Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Electronic Crimes on the E-Information Highway. Violent Crimes.
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
By Andy Scott, Michael Murray and Adam Kanopa
Introduction and Overview of Digital Crime and Digital Terrorism
Security Classification Practical Issues in dealing with different types of cybercrime.
Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.
Maximilian Edelbacher. Speaker: Maximilian Edelbacher Studied Law at the Vienna University 1972 – 2006 employee of Police, Chief of Major Crime Bureau.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
2 Language of Computer Crime Investigation
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Breaking Trust On The Internet
Technology & Crime Cyber – Mini Conference ADIL ILYAS CYBER CRIME CONSULTANT – CID HQ.
Contents What is Forensic Accounting Nature of work of Forensic Accountants Need of Forensic accounting Activities of Forensic accountants Forensic Accountant…An.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Chapter 14 Crime and Justice in the New Millennium
‘ Cyber crime, security and financial crime - what SMEs need to know and how to protect yourself’ Dr. Nicholas Ryder Professor in Financial Crime Department.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Edwin Sutherland Persons of the upper socio-economic class engage in much criminal behaviou; this criminal behaviour differs from the criminal behaviour.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Forensics BACS 371
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
Cyber crime & Security Prepared by : Rughani Zarana.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
CYBER CRIME.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Chapter 9 Enhancing Information/Computer Security.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Cybercrime What is it, what does it cost, & how is it regulated?
A threat to global security and economy Koushik Mannepalli CMPE 294.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Cyber Law And Ethics And Ethics.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Cyber crime and security issues
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
What is ‘Crime’?.
GCSE ICT SECURITY THREATS.
The Best Way To Secure U R Self
COMPUTER CRIME.
Challenges and Successes in the Zambian ICT Security Sector
CCP 420: FRAUD DETECTION AND MANAGEMENT
Presentation transcript:

Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE AUTHORITY

white collar crime Coined in 1939 by Edwin Sutherland, a sociologist. “Crime committed by a person of respectability and high social status in the course of his occupation”. Encompasses the nonviolent, financially motivated crimes (committed for monetary gain).

Common white collar crimes Computer & Internet Fraud Credit Card & Finance Fraud Tax Evasion & Money Laundering Counterfeits Public Corruption, etc. The perpetrators are increasingly embracing numerous sophisticated means availed by technology to conceal activities. White-collar crimes are increasingly difficult to prosecute.

Doesn’t require any violence”!! However, it’s not victimless! A single scam can destroy a company. Shutter investor confidence. Classic examples :  Enron case  Bernie Madoff currently serving 150- years in jail for embezzlement

The advent of CYBER CRIME The question now is not what crimes are committed with computers anymore but rather What crimes are not done on, or with computers? Thanks to ICTs and the Internet. Many “Traditional” forms of crime now have taken on a digital dimension, hence the term digital or cyber crime.

CYBER CRIME background Computer Technology as the subject of the crime Computers as Instruments of Crime Computers as Targets of Crime This entails the use ICT and the internet as a platform for crime. Computing digital devices used as facilitators of crime through Hacking; cracking; e-commerce fraud; software piracy; theft of intellectual property; planning offences via chat rooms / e- mail etc. Computers holding information targeted by a criminal can be subjected to Physical theft; hacking; cracking; denial- of-service attacks; sabotage of electronic business records; theft of data; vandalism of web sites etc

CYBER CRIME background Computers are Repositories of Evidence A computer may be the container holding evidence of a crime like; Tax fraud, Transactional drug trafficking data; Records of stolen passwords; Stolen credit card numbers etc

CYBER CRIME IS REAL... URA got hacked leading to an estimated UGX 2Billion tax loss in vehicle registrations Government websites defaced in the recent past. Telecom Companies grappling with cyber crime Banks are meeting the same challenge

Why white collar crime/ cyber crime thrives !! Super lucrative The pervasive nature of technology and the internet. Technology offers many options to exploit speed, convenience and anonymity that comes along with ICT technologies. "Hacker tools and tutorials" are easily available on the internet.

Crime Time-Line Crime Opportunity & Idea Pre-Crime Activities Actual Crime Detected Crime Reported Crime Investigated ProsecutionConviction Arrest Pro-Active TechniquesRe-Active Techniques

Cyber laws enactment timely ELECTRONIC SIGNATURES ACT, 2011ELECTRONIC SIGNATURES ACT, 2011; makes provision for and regulates the use of electronic signatures. ELECTRONIC TRANSACTIONS ACT, 2011ELECTRONIC TRANSACTIONS ACT, 2011: provides for use, security, facilitation and regulation of electronic communications and transactions. THE COMPUTER MISUSE ACT, 2011THE COMPUTER MISUSE ACT, 2011: makes provisions against unlawful access, abuse or misuse of information systems. The enactment of cyber laws, a milestone

significance of cyber laws.... Unprecedentedly define several misuse offences e.g. unauthorized access. lay down mechanisms for investigation and prosecution of the offences. efficacy of the cyber laws in place will become more apparent as they are put to test during judicial processes. However, cyber laws alone not sufficient in stemming the white collar crimes. Take cognizance of the fact that all computer operations are susceptible to computer crimes.

Way forward Capacity building efforts: Forensic Investigations expertise Prosecutorial Expertise Judges and Magistrates knowledge in the field International cooperation and strategic partnerships

Conclusion Criminals have raised the bar! Law enforcement & Justice systems need to stay relevant. Society’s dependency on technology has left it more vulnerable. Complexity that arises with rapid change in technology dictate the need for strategic partnerships locally and globally to counter legal challenges that arise thereof.

THANK YOU !