Dr. Herbert Gustav Yankson GLACY+ Ghana National Team (Member)

Similar documents
National Communications Authority

Criminal Justice Statistics on Cybercrime & Electronic Evidence

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Cyber Security Development. Ghana in Perspective

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

10025/16 MP/mj 1 DG D 2B

CYBERCRIME RESPONDERS TRAININGS

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

Act Pacific Islands Law Officers Network Cybercrime Workshop

15412/16 RR/dk 1 DGD 1C

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Overview on the Project achievements

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

UNODC tackling cybercrime in support of a safe and secure AP-IS

ECONOMIC ASPECTS OF CYBERCRIME

Strategic and operational threat analysis at Europol's EC3

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

The cost of cybercrime the benefits of cooperation

PROJECT RESULTS Summary

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Legal Foundation and Enforcement: Promoting Cybersecurity

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

Republic of Mauritius CYBERCRIME STRATEGY Page

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

ASEAN s Cyber Confidence Building Measures

FOREWORD DR PHILIP SMITH MBE CHAIRMAN MILTON KEYNES BUSINESS LEADERS PARTNERSHIP

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

Project III Public/private cooperation

In December 2010 the Unit was renamed as the Statistics and Information Management Unit.

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Guiding principles on the Global Alliance against child sexual abuse online

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

THE VIRTUAL COURT PROTOTYPE

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

The commission communication "towards a general policy on the fight against cyber crime"

STANDARD SUMMARY PROJECT FICHE

Resolution: Advancing the National Preparedness for Cyber Security

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

CHAPTER 1 CYBER CRIME A CONCEPTUAL AND THEORETICAL FRAMEWORK

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

NORTH YORKSHIRE POLICE

2013 US State of Cybercrime Survey

Global cybersecurity and international standards

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

ITU Model Cybercrime Law: Project Overview

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

PIONEER TRAINING INSTITUTE

Cyber Crime Update. Mark Brett Programme Director February 2016

A practical guide to IT security

Thailand Initiatives and Challenges in Cyber Terrorism

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

Standard Categories for Incident Response (definitions) V2.1. Standard Categories for Incident Response Teams. Definitions V2.1.

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

Co-operation against cybercrime CSIRTs LE private sector

Security Breaches: How to Prepare and Respond

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

EXPERT GROUP MEETING ON CYBERCRIME

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Region

Designing Robustness and Resilience in Digital Investigation Laboratories

CYBER SECURITY & CYBER LAWS

Best Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake

Promoting Global Cybersecurity

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

New Zealand National Cyber Security Centre Incident Summary

Subject Access Request to apply for information held about you by Durham Constabulary

Cybercrime and e-evidence: challenges and solutions.

The UN-CTS data collection on crime and criminal justice: Overview. Michael Jandl Data Development and Dissemination Unit UNODC

G8 Lyon-Roma Group High Tech Crime Subgroup

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Making a Victim Personal Statement. You have a voice in the criminal justice system and have a right to explain how the crime has affected you

Reviewing the Results of the Forensic Analysis

Responding to Cybercrime:

Infrastructure Theft Presentation

INTERPOL Capacity Building and Training Activities. Lili SUN Head of Training Unit Cybercrime Directorate June 15, 2017

Privacy Notice. Contents. How Glasgow Credit Union uses your personal information

International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL. Mr Olusola Oguntunde

Performance Audit: City Could Better Protect Personally Identifiable Information July 2015

Data Protection - Subject Request Form

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

Judiciary Judicial Information Systems

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Consumer Rights in the Digital Age

HBW LAW LTD T/A HESELTINE BRAY & WELSH

Garry Mukelabai Communications Authority Zambia

Global Cybercrime Certification

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

A Multi-Stakeholder Approach in the Fight Against Cybercrime

TOWARDS A CONCEPTUAL FRAMEWORK FOR DIGITAL DOSSIER MANAGEMENT IN CRIMINAL PROCEEDINGS

Data Protection and Cybercrime Challenges

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

UK Perspectives on Cyber Crime: victims, offences and offenders

New Legal instruments for Cross-border Crime Investigation in EU

Transcription:

Dr. Herbert Gustav Yankson GLACY+ Ghana National Team (Member)

OUTLINE OF PRESENTATION Ghana GLACY+ National Team Criminal Justice System Cybercrime Criminal Justice Institutions Reporting & Recording Cybercrime and Criminal Justice Statistics Use of Criminal Justice Statistics Challenges Way Forward Conclusion 3/29/2017 2

GHANA GLACY+ NATIONAL TEAM REPRESENTATIVE Mr. Joe Anokye (National Coordinator) Justice Mrs. Afia Serwaa Asare Botwe Mrs. Yvonne Atakora Obuobisa Mr. Kwabena Adu Boahene Dr. Gustav Yankson Mr. Tim Coleman Mr. Eric Akumiah Mr. Kofi Boakye INSTITUTION National Communications Authority Judicial Service of Ghana Ministry of Justice and Attorney General s Department National Security Council Secretariat Ghana Police service Bureau of National Investigations CERT - GH Financial Intelligence Center Mr. Richard Quaye Economic and Organised Crime Office 3/29/2017 3

THE CRIMINAL JUSTICE SYSTEM The Criminal Justice System consists of: The law Enforcement Agencies The Court/Judiciary and Prosecution The Prisons Service 3/29/2017 4

METHODS OF REPORTING CYBERCRIMES ISSUES Complaints/ Petitions on cybercrime issues are generally made through the following channels Walk-in at offices of the Law Enforcement Agencies. Via the Agency s website. Via emails. Via phone calls and SMS Short code. 3/29/2017 5

HOW CYBERCRIME STATISTICS ARE OBTAINED/RECORDED BY LAW ENFORCEMENT AGENCIES, PROCECUTION AND COURTS POLICE Collates its statistics through the following manual processes: Station Diary Register of Offences Book Register of Lost, Stolen or Recovered Property book Statement Forms Profile forms Fingerprint and Antecedent BNI Collates its statistics from an in-house built case management system. Financial Intelligence Center (FIC) Collates its statistics as prescribed in Section 5 Act 749 (Procedures for gathering data). The Centre receives the mandatory reports of Suspicious Transaction Reports, Cash Transaction Reports, Electronic Transaction Reports. 3/29/2017 6

HOW CYBERCRIME STATISTICS ARE OBTAINED/RECORDED BY LAW ENFORCEMENT AGENCIES, PROCECUTION AND COURTS EOCO Reporting is done at all offices similar to the police Recording is done via manual process such as excel spreadsheet. PROCECUTION & COURTS There is no formal procedure for reporting and recording Cybercrime. Statistics are collated by the Individual judges or prosecutors. Table 1. Sample crime statistics form. 3/29/2017 7

Table 2 TYPICAL STATISTICS OF CRIME REPORTED FORM FOR POLICE CYBERCRIME UNIT CYBERCRIME UNIT (CU) CID HEADQUARTERS CASES REPORTED/STATISTICS FOR THE MONTH OF 2017 OFFENCE AMT DEFRAUDED ATTACK/ MODOUS EMP NATIONALITY AGE SUSPTS VICTIMS SUSPT VICTIMS 3/29/2017 8

TYPICAL REPORT OF STATISTICS OF CYBERCRIME BY POLICE CID CYBERCRIME UNIT Table 3 A CHART SHOWING CASES RECEIVED AND THE AMOUNT DEFRAUDED FOR THE FIRST QUARTER 2016 [CELLRANGE] [CATEGORY NAME] [PERCENTAGE] [CELLRANGE] [CATEGORY NAME] [PERCENTAGE] ATM FRAUD [CELLRANGE] [CATEGORY NAME] [PERCENTAGE] BUSINESS EMAIL COMPROMISE SOCIAL MEDIA IMPERSONATION INTERNET FRAUD OTHERS [CELLRANGE] [CATEGORY NAME] [PERCENTAGE] [CELLRANGE] [CATEGORY NAME] [PERCENTAGE] 3/29/2017 9

CURRENT USE OF CYBERCRIME STATISTICS IN GHANA Trend of Threats posed Direct Policy Decision by relevant institutions Decision on how resources should be directed Develop Regulation/ Legislation Required, etc 3/29/2017 10

CHALLENGES No standardization or structured format for data reporting. Different data capture forms used within an Agency result in duplication making it cumbersome, and difficult to manage during the extraction for statistics Different data capture forms used across Agency s resulting in difficulty in sharing statistics Absence of key fields for capturing relevant data on forms - eg. Absence of email address on statement forms No Case management system for data collection and analysis. 3/29/2017 11

CHALLENGES Inaccurate data capturing due to Human errors in manual data entry Victim unwillingness to report cybercrime incidents Lack of awareness of some of the cyber laws amongst the Law enforcement personnel ---inappropriate charges preferred Lack of clear definition of Cybercrime and distinction between cybercrime and other cyber-based malicious acts. 3/29/2017 12

THE WAY FORWARD Implementation of Centralized Case Management System Consolidation of Crime statistics forms to eliminate duplication. Continuous training of Criminal Justice System personnel on the effective ways of collating statistics and to sensitize them on the need for it. 3/29/2017 13

CONCLUSION We are grateful to the Council of Europe and GLACY+ for organizing this very important workshop. It is our expectation that this workshop and future workshops will help address the challenges in the previous slide. 3/29/2017 14

Thank You 3/29/2017 15