ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness



Similar documents
CRIMINOLOGICAL RESEARCH REPORT

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Programme Specification

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

Cyber Security and Digital Forensics Training Platform

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

24/7 High Tech Crime Network

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Insiders Guide to EU Affairs

Europol Unclassified Basic Protection Level VACANCY NOTICE

Research Topics in the National Cyber Security Research Agenda

Forensics Europe Expo 2015 Conference Programme

Forensics in Nuclear Security. by the Netherlands Forensic Institute

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

Report of the Strategic Meeting on Cybercrime

Optional Protocol on the sale of children, child prostitution and child pornography

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

Operational indicators of trafficking in human beings

Cyber intelligence exchange in business environment : a battle for trust and data

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender

ETSC Fact Sheet. Drink Driving in Belgium. Current Belgian legislation on drink-driving 8

Europol Public Information. Business Manager Corporate Communications

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

The Massachusetts Strategic Plan for Cyber Crime

How To Become A Member Of Europol

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

Eurojust. The European Union s Judicial Cooperation Unit

The European Response to the rising Cyber Threat

Honourable members of the National Parliaments of the EU member states and candidate countries,

MSc Forensic Psychology. Programme Specification Faculty of Education, Law and Social Sciences May 2010

An Overview of Cybersecurity and Cybercrime in Taiwan

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK. 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

1.1 Full name: Social Work Practitioner Youth Justice

Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice

Cyber Crime and Data Retention

Migration/ Asylum. Co-operation in the field of drugs

Programme Specification and Curriculum Map for MA Criminology with Forensic Psychology

Cyber Crime and Digital Forensics in Japan

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework

School of Psychology. Forensic Psychology Practice Doctorate (ForenPsyD) Three years full-time

FACT SHEET: PROJECT SAFE CHILDHOOD

Tilburg University. U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen

10128/16 LB/dk 1 DGD 1C

ASEAN s Cooperation on Cybersecurity and against Cybercrime

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

The global challenge

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

MSc. Criminology with Forensic Psychology. Programme Specification. 1. Programme title MSC Criminology with Forensic Psychology

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Roadmap for new Cyber security education in ME

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Classification scheme Criminal law and criminology (STR)

Victim services commissioning intentions

CRIMINAL JUSTICE. Major in Criminal Justice. Faculty

The internet and digital technologies play an integral part

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,

8674/15 MC/pf 1 DGD 1B

As part of their course on law and/or sociology in this module, participants will be able to:

Psychology, Social Work and Human Sciences

Issue Brief. Arizona State Senate ARIZONA SEX OFFENDER REGISTRATION AND NOTIFICATION INTRODUCTION ADAM WALSH ACT. November 23, 2009.

WAPIS PROGRAMME. West African Police Information System. This Programme is funded by the European Union

MSc Forensic Psychology

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Ethical Hacking & Cyber Security Workshop

Diablo Valley College Catalog

National Cyber Crime Unit

United Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA

Transcription:

ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February 2015 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE Strategic/Criminological Room MTC02.11 Legal Technical Room MTC02.07 10:00 11:00 11:00 11:30 11:30 13:00 13:00 14:00 14:00 14:30 Introducing the online child predators LINC KU Leuven & University of Tilburg First responders e- learning CRIDS-ICRI- Belgian Computer Crime Units (FCCU RCCUs) COFFEE BREAK Investigating online: best practices and legal reflections Institute for Criminal Law LUNCH BREAK Introduction to the Belgian Cyber Security Guide Microsoft - ICRI Physical attacks against security devices CryptoGroup- UCL IPv6 training -FCCU 14:30 15:45 Online behaviour of Minors LINC Tilburg University A priori and a posteriori legal means to fight against cybercrime CRIDS - FCCU Web Security Training 15:45 16:15 COFFEE BREAK 16:15 17:15 17:15 18:00 18.00 19:00 Introduction to Cryptography CryptoGroup Digital Evidence Gathering IGO-IFJ Guided Tour of Leuven Recent Web Security Technology Web-based device Fingerprinting 19:00 21:30 NETWORKING DINNER

Pre-Congress B-CCENTRE Workshop 3 February 2015 Detailed programme 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE 10:00 11:00 Introducing the online child predators Professor dr. Stefan Bogaerts, LINC KU Leuven & University of Tilburg In this workshop, we first examine differences between identified and unidentified child molesters and child porno downloaders from a clinical perspective: do they differ from each other? Second, these findings will be extended to the global worldwide problem of online predators; preliminary research tools will be explained of how to discourage and deter online predators. Finally, we discuss a social network tool that can help police investigators in the detection of sex offenders. This tool can also be applied to online sexual abuse. Physical attacks against security devices Dr. François Koeune, CryptoGroup - UCL Besides dedicated talks on specific topics, UCL organised two series of trainings for B- CCENTRE: one introducing cryptography for a non-technical audience, the other devoted to physical attacks and the threat they represent. This talk will discuss the physical attacks training, the target of which was to provide participants (required to have a good background in cryptography and security) with a perspective on physical attacks, the practical threat they represent, the possible countermeasures, etc. The training provided a theoretical introduction to physical attacks, then presented various potential application contexts, such as the Keeloq contactless car keys, or cloud-based virtualization, each time discussing the practicability of the attacks and the most recent findings about it. We will describe our experience in organising the training, the lessons we learned and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. 11:00 11:30 COFFEE BREAK 11:30 13:00 First responders e-learning Franck Dumortier and Cathérine Forget, CRIDS Unamur, Ann Mennens,

B-CCENTRE - ICRI- KU Leuven, Belgian Computer Crime Units (FCCU RCCUs) Based on the e-learning tool developed by the French 2CENTRE (UTT), work was initiated for creating a localised version for Belgium. After knowledge transfer on the tool to be used, a customised version is being created by a working group of police officers and academics from different regions in the country. Approach and methodology used, work in progress and first results will be presented. Investigating online: best practices and legal reflections Professor Frank Verbruggen & Kristel De Schepper, Institute for Criminal Law KU Leuven This workshop will focus on possibilities law enforcement has and the difficulties it faces when investigating online. Should law enforcement be able to resort to hacking as an investigative measure? A matter of concern for those intent on regulating this, will be the inevitable issue of jurisdiction. Two issues will be addressed more in particular, on the basis of the Belgian experience: 1) can a state invoke its territorial jurisdiction to obtain cooperation with its law enforcement services from foreign-based private entities? 2) where does one locate searches conducted by law enforcement in cyberspace to judge who has jurisdiction and who lacks it? IPv6 training Professor Danny Hughes & Rafaël Bachiller, KU Leuven IPv6 will become increasingly prevalent in the coming years. Forensic Investigators will need to be aware of the changes in IPv6, and the security issues surrounding those changes. This workshop will introduce the training developed (theory and lab sessions) in the frame of the B-CCENTRE project and will focus on explaining IPv6 routing and log file analysis. 13:00 14:00 LUNCH BREAK 14:00 14:30 Introduction to the Belgian Cyber Security Guide Bruno Schröder, Microsoft, Ann Mennens, B-CCENTRE ICRI KU Leuven 14:30 15:45 Online behaviour of Minors Professor dr. Stefan Bogaerts & Drs. Janneke Schilder, LINC KU Leuven & University of Tilburg Does a school intervention works? That's the question! There is a big difference between consciousness/awareness and its conversion into actual behaviour. In the first part, we will discuss the impact of a school-based intervention on online risk awareness and behaviour of primary school children (grades 4 and 6) at two measurements. In the second part, we investigate the role of parents (parental control

and parental supervision). In the third part, we study Privacy, Risk, Information Protection and Social Network Site Using Behaviour among three groups of Flemish university students. A priori and a posteriori legal means to fight against cybercrime Franck Dumortier and Cathérine Forget, CRIDS Unamur & FCCU The 2006/24/EC Data Retention Directive imposed on telecom operators to retain the "metadata" of citizens for a minimum of 6 months and at most 24 months. This directive was invalidated by the Court of Justice of the European Union on 8th April 2014. The aim of this session is to discuss the possible consequences of this decision on the Belgian legislation transposing the Directive. If the blanket massive data collection measures were originally justified by the EU Parliament to fight against serious crime and terrorism, do they still have their place at the time of the resurgence of crime on Internet - for example, child pornography, arms sales online, drug trafficking - facilitated by new means of anonymity such as VPN or TOR. Besides the difficulty of a priori retention of personal data entailed by this phenomenon, it raises the question of the adequacy of the legal framework relating to ex-post particular methods of research, including observation and infiltration into the "virtual" world. Web Security Dr. Philippe De Ryck, KU Leuven In this talk, we will give an overview of B-CCENTRE's training day on Web Security, held last March. We briefly sketch the different topics and lab sessions that were covered in the training. By elaborating on a small selection of topics, we illustrate what the participants have learned from this course, and why such training events are important. 15:45 16:15 COFFEE BREAK 16:15 18:00 Introduction to Cryptography Dr. François Koeune, CryptoGroup - UCL This talk will discuss the introduction to cryptography training, the target of which was to provide participants (who were not required to have any specific background knowledge) with a global view of what cryptography does and how it can be used to circumvent various threats on the internet. In this talk, we will describe our experience in organizing the training, the lessons we learned and second edition, and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. Digital Evidence Gathering IGO-IFJ, Jan Kerkhofs, Federal Magistrate and Philippe Van Linthout, Investigating Judge

A three day seminar is organised on a yearly basis by the Institute for Juridical Training (IGO-IFJ) to provide magistrates an in-depth introduction to matters related to cybercrime and the legal challenges related to it. During this session, experienced trainers will provide an insight in the course set up and will introduce different modules and their content in an interactive manner to the audience. 16:15 17:15 Recent Web Security Technology Dr. Lieven Desmet, KU Leuven In this talk, various new web security mechanisms (such as CSP, HSTS and XFO) will be introduced and explained. These mechanisms have recently been proposed within various web standardization activities and by browser vendors, and allow the website owner to have more control over the client-side security of his web application. All these security mechanisms have a similar deployment pattern: security policies are defined by the website owner, and are enforced by security controls within the browser environment. 17:15 18:00 Web-based Device Fingerprinting Tom Van Goethem and Thomas Vissers, KU Leuven Presentation of the state of the art in web fingerprinting, and our findings on how this is used in practical contexts 16:30 18:00 Registration open for ICSS2015 18:00 19:00 Guided tour of Leuven 19:00 21:30 NETWORKING DINNER at Restaurant Ter Eyken and Restaurant Mykene.