{"id":4032,"date":"2012-06-01T08:29:42","date_gmt":"2012-06-01T13:29:42","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=4032"},"modified":"2013-02-06T09:36:24","modified_gmt":"2013-02-06T14:36:24","slug":"escalating-cyber-security-up-the-political-agenda","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2012\/06\/escalating-cyber-security-up-the-political-agenda\/","title":{"rendered":"Escalating cyber security up the political agenda"},"content":{"rendered":"
In the final day of the CTU-organised 10th<\/span>\u00a0Ministerial Seminar, the discussions sought to galvanise Caribbean countries to more decisive action on cyber security.<\/em><\/p>\n <\/a>Wednesday, 30 May, day 2 and the last day of the 10th<\/span>\u00a0Ministerial Strategic Seminar, hosted by the Caribbean Telecommunications Union (CTU)<\/a>, focussed almost exclusively on cyber security, which the organisation believes is a critical issue yet to be decisively addressed in the region. Moreover, the experts in our three-part series on cyber security and threats (who were from Barbados<\/a>, Jamaica<\/a> and Trinidad and Tobago<\/a>), all corroborated this view that cyber crime is highly prevalent in the Caribbean. Hence Wednesday\u2019s session sought not only to highlight the current situation, but also to provide some strategies that countries could explore and implement.<\/p>\n To kick off the day\u2019s proceedings, the attendees, who comprised primarily Caribbean Ministers with responsibility for telecoms and\/or ICT, and public and private sector technocrats, got some insight into current challenges and frameworks in the OAS and UK, from representatives from CICTE (Inter-American Committee against Terrorism)<\/a> and SOCA (Serious Organised Crime Agency)<\/a>, respectively. A key point of note from Andrew Auld, Cyber Intelligence Manager at SOCA, is the fact that the advances in technology and the Internet is causing cyber crime to become more organised and structured. For example he noted that many of the more successful cyber crime groups have established hierarchical structures to oversee and vet the quality of the coding that is being prepared by its members, who are all anonymous (See Figure 1). \u00a0Mr. Auld also highlighted that cyber crime has become commoditised. For example, it is possible to purchase online bulk data on compromised credit cards, to off the shelf and custom designed malware and attack systems.<\/p>\nThe danger is real and very sophisticated<\/h3>\n