Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

COMMITTEE ON HEMISPHERIC SECURITY- Special Security Concerns of small island States of the Caribbean Presented by Kerry-Ann Barrett Ministry of National.
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Security Classification Practical Issues in dealing with different types of cybercrime.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Fraud and Identity Theft: The United Nations Crime Commission Intergovernmental Expert Group on Fraud and the Criminal Misuse and Falsification of Identity.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
LEFIS General Assembly, Wrocław Sept Continuing education Andrzej Adamski, Nicolaus Copernicus University, Poland.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
The National Cyber Security Strategy and Action Plan A presentation by Ms. Antoinette Lucas-Andrews Director, International Affairs Ministry.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Australia’s Implementation of the People Trafficking Protocol Presentation by Sandra Bennett International Crime Branch Australian Government Attorney-General’s.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Ministry of the Interior of the Republic of Latvia STATE POLICE of LATVIA CENTRAL CRIMINAL POLICE DEPARTMENT Economic Crime Enforcement Department.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Strengthening national capacities to prevent and combat cybercrime: UNODC Global Programme on Cybercrime Tania Banuelos Crime Prevention and Criminal Justice.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
A Project on CYBER SECURITY
Computer Crime CJ 520 / CJ October 27, 2010.
Assalamualaikum Today, I am going to give a presentation on
What every consumer should know
Challenges and Successes in the Zambian ICT Security Sector
UNODC and CYBERCRIME October 2009.
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service

Page 2 Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may have been an instrumental tool or target in the commission of a crime. Three Categories mainly:- –Crimes against Persons –Crimes against Property –Crimes against Government or Country

Page 3 Cybercrime is viewed by law enforcement in T&T as traditional crimes, where perpetrators use technology as the vehicle for their nefarious activities.

Page 4 Current Trends  Online Lottery Scams  Identity theft  Credit card fraud  ATM Fraud  Money laundering  Spoofing and Phishing  Child Pornography  Cyber Bullying  Bombs threats  Nigerian Scams

Page 5 Cyber Warfare – Nation vs. Nation (America vs. Iran) Extradition of Perpetrators Law Enforcement Jurisdiction

Page 6 Cyber Perspective The modern thief can steal more with a computer can steal more with a computer than with a gun. than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, U S A "Computers at Risk”.1991

Page 7 TTPS Investigative Framework Reports of technology based crimes are made to Police Stations/ Sections of TTPS/ Online from TTPS Website. Investigators are appointed, who are promptly assisted by the experts of the Cyber Crime Unit as it relates to technical investigations.

Page 8 Legislative Framework There are four (4) main pieces of legislation at present in Trinidad and Tobago that govern investigation and prosecution of High Technology Crimes. They are as follows:-  Computer Misuse Act of 2000  Telecommunications Act of 2001  Interception of Communications Act 2010  Offences against the Person “Harassment”

Page 9 Proposed Legislation CYBER CRIME BILL The Trinidad and Tobago Cybercrime Bill 2014 was introduced in the House of Representatives in March 2014 to provide for the creation of offences related to cybercrime and for other related matters in Trinidad and Tobago. In July 2014 when parliament dissolved the Cyber Crime Bill Lapsed as a result there is to be a reintroduction of the said Bill in Parliament.

Page 10 Cyber Crime Bill The Cyber Crime Bill is intended to provide offences relating to the following matters:-  Child Pornography  Using a computer system to set up a meeting with a child for the purpose of abusing the child.  The offence of violating a person’s privacy by capturing and sharing pictures or videos of a person’s private area without his consent.  Cyber Bullying

Page 11 Collaborative Aspects With the advent of the world wide web coupled with the prolific rate of technological advancements in our region, criminals are using these advancements as catalysts for worldwide iniquitous activities. Thus in order to realistically combat the “dark-side of technology” law enforcement officials from different nationalities must co-operate to detect, apprehend and successfully prosecute Cyber-Criminals.

Page 12 Ministry of National Security –Cyber Security Agency - Computer Policies at National Level - Computer Security Incident Response Team (C.S.I.R.T) - Education and Awareness

Page 13 Conclusion Successful Cyber-Crime investigation and effective Cyber Security can only be achieved using holistic multi-national approaches. and effective Cyber Security can only be achieved using holistic multi-national approaches.

Page 14 I Click Therefore I am.