RSA 2009: SOCA attacks heart of organised cyber crime
SOCA wants to hit the infrastructure of criminal enterprises and find out where they're storing data.

The criminal underground is making serious money from cyber crime on different fronts, but Britain's Serious Organised Crime Agency (SOCA) is fighting back.
At the RSA Conference in London, Andy Auld, the head of intelligence at SOCA's e-crime department, said that the agency's main goal was to target criminal's IT infrastructures in the same way that such hackers target real businesses.
SOCA is considering infiltrating the groups and trying to undermine them from within using undercover officers, or using sources from criminal forums where fraudsters barter and communicate.
It would also "target the money" by focusing on the electronic exchanges of funds between different criminal groups.
"The exchanges are actually a critical part of the groups and how they function," Auld said. "Taking out the exchanges and the operators who lead forums are one of those targets."
SOCA also wants to identify weaknesses in business that cyber criminals are actively targeting, and find where hackers are storing stolen data.
"These guys are harvesting the data in bulk, using various methods such as hacking corporate networks or mass infection of malware," Auld added.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"They have to store that data somewhere. If you can find the drop zones where that data is stored and reach the affected financial institutions, you are attacking the profitability and damage the reputation of the criminals involved who are trying to restore that data and sell it to third parties."
Auld added: "By the time the sale is made, that data is cancelled and no longer valid for use."
SOCA also wants to target legal businesses that worked with underground enterprises - without even realising it.
He used the example of the Russian Business Network (RBN), a now defunct criminal network that registered as a local internet registry with RIPE, an European body that allocated IP resources to industry.
"RIPE was being paid by the RBN for that service of IP allocation," said Auld.
"Essentially what you have if you interpret it very harshly, RIPE is receiving criminal funds and was therefore involved in money laundering offences."
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
Dell sells RSA security business to private equity firm
News Cash deal worth £1.6bn expected to close within the next 9 months
-
View from the Airport: RSA Conference 2017
Opinion Brace yourselves for the cyberpocalypse... or not
-
Why complex security plans mar business-IT relationship
News Michael Dell talks security at first post-acquisition RSA Conference
-
C-suite and IT must collaborate for safer businesses
News "Business-driven security" is the name of the game at RSA Conference 2017
-
What to expect from RSA Conference 2017
Opinion This year's security landscape means there's more to discuss than ever
-
RSA 2016: Weakened encryption compromises national security
News Terrorists will move to other platforms, while criminals will exploit the flaws, claim speakers
-
ChewBacca malware steals data from retailers in 11 countries
News RSA researchers uncover global malware operation that relies on ChewBacca keystroke logger.
-
EMC World 2013: Enterprise on back foot with cloud and mobile security
News RSA chairman paints bleak picture of enterprise threat response.