An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

Similar documents
Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

The FBI and the Internet

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

Security in the Cloud an end to end Problem

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Establishing a State Cyber Crimes Unit White Paper

Cybercrime: an overview of incidents and issues in Canada

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

ASEAN s Cooperation on Cybersecurity and against Cybercrime

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Supply Chain Security Training Needs for Law Enforcement Agencies

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

The EU s approach to Cyber Security and Defence

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013

CTC Special Meeting on Communications and IT New York May Thank you very much. I am very pleased to be here to participate in

National Cybersecurity Awareness Campaign

Cyber Security Strategy

Cybercrime: Improving international cooperation

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Top Fraud Trends Facing Financial Institutions

CYBERCRIME AND THE LAW

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Who s Doing the Hacking?

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, June 2006)

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

National Cyber Crime Unit

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

How To Protect Yourself From Cyber Crime

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

Edward Lowery III. Special Agent in Charge Criminal Investigative Division, U.S. Secret Service. Prepared Testimony

Fraud and Abuse Policy

New challenges in Data privacy.

International Serious and Organised Crime Conference

Classification scheme Criminal law and criminology (STR)

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Emerging risks for internet users

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

Anti-Cyber Crime Law (8 Rabi1, 1428 / 26 March 2007)

The UK cyber security strategy: Landscape review. Cross-government

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors

AUDIT TAX SYSTEMS ADVISORY

Data Security on Every Network Layer. Internet Security Days 2015, Phantasialand Brühl ADVA Optical Networking SE

Internet Governance Forum Hyderabad, India Dimensions of cyber-security and cyber-crime 4 December 2008

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Peace and Justice in Cyberspace

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Directives and Legislation

Home Security: Russia s Challenges

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

IT Security Community

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Cyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

RETHINKING CYBER SECURITY Changing the Business Conversation

NATIONAL POLICING CYBERCRIME SUMMIT. October 19 & 20, 2015 Toronto

FAQs Organised Crime and Anti-corruption Legislation Bill

Policies and Practices on Network Security of MIIT

PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS

An Overview of Cybersecurity and Cybercrime in Taiwan

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

STATEMENT OF BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ENTITLED

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

National Plan to Address Cybercrime

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE

Cybersecurity in the Commonwealth: Setting the Stage

Welcome to this ACT webinar

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Promoting a cyber security culture and demand compliance with minimum security standards;

UN Emergency Summit on Cyber Security Topic Abstract

INTRODUCTION DEVELOPMENT AND PHENOMENA

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

Commonwealth Organised Crime Strategic Framework: Overview

FBI: Taking down Botnets - Testimony

Cyber Security. John Leek Chief Strategist

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Cyber-Crime in Sri Lanka. A. H. Dinithi Jayasekara, Wijayananda Rupasinghe. University of Kelaniya, Kelaniya, Sri Lanka

Transcription:

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges Marc Goodman Director of International Cooperation International Multilateral Partnership Against Cyber Threats (IMPACT)

What is a cyber crime? Cyber terrorism? Cyber threat? Why Care?

Traditional Crime Has Long Ago Moved Online Money laundering Child pornography/sexual Explitation of Children Sale and trafficking of illegal drugs Prostitution Internet fraud/credit Card Fraud Illegal gambling Hate propaganda/racism crimes Intellectual Property Theft/Piracy Harassment/Stalking Threats/Extortion Identity Theft And many, many more

New Forms of Criminality (thanks to computers/cyberspace) Crimes directed against a computer or a computer network itself Unauthorized use of computer system Hacking Denial of service attacks (DDOS) Virus/Malware transmission Phishing Botnet Armies and attacks Terrorist Use of the Internet Crime in Virtual Worlds

Critical Infrastructure Threats Beyond the economic consequences, society relies on computerized system for almost everything in life Air, train and bus traffic control Medical service coordination Banking, Energy, Government and national security When countries depend on computer-based systems and globally interconnected networks for their critical infrastructure, it exposes us to new threats. Not theoretical Australia, Estonia, Massachusetts

Terrorist Use of the Internet --thousands of sites Publication of terrorist ideologies and ideas ) propaganda(. Raising funds/ terrorist financing ) money transfer/ e- cash( Recruiting new members ) finding each other( Launching threat or intimidation campaigns ) beheadings( Communication among members P2P, SMS, VOIP ) encryption( - Obtaining operational information ) targeting; JFK Airport( Coordinating, planning and discussing terrorist actions Logistics ) ordering supplies, car/ apt. rentals, explosive, chemical/ biological components(

Understanding the Threat Canadian agents make the arrest Korean agents discover attack came from Vancouver Philippine investigators discover attack came from computer in Buenos Aires Brazilian investigators discover attack came from Seoul A Criminal Intrudes into a Bank in Manila Where is the crime scene?

Challenges of Computer Crime Investigation Irrelevance of geographic distance (no borders) Investigative Costs, Resources, Equipment, Training Real Time Investigations Anonymity Jurisdiction Legal Issues Technology is evolving rapidly

Legal Issues Substantive legal problems Procedural legal problems Highly complex search and seizure laws. Mutual Legal Assistance Treaties, letters rogatoires, dual criminality, conflict of law, extradition, etc. Police and prosecutors must work together

ABOUT IMPACT. A Not For Profit organisation, IMPACT is a politically agnostic platform to foster collaborative partnerships across Governments, private sector, and the academia. Works closely with multi-lateral organisations, such as the UN/ITU. An agreement to house and implement Global Cyber Security Agenda. Inspired by the Center for Disease Control & Prevention ( CDC ) in Atlanta, IMPACT acts as the platform that enables all member countries to benefit from, and contribute to, global resources in the interest of their national cybersecurity.

In conclusion With over 200 countries connected to the Internet, cybercrime has become a global issue that requires the full participation and cooperation of the public and private sectors in all countries, including the 150 plus developing countries around the globe Avoiding Cyber Havens (like money laundering havens) We will sink or swim together: coordination and cooperation are key Thanks you!