CSO - Perhaps the biggest mistake the recently arrested leaders of the Anonymous spinoff hacker group LulzSec made was operating in the U.S. and European countries instead of Ukraine. There, they might have remained beyond the reach of the law indefinitely.
The Kyiv Post last week reported that in spite of the high-profile arrests of five alleged hacker "kingpins" in October 2010, "Ukraine's would-be major crackdown on cybercrime is increasingly looking like (a) real bust." The result is the country becoming, "a haven for hackers," in the view of analysts, including some Ukraine security officials.
The five, who allegedly used Conficker, a fast-spreading worm unleashed in 2008, to steal more than $72 million from U.S. bank accounts, faced up to six years in prison.
But within months of the arrests, they were all released and remain free as an investigation reportedly continues.
Valentyn Petrov, an information security official at the Security Service of Ukraine, known by the acronym SBU, acknowledged to the Post that, "Ukrainian hackers are well-known in the world. Our country is a potential source of cyber threats to other countries."
The official explanation for the freedom enjoyed by hackers is a lack of modern legislation covering cybercrime, along with a lack of authority for law enforcement.
But experts say the problem is deeper and much more menacing. Brian Krebs, a former Washington Post reporter and author of the blog KrebsonSecurity.com, told the Post that he knows of many people in Ukraine who want to, "put cyber criminals behind bars and clean up Ukraine's image as a cybercrime heaven. However, if this is not combined with a competent and responsible legislative system, the rest does not matter."
Taras Kuzio, editor of Ukraine Analyst, goes beyond that. In a March 1 blog post, he quotes extensively from a 2011 book by former Guardian Moscow correspondent Luke Harding titled, "Mafia State: How one reporter became an enemy of the brutal new Russia."
The book discusses 10 criteria that make Russia a "virtual mafia state," and Kuzio says those criteria apply to Ukraine as well.
Kuzio, an Austrian Marshall Plan Foundation Visiting Fellow at the Center for Transatlantic Relations, School of Advanced International Studies, John Hopkins University, was reached through the Information Security Community on LinkedIn.
He and others say corruption throughout that region of the world means, "ruling elites are unaccountable & (and) have no remorse for crimes they have committed.
"Russian and Ukrainian kleptocracy merge organized crime, corruption and the state in a closely bound nexus," Kuzio writes. "Organized crime has close ties to senior leaders of both countries."
Kuzio notes that Yuriy Lutsenko, former Interior Minister in two governments led by Yulia Tymoshenko, was recently sentenced to four years imprisonment and banned from public office for three years. That prevents him from participating in the 2015 presidential elections, in which Viktor Yanukovych will seek a second term.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!