Cybercrime – the Global Challenge

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

Philippine Cybercrime Efforts
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
Council of Europe, Seminar, One in five Campaign and Strategic Action plan, the 9 th February 2012 The key to uncovering child sexual abuse: the child-friendly.
Council of Europe Eastern Partnership Facility 16 May 2013, Brussels.
The Second Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms Wednesday 21,
Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms May 2013.
International Country Cooperation and Coordination in Implementing the Palermo Protocol Ruby Marks Chief Director: Gender Department of International Relations.
INTER- GOVERNMENTALISM AND INTERNET SECURITY DR IAN BROWN, OXFORD / OII.OX.AC.UK.
Inter-ministerial Delegation for Human Rights Combatting trafficking in persons in Morocco: Fostering cooperation between NREMs and state and non State.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
2011 Overall Objectives Contributing toward limiting Violence against Women, and fostering the role of the NCHR in combating VAW focusing on domestic.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
Strategies to prevent and respond to violence against children who are in contact with the justice system APJJC Second Meeting “Towards child-friendly.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
To provide technical assistance to States to implement the Organized Crime Convention in order that they may effectively prevent and combat different forms.
Legislative Assistance and other Activities in Support of the Implementation of the Trafficking in Persons and Smuggling of Migrants Protocols.
Project Coordinator, UNODC
MONGOLIA Technical Expert Workshop on Mutual Legal Assistance (MLA) and Law Enforcement Cooperation Bangkok, Thailand 30 May – 1 June 2011.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
“With the signing of the United Nations Convention against Transnational Organized Crime in Palermo, Italy, in December 2000, the international community.
Cooperation models and monitoring mechanisms to fight trafficking in human beings Cooperation between law enforcement and social service providers in Germany.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
TRAFFICKING IN PERSONS A CASE OF MODERN SLAVERY 1.
1 11 Combatting Trafficking in Persons (CTiP) Regional Support Office – The Bali Process 27 September 2013.
“How to Enhance Assistance to Victims of Human Trafficking”, Helsinki, March 2014 Children exposed to exploitation, trafficking and at risk in transnational.
Overview of SAPS roles and responsibilities and demand reduction Assistant Commissioner Tertius Geldenhuys.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Regional Conference Intellectual Property Crime Bahrain April 2008.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
THE MEETINGS OF MINISTERS OF JUSTICE OR OTHER MINISTERS OR ATTORNEYS GENERAL OF THE AMERICAS ("REMJA" PROCESS) Committee on Juridical and Political Affairs.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Cybersecurity Governance in Ethiopia
Multidimensional Security in the Americas. INTRODUCTION 1.Where are we today? 2.Achievements (How and where?) 3.Our future 4.Realities.
ASIA PACIFIC FORUM OF NATIONAL HUMAN RIGHTS INSTITUTIONS WORKSHOP ON TRAFFICKING 21 NOVEMBER 2005 HUMAN RIGHTS AND HUMAN TRAFFICKING The framework of engagement.
Inter-American Program for the Prevention of Violence and Crime October 2014.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
Australia’s Implementation of the People Trafficking Protocol Presentation by Sandra Bennett International Crime Branch Australian Government Attorney-General’s.
Overview of the desk Review of Counter- Trafficking Initiatives in IGAD and EAC Regions December 2010.
The United Nations Global Initiative to Fight Human Trafficking (UN.GIFT) at the Informal Joint Briefing to Member States, Vienna, 2 March 2012.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Workshop on Developing a Coordinated Inter-Agency National Action Plan to Eradicate Trafficking in Persons Tokyo, Japan June 2005 Presented by Lance.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Human Trafficking: Global Trends and Responses
The European Women’s Lobby Working together for women’s rights and gender equality in Europe Eha Reitelmann Estonian expert to the EWL Observatory on violence.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
ENSURING BETTER PROTECTION FOR WOMEN FROM THEIR FIRST CALL FOR HELP UNTIL THEY REBUILD THEIR LIVE Prepared by Špela Veselič, Association SOS Help-line.
Trafficking flows Breakdown of trafficking flows by geographical reach,
Strengthening national capacities to prevent and combat cybercrime: UNODC Global Programme on Cybercrime Tania Banuelos Crime Prevention and Criminal Justice.
Michelle Forrest JD Candidate, Santa Clara University School of Law
15 October, 2012 Belgrade Human Trafficking and Migrant Smuggling Section (HTMSS) Trafficking in Persons.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
The Council of Europe and children’s rights Progress and challenges Regina Jensdottir Children's Rights Coordinator.
1 Belfast, Horst Forster European Commission Belfast,
The work of UNODC on violence against women
NATIONAL EFFORTS ON ADDRESSING AND RESPONDING TO VIOLENCE AGAINST SRI LANKAN WOMAN AND GIRL CHILD: RECOMMENDATIONS OF THE PRIME-MINISTER’S TASK FORCE.
Hard Data: Data Collection Mechanisms on Human Trafficking in the Baltic Sea Region Expert Conference on Forced Labour Exploitation and Counter.
U.S. Department of Justice
Trafficking in Persons (TIP)
  The Second Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms Wednesday.
Combatting Trafficking in Persons (CTiP)
Inter-ministerial Delegation for Human Rights
Fostering Cooperation between National Rapporteurs and Equivalent Mechanisms and Cooperation with International and Regional Organizations Consultative.
Authors: Zerina Bosovic
UNODC and CYBERCRIME October 2009.
DEFINING THE CONCEPT OF TRAFFICKING IN PERSONS
Presentation transcript:

Cybercrime – the Global Challenge UNODC Cybercrime – the Global Challenge Standards for the prevention and elimination of cybercrime

UNODC Cybercrime Mandates 2009: General Assembly Resolution 64/179 Explore ways and means of addressing cybercrime 2010: General Assembly Resolution 67/189 Comprehensive study on cybercrime 2011: Commission on Crime Prevention and Criminal Justice Resolution 20/7 General Assembly Resolution 65/230 Provide cybercrime technical assistance and training 2011: ECOSOC Resolution 2011/33 Produce a study facilitating the identification, description and evaluation of the effects of new information technologies on the abuse and exploitation of children Assess the needs of States for training in investigation of these offences Design a technical assistance programme to meet those needs 2013: Continued work on the study and strengthened partnerships

The Global Challenge Compared to the investigation, prosecution and adjudication of ‘conventional’ crimes (such as homicide or robbery), the involvement of a computer, mobile phone, or computer data in a crime event, presents at least three key challenges: Access to evidence – Evidence of cybercrime exists in electronic form. The lifetime of such evidence varies enormously The physical location of evidence also varies. Relevant evidence may be contained within vast quantities of non-relevant data, and that electronic evidence can be subject to encryption.   Handling evidence – Electronic evidence requires careful handling in order to ensure that it meets the necessary standards for use in court. Identifying the perpetrator – The Identification of the perpetrator(s) can represent a significant challenge.

UNODC Approach: The Global Programme on Cybercrime UNODC Global Programme on Cybercrime Objective: to assist developing countries to prevent and combat cybercrime through a global, sustainable and holistic approach

Combatting the problem International and regional instruments National laws and policies International cooperation International law increasingly recognizes that children deserve special protection. States vary considerably in approaches to addressing forms of child abuse and exploitation. While many States criminalize acts such as production of child sexual abuse material, they may differ with respect to elements of the crime and definitions of “child”. Tools and mechanisms for international cooperation include mutual legal assistance treaties, direct law enforcement cooperation, multi-agency partnerships, forums for information-sharing and informal direct law enforcement cooperation.

Combatting the problem Investigation of offences Private sector responses Civil society responses Specific tools can be employed for detection and investigation: digital forensic techniques, automated search, image analysis and image databases, data mining and analytics. Electronic service providers may engage in this respect through varying degrees of self-regulation, including by internet service providers, self-monitoring by travel and tourism companies and the creation of financial coalitions. Parents, guardians, child educators and civil society are a further vital component in combating the problem, including in supporting children in understanding and handling online risks, the “flagging” of certain material online, the creation of telephone hotlines for reporting, and contributions towards education and psycho-social methods of prevention.

International Instruments to combating ICT-Facilitated sexual abuse and exploitation of children United Nations Convention on the Rights of the Child (CRC) The Optional Protocol to the CRC on the Sale of Children, Chilf Prostitution, and Child Pornogrphy United Nations Convention Against Transnational Organized Crime The Protocol to Prevent, Suppress, and Punich Trafficking in persons, Espcially Women and Children Guidelines on Justice in Matters Involving Child Victims and Witnesses of Crime Prevention, invetigation and prosecution of any “serious crime”- includes the the use of ICTs to abuse ir exploit children. Develop training fo combatting crimes through the use of computers… It renders irrelevant the consent of any child victim of the practice of trafficking in persons

Regional Instruments to combating ICT-Facilitated sexual abuse and exploitation of children Council fo Europe Convention on Cybercrime Council of Europe Convention on the Protection of Children against sexual exploitation and sexual abuse African Charter on the rigths and walfare of the Child Aims to provide a common criminal policy. Art.9 deals with offences realted to child pornography. Aims to prevent and combat sexual exploitation and sexual abuse of children… Protect children from all forms of sexual exploitation and sexual abuse

Regional Instruments to combating ICT-Facilitated sexual abuse and exploitation of children (Child pornography) Commonwealth Model Law (art.10) 2. EU Dierctive on Child Explotoitation (art.15) 3. ITU/CARICOM/CTU Model Legislative (art.13)} 4. League of Arab States Convention (Art.12) 5.Draft African Union Conventio (art.9)

National Law

National Law

National Law

National Law

National Law

Assessment of the training needs of States Identification of crimes Lack of dedicated staff trained in all aspects of ICT- Facilitated child abuse and exploitation cases. Less 1% of all polices are specialists in cybercrime. El Salvador have only one forensic examiner -Training for personnes may best take place on a inter-agency basis -The investigation of ICT- F child abus tended to be reactive in nature, rather than proactive. As mentioned, the informal expert group that helped develop the Study also discussed needs of States in training in combatting these offences. One of the greatest needs in the detection of technology-facilitated offences against children was considered to be a lack of dedicated staff trained in all aspects of ICT-facilitated child abuse and exploitation cases. The Cybercrime Study noted that less than one per cent of all police are specialists in cybercrime. Skilled and dedicated personnel, perhaps organized into inter-agency task forces or units, can aid in all aspects of investigation and prosecution of these crimes, including developing expertise on handling digital evidence and conducting image analysis; studying offender profiles; interviewing and assisting child victims and witnesses; developing networks to facilitate cooperation across jurisdictions and borders; elaborating appropriate counter strategies for common defences in judicial proceedings, and learning how to clearly and persuasively present technical evidence to judges and juries. The group also noted that investigations of ICT-facilitated child abuse and exploitation offences tended to be reactive in nature, rather than proactive. One major obstacle in this respect, can be limited possibilities to undertake undercover investigations. The most common methods of such undercover investigations consist of law enforcement agents posing as children, virtually entering chat rooms, setting up websites that purport to display child sexual abuse material, or joining child sexual abuse communities purporting to be a consumer. The most significant obstacle to effective investigative capabilities was considered to be the lack of ability to obtain stored or real-time data on traffic or content, or subscriber information which can become magnified when requests for information and assistance are received from abroad. With regard to victim assistance, the main deficiencies identified were the absence of standard protocols for supporting victims through the investigative process, techniques for interviewing victims, and the collection and preservation of victim-related evidence. It is crucial that society at large is aware of whether conduct — such as cyberbullying or harassment — constitutes a criminal offence and if so, where and how to report it. As the Cybercrime Study noted, cybercrime acts most frequently come to the attention of law enforcement authorities through reports by victims. Finally, the expert group noted that the development of an overarching national law, policy or strategy against ICT-facilitated child abuse and exploitation with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. -States requiere a clear legal framework taht regulates undercover operations.

Assessment of the training needs of States Investigative capabilities and electronic evidence Lack of ability to obtain stores or real- tiem data on traffic content. In El Salvador the Internet Services Providers only stores datas for maximun of 3 months (they said don not have enough space) -Service providers require due legal process for disclosure of customer data. -Lack basic sufficient material resources, hardware, software and internet. -Specialized training for prosecutors and judges in handling digital evidence is a need. International cooperation As mentioned, the informal expert group that helped develop the Study also discussed needs of States in training in combatting these offences. One of the greatest needs in the detection of technology-facilitated offences against children was considered to be a lack of dedicated staff trained in all aspects of ICT-facilitated child abuse and exploitation cases. The Cybercrime Study noted that less than one per cent of all police are specialists in cybercrime. Skilled and dedicated personnel, perhaps organized into inter-agency task forces or units, can aid in all aspects of investigation and prosecution of these crimes, including developing expertise on handling digital evidence and conducting image analysis; studying offender profiles; interviewing and assisting child victims and witnesses; developing networks to facilitate cooperation across jurisdictions and borders; elaborating appropriate counter strategies for common defences in judicial proceedings, and learning how to clearly and persuasively present technical evidence to judges and juries. The group also noted that investigations of ICT-facilitated child abuse and exploitation offences tended to be reactive in nature, rather than proactive. One major obstacle in this respect, can be limited possibilities to undertake undercover investigations. The most common methods of such undercover investigations consist of law enforcement agents posing as children, virtually entering chat rooms, setting up websites that purport to display child sexual abuse material, or joining child sexual abuse communities purporting to be a consumer. The most significant obstacle to effective investigative capabilities was considered to be the lack of ability to obtain stored or real-time data on traffic or content, or subscriber information which can become magnified when requests for information and assistance are received from abroad. With regard to victim assistance, the main deficiencies identified were the absence of standard protocols for supporting victims through the investigative process, techniques for interviewing victims, and the collection and preservation of victim-related evidence. It is crucial that society at large is aware of whether conduct — such as cyberbullying or harassment — constitutes a criminal offence and if so, where and how to report it. As the Cybercrime Study noted, cybercrime acts most frequently come to the attention of law enforcement authorities through reports by victims. Finally, the expert group noted that the development of an overarching national law, policy or strategy against ICT-facilitated child abuse and exploitation with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. - Lack of standard operating procedures for requests involving digital evidence - Lack of contacts in requested countries (some use the diplomatic via)

Assessment of the training needs of States Victim assistance and awareness raising Absence of standard protocols for supporting victimis through the investigative process, techniques for interviewing victims and collection and preservation of victim-related evidence -Lack of awarnes among children, families and sociaty in respect of whether–cyberbullying, sexual harassment- constitus a criminal offence or not. -Need to promote awarness Policy and coordination As mentioned, the informal expert group that helped develop the Study also discussed needs of States in training in combatting these offences. One of the greatest needs in the detection of technology-facilitated offences against children was considered to be a lack of dedicated staff trained in all aspects of ICT-facilitated child abuse and exploitation cases. The Cybercrime Study noted that less than one per cent of all police are specialists in cybercrime. Skilled and dedicated personnel, perhaps organized into inter-agency task forces or units, can aid in all aspects of investigation and prosecution of these crimes, including developing expertise on handling digital evidence and conducting image analysis; studying offender profiles; interviewing and assisting child victims and witnesses; developing networks to facilitate cooperation across jurisdictions and borders; elaborating appropriate counter strategies for common defences in judicial proceedings, and learning how to clearly and persuasively present technical evidence to judges and juries. The group also noted that investigations of ICT-facilitated child abuse and exploitation offences tended to be reactive in nature, rather than proactive. One major obstacle in this respect, can be limited possibilities to undertake undercover investigations. The most common methods of such undercover investigations consist of law enforcement agents posing as children, virtually entering chat rooms, setting up websites that purport to display child sexual abuse material, or joining child sexual abuse communities purporting to be a consumer. The most significant obstacle to effective investigative capabilities was considered to be the lack of ability to obtain stored or real-time data on traffic or content, or subscriber information which can become magnified when requests for information and assistance are received from abroad. With regard to victim assistance, the main deficiencies identified were the absence of standard protocols for supporting victims through the investigative process, techniques for interviewing victims, and the collection and preservation of victim-related evidence. It is crucial that society at large is aware of whether conduct — such as cyberbullying or harassment — constitutes a criminal offence and if so, where and how to report it. As the Cybercrime Study noted, cybercrime acts most frequently come to the attention of law enforcement authorities through reports by victims. Finally, the expert group noted that the development of an overarching national law, policy or strategy against ICT-facilitated child abuse and exploitation with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. -The development of an overarching national law, policy or strategy against ICT-facilitated child abuse and axploitations with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. -Urgent need for senior officials in the criminal justice field to be aware of such problems and the importance of digital evidence in investigations.

UNODC technical assistance programme to prevent and combat technology-facilitated child abuse and exploitation Law enforcement training International cooperation -Training on specialized methods for investigatin online crimes (types of crimes, offender and victim profile, international image chcking, assistence to victimsl, and rights of the children. -Support the authorities in establishing the necessary structures for the effective operation of police. -Support to strenghthening cooperation with internet service providers. -training on human rights aspects of law enforcement investigations -Support to authorities responsible for preparing and sending and receiving and implemting mutual legal assistance requests Training for prosecutors and judges A training and technical assistance programme on combatting ICT-facilitated child abuse and exploitation offences was developed in order to meet the needs identified, pursuant to Council resolution 2011/33. These activities may leverage those already undertaken by UNODC through the Global Programme on Cybercrime. The programme would provide law enforcement agencies of requesting countries with training on specialized methods for investigating online crimes against children. These would cover a range of relevant issues such as the types of technology-facilitated crimes committed against children; offender and victim profiles and their relevance to the investigation; international image searching and checking; investigation approaches; and providing assistance and protection to victims. In addition to training of officers and investigators, the programme would support law enforcement authorities in establishing the necessary administrative structures for the effective operation of police ICT-facilitated child abuse units. The programme would deliver training for prosecutors and judges on protection considerations where child victims or witnesses are required to testify during the criminal justice process. As well as on means — including informal cooperation means — to secure the expedited preservation of computer data; on the effective preparation of mutual legal assistance requests involving digital evidence; and on the use of UNODC tools, such as the Directory of Competent National Authorities and the MLA Writer Tool, including its new digital evidence module presently under development. Taking into account the extensive range of awareness raising material already available, the programme would develop an awareness-raising toolkit for Member States. The toolkit would include templates for a variety of campaign products such as a public service announcement, a website, a general information brochure, a poster, a child-focused leaflet, web banners and a social media pack. Mechanisms to ensure the sustainability of support may include the accreditation of training courses with national police academies and other relevant institutions, as well as securing standard operating protocols and specialist staffing arrangements within law enforcement authorities in close cooperation with relevant government stakeholders. UNODC stands ready, together with relevant international partners, to begin implementation of a training and technical assistance programme to assist Member States in combating ICT-facilitated child abuse and exploitation offences more effectively. Next steps will involve the development of a full project document, which will be followed by a resource mobilization phase and initial roll-out of activities in selected pilot regions or subregions, according to need and upon Member State request for assistance. The challenges of ICT-facilitated child abuse and exploitation are unlikely to be overcome in the near future. A sustainable response will require commitment from all stakeholders in order to build awareness; allocate sufficient human and technological resources, establish supportive government structures; enable proactive investigations; and train practitioners on gathering, preserving, presenting and delivering judgements based on electronic evidence. Thank you for your attention. -Training for prosecutors and judges on protection considerations where child victims are required to testify

UNODC technical assistance programme to prevent and combat technology-facilitated child abuse and exploitation Awareness raising Sustainability -Public awareness-raising campaigns. Develope an awarness raising toolkit. Mecahnism to ensure the sustainability of support may include the accreditation fo training courses with national police academies and other relevant institutions. A training and technical assistance programme on combatting ICT-facilitated child abuse and exploitation offences was developed in order to meet the needs identified, pursuant to Council resolution 2011/33. These activities may leverage those already undertaken by UNODC through the Global Programme on Cybercrime. The programme would provide law enforcement agencies of requesting countries with training on specialized methods for investigating online crimes against children. These would cover a range of relevant issues such as the types of technology-facilitated crimes committed against children; offender and victim profiles and their relevance to the investigation; international image searching and checking; investigation approaches; and providing assistance and protection to victims. In addition to training of officers and investigators, the programme would support law enforcement authorities in establishing the necessary administrative structures for the effective operation of police ICT-facilitated child abuse units. The programme would deliver training for prosecutors and judges on protection considerations where child victims or witnesses are required to testify during the criminal justice process. As well as on means — including informal cooperation means — to secure the expedited preservation of computer data; on the effective preparation of mutual legal assistance requests involving digital evidence; and on the use of UNODC tools, such as the Directory of Competent National Authorities and the MLA Writer Tool, including its new digital evidence module presently under development. Taking into account the extensive range of awareness raising material already available, the programme would develop an awareness-raising toolkit for Member States. The toolkit would include templates for a variety of campaign products such as a public service announcement, a website, a general information brochure, a poster, a child-focused leaflet, web banners and a social media pack. Mechanisms to ensure the sustainability of support may include the accreditation of training courses with national police academies and other relevant institutions, as well as securing standard operating protocols and specialist staffing arrangements within law enforcement authorities in close cooperation with relevant government stakeholders. UNODC stands ready, together with relevant international partners, to begin implementation of a training and technical assistance programme to assist Member States in combating ICT-facilitated child abuse and exploitation offences more effectively. Next steps will involve the development of a full project document, which will be followed by a resource mobilization phase and initial roll-out of activities in selected pilot regions or subregions, according to need and upon Member State request for assistance. The challenges of ICT-facilitated child abuse and exploitation are unlikely to be overcome in the near future. A sustainable response will require commitment from all stakeholders in order to build awareness; allocate sufficient human and technological resources, establish supportive government structures; enable proactive investigations; and train practitioners on gathering, preserving, presenting and delivering judgements based on electronic evidence. Thank you for your attention.

Thank you Bertha Nayelly Loya Officer Research Bertha.loya@unodc.org +(503) 22 48 88 25 http://www.unodc.org/unodc/en/organized-crime/emerging-crimes.html