Attribution & the globalization of criminal evidence

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information.
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Silicon Flatirons.
Lawful Access in the EU: The Pipe to the Cloud? Professor Peter Swire Ohio State University & Future of Privacy Forum Georgetown Law School Conference.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.
MONGOLIA Technical Expert Workshop on Mutual Legal Assistance (MLA) and Law Enforcement Cooperation Bangkok, Thailand 30 May – 1 June 2011.
Conflicting Privacy Regimes: (1) Encryption and (2) Access to Cloud Records Peter Swire Ohio State University Future of Privacy Forum IAPP Global Summit.
Federal Bureau of Investigation
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
TOGOLESE CONSUMERS ASSOCIATION (ATC ) Fifth Annual African Consumer Protection Dialogue Conference (Zambie september 2013) “ Moving Cross Border.
Cyber Security Nevada Businesses Overview June, 2014.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
SECI Regional Center for Combating Transborder Crime 22. – 23. June 2010 Bucharest, Romania.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Operational (Forensic) Analysis. Differences between Prosecutorial vs. Operational Investigations Timeliness of the investigation –There is no criminal.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Consistency in Reporting Data Breaches
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
IPTS Workshop on Cyber Crime German Developments.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Extradition Issues arising in people smuggling matters Australia’s Experience Technical Expert Workshop on Mutual Legal Assistance (MLA) and Law Enforcement.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Memoranda of Understanding: An Effective Tool to Enhance Cooperation.
Global Cyberspace Cooperation Update and Prognosis, June 2015 Bruce W. McConnell Senior Vice President
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
London Action Plan Wout de Natris OPTA Strasbourg, 12 June 2007.
SmallMail, protect your from nosey Big Brothers Peter Roozemaal
María Sánchez Prevention & Communication Officer
Maritime Security as an Integral Part of an
Peter Swire Holder Chair of Law and Ethics
Regional integration: Is tax harmonization a natural next step?
Danilovgrad, MN, RESPA, September 2013
The Challenge of Effective Judicial Cooperation
UCD Centre for Cybersecurity & Cybercrime Investigation
Sub-regional wildlife enforcement cooperation
EU policy on combating hate speech online
Hard Data: Data Collection Mechanisms on Human Trafficking in the Baltic Sea Region Expert Conference on Forced Labour Exploitation and Counter.
Second Global Meeting of Wildlife Johannesburg – South Africa
“Keynote: The Big Picture on Privacy and Cybersecurity for Technology Lawyers” Peter Swire Holder Chair of Law & Ethics, Georgia Tech Senior Counsel, Alston.
North Carolina Law Review Symposium
Lusaka Agreement Task Force
Introduction to GDPR 09/11/2018.
U.S. Department of Justice
COMBATING THE SEXUAL EXPLOITATION
Dispute Settlement under the Indian Model BITs
Matthew Allen Comp 2903 October 28th 2010
Cybercrime in the election process:
Chapter 6 International crime
CYBERSPACE: CAN FRAGMENTATION BE STOPPED
Promoting Global Cybersecurity
IGraphic Social impacts of IT
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
Eurojust’s involvement in JITs
Presentation transcript:

Attribution & the globalization of criminal evidence Peter swire GT Cybersecurity summit September 27,2017

Overview Attribution increasingly vital Attribution is harder when the attacks come from other countries We are getting the “globalization of criminal evidence” Mutual Legal Assistance (MLA) is a key way nations cooperate We at Georgia Tech are leading research on MLA If we don’t fix MLA, we’ll get a much worse Internet

Stewart baker: “Picking away at the Impunity problem” (1) Do attribution (2) Get usable criminal evidence (3) Prosecute in US or abroad

Cross-border evidence is much harder for Law enforcement Easy: Hacker is in the US, get evidence in the US, arrest in the US That drove the spammers out of the US: Much harder: Hacker is in a not-so-friendly government, evidence often there, maybe can arrest there To make this better: Stronger international cooperation to get the evidence and make the arrests

Cross-border Criminal evidence is becoming the new normal In pre-cyber days, local crime and local evidence Globalization today – police can’t get evidence locally, for data at rest and data in transit Data at rest: Evidence of the hack often in servers and networks in a different country Email, social network information, much more stored in the cloud Cloud often in a different country – local legal process doesn’t work Data in transit: Police used to do wiretaps, locally Today, wiretaps don’t work due to encryption (HTTPS, etc.) “Globalization of Criminal Evidence” – huge pressure on cross-border cooperation

Cross-border requests for data project

GT conference april 2017 GT: April 2017

cross-border cooperation Needs to change The Goal Develop evidence of attribution Cooperate to investigate and prosecute Critiques of current system of Mutual Legal Assistance Slow – average 10 months or more Designed for small sub-set of crimes, before globalization of criminal evidence

Enable direct access to partner countries MLA Reform Issues Improve the mechanics Online MLA portals/requests, standardize forms, more transparency, etc. Enable direct access to partner countries Similar to Visa Waiver Program, with its 37 countries and reciprocal safeguards US/UK agreement in Congress now, allowing UK direct access to US content (and vice versa), with (perhaps sufficient) safeguards Swire & Desai Lawfare article on a similar approach to scale to India and others Research to map the protections of national legal systems GT papers on U.S. & France, to show differences yet similar overall protections Law enforcement vs. intelligence vs. military sharing Attribution might happen in non law-enforcement settings; how to share that

What if we don’t improve cross-border cooperation? If we don’t improve MLA and attribution, then law enforcement will push harder for other tools to get the evidence If local wiretaps don’t work in investigations, that supports limits on strong encryption For instance, the cloud providers or other networks are abroad, so need to wiretap locally If can’t get MLA, then use more “lawful hacking” For instance, no cooperation in Russia or other country, so enable law enforcement to conduct hacks there (and other countries will hack us, too) If can’t get MLA, and evidence abroad, then require localization of data For instance, Russia and others require data to be stored locally, and that could spread to many countries, splintering the Internet

Concluding remarks We face the “globalization of criminal evidence” That evidence is crucial to attribution and prosecution, to reduce “impunity” Mutual legal assistance improves the lawful structure for cross-border cooperation If don’t, then get more pressure for Limits on strong encryption Lawful government hacking Data localization In conclusion, improving MLA is far more important today: To help attribution To fight cyberattacks and other crime To preserve the global Internet

Thank you! GT Cross-border Requests for data project cyber.gatech.edu/cross-border-data-projectS Peter Swire peter.swire@scheller.gatech.edu