Legal Foundation and Enforcement: Promoting Cybersecurity

Similar documents
Commonwealth Cyber Declaration

The cost of cybercrime the benefits of cooperation

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

Promoting Global Cybersecurity

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

International Cooperation in Cybercrime Investigations

Data Protection and Cybercrime Challenges

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

Cybersecurity for ALL

Robert Holleyman, President and CEO, BSA The Software Alliance

Criminal Justice Statistics on Cybercrime & Electronic Evidence

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Global cybersecurity and international standards

1 History of CyberSecurity in the Philippines 2 3

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Guiding principles on the Global Alliance against child sexual abuse online

COMPUTER FORENSICS (CFRS)

Overview on the Project achievements

ASEAN s Cyber Confidence Building Measures

CYBERCRIME RESPONDERS TRAININGS

About Issues in Building the National Strategy for Cybersecurity in Vietnam

10025/16 MP/mj 1 DG D 2B

ITU Regional Cybersecurity Forum for Asia-Pacific

The UK s National Cyber Security Strategy

G7 Bar Associations and Councils

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure


CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

ITU Model Cybercrime Law: Project Overview

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Forensics and Active Protection

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

Security & Phishing

The commission communication "towards a general policy on the fight against cyber crime"

Certified Cyber Security Analyst VS-1160

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Global Wildlife Cybercrime Action Plan1

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Caribbean Cyber Security: Not Only Government s Responsibility

Department of Homeland Security Updates

OAS Cybersecurity Capacity Building Efforts

Policy recommendations. Technology fraud and online exploitation

Garry Mukelabai Communications Authority Zambia

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Virtual Currencies and The Commonwealth. 1 June 2016

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

A new approach to Cyber Security

General Framework for Secure IoT Systems

Comprehensive Study on Cybercrime

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

RESOLUTION 45 (Rev. Hyderabad, 2010)

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

Cybersecurity & Digital Privacy in the Energy sector

Cyber Security Roadmap

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

Defending Our Digital Density.

ISACA West Florida Chapter - Cybersecurity Event

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

5-6 SILICON VALLEY World Cyberspace Cooperation Summit IV NOVEMBER. World Cyberspace Cooperation EXECUTIVE!SUMMARY!

Act Pacific Islands Law Officers Network Cybercrime Workshop

Cybersecurity Strategy of the Republic of Cyprus

DIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services

Cybercrime and e-evidence: challenges and solutions.

Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams

National Cybersecurity preparation to deal with Cyber Attacks

Governance Ideas Exchange

Angela McKay Director, Government Security Policy and Strategy Microsoft

Project III

Cybersecurity & Spam after WSIS: How MAAWG can help

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

Cyber Security Strategy

RESOLUTION 130 (Rev. Antalya, 2006)

Cybercrime Criminal Law Definitions and Concepts

Systemic Analyser in Network Threats

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

Global Cybersecurity Agenda

G8 Lyon-Roma Group High Tech Crime Subgroup

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Bradford J. Willke. 19 September 2007

Transcription:

Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer Crime and Intellectual Property Section U.S. Department of Justice, Criminal Division

Legal Foundation & Enforcement Overview Laws Global Enforcement Reach Investigation Prosecution/Criminal Justice System Effective Networks/Cooperative Partnerships

Legal Foundation & Enforcement What is the role of the legal foundation and enforcement in cybersecurity? Cornerstone Provide framework to investigate, prosecute and deter cyber crime Promote Cybersecurity Confidence In Legal Systems Encourage Commerce

Legal Foundation: Laws Challenges/Barriers New methods of attack More sophisticated crime Organized Crime International Dimension

Recent Trends Increasingly Sophisticated Advanced Identity Theft from Web Site Attacks That Exploit Persistent Bots Browser Vulnerabilities - Increasingly Malicious Especially On Trusted Web Spyware Sites Web Application Security Increasing Sophistication And Exploits Effectiveness In Botnets Increasingly Sophisticated Cyber Espionage Efforts By Social Engineering Including Well Resourced Organizations Blending Phishing with VOIP Looking To Extract Large and Event Phishing Amounts Of Data - Particularly Using Targeted Phishing Supply Chain Attacks Infecting Consumer Devices (USB Mobile Phone Threats, Thumb Drives, GPS Systems, Especially Against iphones Photo Frames, etc.) Distributed And Android-Based Phones; by Trusted Organizations Plus VOIP Insider Attacks Source: http://www.sans.org/press/top10menaces08.php

Greater Sophistication Today s s attackers are increasingly sophisticated and organized, and have begun to adopt methods that are similar to traditional software development and business practices. Increased professionalization and commercialization of malicious activities Threats that are increasingly tailored for specific regions Increasing numbers of multi-staged attacks Attackers targeting victims by first exploiting trusted entities Convergence of attack methods Source: Symantec Internet Security Threat Report: Trends for January J June 07 (Published September 2007)

Malicious Code By Type Symantec Internet Security Threat Report: Trends for January June 07 (Published September 2007)

Legal Foundation: Laws Laws Updated Sufficient for present cybersecurity needs Address core substantive and procedural areas Global Enforcement Reach Address domestic Needs International Cooperation Coordination

Legal Foundation: Laws Convention on Cybercrime www.coe.int/cybercrime Framework Substantive Crimes Procedural Rules International Cooperation CCIPS Review Of Law Drafts Betty.Shave@USDOJ.gov (202) 514 1026

Investigation Questions to ask: What is the ability of investigators to: Follow criminal leads? Collect and preserve evidence? Find, apprehend the perpetrators? Where other countries are involved, how long will it take?

Investigation Specialized Training Obtaining Electronic Evidence Cooperation Mutual assistance processes

Prosecution Enforce Criminal Law Admit evidence in court Deterrence Punishment Criminal Justice System Train judges

Effective Networks/Cooperative Partnerships International Partnerships Governments National State and Local NGOs Industry/Private Sector Assisting investigation Reporting crime

Conclusion Legal foundation and enforcement are essential for effective cybersecurity Assessment How effective is the present legal foundation and enforcement? What areas for improvement? How to enhance regional and international cooperation?

Cybercrime.gov Public Page Latest News Releases Policies & Programs Legal Resources Contact Info Cases

Legal Foundation and Enforcement: Promoting Cybersecurity Questions? Mark L. Krotoski Computer Crime and Intellectual Property Section U.S. Department of Justice, Criminal Division Mark.Krotoski@usdoj.gov

Five Pillars (1) Developing a national cybersecurity strategy (2) Establishing national government- industry collaboration (3) Creating a national incident management capability (4) Deterring cybercrime (5) Promoting a national culture of cybersecurity