International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
ITU – EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2nd Workshop on Lesotho National Transposition of SADC Cybersecurity.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2 nd Workshop on Tanzania National.
International Telecommunication Union Support for Harmonization of the ICT Policies in Sub-Sahara Africa Name of presenter HIPSSA Project.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UN Comprehensive Study on Cybercrime
By Andy Scott, Michael Murray and Adam Kanopa
Cyber Safety Assessment Review
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Introduction and Overview of Digital Crime and Digital Terrorism
Security Classification Practical Issues in dealing with different types of cybercrime.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Unit 18 Data Security 1.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber Crimes.
What is internet? The internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
CYBER CRIME.
Cybersecurity Governance in Ethiopia
Crime & Malpractice AS Module Heathcote Ch. 10.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Computer security By Isabelle Cooper.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Legal and Ethical Issues in Computer Security Csilla Farkas
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Computer Note.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Seminar On Cyber Crime Submitted To: Submitted By:
Computer Forensics 1 1.
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Lesson 3 Data Storage.
Cybercrime legislation and policies in Africa: Issues for discussion
Introduction to Digital Forensics
Presentation transcript:

International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa

Computer crimes Introduction: Cybercrime is the fastest growing crime in the world with millions of people affected every day. The effects of one successful attack on a country or corporation can have far- reaching implications, including threat to countrys security and economy to financial losses at the corporate level, stock losses and money lost for consumers or stock holders. Laws have been swiftly put into place to halt these types of attacks, but criminals find haven in countries with lax cybercrime laws. 2

International Standards International Conventions and Treaties on Cybercrime: Criminalize Crimes related to computers and the Internet [Cybercrime] Provisions for investigating cyber crime International legal cooperation Protection of human rights and liberties 3

Domestic Laws Domestic laws: Establish cyber crime offenses Enable successful investigation and prosecution Provide for Procedural laws Improve international legal cooperation 4

Computer Crimes Bill: Silent Features Offences against the confidentiality, integrity and availability of computer data and systems, that is: offences against computer data and systems, including illegal access, illegal interception, data and system interference, misuse of devices. 5

Silent Features Offences committed by means of computer systems. This list is limited to those old forms of crime that obtain a new quality through the use of computers, that is: computer-related forgery and fraud, child pornography and offences related to infringements of Intellectual Property Rights on a commercial scale. An additional set of crimes covers the criminalization of acts of a racist and xenophobic nature committed through computer systems 6

Computer crimes Cybercrimes: Offenses against computer data and systems Offenses related to computers and the Internet Content-related offenses Intellectual property offenses Ancillary liability and sanctions 7

Investigation of Computer Crimes What evidence does using computers, cell phones, and the Internet create? Copies (Content Data) Logs (Traffic Data) Metadata (Traffic Data) Where is this evidence located? In the file On the device With the service provider 8

Computer Data Storage Short term RAM Cache Long term Hard drives Backups 9

Short Term Data Storage RAM (Random Access Memory) Where the magic happens Only exists when the device is on SWAP File Not enough RAM on most computers Write some data to the hard drive in temporary data files Often still there when the computer turns back on Cache Temporary local storage of data Often in temporary folders in long term data storage devices May still be there after computer restarts Temporary Internet Files Local backups 10

Long Term Data Storage On the computer Usually hard drives, sometimes flash Content data in files Some metadata Table of contents Shows where the data is Deletes only from contents unless overwritten 11

Long Term Data Storage Backups On variety of media o Tape o DVD o CD o Remote server (backup service, , drop box) o Floppy disks o Thumb drives Often off site 12

Data Files Content Data Most files have timestamps and author information Similar to traffic data Some files, such as documents and pictures, may have more detailed information about the file (metadata), Authors name Authors company Computer name Where the file was created (or picture was taken) When the file was created and changed Name of the network server where the file was saved Revisions Previous versions Hidden text/objects Comments Other file properties and summary information 13

Law Enforcement Challenges to law enforcement: Identifying the perpetrator and extent of the crime Volatility of electronic data Need for fast and confidential investigations Need for successful prosecutions 14

Tanzania Case Law Trust Bank Ltd. v. Le-marsh Enterprises Ltd., Joseph Mbui Magari, Lawrence Macharia [The High Court of United Republic of Tanzania (Commercial Division) at Dar es Salaam Commercial case No.4 of 2000 (Unreported)] 15

Love Bug Virus Onel de Guzman (a former computer science student) was identified as the person responsible for creating and disseminating the 'love bug' virus. However, Philippine law did not criminalize hacking or the distribution of viruses. The Philippine officials struggled with the question of how to prosecute De Guzman. They finally charged him with theft and credit card fraud but the charges were dismissed. De Guzman could not be extradited for prosecution in other countries such as the US (which has cybercrime laws) because the conduct attributed to De Guzman was not a crime in the Philippines. Extradition treaties require 'double criminality', namely the act for which a person is extradited must be a crime in both the extraditing country and the country seeking the extradition. De Guzman could not be charged for disseminating the 'love bug' virus. No one was prosecuted for the 'love bug' virus. 16

Case Law-Jurisdiction Director of Public Prosecution v Sutcliffe an Australian citizen, Brian Sutcliffe, was accused of stalking a Canadian actress who lived in Toronto. The charges were based on Sutcliffe's having telephoned the victim and written to her repeatedly over several years. The Australian prosecutor charged Sutcliffe with stalking but the magistrate dismissed the charges. The magistrate found that she lacked jurisdiction to adjudicate the matter because the crime of stalking occurred in Canada, where the victim was located. However, the Supreme Court of Victoria reversed the decision. The Court found that Sutcliffe was a resident of Australia and had committed all of the ingredients of the crime "save for the harmful effect" in Australia. Therefore, it was held that his conduct and presence in Australia established a "sufficient connection" to allow the court to exercise jurisdiction over the proceedings. 17

18Asante… Saidi M. Kalunde ITU LOCAL EXPERT Union Internationale des Télécommunications International Telecommunication Union