Business Standard

HOW TO CATCH CYBERCRIMI­NALS? OLD-SCHOOL SLEUTHING, WITH A DIGITAL TWIST

- KATRIN BENNHOLD & MARK SCOTT

Bank robbers wear masks and escape in vans with stolen license plates. Kidnappers compose ransom letters from newsprint to elude handwritin­g experts. Burglars target houses with the upstairs window ajar. Cybercrimi­nals do much the same. They hide behind software that obscures their identity and leads investigat­ors to look in countries far from their actual hide-outs. They kidnap data and hold it hostage. And they target the most vulnerable companies and people whose informatio­n is poorly protected.

Cybercrime­s, like the global ransomware attack that began on Friday and has affected hundreds of thousands of computers in more than 150 countries, are in a way an updated version of ancient criminal methods.

And in the global search for the criminals that continued on Sunday, investigat­ors are following much the same process that detectives in the physical world have used for decades: Secure the crime scene, collect forensic evidence and try to trace the clues back to the perpetrato­r. But for all of their similariti­es to traditiona­l crimes, cyberattac­ks have major digital twists that can make them much harder to solve and can greatly magnify the damage done.

The latest attack has claimed at least 200,000 victims worldwide, according to an estimate on Sunday by Europol, Europe’s police agency, and new variants of the malware are emerging, leading security experts to warn that the fallout could spread as people return to work on Monday.

Such a large, complex and global crime outbreak means any hope of a successful investigat­ion will require close teamwork among internatio­nal law enforcemen­t agencies — like the FBI, Scotland Yard and security officials in China and Russia — often wary of sharing informatio­n with one another.

“With cybercrime, you can operate globally without ever having to leave your home,” said Brian Lord, a former deputy director for intelligen­ce and cyber operations at Government Communicat­ions Headquarte­rs, Britain’s equivalent of the National Security Agency. “Catching who did this is going to be very hard, and will require a level of internatio­nal cooperatio­n from law enforcemen­t that does not come naturally.” The only institutio­nal arrangemen­t for internatio­nal cooperatio­n on cybercrime is the so-called Budapest Convention, whose membership is largely restricted to Western democracie­s, said Nigel Inkster, a former assistant chief of Britain’s secret intelligen­ce service, MI6.

Authoritar­ian states such as Russia and China have refused to sign on to the agreement because it permits the digital equivalent of hot pursuit: A police force investigat­ing a cybercrime can access networks in other jurisdicti­ons without first seeking permission.

“Any investigat­ion of the recent ransomware attack will have to be done by a coalition of the willing,” Inkster said.

There are signs a coalition is coming together, at least in parts of the internatio­nal system. Europol said its team of cybersecur­ity specialist­s — made up of agents from countries like Germany, Britain and the United States — was investigat­ing the attack.

Europe and Asia were the regions most affected by the crime, with hospitals, car plants and even the Russian Ministry of Interior falling prey to the malware, which takes over a computer, locks down the machine and releases it only when the owner has paid a ransom.

Hours after the attack was first reported in Britain, where the computer systems of the National Health Service were crippled, law enforcemen­t agencies across Europe, Asia and the United States began looking for clues that could trace the assault to specific people or organisati­ons.

As with a physical crime scene, the first step with any cyber investigat­ion is to make sure the criminal is no longer hiding out, about to pounce again.

“Before we get into who did it, we try to figure out if the bad guys still have access,” said Theresa Payton, a former chief informatio­n officer of the White House and founder of Fortalice, a cybersecur­ity firm. “Are they still hiding? Are they going to come back tomorrow? Is the door that let them in still ajar? Can they inflict more pain?”

“And if so, where are they?” she added. “How do we cordon them off to mitigate further damages?”

©2017 The New York Times News Service

 ?? PHOTO: REUTERS ?? Such a large and complex crime outbreak will require close teamwork among internatio­nal law enforcemen­t agencies for a successful investigat­ion
PHOTO: REUTERS Such a large and complex crime outbreak will require close teamwork among internatio­nal law enforcemen­t agencies for a successful investigat­ion

Newspapers in English

Newspapers from India