iTnews

Cybercrime victims urged to come forward

By Nate Cochrane on Aug 4, 2009 3:41PM
Cybercrime victims urged to come forward

Crimes are 'under-reported', says legal chief.

The same social taboos that cause under-reporting of rapes are behind the reluctance of many organisations to pursue malicious hackers through the courts, the NSW director of public prosecutions told a Sydney symposium today.

Nicholas Cowdery said it's "terribly important" for victims of cybercrime to report it even if they suffered embarrassment by going public.

"Corporations don't want the public embarrassment of coming forward and admitting that their systems were compromised and there was some loss so they won't take the next step," Cowdery told delegates to the eCrime Symposium.

Cowdery said legislators and law enforcement should consider if under-age offenders should face adult penalties if the results of their hacking had serious consequences.

He pointed to the constant rate of about 100 murders a year in NSW over the past 100 years as evidence there would always be some online criminal activity but the goal was to "try to keep it within acceptable bounds".

But he shot down the notion that a national internet content filter was a useful tool to stem online fraud.

"Crime prevention methods that are put forward or suggested need first to be practical," Cowdery said.

"Talk[ing] of filters and blocking mechanisms - I think ultimately in a society like ours, in contrast with China, are going to have very limited if any success in achieving the aims that the proponents set out for them.

"By all means let's examine ways in which offending can be limited but we have to do it within the context of our legal system, philosophy, values we hold dear such as freedom of ... association, freedom of communication and try to get the right balance."

Nate Cochrane @natecochrane is tweeting live from the eCrime Symposium.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
cowderycybercrimeecrimefilteringinternetnswsecuritysymposium

Partner Content

Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project
Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Nate Cochrane
Aug 4 2009
3:41PM
0 Comments

Related Articles

  • Victorians lost $31.9 million to business email compromise in 2021
  • APNIC moves to block BGP fat-thumb outages
  • Service NSW shortlists face matching tech for identity verification
  • US spy agency probes sabotage of satellite internet
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

Macquarie Bank creates a broker portal on Salesforce

Macquarie Bank creates a broker portal on Salesforce

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Digital Nation

Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.