Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.

Slides:



Advertisements
Similar presentations
UN Comprehensive Study on Cybercrime
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
State of play and activities in 2014 March 2014
Chapter Twenty Navigating the Internet. Objectives To learn about the history of the Internet To examine the infrastructure of our electronic world To.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
John W. McReynolds Assistant Chief, New York Field Office Antitrust Division, U.S. Department of Justice Judicial Training Program Moscow, Russia July.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
INTERNATIONAL COOPERATION Daniel H. Claman Senior Trial Attorney U.S. Department of Justice.
Remarks of Kristen Pinhey Competition Law Officer Competition Bureau Canada Unannounced Inspections in Canada International Competition Network, 2013 Cartel.
Developing a Records & Information Retention & Disposition Program:
Canadian*- US Law Enforcement Internet Governance Cooperative Efforts April 19, 2010 Marc Moreau Royal Canadian Mounted Police Robert Flaim Federal Bureau.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Child Protection Register Ongoing consequences of child sex offences and offences relating to non-compliance.
1 From Filing Cabinet to Desktop and Network: Records Management in N.C. State Government Ed Southern Government Records Branch N.C. Office of Archives.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Pennsylvania Child Protective Services Law: Module 4: Reporting and the Role of the Child Welfare Professional Transfer of Learning The Pennsylvania Child.
The Internet, World Wide Web, and Computer Communication.
Luxembourg 12 September Public consultation 12 September 2003 Horst Forster Director, INFSO/E European Commission Safer Internet plus
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Budapest 25 September 2012 Denton Howard INHOPE Training & Services.
Federal Bureau of Investigation
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Making Life and Communication Easier Neka Anyaogu.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
Internet Governance and Regulation Internet Safety : Concrete Ways Forward For Government-Industry Partnerships Baltic IT&T 2005 David Finn Senior Attorney.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Cybersecurity Governance in Ethiopia
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
EUROJUST EUROJUST Veronika Keller Seconded National Expert for the National Member for Germany (Eurojust)
Protecting Students on the School Computer Network Enfield High School.
Communication, Networks, The internet and the Worldwide Web.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
Navigating the Justice System. 4-1  Describe the seven phases of the criminal justice process.  Identify at least two key victims’ rights in each phase.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
CITY OF PHOENIX RECORDS MANAGEMENT AND E-PRIVACY Margie Pleggenkuhle City Clerk Department March 18, 2004.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
Domestic Violence Action Team. Law Enforcement Sergeant Detective Prosecutors Office Chief Prosecutor Victim Advocate Probation Officer Family Services.
INTERNET INVESTIGATIONS. GOAL:  Identify different people by using online tools / information  Gather information about different people  Gather information.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Records Management Reality
Indiana Access to Public Records Act (APRA) Training
Learning Objectives Describe the seven phases of the criminal justice process. Identify at least two key victims’ rights in each phase of the criminal.
3rd ANTI-CYBERCRIME FORUM
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Patrick Sefton | Principal, Brightline Lawyers
Prosecuting International Intellectual Property Crimes
Government Data Practices & Open Meeting Law Overview
Navigating the Justice System
Government Data Practices & Open Meeting Law Overview
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008

2

Upcoming activities around public/private partnerships Law Enforcement trainings Germany (March), Egypt (H2), Europol (Dec.) Cybercrime legislation Guidelines on industry/LE cooperation (European Commission, Sept.), Judges trainings Romania (Oct.), Turkey (Oct), Egypt (H2) Child Online Safety events Italy (Nov.), Council of Europe (Dec.), Estonia (March) 3

Main next steps Enforcement against Lottery Scams International conference, October European Financial Coalition Combating sale of pictures of sexual abuse of children, Q2 Industry visit to University College Dublin Creating a curriculum for law enforcement, Industry visit Council of Europe Cybercrime Conference Global cybercrime conference 4

Microsoft Services Microsoft Confidential For Law Enforcement Use Only

Microsoft Services Many different domains: Country specific domains:.co.uk,.fr,.it,.de,.es,.th,.tk,.co.jp Currently all service data is stored in the U.S. even for country specific domain name accounts. Microsoft Confidential For Law Enforcement Use Only

Windows Live Messenger : Instant messaging or chat Microsoft Confidential For Law Enforcement Use Only

Office Live Set of online services for small businesses – Office Live Small Business – Office Live Workspace Provides: – A domain name Example: – accounts with the domain name : – Web hosting and website design tools Web address: Microsoft Confidential For Law Enforcement Use Only

Evidence to solve a computer crime is often in the possession of ISPs Computer crime is frequently committed through the Internet, over equipment owned by Internet Service Providers ISPs posses evidence regarding the travel-path of data and who received it or stored it. 9

TYPES OF INTERNET SERVICE PROVIDERS 10

Access providers Providers of access to the Internet. Traditionally the Access Providers are phone companies that provide internet access over the phone network through dial-up service or DSL connections Access providers may provide evidence as to who was using a particular Internet address to connect to other computers Example : 11

Web hosting providers Web hosts provide space on an Internet server for clients to host a website or a file storage. The hosting company can provide evidence regarding who rented the web server and who accessed it Example : 12

hosting providers companies store the content of users They will be able to provide evidence on who owns the account and who accessed it Because of secrecy of correspondence the content of the boxes can only be obtained through a Court Order Example: 13

Evidence identifying a network end- point IP (Internet protocol) numbers – Designate a network location which is often a geographical location but not necessarily a user identification. Proxy servers and NAT Network Address Translation Open access Wifi networks Internet Cafés 14

Reading Account Records – Registration Records 15 The “Registered From IP Address” is not provided by the user, but is captured by Microsoft’s systems. 15

Reading Account Records – IP Connection History 16  Microsoft retains account Internet Protocol (IP) connection history for 60 days.

Record Retention Policy, some examples 17

CASE STUDY: MICROSOFT CRIMINAL COMPLIANCE 18

ISP jurisdiction The ISP will have to take into consideration the laws of the jurisdiction under which it operates even when the legal request come from a different jurisdiction. Additionally ISPs need to consider the laws of the jurisdiction in which its servers are located should it not be the same as the jurisdiction of incorporation. 19

Obtaining evidence from ISPs like Microsoft Most ISPs have designated employees to respond to criminal compliance requests When receiving a request, a criminal compliance department will examine legal obligations under the jurisdiction of where the data is located and under the jurisdiction of the petitioner Because of the nature of MLATs, ISPs will usually receive court order from both of these jurisdictions Microsoft is following the recommendations of the Guidelines on cooperation between law enforcement and industry of the Council of Europe (April 2008) and of the European Commission (September 2008) 20

International Criminal Compliance 21

Legal Documentation Required Electronic Communications – Contents of Communications – To obtain electronic communications content ( , including subject line), foreign law enforcement must follow the Mutual Legal Assistance Treaty (MLAT) or Letters Rogatory process. – Upon request, Microsoft will preserve content while the foreign government seeks disclosure through the MLAT/Letters Rogatory process. – Microsoft will accept a written request, signed by the international law enforcement agency, which specifies the information to be preserved. Upon receipt of an official preservation request, Microsoft will preserve data for 180 days. Microsoft will allow an extension of the original preservation for an additional 180 day period. Microsoft Confidential For Law Enforcement Use Only

CASE STUDIES International police cooperation Civil actions Criminal referrals

Zotob virus Zotob was a computer virus affecting hundreds of companies. It was allegedly written as a work for hire by two Moroccan individuals and used for economic gain by a Turkish individual. Arrests of the suspects was made possible by the exemplary cooperation between Moroccan, Turkish, and American law enforcement together with Microsoft investigations teams.

The Spam King Microsoft initiates civil proceedings against Robert Soloway, a.k.a. The Spam King. A civil judgment was rendered in 2005 awarding Microsoft $7.8 million in damages. Microsoft supplied evidence for the criminal proceeding and on March 14 th, 2008, Robert Soloway pleads guilty during a criminal procedure and faces 26 years in prison and $625,000 in fines. He is currently in prison awaiting sentencing.

 Thank you!  Laurent MASSON  Director for Anti-Piracy and Internet Safety, Microsoft EMEA 