ICT Barriers, High Tech Crime, and Police



Similar documents
Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement

2012 NORTON CYBERCRIME REPORT

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641)

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES

How To Prevent Cybercrime

Technology Crime Services

Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices

HAS BRAZIL REALLY TAKEN OFF? BRAZIL LONG-RUN ECONOMIC GROWTH AND CONVERGENCE

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

41 T Korea, Rep T Netherlands T Japan E Bulgaria T Argentina T Czech Republic T Greece 50.

World Consumer Income and Expenditure Patterns

Appendix 1: Full Country Rankings

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

GE Grid Solutions. Providing solutions that keep the world energized Press Conference Call Presentation November 12, Imagination at work.

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Establishing a State Cyber Crimes Unit White Paper

United Kingdom Internet Security Threat Profile

Customer Support. Superior Service Solutions for Your Laser and Laser Accessories. Superior Reliability & Performance

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia

U. S. Attorney Office Northern District of Texas March 2013

The Advanced Cyber Attack Landscape

Executive Director Centre for Cyber Victim Counselling /

Report on Government Information Requests

CYBER SECURITY STRATEGY AN OVERVIEW

An Overview of Cybersecurity and Cybercrime in Taiwan

The Internationalization of Higher Education: Foreign Doctorate Holders in a Russian Academic Market as Agents of Transformation

EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013

Information Security is not an IT problem! Enterprise Risk & Security Management

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Consumer Credit Worldwide at year end 2012

Table 1: TSQM Version 1.4 Available Translations

FACT SHEET Global Direct Selling

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

ARE ENTREPRENEURS BORN OR MADE? AMWAY GLOBAL ENTREPRENEURSHIP REPORT ITALY AND UNITED STATES IN COMPARISON

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

Microsoft s cybersecurity commitment

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

Security Business Review

GfK PURCHASING POWER INTERNATIONAL

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

What legal aspects are needed to address specific ICT related issues?

VITA CURRICULUM VITAE. Mark Pullin 116 Beechwood Victoria, TX Phone: Fax: Internet:

How to Obtain CODIS. Tim Zolandz. FBI Laboratory (703)

Building a Global Internet Company: Driving Traffic to Your Site. Benjamin Edelman Harvard Business School

Teaching Information Security to Engineering Managers

Capacity Building in Cyberspace Security

Chapter 4A: World Opinion on Terrorism

The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost *

Threats to Local Governments and What You Can Do to Mitigate the Risks

Prof. Alessandro Balducci, Prorettore Vicario

The global challenge

Dividends Tax: Summary of withholding tax rates per South African Double Taxation Agreements currently in force Version: 2 Updated:

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

ADDRESS. Ronald K. NOBLE. Secretary General. 62 nd FIFA CONGRESS. Budapest, Hungary

Identity Theft and Strategies for Crime Prevention

THE ETHICS HELPLINE Worldwide Dialing Instructions April 2012

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

How To Get A New Phone System For Your Business

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

National Cyber Crime Unit

INCO for Cyber Security. PTCIF: 21st Feb 2014

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

BT Premium Event Call and Web Rate Card

Combating Tax Evasion through Transparency and Exchange of Information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

Computer Facilitated Crimes Against Children International Law Enforcement Training

Triple-play subscriptions to rocket to 400 mil.

[NUGENESIS SAMPLE MANAGEMENT ] AMPLE IMPROVING LAB EFFICIENCY, ANAGEMENT ACCELERATING BUSINESS DECISIONS. bigstock.com $69

Transcription:

ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College Station, Texas 77843 mrice@tamu.edu Prepared for presentation at the CAFRAD s Conference ICT AS A MODERN SOLUTION TO SECURITY THREAT, EARLY DETECTION AND PREVENTION OF CRIMES June 23-25, 2014, Hotel Intercontinental, Tangiers, Morocco

PRESENTATION OBJECTIVES OVERVIEW OF COMPUTER CRIMES AND TECHNOLOGY DYNAMICS OF COMPUTER CRIME AND ICT CRIMINALITY ICT BARRIERS FOR POLICE IN SOLVING ICT CRIME Dr. Rice 2

HIGH TECH CRIME Known as IT CRIME (information technology) later known as ICT CRIME (information and communication technology) Known as Computer Crime Known as Computer Related Crime or Computer Facilitated Crime Known as Internet Crime Known as Digital Crime Known as Cyber Crime (also known as Cyber crime) Known as High Tech Crime Cyber Crimes are growing and by 2017, the global Cyber Security market is expected to skyrocket to $120.1 billion POINT: ICT CRIME is about computers and criminal law Dr. Rice 3

More than 600,000 FaceBook accounts are compromised every day. 15% of social network users have reported that their profiles have been hacked by pretenders. 1 in 10 social network users said they d fallen victim to a scam or fake link on social network platforms. EXTENT OF CYBER CRIME Victims per year 556 million Victims per day Over 1.5 million Victims per second 18 Identities exposed More than 232.4 million May 17, 2013: http://www.gogulf.ae/blog/cyber-crime/ Dr. Rice 4

DYNAMICS OF COMPUTER CRIME Information technology makes it possible to carry out criminal activity in a different location without traveling. (trans-border criminality) IT makes it possible for criminal activity to occur that is not directly observable without a specially trained eye. IT makes it possible to be outside the jurisdiction of criminal prosecution QUESTION: (Is there a need for harmonization of legal norms and/or international cooperation among countries regarding ICT?) Dr. Rice 5

ICT CRIMINALITY Has something to do with knowledge (or lack of knowledge to investigate) Knowledge of how ICT works and its infrastructure Depends upon knowledge of what happens in an automated environment and how it happens More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities Dr. Rice 6

HYPOTHETICAL COMPUTER CRIME A CYBER CROOK hacks into a bank in Mexico City. Mexican investigators trace the computer used in the attack to New York City and quickly contact FBI agents, who discover that the New York computer is linked to a computer in South Korea. They alert Korean agents, who learn that the attack originated in Bangkok, Thai agents make the arrest. POINT--Savvy crooks will base their operations in a country or countries with the most lax cyber laws. Dr. Rice 7

TOP 15 Countries Where Cyber Attacks Originate (Feb 2013) Source of Attack Number of Attacks Russia 2,402,722 Taiwan 907,102 Germany 780,425 Ukraine 566,531 Hungary 367,966 USA 355,341 Romania 350,948 Brazil 337,977 Italy 288,607 Australia 255,777 Argentina 185,720 China 168,146 Poland 162,235 Israel 143,943 Japan 133,908 www.go- gulf.ae/blog/cyber- Dr. Rice 8

POLICE OBSTACLES TO SOLVING ICT CRIME For Police optimizing the use of technologies can contribute to solving crime. However, there are Legal (L), Organizational (O) and Technological (T) OBSTACLES (L) Absence of a proper legal basis for using a particular technology due to a political, legal, or ethical perspective. (O) Insufficient adaptability of colleagues (not trained or under trained) (O) Insufficient financing (money or funding) (O) Insufficient management guidance, insight and overview Dr. Rice 9

POLICE OBSTACLES TO SOLVING ICT CRIME (cont d) (T) Insufficient capacity for innovation and development Insufficient overview of available technologies (T) Insufficient availability of technologies (T) Insufficient user friendliness Dr. Rice 10

ICT Crime Analysis INVOLVES: Special training in the following areas: Encryption breaking technology Recovery Equipment Software to collect input/output data Digital Forensic Labs Hacking and Password Cracking Network Intrusion Detection Photo/video/audio analysis Dr. Rice 11

GENERAL CONCLUSION Trans border crimes calls for trans border measures. More internationally agreed upon and enforced laws. Technology is a democratic instrument meaning it can be exploited by anyone. Dr. Rice 12

CONCLUSION: What is needed in Africa My preliminary research suggests a number of African countries need: Stronger ICT security systems Stronger security awareness training Installation of CCTV cameras/monitors (closed circuit television) Installation of tracking technology (GPS devices) Dr. Rice 13

SUGGESTED READINGS Kim-Kwang Raymond Choo, The Cyber Threat Landscape: Challenges and Future Research Directions. Computers and Security 30 (2011): 719-731. Bart Custers, Technology in Policing: Experiences, Obstacles and Police Needs. Computer Law and Security Review 28 (2012): 62-68. Paul Hunton, The Stages of Cybercrime Investigations: Bridging the Gap Between Technology Examination and Law Enforcement Investigation. Computer Law and Security Review 27 (2011):61-67. Pieter Kleve, Richard De Mulder, and Kees van Noortwijk, The Definition of ICT Crime. Computer Law and Security Review 27 (2011): 162-167. Henry Osborn Quarshie, Using ICT to Fight Crime A Case of Africa. Journal of Emerging Trends in Computing and Information Systems 5 (1) (January 2014): 21-24. Dr. Rice 14