Hacker attacks on company computer systems are increasing. Specialists say that around 98 percent of cases are discovered by chance. The number of unreported cases is believed to be high.
Security adviser Christoph Fischer says that, by the time the intrusion has been discovered, heavy financial damage has already been caused.
Sandra Frings, of the Fraun-hofer Institute's IAO branch say crime fighting is faced with completely new challenges which it is having trouble adjusting to.
Many firms, after finding they are the victims of a hacker attack, are at a loss about how to get on the trail of the hackers and bringing them to book, she adds.
The IAO is involved in a EU-backed project to draw up guidelines to help firms.
One specialist says the guidelines will be aimed at helping firms to recognize criminal Internet transactions and to cope with them.
Emphasis is given to working with prosecutors, police and information technology (IT) security specialists. The central issue is securing electronic evidence and turning it into legally usable evidence.
Fischer says a classic example of cyber crime is when one firm gains access to the lowest acceptable price a construction firm is prepared to tender for a project, and then underbids it to get the order.
Frings believes that, aside from the search for technical solutions, police and prosecution must become more aware of the problem. Many police officers were not in a position to technically assess computer log files. Sometimes, there was a lack of understanding about the damage caused by the attacks, she adds.
This is also Fischer's experience. He says that justice officials can much better understand when files are stolen than when a data bank is downloaded with the click of a mouse.
"It is not that the feeling for Internet crime is missing, more that there is no compulsion to act quickly," Fischer says.
Bureaucracy acts far too sluggishly, sometimes weeks, he says. This gives time for the hacker to delete clues, and firms time to delete them as well, accidentally. Fisher proposes that a prosecution unit be set up to deal with high-tech crime.
Peter Klee, a specialist with IBM Global Services, says the number of unreported cases is "gigantic."
This is because, in many cases, firms prefer to deal with attacks internally so weaknesses in their system are not made public and to avoid a consequent harm to their reputation.
"Successful hackers often do not use unusual techniques. They simply use tricks to persuade employees to reveal passwords," Klee said.
Physically finding the whereabouts of hackers is almost impossible, the specialists agree.
They are nimble at eliminating traces, they operate from other countries, and work more quickly than their pursuers.
Frings says that getting on a trail of the hackers by technical means is one thing. Arresting them and bringing them to book is another.
Fischer says many cases do not even come before the courts because the justice system is overloaded. Some firms withdraw charges are deal with the problem internally.
The EU guidelines being prepared are also designed to assist to cope with different laws in different countries.
A Chinese aircraft carrier group entered Japan’s economic waters over the weekend, before exiting to conduct drills involving fighter jets, the Japanese Ministry of Defense said yesterday. The Liaoning aircraft carrier, two missile destroyers and one fast combat supply ship sailed about 300km southwest of Japan’s easternmost island of Minamitori on Saturday, a ministry statement said. It was the first time a Chinese aircraft carrier had entered that part of Japan’s exclusive economic zone (EEZ), a ministry spokesman said. “We think the Chinese military is trying to improve its operational capability and ability to conduct operations in distant areas,” the spokesman said. China’s growing
Nine retired generals from Taiwan, Japan and the US have been invited to participate in a tabletop exercise hosted by the Taipei School of Economics and Political Science Foundation tomorrow and Wednesday that simulates a potential Chinese invasion of Taiwan in 2030, the foundation said yesterday. The five retired Taiwanese generals would include retired admiral Lee Hsi-min (李喜明), joined by retired US Navy admiral Michael Mullen and former chief of staff of the Japan Self-Defense Forces general Shigeru Iwasaki, it said. The simulation aims to offer strategic insights into regional security and peace in the Taiwan Strait, it added. Foundation chair Huang Huang-hsiung
PUBLIC WARNING: The two students had been tricked into going to Hong Kong for a ‘high-paying’ job, which sent them to a scam center in Cambodia Police warned the public not to trust job advertisements touting high pay abroad following the return of two college students over the weekend who had been trafficked and forced to work at a cyberscam center in Cambodia. The two victims, surnamed Lee (李), 18, and Lin (林), 19, were interviewed by police after landing in Taiwan on Saturday. Taichung’s Chingshui Police Precinct said in a statement yesterday that the two students are good friends, and Lin had suspended her studies after seeing the ad promising good pay to work in Hong Kong. Lee’s grandfather on Thursday reported to police that Lee had sent
BUILDUP: US General Dan Caine said Chinese military maneuvers are not routine exercises, but instead are ‘rehearsals for a forced unification’ with Taiwan China poses an increasingly aggressive threat to the US and deterring Beijing is the Pentagon’s top regional priority amid its rapid military buildup and invasion drills near Taiwan, US Secretary of Defense Pete Hegseth said on Tuesday. “Our pacing threat is communist China,” Hegseth told the US House of Representatives Appropriations Subcommittee on Defense during an oversight hearing with US General Dan Caine, chairman of the Joint Chiefs of Staff. “Beijing is preparing for war in the Indo-Pacific as part of its broader strategy to dominate that region and then the world,” Hegseth said, adding that if it succeeds, it could derail