1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.

Slides:



Advertisements
Similar presentations
11 COUNTER-TERRORISM COMMITTEE CTED PRESENTATION ON MUTUAL LEGAL ASSISTANCE TO MEMBER STATES presentation by CTED GENERAL LEGAL ISSUES GROUP, INCLUDING.
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UNODC & the Global Response to Cybercrime
INTER- GOVERNMENTALISM AND INTERNET SECURITY DR IAN BROWN, OXFORD / OII.OX.AC.UK.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Maritime Security: Our Approach. Who is CUBIC?  Cubic Corporation (Amex) is an innovative supplier of products, systems and services to government and.
INTERNATIONAL COOPERATION Daniel H. Claman Senior Trial Attorney U.S. Department of Justice.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
43rd Plenary Meeting of the European Judicial Network
IS Audit Function Knowledge
(Geneva, Switzerland, September 2014)
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
ITIC PERSPECTIVE ON THE EFFECTIVE IMPLEMENTATION OF THE FCTC PROTOCOL ELIZABETH ALLEN ITIC – JULY 2014.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
The Global Effort to Regulate the Financing of Terrorism.
Non-governmental Actors in the Compliance with and Monitoring of Multilateral Environmental Decisions.
Gert Eidherr Global Project Manager, ITS Information Technology Service United Nations Office on Drugs and Crime.
THE INTER-AMERICAN CONVENTION AGAINST CORRUPTION AND ITS FOLLOW-UP MECHANISM GENERAL SECRETARIAT OF THE OAS.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 4 INVESTIGATION.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Legal Aid of Cambodia Bangkok, August 2015 Mr. RUN Saray Executiva Director and Lawyer Legal Aid of Cambodia WitnessProtection Presentation by.
Cybersecurity Governance in Ethiopia
A National approach to Cyber security/CIIP: Raising awareness.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Australia’s Implementation of the People Trafficking Protocol Presentation by Sandra Bennett International Crime Branch Australian Government Attorney-General’s.
CONDUCTING CYBERSECURITY RESEARCH LEGALLY AND ETHICALLY By Aaron J. Burstein; Presented by David Muchene.
LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security.
RECOMMENDATIONS FOR THE INSTITUTIONALIZATION OF THE ACTIVITIES OF THE REMJA WORKING GROUP ON MUTUAL LEGAL ASSISTANCE IN CRIMINAL MATTERS AND EXTRADITION.
The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.
2002 Symantec Corporation, All Rights Reserved The EU Regulations and IT security An industry perspective Ilias Chantzos, Government Relations EMEA Terena.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Presentation for Data Protection 2003 South Eastern Europe Conference on Regional Security Through Data Protection December 1-2, 2003 Cybercrime, Cyber.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Summary of Resolutions & Best Practice Guide By Hon. Kagiso Molatlhegi, MP. BOTSWANA PUBLIC ACCOUNTS COMMITTEE1.
 Cooperation and information exchange amongst financial supervisors and regulators are essential for effective oversight in an integrated financial system.
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Surveillance around the world
WitnessProtection Presentation
Investigating Shipping Pollution Violations
8 Building Blocks of National Cyber Strategies
BRASĺLIA Pierre-Gilles Bélanger, coordinator
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Forth International Forum
Forensic and Investigative Accounting
Prosecuting International Intellectual Property Crimes
Prevention, Intelligence
Deborah Housen-Couriel, ADV.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel and resources; Improve abilities to locate and identify criminals; Improve abilities to collect and share evidence internationally to bring criminals to justice.

2 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel and resources; Improve abilities to locate and identify criminals; Improve abilities to collect and share evidence internationally to bring criminals to justice.

3 Where Country A criminalizes certain conduct & Country B does not, a bridge for cooperation may not exist Extradition treaties Mutual Legal Assistance Treaties Criminalize Attacks on Computer Networks

4 Countries need to reach consensus about what to criminalize APEC Cybersecurity Strategy (2002) U.N. General Assembly Resolution 55/63 (2001) Effort to do so: Cybercrime Convention Provides a baseline for substantive law Follow through with amendments Bridging the “Dual Criminality” Divide

5 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel and resources; Improve abilities to locate and identify criminals; Improve abilities to collect and share evidence internationally to bring criminals to justice.

6 Law Enforcement Needs Experts dedicated to High-tech Crime Experts available 24 hours a day (home & beeper) Continuous training Continuously updated equipment Each country needs this expertise

7 Solutions Are Not Always Easy APEC Cyber Security Strategy Project to help develop law enforcement cybercrime units Difficult budget issues arise (even in the U.S.) Requires the commitment of the most senior officials Often close cooperation with the private sector can help

8 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel and resources; Improve abilities to locate and identify criminals; Improve abilities to collect and share evidence internationally to bring criminals to justice.

9 Primary investigative step is to locate source of the attack or communication Very often what occurred is relatively easy to discover, but identifying the person responsible is very difficult Applies to hacking crimes as well as other crimes facilitated by computer networks Locating and Identifying Crimnals

10 Only 2 ways to trace a communication: 1.While it is actually occurring 2.Using data stored by communications providers Tracing Communications

11 Infrastructure must generate traffic data in the first place Carriers must have kept sufficient data to allow tracing E.g.: “anonymizers” choose not to collect the data Certain legal regimes require destruction of data The legal regime must allow for timely access by law enforcement that does not alert customer The information must be shared quickly Tracing Communications

12 Countries should encourage providers to generate, and permit them to retain, critical traffic data Law enforcement’s ability identify and criminals and terrorists is enhanced by access to the data Countries have taken different approaches to balancing this need against other societal concerns Solution: Traffic Data

13 Solution: Traffic Data Industry will have views about appropriate retention periods One approach was developed by the G-8 Subgroup on High-Tech Crime Including a summary of the most important log files

14 Solution: Law Enforcement Access Legal systems must give law enforcement appropriate authorities to access traffic data E.g.: access to stored log files and to traffic information in real-time Preservation of evidence by law enforcement Critical given the speed of international legal assistance procedures Must be possible without “dual criminality” Convention on Cybercrime, Article 29

15 Solution: Sharing Evidence Countries must improve their ability to share data quickly If not done quickly, the electronic “trail” will disappear Yet most cooperation mechanisms take months (or years!), not minutes Convention on Cybercrime, Article 30: expedited disclosure of traffic data

16 Solution: Sharing Evidence When law enforcement gets a request, it should be able to 1.Preserve all domestic traffic data 2.Notify the requesting country if the trace leads back to a third country 3.Provide sufficient data to the requesting country to allow it to request assistance from the third country Countries must be able to do this for each other quickly, and on a 24/7 basis

17 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel and resources; Improve abilities to locate and identify criminals; Improve abilities to collect and share evidence internationally to bring criminals to justice.

18 Will evidence collected in the U.S. be admissible in Botswana? Computer forensics: It is easier to deny the threatening e- mail It is easier to hide evidence on a computer It is easier to change electronic evidence by mishandling it Collecting and Sharing Evidence

19 Solutions for Collecting and Sharing Evidence Convention on Cybercrime Acts as a Mutual Legal Assistance Treaty where countries do not have an MLAT Parties agree to provide assistance to other countries to obtain and disclose electronic evidence International standards being developed by International Organization for Computer Evidence

20 Law Enforcement 24/7 Network (May 2003)

21 Ongoing International Efforts In 2002, APEC leaders committed to: Modernize legal frameworks Develop cybercrime investigative units and 24/7 response capability Establish threat and vulnerability information sharing OAS: REMJA, CICTE, CITEL, Hemispheric Security OECD: “Culture of Security”

22 Conclusion Every country relies on the others for assistance in responding to the threat of cybercrime Each country needs to: Enact adequate substantive and procedural laws Empower its law enforcement authorities to collect evidence for other countries Work to enhance the rapid collection and international sharing of electronic evidence

23 The Result

24 Questions?