Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Its a new digital world with new digital dangers….
Philippine Cybercrime Efforts
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Fluff Matters! Information Governance in an Online Era Lisa Welchman.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Technology Trends Impacts on Society, Education & Policy.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
The need for global approach to child online protection Dr. Mona Al-achkar Jabbour Pan Arab Observatory for cyber security October.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
A First Course in Information Security
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber Crimes.
Information Security Issues at Casinos and eGaming
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Sutton Public Schools Anti-Bullying Law Overview.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Cybersecurity Governance in Ethiopia
Information Warfare Playgrounds to Battlegrounds.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Jordan’s ICT Sector Information Technology Association
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Topic 5: Basic Security.
Technology Gap. Objectives Develop a deeper understanding of technology gaps in relation to IDT Discuss the strengths and weaknesses of e-resources as.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Warfare Playgrounds to Battlegrounds.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Botnets: Measurement, Detection, Disinfection and Defence Dr Giles Hogben ENISA.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.
MGMT 452 Corporate Social Responsibility
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
MODUS OPERANDI OF CYBER CRIME
Trends in my profession, Information Technology
Securing Information Systems
Digital Citizenship & Social Media.
Trafficking in Persons (TIP)
Chapter 13 Security and Ethical Challenges.
Preventing Information Technology Crimes
The Issues with Technology in education
Presentation transcript:

Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010

Page 2 Is it a game, or is it real?

Page 3 Times have changed!

Page 4 The botnets

Page 5 The threat is real 1.5 million infected machines/ day 21 million botnet connections per month 44 billion bad e ‐ mails/month 200 Petabytes of malicious traffic / year

Page 6 Victims are clueless

Page 7 Agenda the nature of cybercrime different regulatory modalities examples from the Canadian Criminal Code implications for a cybercrime strategy

Page 8 Question: Can we apply general rules of law, and specifically, criminal law, to the Internet context?

Page 9 Take one “…the best way to learn the law applicable to specialized endeavors is to study general rules.... Any effort to collect these strands into a course on "The Law of the Horse" is doomed to be shallow and to miss unifying principles.” - F. Easterbrook “Cyberspace and the Law of the Horse” (1996)

Page 10 Take two “… there is an important general point that comes from thinking in particular about how the law and cyberspace connect. This general point is about the limits on law as a regulator and about the techniques for escaping those limits. This escape in both real space and in cyberspace comes from recognizing the collection of tools that society has at hand for affecting constraints upon behavior.” - Lawrence Lessig, “The Law of the Horse: What Cyberlaw Might Teach” (1999)

Page 11 Cybercrimes In the Canadian Criminal Code

Page 12 Section 342.1(2) “computer system” means a device that, or a group of interconnected or related devices one or more of which, (a)contains computer programs or other data, and (b)pursuant to computer programs, (i)performs logic and control, and (ii)may perform any other function;

Page 13 Categories of cybercrimes 1. child exploitation 2. hate crimes 3. fraud 4. identity theft

Page 14 The headlines

Page 15 Regulatory modalities: an example

Page 16 Legal

Page 17 Social

Page 18 Market forces

Page 19 Architecture

Page 20 Modal Interplay recognizing the interplay of all four modalities will enhance our ability to contend with cybercrimes

Page 21 “thou shall not use the Internet to prey on minors” The law is clear

Page 22 Ok, but is the same true online? Are other constraints we have on predators in real space effective in cyberspace?

Page 23 A chatroom isn’t like a classroom

Page 24 Social modality is different victims are aware they are conversing online with adults only 5% of offenders pretended to be teens when they met potential victims online rarely deceive victims about their sexual interests Source: Wolak et al., 2004

Page 25 Market forces seemingly absent some child friendly sites some emphasizing parental controls

Page 26 Architecture modality is largely untouched physical layers (cable, wireline, etc) logical layers (software and standards) content layer (text, images, etc.)

Page 27 The challenge of cyberspace the regulatory modalities change changes need to be noted

Page 28 Proactive defence discover, infiltrate and disrupt activity before an attack involves a multi-pronged approach that leverages technology

Page 29 Bill C-28 Fighting Internet and Wireless Spam Act (FISA) considers the technology promotes a holistic reflecting the regulatory modalities

Page 30 FISA law recognizes nature of the technology facilitates consultation, referral and information sharing implicates foreign states

Page 31 FISA social recognizes impact on the individual and privacy issues promotes the transparency and openness of practices

Page 32 FISA architecture prohibits the altering of a data transmission exempts service providers for the purposes of “network management” promotes the use of systems to help identify and intercept activities

Page 33 FISA market forces part of a general Canadian trend service provider intervention is permissible if not necessary

Page 34 What does this mean? Implications for a cybercrime strategy

Page 35 Law: strategic implications recognize the different modalities and how they work in cyberspace design with technology in mind

Page 36 Social: strategic implications public awareness campaign individuals need to know about the risks associated with these crimes and how to mitigate these risks.

Page 37 Market forces: strategic implications incent players to participate better risk management capabilities should provide competitive advantage law enforcement agencies should outsource functions where more efficient to do so

Page 38 Architecture: strategic implications consider all layers of the technology form “sector networks” or “associations” to promote strategic partnerships among relevant players in cyber security establish standards for infrastructure protocols and procedures.

Page 39 Conclusion cybercrimes are substantively different from real space crimes - regulatory modalities may not function the same way no longer be a case of using old laws to adapt to new technology bolster proactive defences and take into account all regulatory modalities