Cybercrime & Cybersecurity



Similar documents
Cyber Crime and Data Retention

CYBERCRIME AND THE LAW

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES

The EU approach to Cybersecurity and Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

24/7 High Tech Crime Network

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Honourable members of the National Parliaments of the EU member states and candidate countries,

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Helping to protect your business and your customers in the event of a data breach

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Cybercrime in Canadian Criminal Law

The European Response to the rising Cyber Threat

BSA GLOBAL CYBERSECURITY FRAMEWORK

Cybercrime: risks, penalties and prevention

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

Mitigating and managing cyber risk: ten issues to consider

Models for Cyber-legislation in ESCWA member countries

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

Migration/ Asylum. Co-operation in the field of drugs

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

The President s Task Force on Identity Theft and The FTC s Role in Identity Theft

Procedure for Managing a Privacy Breach

Cyber security Country Experience: Establishment of Information Security Projects.

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

How To Deal With Social Media At Larks Hill J & I School

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :

Police Officers who Commit Domestic Violence-Related Criminal Offences 1

Fraud and Abuse Policy

An Overview of Cybersecurity and Cybercrime in Taiwan

National Plan to Address Cybercrime

Online Copyright Infringement. Discussion Paper

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Acceptable Use Policy

In an age where so many businesses and systems are reliant on computer systems,

Information Security Law: Control of Digital Assets.

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children

Peace and Justice in Cyberspace

U. S. Attorney Office Northern District of Texas March 2013

more dangerous. One way that private entities may defend against cyber attacks is by

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS

Cyber Security Recommendations October 29, 2002

Perception of Cyber Crime in Slovenia

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

CRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

INFORMATION SECURITY MANAGEMENT POLICY

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

U.S. Cyber Security Readiness

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Optional Protocol on the sale of children, child prostitution and child pornography

Using Public Computer Services in Somerset Libraries

Cybersecurity y Managing g the Risks

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Maritime Law Enforcement

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.

JPMA - Terms and Conditions

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

Cybercrime: Improving international cooperation

HOUSING SERVICES. Policy Anti Social Behaviour Policy Version 2. Issue Date Lead Officer Neil Turton Review Date

INFORMATION SECURITY POLICY

Operational indicators of trafficking in human beings

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

National Cyber Security Strategy of Afghanistan (NCSA)

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

What legal aspects are needed to address specific ICT related issues?

How To Use A College Computer System Safely

Cyber Security Strategy

5581/16 AD/NC/ra DGE 2

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Transcription:

Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London

Introductory Remarks Inherently transnational crime e.g. transatlantic bomb plot Harmonisation & co-operation Multi-lateral & bi-lateral instruments Budapest Convention (2001) Influence & implementation Preventing data havens e.g. I love you virus Enhance enforcement

Harms Physical harm Hate speech, child abuse harassment Economic harm loss of business/information assets e.g. music industry & P2P loss & disruption of business activity e.g. e.g. Polish airline LOT (21 June 2015) brand & reputational damage as victim (e.g. security breach), as source ( botnets ) Societal harm Critical national infrastructure e.g. Air traffic control systems

Incidence & cost Numbers: Always big! Reporting problem Law enforcement experience & resources Statistical recording Sex, lies & cybercrime statistics Losses are concentrated and therefore not representative Unverified and self-reported numbers Outliers can have a huge impact on the result Collected by entities that have an incentive to over report Developed & developing country perspectives

Legal response Criminalising behaviours Computer-related Computer-integrity Content & contact-related Enhancing law enforcement Powers of investigation While safeguarding individual rights Imposing obligations Information security Prevention being better than cure... Obligations to implement

Harmonisation Suppression conventions Homogenization of criminal justice systems Regularization of criminal justice relationships Co-operation between states Moving evidence & people Formal & informal Jurisdiction Extending material & procedural Concurrency problem Extraterritorial Active nationality

Law reform Convention on Cybercrime (N o 185, November 2001) 45 (47) Member countries + US, Japan, South Africa, Canada Australia, Dominican Republic, Mauritius and Panama US ratified 1 January 2007; UK ratified 25 May 2011 Additional Protocol concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems (N o 189, January 2003) 35 (47) Member Countries + Canada, South Africa Regional initiatives - Antigua (2013), Bahamas (2003), Barbados (2005), Costa Rica, Jamaica (2010) and Trinidad (2000)

Policing cyberspace Public law enforcement Industrial scale e.g. Operation Ore Specialised training & resources Police, prosecutors and judiciary International co-operation Tools, e.g. Interpol African Working Party on IT Crime 24/7 policing, e.g. www.virtualglobaltaskforce.com Interaction with private sector Role of telecoms operators and ISPs

Policing cyberspace Assistance to law enforcement Interception Building an intercept capability Communications data Data preservation v data retention? Protected data Cryptographic technologies, e.g. Blackberry, Apple Private law enforcement e.g. Internet Watch Foundation Notice and take-down Controlling access, i.e. filtering

Cybersecurity Security services Confidentiality, integrity, availability, authentication & accountability e.g. Digital signatures and certification services Provision of services e.g. Electronic payments Protection of rights Privacy & intellectual property rights e.g. Digital watermarking

Legal response Obligations to implement appropriate technical and organisational measures e.g. FTC enforcement against HTC Obligations to notify of security breaches To mitigate losses Promoting compliance with standards e.g. IS0/IEC 27002: 2005: Code of practice for information security management ; PCI-DSS... Institutional response e.g. Computer Emergency Response Team (CERT) e.g. PKI Certification service & key management

Concluding remarks Impact of harmonisation Direct & indirect influence Limits of harmonisation Cultural differences Criminal justice system e.g. sentences Law enforcement & rights infringement e.g. data retention