ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February 2015 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE Strategic/Criminological Room MTC02.11 Legal Technical Room MTC02.07 10:00 11:00 11:00 11:30 11:30 13:00 13:00 14:00 14:00 14:30 Introducing the online child predators LINC KU Leuven & University of Tilburg First responders e- learning CRIDS-ICRI- Belgian Computer Crime Units (FCCU RCCUs) COFFEE BREAK Investigating online: best practices and legal reflections Institute for Criminal Law LUNCH BREAK Introduction to the Belgian Cyber Security Guide Microsoft - ICRI Physical attacks against security devices CryptoGroup- UCL IPv6 training -FCCU 14:30 15:45 Online behaviour of Minors LINC Tilburg University A priori and a posteriori legal means to fight against cybercrime CRIDS - FCCU Web Security Training 15:45 16:15 COFFEE BREAK 16:15 17:15 17:15 18:00 18.00 19:00 Introduction to Cryptography CryptoGroup Digital Evidence Gathering IGO-IFJ Guided Tour of Leuven Recent Web Security Technology Web-based device Fingerprinting 19:00 21:30 NETWORKING DINNER
Pre-Congress B-CCENTRE Workshop 3 February 2015 Detailed programme 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE 10:00 11:00 Introducing the online child predators Professor dr. Stefan Bogaerts, LINC KU Leuven & University of Tilburg In this workshop, we first examine differences between identified and unidentified child molesters and child porno downloaders from a clinical perspective: do they differ from each other? Second, these findings will be extended to the global worldwide problem of online predators; preliminary research tools will be explained of how to discourage and deter online predators. Finally, we discuss a social network tool that can help police investigators in the detection of sex offenders. This tool can also be applied to online sexual abuse. Physical attacks against security devices Dr. François Koeune, CryptoGroup - UCL Besides dedicated talks on specific topics, UCL organised two series of trainings for B- CCENTRE: one introducing cryptography for a non-technical audience, the other devoted to physical attacks and the threat they represent. This talk will discuss the physical attacks training, the target of which was to provide participants (required to have a good background in cryptography and security) with a perspective on physical attacks, the practical threat they represent, the possible countermeasures, etc. The training provided a theoretical introduction to physical attacks, then presented various potential application contexts, such as the Keeloq contactless car keys, or cloud-based virtualization, each time discussing the practicability of the attacks and the most recent findings about it. We will describe our experience in organising the training, the lessons we learned and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. 11:00 11:30 COFFEE BREAK 11:30 13:00 First responders e-learning Franck Dumortier and Cathérine Forget, CRIDS Unamur, Ann Mennens,
B-CCENTRE - ICRI- KU Leuven, Belgian Computer Crime Units (FCCU RCCUs) Based on the e-learning tool developed by the French 2CENTRE (UTT), work was initiated for creating a localised version for Belgium. After knowledge transfer on the tool to be used, a customised version is being created by a working group of police officers and academics from different regions in the country. Approach and methodology used, work in progress and first results will be presented. Investigating online: best practices and legal reflections Professor Frank Verbruggen & Kristel De Schepper, Institute for Criminal Law KU Leuven This workshop will focus on possibilities law enforcement has and the difficulties it faces when investigating online. Should law enforcement be able to resort to hacking as an investigative measure? A matter of concern for those intent on regulating this, will be the inevitable issue of jurisdiction. Two issues will be addressed more in particular, on the basis of the Belgian experience: 1) can a state invoke its territorial jurisdiction to obtain cooperation with its law enforcement services from foreign-based private entities? 2) where does one locate searches conducted by law enforcement in cyberspace to judge who has jurisdiction and who lacks it? IPv6 training Professor Danny Hughes & Rafaël Bachiller, KU Leuven IPv6 will become increasingly prevalent in the coming years. Forensic Investigators will need to be aware of the changes in IPv6, and the security issues surrounding those changes. This workshop will introduce the training developed (theory and lab sessions) in the frame of the B-CCENTRE project and will focus on explaining IPv6 routing and log file analysis. 13:00 14:00 LUNCH BREAK 14:00 14:30 Introduction to the Belgian Cyber Security Guide Bruno Schröder, Microsoft, Ann Mennens, B-CCENTRE ICRI KU Leuven 14:30 15:45 Online behaviour of Minors Professor dr. Stefan Bogaerts & Drs. Janneke Schilder, LINC KU Leuven & University of Tilburg Does a school intervention works? That's the question! There is a big difference between consciousness/awareness and its conversion into actual behaviour. In the first part, we will discuss the impact of a school-based intervention on online risk awareness and behaviour of primary school children (grades 4 and 6) at two measurements. In the second part, we investigate the role of parents (parental control
and parental supervision). In the third part, we study Privacy, Risk, Information Protection and Social Network Site Using Behaviour among three groups of Flemish university students. A priori and a posteriori legal means to fight against cybercrime Franck Dumortier and Cathérine Forget, CRIDS Unamur & FCCU The 2006/24/EC Data Retention Directive imposed on telecom operators to retain the "metadata" of citizens for a minimum of 6 months and at most 24 months. This directive was invalidated by the Court of Justice of the European Union on 8th April 2014. The aim of this session is to discuss the possible consequences of this decision on the Belgian legislation transposing the Directive. If the blanket massive data collection measures were originally justified by the EU Parliament to fight against serious crime and terrorism, do they still have their place at the time of the resurgence of crime on Internet - for example, child pornography, arms sales online, drug trafficking - facilitated by new means of anonymity such as VPN or TOR. Besides the difficulty of a priori retention of personal data entailed by this phenomenon, it raises the question of the adequacy of the legal framework relating to ex-post particular methods of research, including observation and infiltration into the "virtual" world. Web Security Dr. Philippe De Ryck, KU Leuven In this talk, we will give an overview of B-CCENTRE's training day on Web Security, held last March. We briefly sketch the different topics and lab sessions that were covered in the training. By elaborating on a small selection of topics, we illustrate what the participants have learned from this course, and why such training events are important. 15:45 16:15 COFFEE BREAK 16:15 18:00 Introduction to Cryptography Dr. François Koeune, CryptoGroup - UCL This talk will discuss the introduction to cryptography training, the target of which was to provide participants (who were not required to have any specific background knowledge) with a global view of what cryptography does and how it can be used to circumvent various threats on the internet. In this talk, we will describe our experience in organizing the training, the lessons we learned and second edition, and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. Digital Evidence Gathering IGO-IFJ, Jan Kerkhofs, Federal Magistrate and Philippe Van Linthout, Investigating Judge
A three day seminar is organised on a yearly basis by the Institute for Juridical Training (IGO-IFJ) to provide magistrates an in-depth introduction to matters related to cybercrime and the legal challenges related to it. During this session, experienced trainers will provide an insight in the course set up and will introduce different modules and their content in an interactive manner to the audience. 16:15 17:15 Recent Web Security Technology Dr. Lieven Desmet, KU Leuven In this talk, various new web security mechanisms (such as CSP, HSTS and XFO) will be introduced and explained. These mechanisms have recently been proposed within various web standardization activities and by browser vendors, and allow the website owner to have more control over the client-side security of his web application. All these security mechanisms have a similar deployment pattern: security policies are defined by the website owner, and are enforced by security controls within the browser environment. 17:15 18:00 Web-based Device Fingerprinting Tom Van Goethem and Thomas Vissers, KU Leuven Presentation of the state of the art in web fingerprinting, and our findings on how this is used in practical contexts 16:30 18:00 Registration open for ICSS2015 18:00 19:00 Guided tour of Leuven 19:00 21:30 NETWORKING DINNER at Restaurant Ter Eyken and Restaurant Mykene.