Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not an Insider? Subscribe now for unlimited access to online articles.

Intelligent Machines

Global Gridlock on Cyber Crime

  • by David Talbot
  • June 22, 2010
  • Cross-border cyber attacks suspected to originate from North Korea sparked bitter protests from South Koreans last year.

The first international treaty on fighting cyber crime went into effect six years ago. Called the European Convention on Cybercrime, it aims to make different country’s laws compatible and promote investigative coöperation. But progress has stalled.

Just 30 nations, including the United States, have ratified the treaty. China and Brazil haven’t even signed it. Most troubling is that Russia–which the Internet infrastructure company Akamai identifies as the leading source of computer attacks as of late 2009–has also refused to sign. Russia objects to a provision that would let foreign investigators bypass governments and work directly with network operators.

In the face of all these delays, criminal threats continue to evolve. Cloud computing, in particular, makes it easy to move data across borders and obscure the true origin of attacks. Some European politicians say that the European Union should create a cyber security czar. Other experts think countries should just work out agreements one on one. “We need to cut deals with countries we have problems with, not pursue a general convention which requires ratification in many countries,” says Veni Markovski, who ran an Internet service provider in Bulgaria and is the representative to Russia from ICANN, the organization that assigns Internet domain names.

This story is part of our July/August 2010 Issue
See the rest of the issue
Subscribe

Representatives from the major nations have gathered several times recently for talks that could lead to bilateral agreements. Without one we’re all less secure, because cyber criminals know they can wage attacks without getting caught, says Charles Barry, senior research fellow at the Center for Technology and National Security Policy at the National Defense University in Washington, DC. “Agreement among at least the major cyber players on what constitutes illicit behavior should be a high priority,” he says.

Tech Obsessive?
Become an Insider to get the story behind the story — and before anyone else.

Subscribe today

Uh oh–you've read all of your free articles for this month.

Insider Premium
$179.95/yr US PRICE

More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe to Insider Basic.
  • Insider Basic {! insider.prices.basic !}*

    {! insider.display.menuOptionsLabel !}

    Six issues of our award winning print magazine, unlimited online access plus The Download with the top tech stories delivered daily to your inbox.

    See details+

    What's Included

    Unlimited 24/7 access to MIT Technology Review’s website

    The Download: our daily newsletter of what's important in technology and innovation

    Bimonthly print magazine (6 issues per year)

/
You've read all of your free articles this month. This is your last free article this month. You've read of free articles this month. or  for unlimited online access.