Why Is It So Difficult To Convict Cyber Criminals?

Hacking and ransomware cyber attacks and are now constant and these crimes are increasing. The current figures suggest that there has been earnings of $860bn from online criminal markets. But police and law enforcement often fail to bring these criminals to justice., even when suspects are caught, it is often rare for cases to result in convictions.

Currently for most police forces there is a lack of cyber sophistication. Also, most cyber crime originates from abroad, with China, Russia and the USA among the top offenders. Not only does this make it more difficult to identify hackers, it means the police can't apprehend them without appropriate authorisation, which is often very difficult.

It might be mutually beneficial for governments to work together to help reduce cyber crime, but that does not often happen. Most countries don’t like leaving their citizens at the mercy of foreign justice systems, and without extradition treaties in place, the authorities in other countries tend to be uncooperative. Another problem is that a good proportion of cyber crime is government sponsored.

Cyber criminals often go to great lengths to hide their identity and their location. As well as using online pseudonyms known as ‘handles’, they will often do business on the Dark Web, which makes it hard to track them. 

Cyber-crime is big business - Surrey University has estimated that in 2018 that the global criminal profit total was $1.5 trillion. With so much money to be made and so little chance of being caught, it’s easy to see how cyber-crime is likely to thrive in future. For businesses, that means protecting themselves is going to be ever more important. In addition to cybersecurity and disaster recovery technology, firms should also give consideration to cyber insurance, which can help to recover any financial losses incurred through breaches.

If cyber crime were a country, then it would have the 13th highest Gross Domestic Profit (GDP) in the world, according to the study commissioned by virtualisation-based security firm Bromium.

There are too many cybersecurity incidents and too little law enforcement resources available to keep up with the crime. To add more complexity to the issue, there are jurisdictional boundaries that prevent criminals from being prosecuted. Due to legislative changes such as the GDPR, law enforcement may be denied access to data or may only be able to access very limited data as part of a criminal investigation.

Increasing technological development and internet use also presents a challenge for law enforcement, resulting in extremely large amounts of data where it is difficult to distinguish a specific user.

For police there is a real problem hiring officers with the technical expertise needed for these complex investigations and this is becoming a major obstacle, however, things are beginning to change. Recently more than 800 criminals have been arrested by the FBI in an organised crime sting. This was done by the FBI using an encrypted data operation and agencies made arrests in 18 countries, including the USA, UK, Germany, Sweden, Australia, New Zealand and the Netherlands.

Surrey University:     CCRC:       Cipher:     TMB:     Computer Weekly:    ITPro

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Protecting Critical Infrastructure
Cyber Attacks Are The New Cold War »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

CyberQP

CyberQP

CyberQP (formerly Quickpass Cybersecurity) provide Privileged Access Management built for MSPs. Our system is designed to reduce ransomware and social engineering attack risks.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Readynez

Readynez

Readynez is the digital skills concierge service that helps you ensure your workforce has the tech skills and resources needed to stay ahead of the digital curve.