Australia Cybercrime Capacity Building Conference 27-28 April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.

Slides:



Advertisements
Similar presentations
UN Comprehensive Study on Cybercrime
Advertisements

UNODC & the Global Response to Cybercrime
Security Classification Practical Issues in dealing with different types of cybercrime.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
MINISTRY FOR INFORMATION SOCIETY AND TELECOMMINUCATIONS CIRT - Computer Incident Response Team GOVERNMENT OF MONTENEGRO MINISTRY FOR INFORMATION SOCIETY.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Legal Frameworks and Cyber- Security Discussion. Good Models to look at for Pacific Island Nations Tonga has a computer crime act (in review) – NZ does.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
Strategy and Policy Unit: Current Activities and Future Tasks
Child Online protection and curbing child pornography in South Africa
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
1 Photo PAMECA IV TEAM Design of PAMECA IV PAMECA IV started in July 2013 and is scheduled to run until October Its overall objective.
PREVENTION & RESPONSE “ARE YOU PREPARED” Security & Emergency Management Conference 1 June 2006 FA Frank Prendergast National Manager Counter Terrorism.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Cybersecurity Governance in Ethiopia
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Australia’s Drug Policy Greg Denham Nossal Institute for Global Health.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Australia’s Implementation of the People Trafficking Protocol Presentation by Sandra Bennett International Crime Branch Australian Government Attorney-General’s.
Whole of Government Approach to Combating People Trafficking, including Victim Support Presenter Scott Wilson, Principal Legal Officer Commonwealth Government.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
OPSC Optional protocol on sale of children children prostitution and pornography.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
IPTS Workshop on Cyber Crime German Developments.
Assessing Cyberspace Security and Vulnerabilities: The Critical Impact on Civil Liberties and Privacy Is there a trade-off between civil liberties and.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Computer crimes.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 1 Pages 979 to 983.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
SPANISH NATIONAL POLICE INNOVATION & DEVELOPMENT SERVICE LOGISTICS GENERAL DIRECTORATE SMI2GS - H2020, BRUSSELS 26 & 27 February 2016 H2020 (CALL 2016)
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
GROUP SECURITY INVESTIGATIONS. 2016/06/212 Drive down the instances of energy crime against Eskom by means of effective prevention, investigation and.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Cyber Security and Georgia. New Challenges
Conducting Reactive and Proactive Internet Investigations
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Public-private cooperation
Prepared by the Cybercrime Programme Office of the Council of Europe
8 Building Blocks of National Cyber Strategies
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
UNODC and CYBERCRIME October 2009.
Digital Empowerment of Women in KP
Introduction to Digital Forensics
Presentation transcript:

Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government Attorney-General’s Department

Cyber crime trends Increasing dependence Increasing sophistication Mainly for financial gain – business principles apply Use of technology by criminal groups – real world crossing into online world.

Cyber crime Behaviour Computer offences (hacking or impairment for extortion, terrorism, warfare) Online offencesCyber safety Cyber security (unauthorised access for fraud, identity theft, espionage) Fraud / scams Identity theft PrivacyChild grooming, pornography etc Cyber bullyingInappropriate content and promotion of inappropriate behaviours Policy whole of government policy business-government partnerships international engagement legislative frameworks awareness raising and education Policy whole of government policy business-government partnerships international engagement legislative frameworks awareness raising and education Law enforcement Australian Federal Police & State/Territory police investigation of offences and awareness raising Law enforcement Australian Federal Police & State/Territory police investigation of offences and awareness raising National security & defence Policy whole of government policy business-government partnerships international engagement legislative frameworks awareness raising and education Policy whole of government policy business-government partnerships international engagement legislative frameworks awareness raising and education Law enforcement Australian Federal Police & State/Territory police investigation of offences and awareness raising Law enforcement Australian Federal Police & State/Territory police investigation of offences and awareness raising Regulators Law enforcement Australian Federal Police & State/Territory police investigation of offences and awareness raising Law enforcement Australian Federal Police & State/Territory police investigation of offences and awareness raising Policy whole of government policy business-government partnerships international engagement legislative frameworks awareness raising and education Policy whole of government policy business-government partnerships international engagement legislative frameworks awareness raising and education

Comprehensive response –awareness raising and education –international cooperation –research –business-government partnerships (information sharing) –law enforcement (crime prevention and investigation)

Australia’s legal framework Comprehensive cyber crime offences –Computer offences Unauthorised access or impairment Interception –Traditional crime – online Technology neutral –Prevention, investigation and prosecution of online child sexual exploitation –Identity crimeETC

Operational response capability and law enforcement Partnerships, shared responsibility: Trusted Information Sharing Network for Critical Infrastructure Resilience(TISN) CERT Australia ISP Code of Practice Law enforcement Crisis management plan, exercises International cooperation