Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
Security Classification Practical Issues in dealing with different types of cybercrime.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Submitted by: Abhashree Pradhan CA (1)
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Computer Crime and Information Technology Security
AVAR November 2004 in Tokyo, Japan Computer Secutiry Situation in Japan (Report from National Police Agency Japan) Takashi Garcia SATO Assistant.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Hurdles in implementation of cyber security in India.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Ministry of Security and Public Administration Disaster and Safety Management
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
Cyber crime and security issues
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
CYBER SECURITY...
Chapter 19.1 Cyberlaw and Cybercrime
A Project on CYBER SECURITY
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Seminar On Cyber Crime Submitted To: Submitted By:
Five Unethical Uses of Computers
Forensic and Investigative Accounting
Philip Nichilo Vincent Carestia
Preventing Information Technology Crimes
Challenges and Successes in the Zambian ICT Security Sector
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Security of network and information systems
Role of US Security and Intelligence Agencies
Deborah Housen-Couriel, ADV.
Presentation transcript:

Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China

Outline The situation of cyber crime Internet Security Legislation Policies against cyber crime

Internet Development in China

Cyber crimes Cyber crime (Cyber as Object) Hacking in Crucial Information Systems Virus and Malicious Code Cyber facilitated crime (Cyber as Tools) Phishing Pornography online Gambling online

Cases of Cyber Crime

Trends of Cyber Crime 1 . The property crime trends to be severe Fraud Phishing Ransom online Steal “ Virtual ” Property

Trends of Cyber Crime 2 . Cyber Terrorism Threats Cyber Facilitated Terrorism (cyber as tools) Communication Coordination Threaten the victims Disseminate terrorism information or rumors Recruit supports Train the members Acquire intelligence in support of physical violations To be continued …

Cyber Facilitated Crime Cases In 2004, we have deal with several terrorism cases in which the criminal threatened to bomb some public facility by . In 2003, a criminal put some poison into the milk soled in supermarket and send to extort the milk producer. In 2003, a lot of rumors related to SARS were spread via Internet and cause public panic. In 2002, a terrorist was found to teach another one how to produce bomb and poison. To be continued …

Cyber targeted terrorism: Attacking crucial networks and information systems In 2002, a “ logic bomb ” was found in software installed in more than 140 Power Quality Recorder which were used to detect power breakdowns Big problem: How to prevent cyber terrorism from inner side? The target includes not only computer network but also other digital devices There are more cyber facilitated terrorism than cyber targeted terrorism till now

Cyber Legislation The Criminal Law of China. P.R. Crime Slight Illegal Action Security Management The Public Security Administration Punishment Law of China. P.R. Regulation on Safety Protection of Computer Information Systems Management Regulation of Security and Protection of Computer Information Networks Connected with INTERNET Regulation on Telecommunicaton …

Criminal Law Article 285 Whoever violates state regulations and intrudes into computer systems with information concerning state affairs, construction of defense facilities, and sophisticated science and technology is be sentenced to not more than three years of fixed-term imprisonment or criminal detention. The law related to cyber crime emphasizes the protection of crucial information infrastructure For those who intrude into the information systems related to critical infrastructure, no matter the systems were damaged or not, the intruders will be accused To be continued …

Article 286 Whoever violates states regulations and deletes, alters, adds, and interferes in computer information systems, causing abnormal operations of the systems and grave consequences, is to be sentenced to not more than five years of fixed-term imprisonment or criminal detention; when the consequences are particularly serious, the sentence is to be not less than five years of fixed-term imprisonment. Whoever violates state regulations and deletes, alters, or adds the data or application programs installed in or processed and transmitted by the computer systems, and causes grave consequences, is to be punished according to the preceding paragraph. Whoever deliberately creates and propagates computer virus and other programs which sabotage the normal operation of the computer system and cause grave consequences is to be punished according to the first paragraph. To be continued …

Article 287 Whoever uses a computer for financial fraud, theft, corruption, misappropriation of public funds, stealing state secrets, or other crimes is to be convicted and punished according to relevant regulations of this law. Other related articles: Article 124: sabotage the public telecommunications facilities Article 291: make false threat of terrorism in the form of an explosion, bio-chemical agents or radiation

Policies Prevention: Software & Hardware Production Security Evaluation Prevention: Critical information system security evaluation Crime Detection Response and Investigation Deterrence Training Crime Report Mechanism Research

1. Prevention in First Place Software & Hardware Production Security Evaluation Mechanism A five-level security criteria

2. Fast detecting, reporting and responding mechanism Online cyber crime reporting website were established in each provinces (cities) On-call point-of-contact between ISP, ICP, IDC, administrators of critical information systems and cyber police on 24/7 basis A Coordination center was established in our bureau to deal with cyber security related incidents

3. Investigation and forensic technology A lot of cyber-polices were sent to universities for training specialized in cyber crime Co-operate with IT research and production corporations A research center was established in our bureau to promote the technology related to computer forensic and crime investigation.

4. International cooperation Asia-South Pacific Working Party on Information Technology Crime, ICPO CTINS Training and discussion Investigation request from 2004, we have dealt with over 250 requests from 40 countries hacking, fraud, phishing, child pornography, fake website …

Thank you! The End