CSO - Perhaps the biggest mistake the recently arrested leaders of the Anonymous spinoff hacker group LulzSec made was operating in the U.S. and European countries instead of Ukraine. There, they might have remained beyond the reach of the law indefinitely.
The Kyiv Post last week reported that in spite of the high-profile arrests of five alleged hacker "kingpins" in October 2010, "Ukraine's would-be major crackdown on cybercrime is increasingly looking like (a) real bust." The result is the country becoming, "a haven for hackers," in the view of analysts, including some Ukraine security officials.
The five, who allegedly used Conficker, a fast-spreading worm unleashed in 2008, to steal more than $72 million from U.S. bank accounts, faced up to six years in prison.
But within months of the arrests, they were all released and remain free as an investigation reportedly continues.
Valentyn Petrov, an information security official at the Security Service of Ukraine, known by the acronym SBU, acknowledged to the Post that, "Ukrainian hackers are well-known in the world. Our country is a potential source of cyber threats to other countries."
The official explanation for the freedom enjoyed by hackers is a lack of modern legislation covering cybercrime, along with a lack of authority for law enforcement.
But experts say the problem is deeper and much more menacing. Brian Krebs, a former Washington Post reporter and author of the blog KrebsonSecurity.com, told the Post that he knows of many people in Ukraine who want to, "put cyber criminals behind bars and clean up Ukraine's image as a cybercrime heaven. However, if this is not combined with a competent and responsible legislative system, the rest does not matter."
Taras Kuzio, editor of Ukraine Analyst, goes beyond that. In a March 1 blog post, he quotes extensively from a 2011 book by former Guardian Moscow correspondent Luke Harding titled, "Mafia State: How one reporter became an enemy of the brutal new Russia."
The book discusses 10 criteria that make Russia a "virtual mafia state," and Kuzio says those criteria apply to Ukraine as well.
Kuzio, an Austrian Marshall Plan Foundation Visiting Fellow at the Center for Transatlantic Relations, School of Advanced International Studies, John Hopkins University, was reached through the Information Security Community on LinkedIn.
He and others say corruption throughout that region of the world means, "ruling elites are unaccountable & (and) have no remorse for crimes they have committed.
"Russian and Ukrainian kleptocracy merge organized crime, corruption and the state in a closely bound nexus," Kuzio writes. "Organized crime has close ties to senior leaders of both countries."
Kuzio notes that Yuriy Lutsenko, former Interior Minister in two governments led by Yulia Tymoshenko, was recently sentenced to four years imprisonment and banned from public office for three years. That prevents him from participating in the 2015 presidential elections, in which Viktor Yanukovych will seek a second term.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts