IPTS Workshop on Cyber Crime German Developments.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

UN Comprehensive Study on Cybercrime
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Security Classification Practical Issues in dealing with different types of cybercrime.
Law & Public Safety Instructors: Matt Pleasants Nancy Embs & Nancy Embs & Don Echevarria Don Echevarria.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Introduction to Cyber Crime Investigation Course Conducted in English Institute for Information Industry Decision Group.
Cyber Crime in the Digital Age
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
POCA - A Local Authority View. Local Authorities & POCA What asset recovery offers Contributes to your Councils Strategic Priorities To protect the most.
PROSECUTION OF CORRUPTION Maja Veber Šajn, M.Sc., Local State Prosecutor Specialised State Prosecution Office of the Republic of Slovenia.
Canadian*- US Law Enforcement Internet Governance Cooperative Efforts April 19, 2010 Marc Moreau Royal Canadian Mounted Police Robert Flaim Federal Bureau.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007.
Computers and Legal Education at the Nicolaus Copernicus University in Toruń Methodology and Experiences Karol Dobrzeniecki, LLM.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Private Detective BY: Jocelyn Vazquez
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
Federal Bureau of Investigation
RASTAMAMA Unique internet webpage aimed at DRUG INFORMATION and PREVENTION RE/set, civil association.
LEFIS General Assembly, Wrocław Sept Continuing education Andrzej Adamski, Nicolaus Copernicus University, Poland.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
Anti-Corruption, the Swedish way Gunnar Stetler Head of the Swedish Anti-Corruption Unit
CJ © 2011 Cengage Learning Chapter 5 Law Enforcement Today.
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Cyber Security Nevada Businesses Overview June, 2014.
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Project Why me? CZ.1.04/3.1.00/ Project helping victims of crime "Why me?" Mgr. Bc. Tomáš Kellner regional coordinator of services for victims.
Cleve L. Freeman – Los Angeles, CA USA Energy Loss Reduction Programs & Profits, Rio de Janeiro, Brazil 11 – 13 August 2004.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Developing an Asset Recovery Programme Fitz-Roy Drayton Criminal Assets Recovery Project Serbia.
Community policing Lithuanian experience Kestutis Lancinskas Head of International Co-operation Unit Police department at the MiO Kingdom of Bahrain
Local Police- local jurisdiction 3 Main responsibilities: 1.Law Enforcement- investigate crimes, make arrests, appear in court 2.Community Patrol- traffic,
Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Dr. Heike Neuhaus. Federal Prosecutor General Head of Department Central Tasks; Espionage Staff Espionage 1 Espionage 2 Administration EU IT Espionage.
London Action Plan Wout de Natris OPTA Strasbourg, 12 June 2007.
Chapter 15: Contemporary Issues in Police Administration CJ444 seminar 9.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
College of Adult & Professional Studies Criminal Justice Program
Introduction to asset recovery in Poland and Wielkopolska region, along with the presentation of the invited guests and discussion of thematic areas presented.
IRS Criminal Investigation
North Port Police Department Organizational Chart
Challenges and Successes in the Zambian ICT Security Sector
Private Investigations vs. Public Investigations
UNODC and CYBERCRIME October 2009.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

IPTS Workshop on Cyber Crime German Developments

Definition No common (international) definitions on High-tech crime Cyber crime Computer crime It-crime No Internet crime

Definition German police: IT-Crime: all criminal offences aimed at disturbing data networks or using data networks Computer crime: all criminal offences containing “ADP” in its elements

Statistics Prosecution Investigation  Crime Statistics of Police (  Information service on IT-crime

Criminal Investigation Departments Federal Police: BundeskriminalamtFederal Police: Bundeskriminalamt State Police: 16 States 16 Main offices (in state capitals „Landeskriminalamt“/LKA) ?Field offices in each townState Police: 16 States 16 Main offices (in state capitals „Landeskriminalamt“/LKA) ?Field offices in each town

BKA IT-Crime Unit  Intelligence  Forensics  Internet investigations  Internet patrol

State Polices Landeskriminalämter  Computer crime units (investigation)  Computer forensic units Field offices  Fraud units

Skill BKA  Trained officers for Internet investigations in two specialised units Landeskriminalämter  Trained officers for computer crime  Few experts for Internet investigations Field offices  No trained officers

Training Common concept but no money

Training Private companies In-house courses Federal Police

Training Differs from State to State State Police Introduction by experts of the Federal Police

Awareness Law Enforcement  Inadequate  Lack of Readiness Politicians  Lack of knowledge of the background

Co-operation Business world  Bankers no information voluntarily  Traders fear of rivalry Telecommunication carriers

Co-operation Industry  Lack of knowledge within police  Lack of time within police  One-way street to industry side

Co-operation No fixed working group Meetings with target groups on current problems (e.g. ISPs, Internet auctioneers, consumer associations) LE - Industry - Conferences

Main Problems Lack of trained and equipped officers Procedural law Mutual legal assistance  Privacy