Free download ppt on cybercrime in india

1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI.

1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI 2 Cyber Crime – Our Common concerns Cyberspace has become a fertile field /to share information/experience pertaining to Cyber crime. Regularly update on best practices/latest innovations in the sector. Ensure proper documentation is done when adding a subscriber. 7 The Industry can… Make users aware of cybercrime’s risks as and share best practices on safeguards. Post advisory on website, bills or/


Creating Trust in Electronic Environment - IT Act 2000 Deputy Controller (Technology) Controller of Certifying Authorities Ministry of Communications &

parties The End entities of RCAI are the Licensed CAs in India. Subscribers and relying parties using the certificates issued by a/in the PKCs issued by a CA. CCA CA Relying Party Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy Trust in Electronic Environment in India CCA : Root of trust, National Repository Licensed CAs Digital signatures for signing documents Certificates, CRLs for access by relying parties PKI operational Other provisions of the IT Act – Cybercrimes/


Trust: A Cloudy Concept Infrastructure Security in The Cloud Kartik Shahani Country Manager - India & SAARC RSA, The Security Division of EMC.

Trust: A Cloudy Concept Infrastructure Security in The Cloud Kartik Shahani Country Manager - India & SAARC RSA, The Security Division of EMC 2 Agenda Stages in the Journey to the Cloud Security Concerns – Trust / and control user access Control and isolate VM Federate identities with public clouds Identity federation Virtual infrastructure security Access Mgmt Cybercrime intelligence Strong authentication Data loss prevention Encryption & key mgmt Tokenization Enable end to end view of security events and /


Michael geist canada research chair in internet and e-commerce law university of ottawa, faculty of law July 24, 2004 ccTLDs and national governments.

in updated report; 70 countries on itu site all data available online via itu itu/geist survey SOME TITLE north america (canada, us, mexico) europe (denmark, finland, france, germany, greece, italy, spain, netherlands, norway, sweden, switzerland, uk, czech, slovak, romania, lithuania, kyrgyzstan, ukraine) asia (cambodia, china, japan, india/ –int’l and multinational agreements eu data protection (whois) coe cybercrime (network requirements) –laws of general application antitrust (icann) intellectual /


Investing in Tech: Understanding Innogration Jim Pearce The Wealth Summit May 2014.

fluid. Battle lines are being drawn in Asia, especially China and India due to huge populations and limited /infrastructure. We like Qualcomm (QCOM), potential for Asian market too big to ignore (room for both Apple and Samsung to grow). New Utilities: Big Data Perhaps the greatest upside potential of all, least likely to become commoditized in near term. Also good for cloud companies, indirectly supports Mobility and Social. We like NICE Systems (NICE), cybercrime/


Carly Nyst Head of International Advocacy A race to the bottom? Trends in privacy and surveillance in Asia, Africa and Latin America.

2012): indefinite interception – Philippines (Cybercrime Prevention Act 2012) Access to communications data UK (Communications Data Bill 2012) South Korea – 36 million times a year Establishment of monitoring centres – India CMS – Uganda (Regulation of Interception/ of surveillance technologies – Pakistan (FTB 2012) New surveillance technologies SIM card registration 48/54 countries in Africa require mandatory registration of SIM cards Identity cards and biometrics DNA databases Positive developments – data/


Internet Governance Forum (IGF) in Athens How to manage global net society? AP-Star Meeting Feb 25 2007 Izumi Aizu.

Society, Kumon Center, Tama University -Henrik Kaspersen, Chairman of the Cybercrime Convention Brian Cute, Vice President, VeriSign Inc. (Moderator) 2006/9/ Libertà nella Comunicazione Elettronica Interattiva (ALCEI), Center for Communications & Policy Research, India, Centre de Recherche Informatique et Droit, Facultés Universitaires, Notre-Dame de la/seau Internet solidaire (IRIS), France, Independent Centre for Privacy Protection in Kiel, Internet Service Providers Association of South Africa, IP Justice,/


Current Status of the IT sector in Madagascar A quick overview for the SSLEV Mrs Miangaly Andriamampandry Ingenosya Febuary 2009.

inline and are completed by practical exercises (248h in total) CCNA is an industry recognized certification that can be obtained after 6 to 18 months training Partnership with India Central Government network development Pan African VVIP/Health// Development of an IT business park (Antanetibe) IT forum in Malagasy regions Novatech, IT meeting with Africa and UE E-Commerce regulation : electronic documents, electronic signature, Cybercrime, intellectual property, … Internet banking Action Plan www.mtpc.gov/


What is Computer Networking? In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of.

judicial bodies are not fully aware of Cyber crime and the way in which investigations are carried out. Although Cyber law courses available in India, it is difficult to find a experienced cyber lawyer who is /in the court of law. Hence the defense lawyer can always anticipate a ambiguity. There are certain shortcomings of the Information Technology Act, 2000 with regard to identity theft, spamming, pornography, data protection and internet banking. Judiciary and IT Act 2000 Cyber Crimes What is Cybercrime/


Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.

: Prodrug message appeared on US police antidrug web site Pro-zapatista hackers hit Mexican government sites Teenagers hacked India’s atomic research center to protest nuclear weapons Hacking (cont.) The Law: Catching and Punishing Hackers: 1986/files in the state where the crime was discovered and the investigation began Crime Fighting Versus Privacy and... (cont.) Cybercrime Treaty: International agreement to foster international cooperation among law enforcement agencies of different countries in fighting/


Copyright  2007 by the Institute for Certification of Computing Professionals Incorporated not-for-profit, in the State of Delaware All rights reserved,

Administrator Systems Support Analyst Service Technician Call Center Support Company Participants u US Department of State u US CyberCrime Center u Dell u Eastman Kodak Company u American Airlines u Microsoft u Manitoba Lotteries Commission u /Association u CPCIConsejo Profesional en Ciencias Informaticas (Professional Council in Computer science Sciences) - Argentina ICCP Affiliate Societies & Business Partners Affiliates u China & Hong Kong (2) u Ghana u India u Nigeria u Pakistan u Peru u Sultanate of/


1 Copyright  2009 by the Institute for Certification of Computing Professionals Incorporated not-for-profit, in the State of Delaware All rights reserved,

Systems Support Analyst Service Technician Call Center Support 13 Company Participants u US Department of State u US CyberCrime Center u Dell u Eastman Kodak Company u American Airlines u Microsoft u Manitoba Lotteries Commission u State /u CPCIConsejo Profesional en Ciencias Informaticas (Professional Council in Computer science Sciences) - Argentina 19 ICCP Affiliate Societies & Business Partners Affiliates u Argentina u China & Hong Kong (2) u Ghana u India u Nigeria u Pakistan u Peru u Sultanate /


Human Rights in the Digital Age. OUTLINE Human Rights in the context of the Internet IPRs and the Information Commons SOPA Discussion.

) 2. Internet issues such as security, safety and privacy (including spam and cybercrime) 3. Intellectual property and international trade (including copyrights) 4. Development Issues (/Governance Forum (2005) 2 2006 Athens, Greece 2007 Rio, Brazil 2008 Hyderabad, India 2009 Sharm El Sheikh, Egypt 2010 Vilnius, Lithuania 2011Nairobi, Kenya 2012 Baku, /potential users Our job To learn about Human Rights Interpret Human Rights in online contexts To define conditions required to realize human rights online and/


Security, Dependability and Trust in the Future Internet Jeju, South Korea, August.

too dangerous for terrorists, because of CCTV networks of surveillance) – New generation of attackers, failures Organized cybercrime: criminal organization, but also untrusted service operators (telecom, network service, security brokers…) August 28, 2008AsiaFI/ providential solution – Model, counter-model, alter-model – Arrival of China and India on the IT scene change in concerns (demographic, development) change in power – Alter-models the pseudo-libertarians (“Naives of the Internet”) Repression-pure /


InterPARES Trust Observations about records in the cloud & progress report Luciana Duranti InterPARES Trust Project Director May 2014.

them (the Provider), and the possibility that the jurisdiction under which either exists is different from that in which the materials physically reside. India is planning to impose a ban on the use of foreign cloud-based email services to send /, secrecy and transparency, the right to know and the right to be forgotten legislative recommendations related to e-evidence, cybercrime, identity, security, e-commerce, intellectual property, e-discovery and privacy a model policy and a model international statute/


1 Copyright © 2013 M. E. Kabay, D. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Patents in the United States & Globally CJ341 – Cyberlaw.

. E. Kabay, D. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Patents in the United States & Globally CJ341 – Cyberlaw & Cybercrime Lecture #10 M. E. Kabay, PhD, CISSP-ISSMP D. J. Blythe, JD School of Business & /3 rd parties to participate actively  May even begin before patent granted  E.g., India  Pre-grant oppositions  Can delay patent applications for years  Post-grant oppositions  Patents remain in force during proceedings 44 Copyright © 2013 M. E. Kabay, D. Blythe, J. /


This is about the concept of identity theft

personally identifiable information about individuals, or various credentials they use to authenticate themselves, in order to impersonate them. Examples include: Rummaging through rubbish for personal information / and government to the extent provided by this law. Regional legal responses India Under the Information Technology Act 2000 Chapter IX Sec 66C “SECTION 66C/ address. This phenomena lead to the creation of Senate Bill 52: Cybercrime Prevention Act of 2010. Section 2 of this bill states that it/


Effects of Intellectual Property Rights (IPRs) in the Information Society Presenter: Nicodemus A. Ishmael (Multimedia University of Kenya) KABARAK UNIVERSITY.

(IPR) in the Information Society 23 Findings (6) Today, China, India and Brazil, among others, are acquiring the knowledge developed in the Organization for Economic Cooperation and Development (OECD) countries. Every ‘emerging economy’ at some point in its history / and Intellectual Property Section (CCIPS), Intellectual Property Cases, United States Department of Justice, April 2005, [http://www.usdoj.gov/criminal/cybercrime/ipcases.htm] [3]18 U.S.C.§ 230 [4] Atlantic Monthly Co. v. Post Pub. Co. 27 F.2d/


Thursday, 01 November 2012 FOR INTERNAL INFORMATION ONLY. The content of this brief is taken from press sources and does not in any way reflect official.

General Alexander Teutsch also shares the opinion that there should be no borders in the region in terms of media cooperation. He said that all regional states should make efforts/fire using a lighter. Prosecutor for cybercrime Branko Stamenkovic said on 31 October that the man is suspected of inciting "religious hatred/China is ranked 55th, Mongolia – 59th. Pakistan and Afghanistan were ranked 132nd and 140th. India is on 101st position. The Prosperity Index is the only global index that measures national /


Thursday, 01 November 2012 FOR INTERNAL INFORMATION ONLY. The content of this brief is taken from press sources and does not in any way reflect official.

free access to Internet traffic. Moreover, Article #15 of the Convention on cybercrime will also be discussed during the forum. APA (01 Nov.): Baku to / cooperation when they are approved. 24.kg (01 Nov.): Russia is interested in airport construction in Tamchy village - Andrey Belyaninov Kyrgyzstan / Russia The Kyrgyz Parliament passed a law/Ogaryevo outside Moscow. Meanwhile, media reports have indicated that trips to Bulgaria, India and Turkey that were planned for November have been put back to December./


Employment Skills Introduction to module and world of work in IT Week 1 Lecture.

services1,6611,701 Total3,5883,737 IT employment and employment growth OccupationEmployment in 2010 (in thousands) Projected growth 2010–2020 (percent) Computer systems analysts135.343./businesses move online and more consumers connect to the internet, the opportunities for cybercrime will only grow, making it imperative that countries work together now to /and National Cyber Crime Policy of 2013 published by Government of India 5, 00,000 Cyber Security Professionals are required by the end of 2015./


UNCITRAL United Nations Commission on International Trade Law The work of UNCITRAL in electronic commerce Jae Sung LEE Legal Officer, UNCITRAL Office of.

Commission on International Trade Law Legislation implementing the MLES has been adopted in: Barbados (2001), Cape Verde (2003), China (2004), Costa Rica (2005), Ghana (2008), Guatemala (2008), India (2009), Jamaica (2006), Mexico (2003), Nicaragua (2010), Paraguay /contracting Authentication / security (e-signatures, IdM) Data protection and retention Liability of SW facility operator Cybercrime, electronic evidence … UN/CEFACT Rec. 35 Single Windows & Interoperability UNCITRAL United Nations Commission on /


Launching Investigation, prosecution and defending of a computer related crime Karnika Seth Cyberlaw & IP expert Managing Partner, Seth Associates Chairperson,

evidence before any court or authority.  Till now, government forensic lab of hyderabad was considered of evidentiary value in courts- CFSIL  Statutory status to an agency as per Section 79A will be of vital importance in criminal prosecution of cybercrime cases in India Defending an accused in a cybercrime  Preparation of chain of events table  Probing where evidence could be traced? E-mail inbox/files/folders/ web/


CA. Indresh Palan ACA, FAFD(ICAI), UGC-NET, M.Com Forensic Auditing and Fraud Detection Areas of Practice for Forensic Auditors and Fraud Detection Experts.

 Criminals focusing less on theft of financial information and more on business espionage and accessing government information  To fight fast-spreading cybercrime, businesses and governments must collaborate globally to develop an effective model that can control the threat Threat perception of Cybercrime in IndiaCybercrime is not strictly speaking a technology problem. It is a strategy problem, a human problem and a process problem. After/


Foundations of digital Forensics

Chapter reviews how law in the United States deals cybercrime. As the United States is a federal system, there are two basic levels of cybercrime law: federal cybercrime law and state cybercrime law. U.S. law deals with the major cybercrimes: the crimes that target/1891, and the Reserve Bank of India Act, 1934. Important section of IT act It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence committed outside India by any person. Section 2: /


INFORMATION TECHNOLOGY ACT AND ITS IMPACT ON E-COMMERCE © of images belongs to the respective copyright holders.

66-Computer related offences CYBERCRIMES DEFINED UNDER THE IT ACT, 2000  Section 66B-Punishment for dishonestly receiving stolen computer resource or communication device.  Section 66C-Punishment for identity theft  Section 66D-Punishment for cheating by personation by using computer resource INFORMATION TECHNOLOGY ACT AND ITS IMPACT ON E- COMMERCE  Thanks to the Information Technology Act, 2000, e-commerce in India started received a/


Workshop on “Cyber Crime”

maintain one of the strongest Cyberlaws practice in India today. With more than a decades experience in Cyberlaws Practice, Seth Associates recently established the Worlds first integrated Cyberlaws Consulting Centre at Seth Associates CCC- Cyberlaws Consulting Centre CCC renders cyber legal consultancy, cyber law analytics and forensic services to its clients world wide. Work experience of handling cybercrime matters with Delhi Police Delivered training/


Governance of Privacy & Security: Balancing Compliance & Risks CSO Breakfast Club DC Chapter September 30, 2008 Jody R. Westby, Esq. CEO, Global Cyber.

& Evaluation, POAMs ESP Security Funding, ROI Annual Reviews, Audits 14 www.globalcyberrisk.com More and More Offshore – India, China, Philippines Largest Markets Lack of Available Talent, Increasing Wage Scales, Weak Infrastructure Causing Major Outsourcing Vendors to / re Cybercrimes, Investigations Poor International Cooperation With Law Enforcement Recent Breaches of US & EU Data Caused Response from Regulators Global Environment Today © Jody R. Westby 15 www.globalcyberrisk.com Your Data is in Hands of/


INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.

INDIA’S FIRST JOHN DOE CASE IN INFORMATION TECHNOLOGY LITIGATION ASHOKINTEGRIX IP ADDRESS CASE- INDIA’S FIRST JOHN DOE CASE IN INFORMATION TECHNOLOGY LITIGATION BIRTH OF A NEW KIND OF LIABILITY NOT YET PERCEIVED BIRTH OF A NEW KIND OF LIABILITY NOT YET PERCEIVED NEW CASES ARIF AZIM CASE- INDIA’S FIRST CYBERCRIME CONVICTION ARIF AZIM CASE- INDIA’S FIRST CYBERCRIME/. Electronic Signatures not yet legal in India. Electronic Signatures not yet legal in India. Certifying Authorities for Digital Signatures./


Cheating and Gambling Sites.Com John McMullan, PhD Saint Mary’s University Aunshul Rege, PhD Student Rutgers University.

–small-scale organized crime –money laundering through botnet manipulations and chip dumping –online betting fraud [India 2007] Characteristics of Digital Associates Working Crafts Routinization Impersonation/multiple identities Multiple, simultaneous targeting of victims/ execution of intercepted data and decrypted data so as to permit wide use in multilateral contexts Improve ‘market solutions’ to cybercrime –Extend & rationalize relations between public and private security –Create industry-wide /


Disrupting Financial Crimes and Organised Crimes: Nigerias Perspectives By Mohammed Ukashatu, msi Department Of State Services Federal Republic Of Nigeria.

the year if urgent anti-fraud mechanism are not put in place. EMBEZZLEMENT/BANK FRAUD  In August 2013, eleven persons, including seven Nigerians, were arrested in New Delhi, India for involvement in net-banking fraud and fake lottery scam, according to Deccan/ should be adequate international laws that should be applicable against offenders irrespective of where they commit the crime; indeed cybercrime should be equated with crimes against humanity;  There should be awareness both on the proper use of IT /


Information Technology Act 2000- An overview Date: 27th November 2008 Venue: National Institute of Financial Management Faridabad Sector-48, Pali Road.

Associates, 2008 All Rights Reserved TYPES OF CYBER CRIMES © Seth Associates, 2008 All Rights Reserved Frequency of reporting Cybercrime in India During the year 2005, 179 cases were registered under IT Act as compared to 68 cases during 2004 21.2/Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved Sec 69: Decryption of information Ingredients Controller issues order to Government/


Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.

as Prentice Hall 5 The Problem: Collection of Information Without Consent SPAM o Unsolicited messages sent in bulk over electronic mailing systems o India has created the most spam Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 6/ Pearson Education, Inc. Publishing as Prentice Hall 9 Computer Crime and Cybercrime Types of computer crime o Identify theft—criminal access to personal information in order to impersonate someone o Dumpster diving—disgruntled employees or thieves go/


By: Susan B, Hayley C & Randall L. Description Transnational e-crime refers to illegal acts committed with assistance of, or by means of, computers, computer.

prosecute it? (Cowdery, 2008). Detection, Investigation and Prosecution Detection and investigation Cybercrime is executed and carried out more rapidly in comparison to the implementation of legislation that seeks to regulate and combat its existence/others can be seen as are passive recipients of information passed onto them by police such as Northern Ireland, India and Singapore (Grabosky, 2007). Detection, Investigation and Prosecution (continued) Prosecution (continued) Prosecutors will either decide to/


CSCD 303 Essential Computer Security Fall 2010 Lecture 3 - Hackers and Attackers Reading: Chapters 3, 7, 16.

PCs to attack 57% of people who use social networking sites admit to worrying about becoming a victim of cybercrime –Many divulge information that could put them at risk –Three out of four users give out personal information e/infrastructure According to news reports the infestation by this worm might have damaged Irans nuclear facilities in Natanz It has infected computers in China, Iran, Indonesia, India, US and others... Example of Cyberterrorism Chinese Hackers Attack Energy Facilities - 2009 http://www/


Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.

liaise with other international contacts/agencies  Leveraging of and participation in existing international cooperation mechanisms/forums such as Interpol  Making better utilization of local & regional know-how (such as India from a Bangladesh perspective, Asia-Pacific region with an emphasis on South Asia and Oceania) Strategies for the development of a model cybercrime legislation that is globally applicable and interoperable with existing national/


CSCD 303 Essential Computer Security Winter 2014 Lecture 4 - Hackers and Attackers Reading: Chapters 3, 7, 16.

Definitions –History Past Recent –Motivation Glory, Fame Hacktivism CyberCrime Cyberterror –Resources Terms Again What is a Hacker? People engaged in circumvention of computer security, Unauthorized remote computer break-ins, but also includes those who debug or fix /to news reports infestation by this worm might have damaged Irans nuclear facilities in Natanz It has infected computers in China, Iran, Indonesia, India, US and others... Example of Cyberterrorism Chinese Hackers Attack Energy Facilities -/


The Protection of Personal Information Act 2013 Personal Information is your business 25.09.14 KOMESHNI PATRICK TECHNOLOGY LAWYER/DIRECTOR/ENDCODE.ORG.

South African Cyber Threat Barometer 2012/13 no national computer security incident response team no national response team to co-ordinate a cyber defence strategy Annual losses in 3 sectors = R2.65 billion PI & Cybercrime India Sponsored training for 500 000 “cyber warriors” South Korea 5000 cyber specialists are developed annually United Kingdom 11 centres established for cyber skills development allied to the/


Hartwig - Outlook for 2014 and Beyond

(extreme temperature, drought, wildfire) Extraterrestrial events (Meteorite impact) Earthquake (series) Pakistan, 24–28 September Heat wave India, April–June Source: Munich Re Geo Risks Research, NatCatSERVICE – as of January 2014. Meteorological events (storm) /Cybercrime Is Increasing The perception of the risk of cybercrime is increasing at a faster pace than reported actual occurrences. In 2014, some 48% of respondents said their perception of the risk of cybercrime increased, up from 39% in/


THE PRESENTATION WILL CENTRE ON:  OVERVIEW OF CLOUD COMPUTING ◦ CLOUD COMPUTING – WHAT IS IT? ◦ Conceptual & definitional Issues  SECURITY ISSUES (Public,

of the new millennium.  Cybercrime and in particular – Digital Espionage and Identity/India, and Thailand, ministries of Iran and Latvia, and a computer network operated by critical organization around the world.  In the attacks tracked by the Canadian researchers, the installed software provided near-complete control over the victims computers.  Attackers could steal files, capture passwords, and even activate a Web camera.  The challenges that law enforcement agencies face in the battle with cybercrime/


CSCD 303 Essential Computer Security Spring 2013 Lecture 3 - Hackers and Attackers Reading: Chapters 3, 7, 16.

–Definitions –History Past Recent –Motivation Glory, Fame Hacktivism CyberCrime Cyberterror –Resources Terms Again Hacker Defined People engaged in circumvention of computer security, Unauthorized remote computer break-ins, but also includes those who debug or fix security / news reports infestation by this worm might have damaged Irans nuclear facilities in Natanz It has infected computers in China, Iran, Indonesia, India, US and others... Example of Cyberterrorism Chinese Hackers Attack Energy Facilities /


Workshop on “Cyber Crime”

state and trained police Set up EEE/ cyber forensic labs in each state Immediate rulemaking in S.67C-intermediary to preserve information Build International cooperation regime for solving cybercrime cases Thank you! SETH ASSOCIATES ADVOCATES AND LEGAL CONSULTANTS New Delhi Law Office: C-1/16, Daryaganj, New Delhi-110002, India Tel:+91 (11) 65352272, +91 9868119137 Corporate Law Office: B-10, Sector 40, NOIDA/


Dec 14, 2001 Overview of IT Fraud, Thaweesak Koanantakool National Electronics and Computer Technology Center. 1 Overview of IT Fraud Thaweesak Koanantakool.

of IT Fraud, Thaweesak Koanantakool National Electronics and Computer Technology Center. 49 Convention on Cybercrime was opened for signature in Budapest on 23 November 2001. It is the first ever international treaty on criminal offences/ 1994. Regulations of The Peoples Republic of China on Protecting the Safety of Computer Information Hong Kong : Telecommunication Ordinance India : The Information Technology Act, 2000 Israel : Computer Law 5755-1995 Japan : Unauthorized Computer Access Law Malaysia : /


Intellectual Property and Brand Protection

borders are produced in China. Other countries include Taiwan, Hong Kong, Russia, India, Pakistan and Uruguay. An estimated 30% of products sold in mainland China are counterfeit. Counterfeit parts constitute over 37% of the total automotive aftermarket in India. Most Frequently Counterfeited/ (FBI) Web site www.usdoj.gov/criminal/cybercrime/reporting.htm Contact Kiffa Shirley kiffa.shirley@ic.fbi.gov U.S. Department of Justice (DOJ) Web site www.cybercrime.gov Contact Matt Bassiur matthew.bassiur@usdoj.gov /


1 MEMA Brand Protection Council March 5, 2009 Detroit, MI.

are produced in China. Other countries include Taiwan, Hong Kong, Russia, India, Pakistan and Uruguay. An estimated 30% of products sold in mainland China are counterfeit. Counterfeit parts constitute over 37% of the total automotive aftermarket in India. Counterfeit Product/@dhs.gov Federal Bureau of Investigation (FBI) –Web site www.usdoj.gov/criminal/cybercrime/reporting.htmwww.usdoj.gov/criminal/cybercrime/reporting.htm –Contact Kiffa Shirley kiffa.shirley@ic.fbi.govkiffa.shirley@ic.fbi.gov U.S./


Albert Gonzales showed early talent and very easily breezed through computer classes. His remarkable computer skills allowed him to hack into the government.

breezed through computer classes. His remarkable computer skills allowed him to hack into the government network of India, while in his high school library, and his punishment? He was told to say away from a computer / to host capabilities. What is the Russian business network? The Russian business network is known for its blatant involvement in cybercrime. Cybercrime involves such things as hosting illegal business activity such as personal identity resale, child pornography, spyware, malware, and more/


The Second Session of the Committee on Development Information, Science and Technology CODIST-II 2-5 May 2011, Addis Ababa, Ethiopia The Second Session.

Open EPR, data com equip, smart phones, etc.) www.ntcr.sd  Key Int’l and regional partners include China, India, World Bank, ECOWAN, EU, CAB-CIT, WACS, etc. CountryCongoMadagascarMaliMauritiusSudan PAIC/100050.1810.090.004 The Second Session of the / trans Act 2008 KenyaKenya Comm (Amend) Act (KCA) 2009 MauritiusComputer Misuse and Cybercrime Act (2003) SenegalLaws on protection of personal data, e-transactions, cybercrime, and cryptology in 2008 (www.adie.sn)www.adie.sn SudanCyber Crime Law of 2007 (www./


Security / Cybersecurity

dialogue and coordination GCA/HLEG Members Diversity of Participation Argentina Brazil Cameroon Canada China Egypt Estonia Germany Japan India Indonesia Italy Malaysia Morocco Portugal Republic of Lithuania Russian Federation Saudi Arabia South Africa Switzerland United States Diversity /these partners to share experience and best practice, so as to step up efforts for a global response to cybercrime. In this way, working together, we can create a cyberspace that is somewhere safe for people to trade, learn /


Cyber Security and Threats- CyST’2007 Venue: Raman Sabhagar Indraprastha Engineering College, Ghaziabad – 20 Karnika Seth Partner and Cyber Lawyer SETH.

Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2007 All Rights Reserved Sec 69: Decryption of information  Ingredients Controller issues order to Government/8% had no awareness of cyber laws  False arrest concerns © Seth Associates, 2007 All Rights Reserved Frequency of reporting Cybercrime in India  During the year 2005, 179 cases were registered under IT Act as compared to 68 cases during 2004 21.2%/


IT Summit 2008 Cyber security – An intellectual challenge 18 October , New Delhi Tracking the cybercriminal & collection of legally admissible.

the United States, Canada, Japan and South Africa in 2001 signed a convention on cybercrime in efforts to enhance international cooperation in combating computer-based crimes. The Convention on Cybercrime, drawn up by experts of the Council of/Handle jurisdiction issues Cooperate in international investigations Develop acceptable practices for search and seizure Establish effective public/private sector interaction ASLU Survey published in March 2003-Incidence of Cyber crime in India Non Reporting-causes 60%/


Ads by Google