Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.

Slides:



Advertisements
Similar presentations
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
Advertisements

UNODC & the Global Response to Cybercrime
Concept of Law and Sources of Law
Convention for the protection of individual with regard to automatic processing of personal data “The purpose of this convention is to secure in the territory.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Police Integration & Oversight Canadian Association of Civilian Oversight in Law Enforcement June 2009.
Bali Process Technical Expert Workshop on Mutual Legal Assistance and Law Enforcement Bangkok, Thailand, June 2011 Celia Maunder International Crime Cooperation.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Remarks of Kristen Pinhey Competition Law Officer Competition Bureau Canada Unannounced Inspections in Canada International Competition Network, 2013 Cartel.
Lawful Access/Interception: Global Cooperation and Collaboration Anthony M Rutkowski.
Europol’s tailor-made data protection framework
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007.
WORKSHOP ON THE HANDBOOK ON “PARLIAMENTARY OVERSIGHT OF THE SECURITY SECTOR” Podgorica, Montenegro 26 – 27 May, 2005 Geneva Centre for the Democratic Control.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
FORCE INFORMATION MANAGEMENT. INFORMATION MANAGEMENT Aim: To provide students with an awareness of the Force Information Management and legislation that.
Information Security Group DSD & E-Security DSD and E-Security Tim Burmeister Information Security Policy Defence Signals Directorate
AVAR November 2004 in Tokyo, Japan Computer Secutiry Situation in Japan (Report from National Police Agency Japan) Takashi Garcia SATO Assistant.
9/11 attacks radically changed Federal Law Enforcement Attacks highlighted a lack of coordination among Federal agencies 2002 President Bush created: The.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Lecture 11: Law and Ethics
Powers to stop and Search of Premises POLICE POWERS STOP & SEARCH and SEARCH OF PREMISES.
ISPs – Internet’s Secret Police? Ian Kerr Canada Research Chair in Ethics, Law & Technology Université D’ Ottawa University of Ottawa Faculté de droit.
POLICE OF THE CZECH REPUBLIC NATIONAL DRUG HEADQUARTERS CRIMINAL POLICE AND INVESTIGATION SERVICE Beograd,
Whole of Government Approach to Combating People Trafficking, including Victim Support Presenter Scott Wilson, Principal Legal Officer Commonwealth Government.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
 A learning pathway is the means people take to develop the skills and knowledge required to proceed down a particular career path.  Examples are: 
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
IPTS Workshop on Cyber Crime German Developments.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
UNSW CLE 19 July Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
The Search & Surveillance Act 2012 Who does it effect in Local Government & how? Compliance, Enforcement and Regulatory Training (CERT) Systems “Maximising.
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
FIGHTING CYBERCRIMES: THEORY AND PRACTICE GERONIMO L. SY Assistant Secretary & Head, Office of Cybercrime Department of Justice Manila, Philippines.
Prof. Dr. Lorena Bachmaier, Universidad Complutense Madrid, Spain Section III- Criminal Procedure Information Society and Penal Law Lorena Bachmaier Doha,
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Law and Ethics INFORMATION SECURITY MANAGEMENT
Federal Law Enforcement!
Surveillance around the world
JUDICIAL COOPERATION IN CRIMINAL MATTERS IN THE EU
POLICE FORCE СПб Университет МВД России Кафедра иностранных языков
Role of Service Providers in Cybercrime Investigations
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Chapter 6 International crime
Federal Law Enforcement
Patrick Sefton | Principal, Brightline Lawyers
Thinking Critically Questions Chapter Five
Texas Search and Seizure
Cybercrime legislation and policies in Africa: Issues for discussion
Privacy Violation Privacy Law Privacy Amendment
UNODC and CYBERCRIME October 2009.
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers

I Who’s Who ‘Who’s Who in eSecurity and eCrime’ Dale (2001) [2001] CyberLRes 17 Res/2001/17

Who’s Who Federal Government Agencies State and Territory Agencies Industry Associations E-security solutions vendors and consultants Providers of eSecurity qualifications/training E-security professionals within organisations

Federal Government NOIE A-G’s Department DSD ASIO AFP AGEC grouping of Cth Law Enforcement agencies

State and Territory agencies Police forces Attorney-General’s/Justice Departments Co-ordinating agencies for Government online activities

Providers of qualifications/training University IT Departments TAFE sector Professional bodies (eg Australian Computer Society) Private sector providers

II Powers

CoE Convention Cybercrime Convention Sec 2 requires investigatory powers (A14(1)) covering:  Expedited preservation of stored computer data  Production orders  Search and seizure of stored computer data  Real-time collection of computer data  See also Ch. III - International co-operation

Article 16 - Preservation of Data “enable the competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data”

Article 18 - Production Order Enable competent authorities to order the production of data

Article 19 - Search and Seizure Enable competent authorities to search and seize data, or computer systems

Article 20 - Real-time Collection Enable competent authorities to intercept and record traffic data in real-time

ASIO Australian Security Intelligence Organisation Act 1979 s 25A Computer Access Warrant Criminal Code Act s Liability for certain acts

General Telecommunications (Interception) Act 1997

Crimes Act 1914 (Cth) Search Warrants Division 2 In particular, s3LA Person with knowledge of a computer or a computer system to assist access etc.