Intel / North America

Real-time monitoring of security incidents, escalation signals and threat indicators across global hotspots, focusing on rapid alerts and emerging risk developments. Topic: North-America. Updated briefs and structured summaries from curated sources.
Prosecuting cyber-enabled international crimes: What solutions are available?
Prosecuting cyber-enabled international crimes: What solutions are available?
2026-02-05T06:59:16Z
Summary
Harmful cyber operations are increasing in pace, scale, and impact, with identity theft remaining the primary method for cybercriminals. The need for international cooperation in prosecuting cyber-enabled crimes is emphasized by experts from various institutions. Multi-factor authentication effectively blocks over 99% of unauthorized access attempts, highlighting its importance in cybersecurity. AI is increasingly used by malicious actors to enhance the scale and sophistication of cyber fraud and social engineering attacks. Cyber-enabled international crimes include genocide, war crimes, and crimes against humanity, which are prosecuted by the ICC. Cyber operations can facilitate traditional kinetic crimes, such as missile attacks on civilian infrastructure, leading to significant civilian harm. Cyber operations can facilitate traditional crimes, including genocide and torture, through digital platforms. The existing legal framework can be applied to cyber-enabled crimes without necessitating changes to the statute.
Perspectives
LLM output invalid; stored Stage4 blocks + metrics only.
Metrics
other
100 trillion units
security signals processed daily
This volume of data indicates the scale of cyber threats faced globally.
Every day we do get to process about 100 trillion, 100 trillion security signals from across the world.
percentage
97%
observed identity attacks
This statistic underscores the prevalence of password spray or brute force methods in cybercrime.
about 97% of observed identity attacks are password spray or brute force attacks.
other
over 99%
effectiveness of multi-factor authentication
This statistic underscores the critical role of multi-factor authentication in preventing unauthorized access.
multi factor authentication still helps to block over 99% of these types of unauthorized attempts
other
1.6 million units
bot-driven fake account sign-up attempts blocked
This figure illustrates the scale of automated attacks and the need for robust cybersecurity measures.
we're seeing across across the entire year our anti fraud systems block the approximately 1.6 million bot driven fake accounts sign up attempts per hour
other
195%
growth of AI-generated identities
The significant increase highlights the urgent need for enhanced verification processes.
AI generated IDs being used at higher rates globally with an estimated 195% growth
other
high risk of the war crimes
risk associated with targeting civilian objects
This highlights the legal implications of military actions against civilian infrastructure.
we've all seen the people of Ukraine freezing that is an attack against civilian objects for high risk of the war crimes
other
arrest warrants were issued
legal actions against Russian officials
This indicates ongoing international legal efforts to hold individuals accountable for war crimes.
the ranking Russian officials are already charged with that war crime
other
100 people units
casualties from the U.S. raid in Venezuela
This highlights the severe consequences of cyber operations when combined with kinetic actions.
100 people get killed
Key entities
Companies
Apple • Lafarge • Microsoft • Pegasus
Countries / Locations
USA
Themes
#cyber_operations • #escalation_risk • #military_first_strike • #security_alert • #ai_in_law • #ai_threats • #civilian_harm • #cyber_crime • #cyber_crime_challenges • #cyber_enabled_crimes
Timeline highlights
00:00–05:00
Harmful cyber operations are increasing in pace, scale, and impact, with identity theft remaining the primary method for cybercriminals. The need for international cooperation in prosecuting cyber-enabled crimes is emphasized by experts from various institutions.
  • Harmful cyber operations are increasing in pace, scale, and impact
  • Cybercrime is evolving into an industrialized global enterprise, often operating from permissive jurisdictions
  • Identity theft remains the primary method for cybercriminals, with most attacks stemming from compromised credentials
  • % of identity attacks are conducted through password spray or brute force methods
  • The panel includes experts from Microsoft, Reading University, and the Oxford Institute of Technology and Justice
  • The discussion emphasizes the need for international cooperation in prosecuting cyber-enabled crimes
05:00–10:00
Multi-factor authentication effectively blocks over 99% of unauthorized access attempts, highlighting its importance in cybersecurity. AI is increasingly used by malicious actors to enhance the scale and sophistication of cyber fraud and social engineering attacks.
  • Multi-factor authentication effectively blocks over 99% of unauthorized access attempts
  • AI is enhancing the scale and sophistication of cyber fraud and social engineering attacks
  • Malicious actors are increasingly using bots to create fake accounts, with 1.6 million attempts blocked per hour
  • AI-generated identities have seen a 195% increase globally, highlighting the need for robust verification processes
  • Nation-state threats involve organized groups focused on cyber espionage to achieve geopolitical objectives
  • The most targeted sectors for cyber espionage include IT, research, academia, government, and NGOs
10:00–15:00
Cyber-enabled international crimes include genocide, war crimes, and crimes against humanity, which are prosecuted by the ICC. Cyber operations can facilitate traditional kinetic crimes, such as missile attacks on civilian infrastructure, leading to significant civilian harm.
  • Cyber-enabled international crimes include genocide, crimes against humanity, war crimes, and aggression
  • The International Criminal Court (ICC) focuses on prosecuting these serious international crimes, not ordinary cyber crimes like fraud
  • Cyber means can facilitate traditional kinetic crimes, such as missile attacks on civilian infrastructure
  • War crimes require a contextual element, typically occurring in armed conflict, which can be initiated or exacerbated by cyber operations
  • Examples of cyber-enabled war crimes include targeting civilian energy infrastructure, as seen in the conflict between Russia and Ukraine
  • The ICC has issued arrest warrants for high-ranking Russian officials for war crimes related to attacks on civilian objects
15:00–20:00
Cyber operations can facilitate traditional crimes, including genocide and torture, through digital platforms. The existing legal framework can be applied to cyber-enabled crimes without necessitating changes to the statute.
  • Cyber operations can facilitate traditional crimes, such as genocide and torture, through digital platforms
  • Mental harm can be inflicted via the circulation of sensitive images, impacting personal dignity
  • The crime of aggression may require significant cyber power to meet the legal threshold of a manifest violation
  • Cyber attacks can be part of larger kinetic operations, as demonstrated by the U.S. raid in Venezuela
  • Crimes against the administration of justice can be executed through cyber means, including intimidation of judges and tampering with evidence
  • The existing legal framework can be applied to cyber-enabled crimes without necessitating changes to the statute
20:00–25:00
The International Criminal Court is evolving its frameworks to address the complexities of prosecuting cyber-enabled international crimes that cross multiple jurisdictions. This adaptation involves navigating the challenges of determining jurisdiction and the role of corporate actors in facilitating such crimes.
  • The International Criminal Court (ICC) is adapting its frameworks to address cyber-enabled international crimes that span multiple jurisdictions
  • Cyber operations can involve actors from different countries, complicating the determination of where a crime was committed
  • Jurisdiction may apply to both the state where the cyber conduct occurs and the state where the effects of the crime are felt
  • There is ongoing debate about whether data can be considered an object under international humanitarian law, particularly in the context of cyber attacks
  • Facilitation of cyber crimes by IT companies raises questions of complicity similar to traditional forms of aiding and abetting criminal acts
  • The corporate sector plays a significant role in cyber operations, impacting the prosecution of cyber-enabled crimes
25:00–30:00
Prosecution of cyber-enabled international crimes is complicated by the covert nature of cyber activities and the spread of evidence across multiple jurisdictions. The International Criminal Court's new policy aims to adapt international law to address these challenges, but significant hurdles remain in investigations and prosecutions.
  • Prosecution of cyber-enabled international crimes faces significant challenges due to the covert nature of cyber activities
  • Evidence in cyber cases is often spread across multiple jurisdictions, complicating investigations
  • Open source evidence, such as social media posts and videos, can be fragile and subject to deletion by platform providers
  • The rise of deep fakes raises concerns about the reliability and verification of digital evidence
  • Sophisticated cyber operations may require specialized digital and forensic expertise for effective investigation
  • Mutual legal assistance treaties between states are often slow and cumbersome, hindering timely prosecution