Canadian*- US Law Enforcement Internet Governance Cooperative Efforts April 19, 2010 Marc Moreau Royal Canadian Mounted Police Robert Flaim Federal Bureau.

Slides:



Advertisements
Similar presentations
Introduction to ARIN and the Internet Registry System.
Advertisements

June 2013 Internet Number Resource Report. June 2013 Internet Number Resource Report INTERNET NUMBER RESOURCE STATUS REPORT As of 30 June 2013 Prepared.
December 2013 Internet Number Resource Report. December 2013 Internet Number Resource Report INTERNET NUMBER RESOURCE STATUS REPORT As of 31 December.
March 2014 Internet Number Resource Report. March 2014 Internet Number Resource Report INTERNET NUMBER RESOURCE STATUS REPORT As of 31 March 2014 Prepared.
Policy Laundering and International Co-operation as a Good Thing tm.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Introduction to ARIN and the Internet Registry System.
Cyber Crime in the Digital Age
Public Policy Issues in the Communications and Infrastructure Services Policy area Geoff Huston APNIC June 2011.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
The Bulgarian Banking Industry’s Response to Cards Fraud and the Role of the Association in Combating Fraud Nikolay Nedkov Chairman, BASCP.
Mapping Out Cyber Crime Infrastructure A Law Enforcement Approach Jon Flaherty UK National Cyber Crime Unit 13 th May 2015 RIPE 70 - Amsterdam.
Bank Crime Investigation Techniques by means of Forensic IT
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Introduction to ARIN and the Internet Registry System.
1 ARIN: Mission, Role and Services John Curran ARIN President and CEO.
Greg Rattray ICANN Chief Internet Security Advisor
Federal Bureau of Investigation
Prepared by The Regional Internet Registries [APNIC, ARIN, LACNIC and RIPE NCC]
ARIN Update June 2000 NANOG 19Albuquerque NANOG 19Albuquerque Overview Organization & Staff Activities Regional News Membership Statistics Regional Policy.
1 Internet Presentation GCC-IT commity Saleem Al-Balooshi ETISALAT.
Cybersecurity Governance in Ethiopia
Mirjam Kühne 1 RIPE 33, May 1999 Introduction to the RIPE NCC presented by Mirjam Kühne.
NRO update APNIC 39, March 4th 2015 Fukuoka, Japan To be the flagship and global leader for collaborative Internet number resource management as a central.
NRO update LACNIC23, May 2015 Lima Peru To be the flagship and global leader for collaborative Internet number resource management as a central element.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
First Timers’ Breakfast Richard Jimmerson Chief Information Officer.
IPTS Workshop on Cyber Crime German Developments.
IPv6. Why IPv6? Running out of IPv4 addresses Internet Assigned Numbers Authority allocated the last 5 /8 blocks on 3 Feb 2011 Internet Assigned Numbers.
Welcome to Your First ARIN Meeting. Handouts for you Basic information Acronym list ARIN fact sheets – ARIN at a Glance – Policy Development Process –
Governmental Advisory Committee Public Safety Working Group 1.
Regional Internet Registries Statistics & Activities Joint Techs Workshop July 2004 Columbus, OH.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
30 April 2003 ITU SG2, Geneva, Switzerland Axel Pawlik, RIPE NCC Information Document 21-E ITU-T Study Group 2 May 2003 Question:1/2 Source:TSB Title:The.
NRO update RIPE 71, November 2015 Bucharest, Romania To be the flagship and global leader for collaborative Internet number resource management.
NRO update ARIN 36, 8-9 October 2015 Montreal, Canada To be the flagship and global leader for collaborative Internet number resource management as a central.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Emerging Registry Criteria ASO General Assembly Budapest, 19 May 2000.
Law Enforcement Recommendations for RAA ammendment ICANN Brussels 2010 Protective Marking : Protect.
Keith Mitchellhttp:// RIPE ncc IP Address Space Governance Keith Mitchell Executive Board Chairman, RIPE NCC (Chief Executive, LINX) European.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
GAC SESSION 7: PSWG Update. PUBLIC SAFETY WORKING GROUP (PSWG) – UPDATE TO THE GAC Agenda Item 7 | ICANN 56 | 28 June 2016.
Public Safety Working Group (PSWG)
NCUC Africa Members First Regional Webinar Ines Hfaiedh
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
Global Registry Knowledge Update Leslie Nobile
Internet Governance Hui
A Coordinated Proposal Regional Internet Registries
Introduction to ARIN and the Internet Registry System
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
July 2016 Internet Number Resource Report.
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
1.
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
July 2016 Internet Number Resource Report.
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
July 2016 Internet Number Resource Report.
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
July 2016 Internet Number Resource Report.
IPv6 distribution and policy update
July 2016 Internet Number Resource Report.
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
July 2016 Internet Number Resource Report.
INTERNET NUMBER RESOURCE STATUS REPORT Regional Internet Registries
Presentation transcript:

Canadian*- US Law Enforcement Internet Governance Cooperative Efforts April 19, 2010 Marc Moreau Royal Canadian Mounted Police Robert Flaim Federal Bureau of Investigation * Hockey Gold Medalists Marc Moreau Royal Canadian Mounted Police Robert Flaim Federal Bureau of Investigation * Hockey Gold Medalists

LE Involvement Participation in global RIR government working groups in ARIN, AfriNIC, RIPE NCC Canada, US, UK, Australia and New Zealand joint cyber crime working group – –Dedicated to joint cases, initiatives Participation at ICANN and introduction of LE Due Diligence recommendations – –Drafted by Canada, US, UK, NZ and Australia – –Supported by G-8, Interpol, Council of Europe Private industry initiatives, i.e., Microsoft botnet etc Participation in global RIR government working groups in ARIN, AfriNIC, RIPE NCC Canada, US, UK, Australia and New Zealand joint cyber crime working group – –Dedicated to joint cases, initiatives Participation at ICANN and introduction of LE Due Diligence recommendations – –Drafted by Canada, US, UK, NZ and Australia – –Supported by G-8, Interpol, Council of Europe Private industry initiatives, i.e., Microsoft botnet etc

RIR Government Working Groups Develop effective public-private partnerships Maintain policy and technological proficiency Increase international cooperation and standardization – –Like RIRs, mimic each other Advocate for and against policies that effect LE, i.e., Customer Confidentiality – –Negative impact – –Voted down 3x – –Residential privacy Develop effective public-private partnerships Maintain policy and technological proficiency Increase international cooperation and standardization – –Like RIRs, mimic each other Advocate for and against policies that effect LE, i.e., Customer Confidentiality – –Negative impact – –Voted down 3x – –Residential privacy

Goal of Canadian and American Law Enforcement We are not BIG BROTHER… …o ur only goal is to work with ARIN and the other Regional Internet Registries to prevent crime and to be able to trace criminals and malefactors in the most judicious and expedient manner. We are not BIG BROTHER… …o ur only goal is to work with ARIN and the other Regional Internet Registries to prevent crime and to be able to trace criminals and malefactors in the most judicious and expedient manner.

IP WHOIS Triage tool in tracing “owner” of IP address Provides initial clues for investigation DNS WHOIS Due Diligence – prevention of criminal enterprises from fraudulently obtaining IP address space, ASN, domain names Knowledge and proficiency with emerging technologies IP WHOIS Triage tool in tracing “owner” of IP address Provides initial clues for investigation DNS WHOIS Due Diligence – prevention of criminal enterprises from fraudulently obtaining IP address space, ASN, domain names Knowledge and proficiency with emerging technologies LE Issues

Use of Technology In addition to sophisticated court-ordered methods, LE uses many publicly available technologies to identify criminals, such as: – –Domain & IP WHOIS queries – –DNS – –VOIP – – , Instant Messenger, & IRC – –Encryption – –Google – –And many others In addition to sophisticated court-ordered methods, LE uses many publicly available technologies to identify criminals, such as: – –Domain & IP WHOIS queries – –DNS – –VOIP – – , Instant Messenger, & IRC – –Encryption – –Google – –And many others

WHOIS IP and domain name WHOIS information is an integral tool for all cyber investigations These tools provide gap analysis, target profiling, and sometimes even - identification Speed and accuracy in getting the data is key Even with legal process, a properly maintained WHOIS is necessary IP and domain name WHOIS information is an integral tool for all cyber investigations These tools provide gap analysis, target profiling, and sometimes even - identification Speed and accuracy in getting the data is key Even with legal process, a properly maintained WHOIS is necessary

WHOIS - Investigative Use 9/11 Investigations Kidnappings Child pornography – Innocent Images Many others including phishing, botnets, pharming, IPR, and Internet fraud related investigations 9/11 Investigations Kidnappings Child pornography – Innocent Images Many others including phishing, botnets, pharming, IPR, and Internet fraud related investigations

Questions ?