1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Freedom of Speech (Part 3)
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Challenges facing law enforcement agencies in the fight against cybercrime.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
“Safe Surfing in Libraries: Filtering, Acceptable Uses and Practice” October 2002 Nick Morgan.
(Geneva, Switzerland, September 2014)
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
BIOSAFETY IN HEALTH RESEARCH Annah R. Takombwa – Acting Technical Affairs Manager, National Biotechnology Authority.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Network security policy: best practices
The need for global approach to child online protection Dr. Mona Al-achkar Jabbour Pan Arab Observatory for cyber security October.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Cyber Crimes.
Dr E Kritzinger – UNISA SACSAW Cyber Awareness Implementation Plan (CAIP) for schools.
RSC London 11 May 2011 e-Safety Your Legal Duties 1.
An Introduction to the Federal Motor Carrier Safety Administration.
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Ministry of the Interior of the Republic of Latvia Lāsma Stabiņa National Anti-Trafficking Coordinator Riga, 5 February 2015, HESTIA Kick-Off meeting.
Cybersecurity Governance in Ethiopia
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Environmental Management System Definitions
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
The traditional ing process. Sender Receiver ISP Server.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
PRESENTED AT THE STAKEHOLDERS FORUM ON QUALITY OF SERVICE AND CONSUMER EXPERIENCE LAICO REGENCY HOTEL Creating Space for Consumer Rights in.
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lone Working – Good Practice Marie Foster Early Years Safeguarding Officer.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
1 Belfast, Horst Forster European Commission Belfast,
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Accountability & Structured Privacy Management
Public Safety Working Group (PSWG)
Safe Field Research …advice from EHS.
POLICE FORCE СПб Университет МВД России Кафедра иностранных языков
Unit 36: Internet Server Management
People Responsible For Health and Safety
Egypt’s Internet Safety Project
Trafficking in Persons (TIP)
Cybercrime in the election process:
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Cybercrime legislation and policies in Africa: Issues for discussion
Introduction to Digital Forensics
Presentation transcript:

1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI

2 Cyber Crime – Our Common concerns Cyberspace has become a fertile field for illegal activities. Cyber crime have replaced traditional methods of stalking and harassment and affecting Personal Security Industry & Law Enforcement Agencies need to be aware of such cases & devise strategies to resolve it proactively. Child pornography and Internet fraud is a major concern. National Security …and grey market in Internet Telephony

3 Concerns of the Industry  Whether Internet is a free medium or not?  If yes, does it still require disciplining and policing?

4 Concerns of the Industry Most likely, all of us here would agree that Internet is a free medium but it’s misuse has to be stopped. Self regulation is the best regulation, as accepted across the World.

5 A collective responsibility To stop misuse, the responsibility lies with:  The User  Content Provider  Domain name registry  Licensor / Regulator  Law enforcement agencies  Internet Service Provider

6 The Industry can… help in introducing/updating cyber security awareness in curriculum for schools, colleges, institutions. work closely with CERT-IN, TERM, Law Enforcement Agencies to share information/experience pertaining to Cyber crime. Regularly update on best practices/latest innovations in the sector. Ensure proper documentation is done when adding a subscriber.

7 The Industry can… Make users aware of cybercrime’s risks as and share best practices on safeguards. Post advisory on website, bills or through mailers to customers, time to time about Do’s & Don’t while surfing Internet. Establish clear and understandable procedures to register complaints on security breach or protecting Customer Premises Equipment Help in training agencies on the technical aspects related to cyber crime.

8 Understanding an ISP  An ISP can be likened to a Highway. The Highway Authority would provide reasonable safety features like speed breakers, safety railings and speed advisories. If any of these are flouted, there are law enforcement agencies that prosecute but not the Highway Authority.  The Internet Service Providers are like the Highway Authority.

9 We suggest.. An empowered International Committee consisting of Service Providers, Law Enforcement Agency and Policy maker for Internet domain registration needs to become scam proof. Develop more accessible and effective filtering and blocking options to empower users to protect themselves. Providing tools to a user to block mails from a rogue sender.

10 We suggest… 128 bit encryption or higher be allowed instead of 40 bit. A single, nodal enforcement agency coordinate with the Service Providers. If blocking of any site is needed, specific instructions come from the nodal agency. Security agencies invest in placing filtering / monitoring / interception / blocking equipment / data capturing & preservation at the International Gateways, NIXI and if needed, at the ISP level.

11 Common Modalities for Cooperation Close cooperation amongst DoT, CERT-In, law enforcement agencies and industry. Work closely with victims to identify cyber crime patterns. Service Providers should have details of designated officers at law enforcement agencies.

12 Our assurance… Fight against cyber crime To-gather we can and we will

13 To sum up, the Govt. agencies need a better understanding of the role of an ISP so as to devise laws & procedures that are practical but at the same time help further proliferation of Internet and not curb it. A service provider is a mere carrier of the Internet and not an author of any content. We will fail miserably if onus of policing is given to us as we are just a service industry.

14 You can only beat the beasts of tech savvy terrorists by taking the bull by the horns and beating them at their own game. As a service provider, we can only be your Aide d’ Camp.

15 Thank You! Website: