Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267
0

The issues arising from new cybercrime laws | #cybercrime | #computerhacker


Above: Attorney General Reginald Armour. Photo by Damian Luk Pat/GORTT.

BitDepth#1445 for February 12, 2024

The last meeting of the OAS discussions between government level experts on cybercrime took place in December 2016.

On the agenda then were the challenges of prevention, investigation and prosecution of cybercrime and the importance of effective legislation.

Those priorities are still relevant, but in the larger landscape of cybercrime, everything has changed.

According to National Security Minister Fitzgerald Hinds, there have been 205 successful cyber attacks in Trinidad and Tobago between 2019 and 2023. It’s tempting to add to that the caveats that under-reporting of data breaches is widespread and to further note that the minister did not define what constituted a successful cyberattack.

Is this the count of successful intrusions into a secured network? Is it the number of breaches that resulted in the exfiltration of private data?

The Trinidad and Tobago Cybersecurity Incident Response Team (TTCSIRT), nominally the first port of call in a data breach, is frequently left entirely out of the loop in private sector data breaches.

In the face of the hard rain of reported data breaches by professional ransomware hackers, the government is preparing a “cybercrime legislative package” that will update existing laws both on the books and still to be proclaimed.

Minister of Digital Transformation Hassel Bacchus.

This followed an attack on the Ministry of the Attorney General and Legal Affairs, after which Digital Transformation Minister Hassel Bacchus declared that the Legal Affairs Ministry is “one of the more secure environments” after the attack.

The public might have hoped that this important ministry might have been more secure before an attack.

All too often, the revelation of a cybersecurity breach is triggered by a failure of services or exposure by ransomware collectives.

Ricardo Fraser, vice-president of the International Information System Security Consortium (Caribbean and Latin America Chapter), said that, “Organisations bear a crucial responsibility as custodians to safeguard data against unauthorised access. In the unfortunate event of a breach, organisations must prioritise transparency by promptly notifying stakeholders without fear of unwarranted criticism.”

“A cybersecurity breach doesn’t necessarily indicate shortcomings in an organisation’s established controls; independent investigations are essential to determine any potential negligence.”

“Proper reporting of breach incidents is paramount to balance the needs of all stakeholders, including customers, regulators, and shareholders. While organisations may initially hesitate to report breaches due to concerns about reputation and shareholder interests, measures should be implemented to ensure individual privacy protection and minimise individual impacts, whether reporting is mandatory or voluntary.”

Ricardo Fraser

Shiva Parasram, an ethical hacker and cybersecurity consultant said that, “As a researcher, I spend many hours every day on the dark web. If they make this work illegal, it stifles independent investigation. Then, a lot of companies will suffer because I help many companies this way. I give lots of free advice to the general public.”

“[The 2017 bill] wasn’t very well thought out at all. I’m really hoping that some serious thinking gets put into it and that they actually invite people who know what this stuff is about and how it can benefit cybersecurity researchers, particularly what’s required with dark web and penetration testing, vulnerability scanning and assessments and ethical hacking. It should really be guided by a subject matter expert.”

Fraser notes that, “Certified investigative and information security professionals adhere to a strict code of conduct emphasising societal protection. It’s imperative to recognise that disclosing or disseminating breached data improperly not only harms the organisation but also violates the privacy rights of individuals whose sensitive information is exposed.”

Fraser warns, however, that, “Investigating professionals such as journalists, fraud investigators, and ethical hackers play a crucial role in handling breached data responsibly. They must exercise caution to avoid further compromising the privacy of victims while probing or highlighting such incidents.”

The headline gold rush that followed the TSTT breach included several instances of journalist overreach, exposing information then available only on the dark web to a much wider audience.

Without clear guidelines and the scope to do the work of journalism, any new law will not serve the public well.

Shiela Rampersad, President of MATT in 2018, called on a Joint Select Committee convened that year to discuss the 2017 bill, urging the inclusion of, “A public interest exemption to protect all individuals and organisations working towards greater transparency in public affairs.”

The law, as written, Rampersad noted, would levy daunting penalties ($200,000 to $500,000 per infringement) for journalists and whistleblowers contravening of a strict reading of its scope, which was entirely too broad.

Clause 8 of the 2017 bill, for instance, would have made illegal any independent investigation into any data breach that has come to public attention through the media or cybersecurity investigators over the last four years. While clauses 35, 36 and 37 provided caveats for hosting providers, caching services and ISPs.

There is a sense of urgency to create new cybercrime laws, but that haste cannot ignore the dynamic reality of the situation any more than it can neglect the growing threat that cyber criminals now present.

The issues arising from new cybercrime laws


The issues arising from new cybercrime…

Samsung introduces new S24 smartphones


Samsung introduces new S24 smartphones

How Denis O’Brien lost control of Digicel


How Denis O’Brien lost control of…

The end of the trolley bag: How the Judiciary made the Criminal Court digital


The end of the trolley bag:…

The Judiciary’s big digital transformation


The Judiciary’s big digital transformation

There will be blood


There will be blood

The razor’s edge – Tools for shaving


The razor’s edge – Tools for…

My favorite things: iOS apps


My favorite things: iOS apps

My favorite things: Android apps


My favorite things: Android apps

Which smartwatch: Apple or Galaxy?


Which smartwatch: Apple or Galaxy?

Android vs iOS: Smartphone software integration compared


Android vs iOS: Smartphone software integration…

From Android to iOS


From Android to iOS

The flagellation of TSTT


The flagellation of TSTT

TSTT’s dark night of the soul


TSTT’s dark night of the soul

The Sonoma update


The Sonoma update

BC has left the building


BC has left the building

A mandate for Carnival


A mandate for Carnival

Budget 2024: What is it doing for the digital economy?


Budget 2024: What is it doing…

Pushing back on misinformation with provenance


Pushing back on misinformation with provenance

Carnival creators contemplate AI


Carnival creators contemplate AI

——————————————————–


Click Here For The Original Source.

Translate