
Figure 1 is a schematic overview of the political strategy in the National Action Digital Inspecting together with the (6) main lines of action and priorities.
Worldwide, over time many initiatives and policy proposals launched to focus on information and communication technology (ICT) and crime higher on the agenda to bring.Thus alerted to the activities of the G8 countries, where the High Tech Crime Group "is working on far-reaching forms of cooperation on combating cyber-crime. Initiatives in the U.S. in setting up a "National Critical Infrastructure Protection Centre" and the creation of an 'International Fraud Complaint Center in cooperation with the FBI underlines this need.
The EU has the issue high on its agenda. In addition, the Council of Europe in the project "Crime in Cyberspace" under the Dutch presidency of an international treaty, including countries like the United States, Canada, Japan and Australia are involved. And of course Interpol for some years actively working with the Information Technology and Crime and maintains an international network of 24-hour contact (National Central Reference Points) for a rapid response to cyber-crime incidents. Without doubt this is a growth market.
The how and why digital Inspecting
The increasing use of information and communication technology (ICT) accounts for a major part of future society. Information networks provide a whole new virtual infrastructure. Such technologies make the digital world economy, doing business via the Internet, one-on-one communication between business and consumers, etc. And a century old law will continue to apply New Economy. Where financial gain is achieved, will criminals and crooks are. In addition, mobile phones and the Internet contributed to extensive networks of relations arose. Society is thus more complex. In operational studies is therefore increasingly difficult to gauge who is who maintains any relationship.
Anything figures to get an idea of growth of Internet use. It currently has some 400 million Internet users, including about 10 million Dutch. Of all 36 countries included in the second global e-commerce research in June 2001 was established by the NIPO, Netherlands takes one of the highest positions in the field of Internet.
Norway and Denmark have the highest percentage of Internet users worldwide with 63% and 62%. These Nordic countries are closely followed by the North American countries Canada (60%) and the United States (57%). Netherlands is in fifth place with over half (52%) of the Dutch population of 16 years or older in the month of the study at home or elsewhere has used the Internet. Netherlands leaves Germany (34%) and France (30%) far behind. Compared to a similar survey made in 2000, Internet use grew by 6% in the Netherlands.
Revenues for global E-commerce consumer transactions in 1995 was 0.5 billion U.S. dollars. In 1998 it was already 15 billion U.S. dollars. In 2000 it is expected that this will amount to more than 25 billion. In the year 1997 the prospects for 2005 are expected in the last 76 billion U.S. dollar sales through the Internet and the highest expected 186 billion. In the year 1998, these expectations have adjusted to a lower expectation in 2005 of 100 billion U.S. dollars to a maximum forecast of 475 billion U.S. dollars.
All impressive numbers, but very real and need to get some idea about the scale and the fact that the Dutch borders do not exist on the Internet. For example, many Internet Payments from our country by the Dutch in particular place abroad. We also have some in the Netherlands accepting credit card companies, many international transactions processed (think sex-site operators)
In 1950, bank robber Willie Sutton, the American asked why he robbed banks. His answer was short and sweet: "Because, that's ... Where the money is!" With the advent of e-commerce and electronic commerce will rule as simple direction.
With the ICT revolution should move along with police and judiciary as an organization, and adapt. It should be monitored for adverse effects that one's own image crime entails. These include:
n Traditional offenses quickly and can be anonymous committed fraud, racism, corporate espionage, distributing child pornography or gambling via the Internet.
n New crimes: abuse of smartcard technology, abuse of mobile phones, hacking into computer networks, systems with a vital function destruction (infrastructure / economics), identity theft, stalking the Internet, etc.
n More effective and efficient management of criminal networks: techniques to counter surveillance, interception of digital communications, packaging of information in illustrations, audio, infiltration into telecom companies and providers aimed at creating its own telecom network and shielding structures.
n Vulnerability of large networks for fraudulent use of inside: where is (thus IJzerman) the Electronic Highway Police, which oversees an Electronic Highway by a government set standards?
The information age means that people across borders to work, have access to another's computer infrastructure and therefore may change or horizontally. The information on a network is not secure, just as the infrastructure itself. There will always be opponents on the lookout for information to intercept some of the means to disable and / or operations to fail. Such forms of obstruction of the job performance are often highlighted under 'techno anarchy "or" techno crime.
To detect bottlenecks
The above crime and social developments resulting from the massive use of ICT applications in society creates new bottlenecks in the investigation.
n progressing digitalization - It means that evidence will soon have almost exclusively as data stored in computer systems. Work is already in practice at major financial investigations almost no more paper records were seized, but research done within company networks and computer systems of financial (accounting) firms.
n Anonymity - Increasing numbers of crimes committed via the electronic highway by using anonymous e-commerce services. So are widely hacker tools and special software on the internet available to fully anonymous digital life to go and any digital tracks.
n Direct and rapid communication - Distance and borders play no role. Through mobile devices (phones, personal organizers, laptops) and emerging wireless communication applications are criminals at anytime and anywhere in the world had become accessible.
n A variety of communications - mail, voice, telephone, data (GSM, UMTS, GPRS, Satellite, WAP, SMS, Bluetooth, etc.), Internet access by cable. All these new features make the police more and more new problems (ie, greater challenges) when it comes to gathering evidence or conducting special investigative powers.
n Meet Start criminals - The suspect, but the witness and the victim know more of ICT. With the advent of ICT in society is also the profession in the Netherlands in size From a system developer to PC vendor. In more and more studies show that the fraudster, or pedophile drugs carrier know the potential of ICT use, in addition to criminal activity because he also 'normal' in the ICT sector.
n A large gap - There is a huge gap to be created in which crimes committed via the electronic highway to lie, because the knowledge of the local districts to missing declarations to be included.
n Globalizing operation of IT Crime - Information networks have no physical boundaries, making ICT-related crime will soon cross.
What is digital Inspecting?
Digital Inspecting can be defined as the detection and prosecution of criminal offenses and / or punishable acts committed under the influence or using any form of information and communication technology. "
Digital Inspecting is not a new detection method is to add the arsenal. It is more than able to secure evidence from a listening watch on a computer or fax or phone. Digital Inspecting includes:
n Digital intelligence
n Internet Surveillance
n The Inspecting computer to find incriminating (digital) certificate
n Forensic ICT research data carriers (hard disks, PDAs, mobile phones, palmtops, smart cards, embedded hardware, etc.)
n Interception data communications
n Detection in telecommunication networks
n Forensic research data in corporate networks
n The reconstruction of ICT and digital trace evidence at crime scene
n Hearing of suspects, witnesses, informants and victims with ICT expertise (to include declarations, statements, etc.)
n Execute tactical research with ICT knowledge in multidisciplinary teams alongside traditional counterparts (murder, sex, fraud, environmental, etc.)
Magnitude of the problem
The current and future expected level of abuse in relation to ICT and Internet is not exactly it. However there are significant indications from the U.S. and are known to experts worldwide agree that the level of risk behavior using ICT will increase. This alone is the real expectation that the use of Internet and modern future ICT innovations will systematically continue. Also, increased risks created by such increase in the number of financial transactions. In addition, the need for more computer networks to connect them, increase the likelihood of attackers from "outside" to invade.
Besides the sounds from the field to the few available statistics show that the vulnerability of the Internet an increasingly urgent problem.
Figure 2 shows the increase in the number of reported incidents (sisnds) the establishment of the Computer Emergency Response Team Coordination Center (CERT / CC) shown This center coordinates the fight on short notice and handle large-scale computer break-ins, computer viruses and other attacks on computer systems and networks connected to the Internet.
The fifth annual study by computer security firms, the American Society for Industrial Security (ASIS) conducted jointly with PricewaterhouseCoopers, shows that in 1999 businesses more than $ 45,000,000,000 have lost as a result of information theft. PricewaterhouseCoopers calculated earlier that same damage as a result of committing fraud via the Internet worldwide in 1998 totaled over 33 billion U.S. dollars, while the same agency the injury in 1996 would be zero.
Employer reunification, VNO-NCW underestimated the damage the "I Love You" virus in the Netherlands has done to 50 million guilders. The loss of productivity and costs companies make software to repair the damage in most.
Such calculations are expected to explain only a fraction of the actual loss exposure. It appears that many companies and governments - in connection with possible loss of image - not willing to declare. By governments and businesses are predominantly chosen for 'private justice', the internally (without involving police and the courts) handling emergencies.
The law in Cyberspace
Is there a difference in the legal system in the real world? That question also became Professor H. Franks in his farewell speech at Leiden University on September 14, 2001. Problems encountered as we have seen taking to do are:
n The actual identity of users is difficult to establish because total anonymity in cyberspace is possible (virtual invisibility).
n The competence of authorities lacking, because no single jurisdiction can be granted. "Bits Know No Borders" and the route they travel, not by people.
n The message content is volatile and therefore changeable (a proof problem).
n The turbulence of the technique, because significant changes can occur very quickly, are regulated and defensive shortcomings.
This all is not insignificant when you consider that any policeman or woman after committing a first offense is looking for 'who', 'what', 'when', 'true' and 'how'.
In cyberspace nobody knows you're a dog. There is only one known address of a computer without knowing by whom, where, who, where and what kind of data are sent. Offenders and offenders on the rights of others are thus little or no trace.
Frank, I believe that we are not confronted with another world. They are still people who sit behind the buttons. We will be in a different era with a different regime. Thus, the computer programmer today the road along which you can walk and the way opened or closed. In fact, he / she determine it is possible or not, or rather, what may or may not and should. William Mitchell says: "That the software and hardware make cyberspace what it is, Regulate cyberspace as it is. Thus we see in cyberspace - a community, not just based on a natural order, but devised by man and by a large number of people made - indeed forms of organization.
To a certain degree of freedom to achieve a certain degree of planning by the government also needed. Internet users in the first hour especially anarchism have high priority and are themselves prefer to see it as public enemy number 1 will obviously disagree with this statement. But, even in cyberspace is "true freedom listens to the laws".
In the context of search and social (digital) security will for that reason always trade-offs between the interests of citizens from the real and the virtual world and between the private and public domain are needed.
In short, let us before it's too late to join forces and mobilize in the backdrop of rapidly emerging digital information