Challenges facing law enforcement agencies in the fight against cybercrime.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
State of play and activities in 2014 March 2014
Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.
DIGITAL FORENSICS Xinwen Fu Associate Professor Department of Computer Science University of Massachusetts Lowell Center for Cyber Forensics, UMass Lowell.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Guide to Computer Forensics and Investigations, Second Edition
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Regional Conference Intellectual Property Crime Bahrain April 2008.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Lecture 11: Law and Ethics
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
The acquis Council Framework Decision of 19 July 2002 on combating trafficking in human beings (2002/629/JHA). Council Directive 2004/81/EC of 24 April.
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Forensic Science “ Oh, how simple it would all have been had I been here before they came like a herd of buffalo and wallowed all over it.” —A. Conan Doyle,
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
The Law & Forensics Chapters 1-3 (Some information not found in textbook)
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
ITU- BDT Arab Regional Workshop on “Legal Aspects of Child Online Protection” Algiers (Algeria), June 2012 Investigation, Enforcement and Prosecution.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
Digital Evidence Acquisition Using Cyberforensics Tools Oral Paper Presentation Graduate Student Research Development Day Virtual Conference October 25,
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Strengthening national capacities to prevent and combat cybercrime: UNODC Global Programme on Cybercrime Tania Banuelos Crime Prevention and Criminal Justice.
PRINCIPLES OF LAW, PUBLIC SAFETY, CORRECTIONS & SECURITY Interagency Partnerships.
Prof. Dr. Lorena Bachmaier, Universidad Complutense Madrid, Spain Section III- Criminal Procedure Information Society and Penal Law Lorena Bachmaier Doha,
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Public Safety Working Group (PSWG)
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Public-private cooperation
Seminar On Cyber Crime Submitted To: Submitted By:
Internet Governance: An Analysis from Developing country’s perspective
8 Building Blocks of National Cyber Strategies
U.S. Department of Justice
Ad Hoc Phase Structured Phase Enterprise Phase
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Challenges facing law enforcement agencies in the fight against cybercrime

Emergency free number: 112

Crimes related to IT Role of law enforcement agencies Challenges Case lifecycle Legal framework Training Tools & techniques Recommendations

CRIMINALITY FIGURES : SENTENCED BROUGHT TO COURT INVESTIGATED REPORTED TOTAL CASES

1.IT as a tool of crime 2.IT crime, cybercrime: IT as object of crime 3.IP relates crimes 4.IT content as evidence in traditional crime

IT in all aspects of life: IT in all aspects of crime Multiple-offense situation Transnational New forms of crime The crime scene is virtual Involvement of all of the units of the law enforcement agencies, not only the anti- cybercrime unit

Conduct investigations Pursue criminals Forensic lab search Monitor the cyberspace, internet cafes Alert from attacks Suggest prevention Cooperate with: other agencies, ISP’s Enforce the law

Inform law enforcement: report crime Crime scene preservation (yellow stripes) Evidence seizure Forensic lab search: what are we looking for? Local, over the net International cooperation Investigation management Relation with the judicial system, ISP’s

Cybercrime law Acceptance of digital evidence Data privacy Traffic data disclosure Crime scene preservation Evidence recovery Know-how, skills, training Being proactive, staying updated Cost Cooperation : international, ISP’s Play by the rules (criminals don’t)

LABOther specialized units Anti- cybercrime unit Digital evidence acceptance Penal codeIT as a tool Digital evidence acceptance Cybercrime law Cybercrime Digital evidence acceptance Penal codeIT as evidence in crime

Train all the staff involved in the case lifecycle Adapt training to operational needs Continuous update

Special IT forensic tools Define procedures Interpol It crime manual

Cyber crime investigation tools. (nov 2004) WebsitePriceFunctionsProduct · Forensic edition : $ per lic AcquisitionEnCase © · Fastbloc: $ per unit Investigation · Guidance software · Training: Basic: $ Reporting  Enterprise · Intermediate: $ · Forensic · Advance: $ · Fastbloc © · Special: $ · Ultimate toolkit $ 1495 (incl trg $ 1995) Forensic Tool Kit · Forensic Toolkit $795 Investigation · Access data · Password Recovery $ 495 Reporting · Indexing · Password Recovery · Distributed Network Attack · Ultimate Toolkit $ 99 to $ 450 per software package Acquisition toolParaben plus training costs Bolt-on for examination of evidence · Paraben corporation · Primarily PDA ’ s · Now have acquisition tool · Bolt-on-for examination evidence

Protect yourself and your organization Cybercrime law All units involvement Anti-cybercrime unit Convention on cybercrime Interpol effort Cooperation :24/7 network Public private partnership

Thank you