ICT Barriers, High Tech Crime, and Police

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "ICT Barriers, High Tech Crime, and Police"

Transcription

1 ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College Station, Texas Prepared for presentation at the CAFRAD s Conference ICT AS A MODERN SOLUTION TO SECURITY THREAT, EARLY DETECTION AND PREVENTION OF CRIMES June 23-25, 2014, Hotel Intercontinental, Tangiers, Morocco

2 PRESENTATION OBJECTIVES OVERVIEW OF COMPUTER CRIMES AND TECHNOLOGY DYNAMICS OF COMPUTER CRIME AND ICT CRIMINALITY ICT BARRIERS FOR POLICE IN SOLVING ICT CRIME Dr. Rice 2

3 HIGH TECH CRIME Known as IT CRIME (information technology) later known as ICT CRIME (information and communication technology) Known as Computer Crime Known as Computer Related Crime or Computer Facilitated Crime Known as Internet Crime Known as Digital Crime Known as Cyber Crime (also known as Cyber crime) Known as High Tech Crime Cyber Crimes are growing and by 2017, the global Cyber Security market is expected to skyrocket to $120.1 billion POINT: ICT CRIME is about computers and criminal law Dr. Rice 3

4 More than 600,000 FaceBook accounts are compromised every day. 15% of social network users have reported that their profiles have been hacked by pretenders. 1 in 10 social network users said they d fallen victim to a scam or fake link on social network platforms. EXTENT OF CYBER CRIME Victims per year 556 million Victims per day Over 1.5 million Victims per second 18 Identities exposed More than million May 17, 2013: Dr. Rice 4

5 DYNAMICS OF COMPUTER CRIME Information technology makes it possible to carry out criminal activity in a different location without traveling. (trans-border criminality) IT makes it possible for criminal activity to occur that is not directly observable without a specially trained eye. IT makes it possible to be outside the jurisdiction of criminal prosecution QUESTION: (Is there a need for harmonization of legal norms and/or international cooperation among countries regarding ICT?) Dr. Rice 5

6 ICT CRIMINALITY Has something to do with knowledge (or lack of knowledge to investigate) Knowledge of how ICT works and its infrastructure Depends upon knowledge of what happens in an automated environment and how it happens More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities Dr. Rice 6

7 HYPOTHETICAL COMPUTER CRIME A CYBER CROOK hacks into a bank in Mexico City. Mexican investigators trace the computer used in the attack to New York City and quickly contact FBI agents, who discover that the New York computer is linked to a computer in South Korea. They alert Korean agents, who learn that the attack originated in Bangkok, Thai agents make the arrest. POINT--Savvy crooks will base their operations in a country or countries with the most lax cyber laws. Dr. Rice 7

8 TOP 15 Countries Where Cyber Attacks Originate (Feb 2013) Source of Attack Number of Attacks Russia 2,402,722 Taiwan 907,102 Germany 780,425 Ukraine 566,531 Hungary 367,966 USA 355,341 Romania 350,948 Brazil 337,977 Italy 288,607 Australia 255,777 Argentina 185,720 China 168,146 Poland 162,235 Israel 143,943 Japan 133,908 gulf.ae/blog/cyber- Dr. Rice 8

9 POLICE OBSTACLES TO SOLVING ICT CRIME For Police optimizing the use of technologies can contribute to solving crime. However, there are Legal (L), Organizational (O) and Technological (T) OBSTACLES (L) Absence of a proper legal basis for using a particular technology due to a political, legal, or ethical perspective. (O) Insufficient adaptability of colleagues (not trained or under trained) (O) Insufficient financing (money or funding) (O) Insufficient management guidance, insight and overview Dr. Rice 9

10 POLICE OBSTACLES TO SOLVING ICT CRIME (cont d) (T) Insufficient capacity for innovation and development Insufficient overview of available technologies (T) Insufficient availability of technologies (T) Insufficient user friendliness Dr. Rice 10

11 ICT Crime Analysis INVOLVES: Special training in the following areas: Encryption breaking technology Recovery Equipment Software to collect input/output data Digital Forensic Labs Hacking and Password Cracking Network Intrusion Detection Photo/video/audio analysis Dr. Rice 11

12 GENERAL CONCLUSION Trans border crimes calls for trans border measures. More internationally agreed upon and enforced laws. Technology is a democratic instrument meaning it can be exploited by anyone. Dr. Rice 12

13 CONCLUSION: What is needed in Africa My preliminary research suggests a number of African countries need: Stronger ICT security systems Stronger security awareness training Installation of CCTV cameras/monitors (closed circuit television) Installation of tracking technology (GPS devices) Dr. Rice 13

14 SUGGESTED READINGS Kim-Kwang Raymond Choo, The Cyber Threat Landscape: Challenges and Future Research Directions. Computers and Security 30 (2011): Bart Custers, Technology in Policing: Experiences, Obstacles and Police Needs. Computer Law and Security Review 28 (2012): Paul Hunton, The Stages of Cybercrime Investigations: Bridging the Gap Between Technology Examination and Law Enforcement Investigation. Computer Law and Security Review 27 (2011): Pieter Kleve, Richard De Mulder, and Kees van Noortwijk, The Definition of ICT Crime. Computer Law and Security Review 27 (2011): Henry Osborn Quarshie, Using ICT to Fight Crime A Case of Africa. Journal of Emerging Trends in Computing and Information Systems 5 (1) (January 2014): Dr. Rice 14

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement How the G8 24/7 Network Operates THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement The G8 24/7 points of contact are provided for investigations involving electronic evidence that require urgent

More information

2012 NORTON CYBERCRIME REPORT

2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren (Erland Jonsson) Department of Computer Science and Engineering Chalmers University of Technology Sweden Motivation Course

More information

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries Torbjörn Fredriksson (torbjorn.fredriksson@unctad.org) Chief, ICT Analysis Section, UNCTAD Commonwealth Cybersecurity

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology Sweden https://www.youtube.com/watch?v=kpyvenbpj5c

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the

More information

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market

More information

Tble Home Team Visiting Team Home Team Visiting Team Home Team Visiting Team. Open Qualification Group A. 1st Round 2nd Round 3rd Round

Tble Home Team Visiting Team Home Team Visiting Team Home Team Visiting Team. Open Qualification Group A. 1st Round 2nd Round 3rd Round Open Qualification Group A 14th WORLD BRIDGE GAMES OPEN SERIES Group A 1 Netherlands Mexico Chile Netherlands Netherlands Denmark 2 Saudi Arabia Bosnia & Hrzna Switzerland Jordan Spain Germany 3 Korea

More information

CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES

CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES Global GfK survey February 2015 1 Global GfK survey: Consumers activities with mobile phones in stores 1. Methodology 2. Global results 3. Country results

More information

2013 NORTON REPORT 13,022 ONLINE ADULTS AGED 18-64

2013 NORTON REPORT 13,022 ONLINE ADULTS AGED 18-64 2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,

More information

Technology Crime Services

Technology Crime Services Technology Crime Services Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime Traditional Policing

More information

Number of retail outlets Number of retail outlets

Number of retail outlets Number of retail outlets Number 65708 of retail outlets Number of retail outlets Number of retail outlets Trends in total number of retail outlets 2002-2007 number / as stated number per million Table 2.3 % growth inhabitants

More information

Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices

Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM

More information

Establishing a State Cyber Crimes Unit White Paper

Establishing a State Cyber Crimes Unit White Paper Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center

More information

HAS BRAZIL REALLY TAKEN OFF? BRAZIL LONG-RUN ECONOMIC GROWTH AND CONVERGENCE

HAS BRAZIL REALLY TAKEN OFF? BRAZIL LONG-RUN ECONOMIC GROWTH AND CONVERGENCE HAS BRAZIL REALLY TAKEN OFF? BRAZIL LONG-RUN ECONOMIC GROWTH AND CONVERGENCE COUNTRY PROFILE: A COUNTRY IN TRANSFORMATION POLICY RECOMENDATIONS COUNTRY PROFILE Brazilian Equivalent Population in The World

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

Emerging risks for internet users

Emerging risks for internet users Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber

More information

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50.

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50. Overall Results Climate Change Performance Index 2012 Table 1 Rank Country Score** Partial Score Tendency Trend Level Policy 1* Rank Country Score** Partial Score Tendency Trend Level Policy 21 - Egypt***

More information

The Advanced Cyber Attack Landscape

The Advanced Cyber Attack Landscape The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational

More information

Appendix 1: Full Country Rankings

Appendix 1: Full Country Rankings Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

World Consumer Income and Expenditure Patterns

World Consumer Income and Expenditure Patterns World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income

More information

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks

More information

GE Grid Solutions. Providing solutions that keep the world energized Press Conference Call Presentation November 12, 2015. Imagination at work.

GE Grid Solutions. Providing solutions that keep the world energized Press Conference Call Presentation November 12, 2015. Imagination at work. GE Grid Solutions Providing solutions that keep the world energized Press Conference Call Presentation November 12, 2015 Press Conference Call Recording: Toll Free: +1 (855) 859-2056 Toll: +1 (404) 537-3406

More information

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA, LLP Created as a collaborative effort between government and industry to ensure every American has the resources they need to stay

More information

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA Public-Private Partnerships against cybercrime Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA The need for Public Private Partnerships to fight cybercrime Evidence needed by police to

More information

United Kingdom Internet Security Threat Profile

United Kingdom Internet Security Threat Profile Internet Security Threat Profile Worldwide Ranking.%.%.%.%.%.%.%.%.%.%.%.% Overall Average Spam Zombies Malicious Code Phishing Hosts Bots Network Copyright Symantec Corporation. All rights reserved. Symantec,

More information

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia zabri@cybersecurity.my

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia zabri@cybersecurity.my Identity Fraud: Platform for Cybercrime Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia zabri@cybersecurity.my Introduction of Digital Forensics Department, CyberSecurity

More information

A March 2016 The Economic Pulse

A March 2016 The Economic Pulse Global @dvisor The Economic Pulse of the World Citizens in 25 Countries Assess the Current State of their Country s Economy for a Total Global Perspective The Economic Pulse These are the findings of the

More information

Security in the Cloud an end to end Problem

Security in the Cloud an end to end Problem ID WORLD Abu Dhabi 18-19 March 2012 Cloud Computing & Mobile Applications Dr. Andrew Jones Programme Chair for Information Security Khalifa University of Science, Technology and Research, Abu Dhabi Security

More information

Customer Support. Superior Service Solutions for Your Laser and Laser Accessories. Superior Reliability & Performance

Customer Support. Superior Service Solutions for Your Laser and Laser Accessories. Superior Reliability & Performance Customer Support Superior Service Solutions for Your Laser and Laser Accessories Superior Reliability & Performance Optimizing Service Support for our Customers. Increased up-time Focus on core business

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000

More information

The Internationalization of Higher Education: Foreign Doctorate Holders in a Russian Academic Market as Agents of Transformation

The Internationalization of Higher Education: Foreign Doctorate Holders in a Russian Academic Market as Agents of Transformation The Internationalization of Higher Education: Foreign Doctorate Holders in a Russian Academic Market as Agents of Transformation Olessia Kirtchik, National Research University Higher School of Economics

More information

Information Security is not an IT problem! Enterprise Risk & Security Management

Information Security is not an IT problem! Enterprise Risk & Security Management Information Security is not an IT problem! Enterprise Risk & Security Management Raymond Slot Security Seminar 20 maart 2015 Some Security Incidents in 2014 Anthem 80 million customer records exposed JPMorgan

More information

Caribbean Cyber Security Be Aware Be Proactive as the Caribbean Is Under Cyber Attack

Caribbean Cyber Security Be Aware Be Proactive as the Caribbean Is Under Cyber Attack Caribbean Cyber Security Be Aware Be Proactive as the Caribbean Is Under Cyber Attack THE TIME FOR AWARENESS AND VIGILANCE IS NOW WWW.CARIBBEANCSC.COM Caribbean Cyber Security Center Who We Are Computer

More information

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit Tackling Cyber Crime in the UK Andy Archibald Deputy Director National Cyber Crime Unit Cybercrime Facts Cost of Cybercrime Reports of cyber crime to Action Fraud increase d by 30% 229 median number of

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information July 1 - December 31, 2014 apple Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software

More information

EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013

EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013 EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013 EUROPEAN MOBILE INSIGHTS: 2012 NORTON CYBERCRIME REPORT 9 COUNTRIES DENMARK, FRANCE, GERMANY, ITALY, NETHERLANDS, POLAND, RUSSIA, SWEDEN,

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

Table 1: TSQM Version 1.4 Available Translations

Table 1: TSQM Version 1.4 Available Translations Quintiles, Inc. 1 Tables 1, 2, & 3 below list the existing and available translations for the TSQM v1.4, TSQM vii, TSQM v9. If Quintiles does not have a translation that your Company needs, the Company

More information

Consumer Credit Worldwide at year end 2012

Consumer Credit Worldwide at year end 2012 Consumer Credit Worldwide at year end 2012 Introduction For the fifth consecutive year, Crédit Agricole Consumer Finance has published the Consumer Credit Overview, its yearly report on the international

More information

FACT SHEET Global Direct Selling

FACT SHEET Global Direct Selling Global 2011 Global Retail Sales: USD $153,727 million Global Sales Force The 91.5 million Direct Sellers who represent companies around the world are: 3 2 16% 9% 2% 3% 2% 3% 2% 3% Care 42% 2% 56% 3% 2

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Surviving the Era of Hack Attacks Cyber Security on a Global Scale Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information Requests November, We believe that our customers have a right to understand how their personal information is handled, and we consider it our responsibility to provide

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

A June 2015 The Economic Pulse

A June 2015 The Economic Pulse Global @dvisor The Economic Pulse of the World Citizens in 24 Countries Assess the Current State of their Country s Economy for a Total Global Perspective The Economic Pulse These are the findings of the

More information

ARE ENTREPRENEURS BORN OR MADE? AMWAY GLOBAL ENTREPRENEURSHIP REPORT ITALY AND UNITED STATES IN COMPARISON

ARE ENTREPRENEURS BORN OR MADE? AMWAY GLOBAL ENTREPRENEURSHIP REPORT ITALY AND UNITED STATES IN COMPARISON ARE ENTREPRENEURS BORN OR MADE? AMWAY GLOBAL ENTREPRENEURSHIP REPORT AND UNITED STATES IN COMPARISON INTRO AND OBJECTIVES SURVEY DESIGN Fieldwork: April July 2014 Sample: 43.902 men and women aged 14-99

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

GfK PURCHASING POWER INTERNATIONAL

GfK PURCHASING POWER INTERNATIONAL GfK PURCHASING POWER INTERNATIONAL 1 Agenda 1. Europe 3 2. Americas 45 3. Asia & Near East 54 4. Afrika 66 5. Australia 68 6. Overview of countries and available levels 70 2 2 EUROPE 4 GfK

More information

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges An Introduction to Cyber Crime and Terrorism: Problems and the Challenges Marc Goodman Director of International Cooperation International Multilateral Partnership Against Cyber Threats (IMPACT) What is

More information

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012 2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

Cisco Phone Systems Telemarketing Script Cold Call

Cisco Phone Systems Telemarketing Script Cold Call Cisco Phone Systems Telemarketing Script Cold Call 1. Locate Contact: Name listed Owner General Manager / Office Manager Chief BDM (Business Decision Maker) Note: Avoid talking to IT since this is not

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

ADDRESS. Ronald K. NOBLE. Secretary General. 62 nd FIFA CONGRESS. Budapest, Hungary

ADDRESS. Ronald K. NOBLE. Secretary General. 62 nd FIFA CONGRESS. Budapest, Hungary ADDRESS by Ronald K. NOBLE Secretary General 62 nd FIFA CONGRESS 25 May 2012 Budapest, Hungary Mr Sepp BLATTER, FIFA President, Mr Jérôme VALCKE, FIFA Secretary General, Members of FIFA s Executive Committee,

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS December 2011 November saw DNS Poisoning, aka Pharming, making the headlines on more than one occasion: To name a few, the online threat

More information

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year. October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 Idtheft@oag.state.md.us To Whom It May Concern: I am writing on behalf of Scottrade

More information

Security Business Review

Security Business Review Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large

More information

VITA CURRICULUM VITAE. Mark Pullin 116 Beechwood Victoria, TX 77901 Phone: 361-550-5270 Fax: 325-500-1051 Internet: mark.pullin@angelo.

VITA CURRICULUM VITAE. Mark Pullin 116 Beechwood Victoria, TX 77901 Phone: 361-550-5270 Fax: 325-500-1051 Internet: mark.pullin@angelo. VITA CURRICULUM VITAE Mark Pullin 116 Beechwood Victoria, TX 77901 Phone: 361-550-5270 Fax: 325-500-1051 Internet: mark.pullin@angelo.edu EDUCATION Ph.D. 2012 Criminal Justice Dissertation: Social Environmental

More information

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Breakout Session B: Cyber Security and Cybercrime Trends in Africa Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop

More information

Capacity Building in Cyberspace Security

Capacity Building in Cyberspace Security Capacity Building in Cyberspace Security Muhammad Amir Malik Member (IT), Government of Pakistan amir@moitt.gov.pk Sequence of Presentation Country Profile of Pakistan ICT Profile of Pakistan Cyberspace

More information

Building a Global Internet Company: Driving Traffic to Your Site. Benjamin Edelman Harvard Business School

Building a Global Internet Company: Driving Traffic to Your Site. Benjamin Edelman Harvard Business School Building a Global Internet Company: Driving Traffic to Your Site Benjamin Edelman Harvard Business School Mumbai, India January 20, 2012 About me Assistant Professor, Harvard Business School Teaching:

More information

How to Obtain CODIS. Tim Zolandz. FBI Laboratory (703) 632-8473

How to Obtain CODIS. Tim Zolandz. FBI Laboratory (703) 632-8473 1 How to Obtain Tim Zolandz (703) 632-8473 FBI Laboratory Agenda Mission / History International Status and Initiatives How to Obtain Software A look ahead to 7.0 Mission 3 Combined DNA Index System blends

More information

Chapter 4A: World Opinion on Terrorism

Chapter 4A: World Opinion on Terrorism 1 Pew Global Attitudes Project, Spring 2007 Now I m going to read you a list of things that may be problems in our country. As I read each one, please tell me if you think it is a very big problem, a moderately

More information

SPAM: 101 Cause and Effect

SPAM: 101 Cause and Effect SPAM: 101 Cause and Effect Table of Contents Background: JARING SPAM 101 Effects Lesson Learned Challenges and Propositions 1 Part I: Background on JARING (We're the good guys.) What is JARING? The first

More information

Teaching Information Security to Engineering Managers

Teaching Information Security to Engineering Managers Teaching Information Security to Engineering Managers Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 Why Bother? Lots of CS and EE programs

More information

Digital Forensics Institute in Malaysia: The Way Forward

Digital Forensics Institute in Malaysia: The Way Forward Digital Forensics Institute in Malaysia: The Way Forward Digital forensics initiatives in Malaysia are progressing well. Proficiency as a practitioner is acknowledged since 2000 and for research there

More information

Prof. Alessandro Balducci, Prorettore Vicario

Prof. Alessandro Balducci, Prorettore Vicario Prof. Alessandro Balducci, Prorettore Vicario QS World University Rankings - Engineering & Technology 2011 World EU Italy Engineering & Technology 48 13 1 Computer Science & Information Systems Ranking

More information

Threats to Local Governments and What You Can Do to Mitigate the Risks

Threats to Local Governments and What You Can Do to Mitigate the Risks Association of Minnesota Counties Threats to Local Governments and What You Can Do to Mitigate the Risks Andrew Dolan Director of Government Affairs Multi-State Information Sharing and Analysis Center()

More information

PANDALABS REPORT Q1 2015 January - March 2015

PANDALABS REPORT Q1 2015 January - March 2015 PANDALABS REPORT Q1 2015 January - March 2015 1. Introduction 2. The quarter in numbers 3. The quarter at a glance Cyber-Crime Social Networks Mobile Malware Cyber-War 4. Conclusion 5. About PandaLabs

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department VISA International Security Summit Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department Hanoi June 2010 Vietnam Economic Outlook One of the fastest growing economies in South-East

More information

Towards a more secure Cyber Space for South Africa

Towards a more secure Cyber Space for South Africa 22 October 2013 Towards a more secure Cyber Space for South Africa Prof Basie Von Solms Director : Centre for Cyber Security University of Johannesburg basievs@uj.ac.za International comments African comments

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing FEDERAL BUREAU OF INVESTIGATION INTELLIGENCE BULLETIN Cyber Intelligence Section 2 August 2011 (U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing (U//FOUO) The FBI assesses with

More information

Dividends Tax: Summary of withholding tax rates per South African Double Taxation Agreements currently in force Version: 2 Updated: 2012-05-22

Dividends Tax: Summary of withholding tax rates per South African Double Taxation Agreements currently in force Version: 2 Updated: 2012-05-22 Dividends Tax: Summary of withholding tax rates per South African Double Taxation Agreements currently in force Version: 2 Updated: 2012-05-22 Note: A summary of the rates and the relevant provisions relating

More information

CHFI v8(computer Hacking Forensics Investigator)

CHFI v8(computer Hacking Forensics Investigator) CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost *

The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost * The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost * There has been substantial consolidation among firms in many industries in countries around

More information

The Potential and Challenge of Data

The Potential and Challenge of Data The Potential and Challenge of Data Methodology & Overview THE THIRD ANNUAL CISCO CONNECTED WORLD TECHNOLOGY REPORT Based on a survey of 1800 INFORMATION TECHNOLOGY PROFESSIONALS The data in this presentation

More information

current and previous addresses name/ssn Medical Insurance info UNCLASSIFIED credit info family info phone & fax #

current and previous addresses name/ssn Medical Insurance info UNCLASSIFIED credit info family info phone & fax # Personal Identifiable Information current and previous addresses name/ssn credit info family info Medical Insurance info professional & personal relationships email address phone & fax # 1 Implications

More information

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE Agenda Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE INTRACOM Group Core Companies MARKET POSITION A leading regional telecommunications systems manufacturer and solutions

More information

Cybercrime, Cybersecurity and the Future of the Internet

Cybercrime, Cybersecurity and the Future of the Internet The Global Polity Cybercrime, Cybersecurity and the Future of the Internet The Challenges Cybercrime is now the fastest growing sector of cross-border organized crime. In 2009, reported losses in the US

More information

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems Cloud Security Strategies Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems London, 14 October 2015 UNICREDIT AT A GLANCE Employees: more than 146.600 Branches: 8.403 Banking operations

More information

Investigating Computer Crime. Professor Carsten Maple University of Bedfordshire 8th February 2013

Investigating Computer Crime. Professor Carsten Maple University of Bedfordshire 8th February 2013 Investigating Computer Crime Professor Carsten Maple University of Bedfordshire 8th February 2013 Why am I here? Background Computer Scientist applicable computing Co-author of UK Security Breaches Report

More information

Combating Tax Evasion through Transparency and Exchange of Information

Combating Tax Evasion through Transparency and Exchange of Information Combating Tax Evasion through Transparency and Exchange of Information BSEC 23 November 2012 Simon Knott Global Forum Secretariat OECD What s at stake NO LEVEL PLAYING FIELD tax fraud and evasion lack

More information

THE ETHICS HELPLINE Worldwide Dialing Instructions April 2012

THE ETHICS HELPLINE Worldwide Dialing Instructions April 2012 COUNTRY DIALING INSTRUCTIONS US, Canada and Virgin Islands The Ethics Helpline is always available, 24/7/365 888 478 6858 (Dialing instructions for other jurisdictions follow) Coming soon internet reporting

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. 2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by

More information

INCO for Cyber Security. PTCIF: 21st Feb 2014

INCO for Cyber Security. PTCIF: 21st Feb 2014 INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.

More information