The online Gambling Workshop Law Enforcement: “maintain an effective legal framework and enforcement capabilities to target and prosecute cyber crime”

Slides:



Advertisements
Similar presentations
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
Advertisements

Philippine Cybercrime Efforts
Local Public Health System Assessment
Creating the Map To Set the Direction. Educational Positioning System (EPS – a play on GPS)
USE OF REGIONAL NETWORKS FOR POLICY INFLUENCE: THE HIS KNOWLEDGE HUB EXPERIENCE Audrey Aumua and Maxine Whittaker Health Information Systems Knowledge.
Immigration Intelligence Best Practice Bali Process Ad Hoc Group 8 – 10 February 2012 Theo Kuper Manager Intelligence.
Head of Learning: Job description
Delivering Protection.  Community expectations - protection, value for money  They expect the police to:  Prevent crime and disorder,  Respond to.
Working for Warwickshire – Competency Framework
Embedding Public Engagement Sophie Duncan and Paul Manners National Co-ordinating Centre for Public Engagement Funded by the UK Funding Councils, Research.
HR Manager – HR Business Partners Role Description
April 6, 2011 DRAFT Educator Evaluation Project. Teacher Education and Licensure DRAFT The ultimate goal of all educator evaluation should be… TO IMPROVE.
Justice freedom security S t a k e h o l d e r C o n f e r e n c e – M a r c h NATIONAL PROSECUTING AUTHORITY The NPA’s Portfolio of Strategic.
Justice freedom security S t a k e h o l d e r C o n f e r e n c e – M a r c h NATIONAL PROSECUTING AUTHORITY The NPA’s role in Crime Prevention.
DHS, National Cyber Security Division Overview
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
(Geneva, Switzerland, September 2014)
School Improvement Service in Partnership with National and local approaches from England that raise the capacity of organisations to deliver careers advice.
January 2005 ETHICS, COMPLIANCE & CORRUPTION PREVENTION correctional services Department of Correctional Services REPUBLIC OF SOUTH AFRICA Creating an.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Multnomah County Health Department ►Essential Services ►FDA Food Standards ►PACE Tools for Food Program Excellence Lila Wickham March 17, 2004 ♣
Part of a Broader Strategy
Improving Corporate Governance in Malaysian Capital Markets – The Role of the Audit Committee Role of the Audit Committee in Assessing Audit Quality.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Overview of SAPS roles and responsibilities and demand reduction Assistant Commissioner Tertius Geldenhuys.
Outcomes of the 16 th Regional Disaster Managers Meeting held from 9 th – 11 th August 2010 Presentation to the Pacific Humanitarian Team Monday 6 th December.
Foundational Doctrine Guiding Fire Suppression in the Forest Service Product of the Pulaski Conference June 2005.
OFFICE OF THE COMMISSIONER FOR PUBLIC EMPLOYMENT NTPS Capability and Leadership Framework.
VisualConnect™ Waterfield© Strategic Planning Workshop Wednesday 4 th November 2009.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Inspire Personal Skills Interpersonal & Organisational Awareness Developing People Deliver Creative Thinking & Problem Solving Decision Making, Prioritising,
A National approach to Cyber security/CIIP: Raising awareness.
Commissioning Self Analysis and Planning Exercise activity sheets.
CBP National Trade Strategy Winter Presenter’s Name June 17, 2003 CBP’s Trade Vision  CBP’s trade vision is to develop a swift, safe, and secure.
Advancing Cooperative Conservation. 4C’s Team An interagency effort established in early 2003 by Department of the Interior Secretary Gale Norton Advance.
SAPS ANTI-CORRUPTION STRATEGY OVERVIEW TO THE PORTFOLIO COMMITTEE ON POLICE – 13 SEPTEMBER 2011.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Justice freedom security S t a k e h o l d e r C o n f e r e n c e – M a r c h NATIONAL PROSECUTING AUTHORITY The NPA’s role in Strengthening Criminal.
Cross-Border Cooperation November 17, Purpose Highlight how Canada and US advance cross-border cooperation  Canada-US law enforcement context.
Justice freedom security S t a k e h o l d e r C o n f e r e n c e – M a r c h NATIONAL PROSECUTING AUTHORITY Customer and Operations Management.
Governance and Commissioning Natalie White DCSF Consultant
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Queen’s Management & Leadership Framework
Kathy Corbiere Service Delivery and Performance Commission
Curriculum for Excellence Health and Wellbeing. Purpose of this session  To present key aspects of Health and Wellbeing in Curriculum for Excellence.
Building Strong Library Associations | Sustaining Your Library Association BSLA Stakeholders Workshop Yaounde, Cameroon, April 2012 Managing Relationships.
PwC 1 July 2015 Department of Education and Training strategic intent Strategic intent Vision Our future Approaches How we will achieve this Together we.
Institutional data curation implementation 1st African Digital Curation Conference 12 February 2008.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
PROTECTING THE INTERESTS OF CONSUMERS OF FINANCIAL SERVICES Role of Supervisory Authorities Keynote Address to the FinCoNet Open Meeting 22 April 2016.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
ASEAN-WEN : Recent Development, Key Activities, Challenges and Opportunities Presented for Second Global Meeting of the Wildlife Enfrocement Networks 28.
Maritime Security as an Integral Part of an
Information Security Program
Johannesburg, South Africa
Specialised Commercial Crime Unit
GEF governance reforms to enhance effectiveness and civil society engagement Faizal Parish GEC, Central Focal Point , GEF NGO Network GEF-NGO Consultation.
focus areas – what we want to achieve…
9/16/2018 The ACT Government’s commitment to Performance and Accountability – the role of Evaluation Presentation to the Canberra Evaluation Forum Thursday,
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
Trafficking in Persons (TIP)
Increasing Success in Life for All
Cybersecurity ATD technical
Refreshing New Zealand’s Cyber Security Strategy 2018
The European Union response to cyber threats
CEng progression through the IOM3
Presentation transcript:

The online Gambling Workshop Law Enforcement: “maintain an effective legal framework and enforcement capabilities to target and prosecute cyber crime” Glynnis Breytenbach Cape Town 2 March 2012

"Technology leaps, the law creeps.":

“Everybody has a plan until they get punched in the face” – Mike Tyson

Some general strategic objectives for cybersecurity and to combat online crime Everybody is aware of cyber risks, secure their computers and take steps to protect their identities, privacy and finances online Businesses operate secure and resilient information and communications technologies to protect the integrity of their own operations and the identity and privacy of their customers

Some strategic objectives for cybersecurity and to combat online crime Threat Awareness and Response – improve the detection, analysis, mitigation and response to sophisticated cyber threats, with a focus on government, critical infrastructure and other systems of national interest Cultural Change – educate and empower all South Africans with the information, confidence and practical tools to protect themselves online Business-Government Partnerships – partner with business to promote security and resilience in infrastructure, networks, products and services

Some strategic objectives for cybersecurity and to combat online crime Knowledge, Skills and Innovation – promote the development of a skilled cyber security workforce with access to research and development to develop innovative solutions Legal and Law Enforcement – maintain an effective legal framework and enforcement capabilities to target and prosecute cyber crime I would like to focus on this aspect today

Pro-active vs. historical investigations “law enforcement is increasingly turning to proactive investigations where undercover agents seek out the individuals who are already engaging in computer crimes — attempting to record, in real-time, computer criminals while they are involved in the criminal act. The proactive approach bypasses some of the investigatory hurdles of anonymity, lack of records, and under-reporting inherent in computer cases. It also has the added benefit of potentially stopping the criminal before the damage is done. In order to do pro-active investigations you a need a task team who is 24/7 available to be operational”. Robert Strang US Attorney

Pro-active detection “ Pro-active detection takes place where a law enforcement agency initiates an undercover investigation in order to pursue intelligence it may have received possibly from an anonymous source, another agency or perhaps from a telephone interception. The principal feature is that this form of detection is intelligence-based as opposed to being complaint-based.”. UN Handbook p49

Organised Crime Strategic Framework “The South African Banking industry suffered a loss of R 1 billion due to organised white collar crime including cybercrime” – Susan Potgieter SABRIC 29 February 2012 Jhb regional court Organised crime also causes great harm to individuals and the broader community. Organised criminal networks are flexible, innovative and resilient. These networks are profit driven, constantly looking for new opportunities and operating across state, territory and national borders.

NPA’s framework adequate In my view our current structure is conducive to effectively address the crime threat PGI successfully employed for more than a decade now We have developed own capacity in cybercrime partnering SAP

HOW DO WE DO THIS? JOINT PLANNING & PROBLEM SOLVING We work jointly with the police and other stakeholders, e. g. Banking Industry, Road Accident Fund, FIC, FSB, etc We have procedural guidelines, accepted by all We have scheduled strategic & operational meetings, attended by all 12

HOW DO WE DO OUR WORK? OUR FOCUS AREAS 13 FOCUS AREAS SPECIALISATION (Investigation & Prosecution of CC) COMMITMENT (Dedicated Focus) EXPERIENCED PEOPLE (Capacity Building) EFFECTIVE PROCESSES (Optimal operational efficiency & effectiveness)

CASE PLANNING SCOPE OF THE PROCESS 14 Cases Reviewed by Unit Mgt. SCCU Cases Investigator + Prosecutor + External Spec Team Appt. PLAN Investigation & Delegate Tasks TEAM Investigates case and Prepares for Trial THE TRIAL The Post Trial REVIEW NEW CASES CASES CLOSED NON-SCCU CASES CASES NOLLE PROSECUI MISSION ACCOMPLISHED Unit Commander allocates case to Investigator INITIAL investigation to enable Unit Cmdr to assess whether “there is a case” EXTERNAL SOURCES Eg. NDPP other Provinces,, etc. INVESTIGATOR PROSECUTOR AFU FORMAL WORKING RELATION- SHIP

HOW DO WE DO THIS? TEAM WORK A prosecutor and investigator are allocated right at beginning of a case They work together as a team throughout the case Co- location contributes to efficacy of relationship 15

HOW DO WE DO THIS? TEAM WORK The Prosecutor guides the investigation The Prosecutor and Investigator however operate independently and are functionaries in their own right Involvement of prosecutors in the investigation not allowed The Prosecutor does not lead the investigation 16

HOW DO WE DO OUR WORK? TEAM WORK Case plan: The prosecutor and investigator jointly draft a case plan, setting out what needs to be done, by whom and when They monitor progress by regular follow up meetings The guidelines align target dates to tasks 17

HOW DO WE DO OUR WORK? MONITOR & EVALUATE The process is monitored by supervisors on an electronic case register Regular operational and strategic meetings with all stakeholders are held 18

NPA: Prosecution Policy “The NPA is a public, representative service, which should be effective and respected. Prosecutors must adhere to the highest ethical and professional standards in prosecuting crime and must conduct themselves in a manner, which will maintain, promote and defend the interests of justice.” Paragraph 9

the NPA/SCCU is undertaking a range of measures including: providing additional resources for security and law enforcement agencies to enhance operational capabilities for combating cyber crime and other cyber security threats ensuring that linkages are in place between cyber security and law enforcement efforts to combat specific related crime types, including organised crime, through the sharing of information and intelligence To make continuous contributions to ensure our legal framework is robust and keeps pace with developments in technology and criminal behaviour. providing prosecutors with access to information and resources to provide them with the requisite level of technological knowledge and understanding to effectively administer these laws, and promoting international cooperation to facilitate information sharing and law enforcement cooperation across geographical borders.

Case study : Cybercrime example of cooporation between SAP and NPA Postbank case: R42 million