This is just an example, but people here are beggining to look at the possibility that the UK will try to stop sending its citizens abroad to be tried for similar crimes -something unthinkable in most European countries.
@mejiac, absolutely. The thing is, too, that that's just one example of the kind of thing we're dealing with - it could get a lot worse than that, especially given a few years for cloud and the like to develop! Those steps (or their equivalence) could happen in any order, and solving that specific puzzle doesn't help international law organizations all that much.
Even if one country has it figured out, that doesn't help us when that country isn't involved in a given case. Not only do the laws need to be reformed from the ground up, but international governments need to co-operate in a very fundamental way that they haven't before. Maybe co-operate isn't the right word; it might be better for individual rights if they don't - but the rules need to be established.
Let's paint a picture: You have a US base company seeking cloud services from a company in the UK, but then servers are located in Ireland. Then someone makes an attack from Spain to the servers in Ireland.... it's a jurisdiction nightmare!
And even more so with everyday cloud solutions being offered. As has been mentioned on this site various times, security and safety of data is a major concern. I guess this goes to show that we got a long way to go, and we're literally paving the road as we go.
@zerox I agree with you that cross-border cyber crime is one of the greatest challenges the legal system has been faced with in a very, very, long time. The thing is, most cybercrime is really just regular crime that happens to be committed by way of using computer systems. So maybe the laws don't need to change at all. We don't need new laws to fight cybercrime. We just need to establish some law enforcement procedures and some acknowledgement of the fact that the geographic boundaries that exist in the physical world simply don't exist in the virtual world.
You're right, Mejiac. Thinking of this as a small window of opportunity or a minor niche, as soom do, is really missing the point. We're talking about a huge issue that will affect our everyday lives in the near future. Of course, most of use the internet on a daily basis already, but that only goes to show how deeply rooted it will be in everything we and our governments do in the next five or ten years.
Cyber crime will be extremely possible and extremely lucrative on it's own. The ability to hit targets all over the world without moving, under a veil of secrecy is a criminal's dream come true. Once you mix in the fact that the laws for prosecuting those who are caught are muddy at best, all bets are off. This issue can't be tackled soon enough.
This is one of those things that makes me stop and think how legitimately revolutionary of a time we live in. This is not current events - this is the kind of thing history books a century from now will reference as a turning point in human history. The precedents we set now for cyber law will have lasting reprocussions and say a TON about how we intend to treat human rights in the 21st century.
This also serves to remind me that we shouldn't expect the legal system to get it right overnight. In a long view of things, the internet as we know it now sprung up very suddenly for something so important. It's a bigger deal than anything the legal system has ever had to handle in many ways, and they're having to deal with very quickly. This is a problem that won't be solved until the next generation is all grown up.
Yesterday I was with a client that he's email was hacked. Google did a great job, they automatically sent him a notice and locked his account so he could reset his password.
We were discussing your article and he said that this was heading into another form of company espinoage. It could come to the point that companies could exploit this "gap" to hire foreing companies (or people) to "mess" with the competing company....scary. I mean think about it....I one or two day crash of a system could provide the other company a stragetic window.
I guess software security companies have enough to make sure things are up and running and safe enough.
Please join us for the "IT Convergence Strategies: Why, When and How " to learn more about:
• 5 truths about infrastructure convergence today that go beyond the hype
• How to exploit the 4 phases of convergence maximum efficiency and agility
• Key milestones to plan for on the convergence journey
• Why integrated management is a critical component of convergence plans
• The importance of an open, modular approach, such as Dell’s active infrastructure, to building a converged data center
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail: firstname.lastname@example.org
Dell's Efficiency Modeling Tool The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise. Read the full report
Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
There's a lot of hype about virtualization of networks, NaaS, and SDN, but there's a couple of proven applications that enterprises could adopt right now and potentially save money and improve operations.
Skype/Outlook UC integration means we're going to have competition and fragmentation of UC client architectures, but is that bad? Modern devices can support IM, email, voice, and video clients, so maybe it's the back end of UC we need to be worried about.
Workers are now used to portable device support throughout their everyday lives. We should be looking at the policy of providing fixed-desk devices to support stationary workers. Could portable support be smarter?
Input devices run the gamut, from the humble Missile Command-style trackball to advanced speech recognition. Unfortunately, these input devices can be used for evil as well as good. Case in point: mobile ads that want you to talk to them.
Enterprises want three things in storage systems: First is some speech-recognition way of capturing videoconference data for indexing; second is semantic/AI analysis of emails and IM for content indexing; third is a better system for managing hierarchical layers of storage.