AusCERT2012: Infosec militia should help cyber cops

Powered by SC Magazine
 

Private sector bolsters efforts by under-resourced police.

Under-resourced police could turn to civilian militia to help fight cybercrime, according to former Queensland University of Technology professor Bill Caelli.

Speaking to SC Magazine ahead of his presentation at the AusCERT 2012 infosec conference this week, Caelli raised the notion as a means of using security professionals to assist authorities in fighting cybercrime.

The concept dates back more than 100 years, when the civilian groups were used in both Australia and the US to ensure public safety. Able-bodied and firearm-trained men would be recruited by sheriffs to assist authorities in arresting felons.

Complete coverage of AusCERT 2012

The powers to form such groups still exist and reside in agencies such as the Office of the Sheriff of NSW and, according to Caelli, such powers are an apt fit for local attempts to dispel online attacks.

“The local police can't be experts in everything,” Caelli said.

“They can't all be experts in Android for example.”

Such specific skillsets already exist within the private sector and a posse of security professionals could help improve cybercrime investigations.

He says authorities in Estonia were already co-opting private sector security experts.

Similarly, security firms and researchers have for years done the heavy-lifting in collecting evidence to take-down botnets, and fraud and child exploitation networks, providing evidence to law enforcement for action.

Moreover, Caelli pointed out that internet service providers were already a form of information security militia. Under the voluntary iCode framework, telcos are required to monitor their networks for malicious traffic sprouting from customer machines. They then would need to help customers remove infections.

Also speaking at AusCERT 2012, F-Secure chief research officer Mikko Hypponen pointed out the difficulty in providing support to governments on cybersecurity matters while sovereign powers built their own ability to distribute exploits and trojans aimed at their own constituents.

Copyright © SC Magazine, Australia


AusCERT2012: Infosec militia should help cyber cops
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 426

Vote