1 Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China
2 Outline What s Cyber-Terrorism? Crime Types and Trends of Cyber- Terrorism Tactics and Countermeasures on Cyber- Terrorism Proposals
3 What s Cyber-Terrorism?
4 What s Cyber-Terrorism According to criminal law of China, terrorism is attributed to the crime endangering public security. So is cyber-terrorism. We can define it by two aspects : Intention mass loss of lives severe economic damage to generate public panic comparable to that from a physical act of terrorism. to disturb social and public order The intention of cyber-terrorism is the same as that of traditional crime.
5 What s Cyber-Terrorism Result The object of damage is unspecified. To be as one of endangering public security crimes, cyber-terrorism usually imperils public lives and property. The result of damage is uncertain. The scope affected and harm degree of crime result is out of the criminal s expectation and control.
6 What s Cyber-Terrorism The difference between Hacking and cyberterrorism characteristics Hacking Cyber terrorism Intention Result Aim to cause lesser disruption would not result in severe economic damage or loss of life. Not want to generate social panic Not intending to disturb public order The object of damage is specified ----usually imperial the information system of certain subject. The result of damage is certain----control the result at the certain scope and degree. Aim to cause mass loss of lives or severe damage of economy Want to generate social panic Intend to disturb public order The object of damage is unspecified The result of damage is uncertain
7 Crime Types and Trends of Cyber-Terrorism
8 Crime Types and Trends of Cyber-Terrorism Crime types Cyber as object: Terrorist attacks critical information infrastructure to cause mass loss of lives, severe damage of property or disorder of society. Cyber as tool: Terrorist tend to facilitate traditional forms of terrorism by using Internet to: organize and command on internet communicate with each other threaten the victims distribute terror information or rumors. recruit supporters. impart the method of terrorism. acquire intelligence in support of physical violence.
9 Crime Types and Trends of Cyber-Terrorism Trends Due to being the vitals of homeland security, economic development and public order, the critical information infrastructure has become the main target of cyberterrorism. Therefore, it is necessary to reinforce the security of the critical information infrastructure. With the rapidly development of internet industry, internet is exploited as important tool and channel by terrorists. Owing to application of divers information technology, the targets of cyber-terrorism will include not only computer network but also other digital devices.
10 Crime Types and Trends of Cyber-Terrorism Trends Compare with traditional crimes, cyber-terrorists are more easier to disguise their identities and the damage is more severe. So both investigation and information security safeguard will confront with new challenges. Cyber-terrorism often involves multiple places or countries, so it is essential to establish efficient mechanism of intelligence sharing and legal assistance between different countries or regions.
11 Tactics and Countermeasures on Cyber-Terrorism Protection prevention Emergency response And recovery Investigation
12 Tactics and Countermeasures on Cyber-Terrorism Organ organ of information security safeguard State Council of China State Informatization Leadership Group The National Network and Information Security Coordination Team Different departments of government
13 Tactics and Countermeasures on Cyber-Terrorism organ of information security safeguard 2000, Chinese government established State Informatization Leadership Group (SILG ) which included the National Network and Information Security Coordination Team (NNISCT ). NNISCT is in charge of : researching and enacting strategy and policy of national information security safeguard. organizing and coordinating related departments of government to protect critical information infrastructure. mobilizing and directing computer emergency response. improving information sharing and notification.
14 Tactics and Countermeasures on Cyber-Terrorism organ of law enforcement Organizational structure Information Security Supervisory Bureau (ISSB) of Ministry of Public Security (MPS ) Provincial Information Security Supervisory Department Regional Information Security Supervisory Department
15 Tactics and Countermeasures on Cyber-Terrorism Legislation 1: Cyber as object The legislation of China emphasizes the protection of critical information infrastructure. Article 285, Criminal Law Whoever intrudes into information systems concerning state affairs, construction of defense facilities, or sophisticated science and technology will be sentenced no more than three years in jail. For those who intrude into the information systems related to critical infrastructure, no matter the systems were damaged or not, the intruders will be punished.
16 Tactics and Countermeasures on Cyber-Terrorism 1: Cyber as object Article 124, Criminal Law Whoever sabotages radio and television broadcasting facilities, public telecommunication facilities, and endangers public safety is to be sentenced a maximum imprisonment of seven years. Only the public telecommunication facilities were mentioned in this article, however, it would be better to include all the critical information infrastructure.
17 Tactics and Countermeasures on Cyber-Terrorism 1: Cyber as object Modification Act Ⅲ of Criminal Law In Dec. 2001, the criminal law was amended to combat terrorism. Several articles related to terrorism were renewed. Administrative Penalties Law for Public Security In Aug. 2005, National People s Congress enacted Administrative Penalties Law for Public Security. It provides that whoever illegally intrude or impair general information system, which is not serious enough to be a crime, he will be gotten administrative penalty.
18 Tactics and Countermeasures on Cyber-Terrorism 2: Cyber as tool Modification Act Ⅲ of Criminal Law Any person who seriously disturbs social order by knowingly disseminating terror information of a fabricated fact will be punished with a maximum imprisonment of five years. Most of this kind of cases were committed through Internet. Administrative Penalties Law for Public Security If a person disturbs social order by distributing rumor related to danger, plague or others, and it generate public panic, he will be gotten administrative penalty.
19 Tactics and Countermeasures on Cyber-Terrorism Policies Chinese government constitutes many policies to protect critical information infrastructure, such as: national information security strategy It confirms the goal, tactics, measures and safeguardsupporting works of protection for critical information infrastructure safeguard. regulation and standard of grading protection of information security other policies of information security industry.
20 Tactics and Countermeasures on Cyber-Terrorism Prevention and Management Carry out the system of grading protection of information security. All the critical information systems are asked to be evaluated by third party and divided into 5 grades. According to the regulation and standard, the critical information system with specified grade should be taken corresponding safeguards and supervised by government. Adopt crisis evaluation of information system in order to reinforce crisis management for critical information infrastructure.
21 Tactics and Countermeasures on Cyber-Terrorism Prevention and Management Construct and implement notification system of network and information security. In 2004, The National Network and Information Security Coordination Team (NNISCT) established National Notification Center for Network and Information Security (NNCNIS ). NNCNIS is responsible for aggregating, analyzing, assessing, notifying and early warning information concerning network and information security.
22 Tactics and Countermeasures on Cyber-Terrorism Prevention and Management set up and execute classified response system of cyber-emergency, so as to enhance capability of response for critical information infrastructure on preventing preparing responding recovering. Supervise ISP and ICP fulfill the following legal responsibilities: Inform users of their legal burden when they apply Internet services. Report offences or crimes to police in time. Assist police to investigate cyber-terrorism or other cybercrimes. Provide related data according as legislation.
23 Tactics and Countermeasures on Cyber-Terrorism Crime Striking Fast crime detecting, reporting and responding mechanism are essential to combat cyber-terrorism. Set up online cyber-crime reporting website in each province. Beijing: Shanghai: established 24/7 contact mechanism among administrators of critical information infrastructure, ISP, ICP and Cyberpolice in order to efficiently deal with information security incidents occurred in critical information systems.
24 Tactics and Countermeasures on Cyber-Terrorism Crime Striking Enhance digital forensic technology and train staff regularly. Regulate investigation procedure for assuring the admissibility of electronic evidence. Seek technology supporting by Cooperating with institutes, information technology enterprises, ISP, ICP and other organizations. Improve cooperation and coordination with other countries and regions by Participating the international training of technology related to cyber-terrorism or other cyber-crimes. Supplying legal assistance for Japan, Korea, Hongkong of China, etc. Promoting intercourse and collaborate on legislation, computer forensic, staff training etc.
26 Proposals Reinforce cooperation and coordination among the members of ARF for combating cyber-terrorism: Take effort to unify the definition of cyberterrorism so as to guide legislations of the members. Establish Point-of-contact on 24/7 basis between our law enforcement agencies. Set up efficient and effective intelligence sharing mechanism.
27 Cyber-terrorism An regional security Let s work together Thanks a lot
Inter-American Development Bank Institutional Capacity of the State Division (ICS), Institutions for Development (IFD) From Cybersecurity to Cybercrime: A Framework for Analysis and Implementation TECHNICAL
Qatar National Cyber Security Strategy MAY 2014 i ii TABLE OF CONTENTS FOREWORD... v EXECUTIVE SUMMARY... vi 1. INTRODUCTION...1 2. THE IMPORTANCE OF CYBER SECURITY TO QATAR...3 2.1 Threats... 3 2.2 Challenges...
The National Cyber Security Strategy (NCSS) Success through cooperation 1. Introduction The Netherlands stands for safe and reliable ICT 1 and the protection of the openness and freedom of the Internet.
National Emergency Communications Plan 2014 This page intentionally left blank. MESSAGE FROM THE SECRETARY Since the Department of Homeland Security (DHS) was established in 2003, one of its top priorities
The IT Industry s Cybersecurity Principles for Industry and Government 2011 ITI MEMBER COMPANIES Apple Inc. TABLE OF CONTENTS Executive Summary 5 Setting the Stage 7 Six Cybersecurity Principles 9 Principle
Cyber Security: Designing and Maintaining Resilience White paper presented by: Georgia Tech Research Institute Cyber Technology and Information Security Laboratory Dr. George A. Wright Chief Engineer Terrye
United States Government Accountability Office Report to Congressional Requesters April 2014 INFORMATION SECURITY Agencies Need to Improve Cyber Incident Response Practices GAO-14-354 April 2014 INFORMATION
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
2013 Italian Cyber Security Report Critical Infrastructure and Other Sensitive Sectors Readiness Cyber Intelligence and Information Security Center ! CIS Sapienza Cyber Intelligence and information Security
New York State Office of the State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT MANAGEMENT GUIDE Information Technology Governance Thomas P. DiNapoli State Comptroller
RESULTS OF THE NATIONAL CAMPUS SAFETY AND SECURITY PROJECT SURVEY National Campus Safety and Security Project Members National Association of College and University Business Officers (lead) APPA: Leadership
Getting it right for children and young people who present a risk of serious harm Meeting Need, Managing Risk and Achieving Outcomes 1 Contents Introduction Pg 3 Definitions Pg 5 Background Pg 8 Self Assessment
CYBERSECURITY POLICY MAKING AT A TURNING POINT Analysing a new generation of national cybersecurity strategies for the Internet economy Also includes contributions from non-governmental stakeholders Cybersecurity
Cyber security: it s not just about technology The five most common mistakes kpmg.com b Cyber security: it s not just about technology Contents Preface 1 01 Understanding the cyber risk 3 02 The five most
ST/ESA/STAT/SER.F/89 Department of Economic and Social Affairs Statistics Division Studies in Methods Series F No. 89 Manual for the Development of A System of Criminal Justice Statistics United Nations
December 18, 2008 Dear NIMS Stakeholders: Homeland Security Presidential Directive (HSPD)-5, Management of Domestic Incidents, directed the development and administration of the National Incident Management
Prevent duty guidance Prevent duty guidance 2 Prevent duty guidance 3 Prevent duty guidance Guidance for specified authorities in England and Wales on the duty in the Counter-Terrorism and Security Act
The Global Principles on National Security and the Right to Information (Tshwane Principles) The Global Principles on National Security and the Right to Information (Tshwane Principles) These Global Principles
BASEL CONVENTION ON THE CONTROL OF TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES AND THEIR DISPOSAL PROTOCOL ON LIABILITY AND COMPENSATION FOR DAMAGE RESULTING FROM TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES
AFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION EX.CL/846(XXV) AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA P.O. Box: 3243, Addis Ababa, Ethiopia, Tel.: +251-115 18 24 02 Fax: +251-115
Prevent Duty Guidance: for England and Wales Guidance for specified authorities in England and Wales on the duty in the Counter-Terrorism and Security Act 2015 to have due regard to the need to prevent
10101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010 NCSRA II 01010101010101010101010101010100101010101010101010101010101010101
TURKISH JUDICIAL SYSTEM BODIES, DUTIES AND OFFICIALS BY İsmail Aksel Judge 1 Turkish Judicial System By İsmail Aksel Publisher : The Ministry of Justice of Turkey The Department for Strategy Development
GUIDE FOR DEVELOPING HIGH-QUALITY SCHOOL EMERGENCY OPERATIONS PLANS U.S. Department of Education U.S. Department of Health and Human Services U.S. Department of Homeland Security U.S. Department of Justice
This policy paper defines a general strategy for the Office of the Prosecutor, highlights the priority tasks to be performed and determines an institutional framework capable of ensuring the proper exercise
LIBERTY AND SECURITY IN A CHANGING WORLD 12 December 2013 Report and Recommendations of The President s Review Group on Intelligence and Communications Technologies This page has been intentionally left
United States Government Accountability Office Report to Congressional Requesters April 2015 AIR TRAFFIC CONTROL FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to
Proceedings of the First IFIP TC9 / TC11 Southern African Cyber Security Awareness Workshop 2011 Gaborone, Botswana 12 May 2011 A workshop managed by CSIR, South Africa Edited by J Phahlamohlaka, L Leenen,