High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Criminal Organizations and Drugs Sub-Directorate
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003.
DHS, National Cyber Security Division Overview
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
The Outline of the Police System and the Community Police in Japan The Japanese Experience with the Koban System and Other Measures to Create Safer Community.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Federal Intrusion Detection Network (FIDNet) Concept Overview Darwyn Banks, Program Manager “Protecting the Critical Infrastructure: Issues & Solutions”
Forensic and Investigative Accounting
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
1 Kuwait Central Agency for information technology.
INFORMATION TECHNOLOGY MARKET IN SINGAPORE Presented by Chia Swee Hoon Senior Commercial Specialist U.S. Commercial Service Singapore.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Network security policy: best practices
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
JPCERT/CC May Fixed-Point Auto Data Collecting System Getting more accurate Scan and Prove data to provide more accurate network traffic analysis.
Cracking down on international cyberterrorism
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Office Management A Look from the Inside-Out Mohammad Najjar, PhD Management Science 1.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
1 Modernization of Statistical Business Process via a World Bank Project at General Statistics Office of Vietnam (GSO) International Seminar on Modernizing.
Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
1 Korea’s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication.
Cybersecurity Governance in Ethiopia
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Digital Forensics - challenges and opportunities Marc Kirby Cranfield University.
Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.
UNIVERSITY ROLES IN MEETING ASPIRATIONS FOR ICT & ECONOMIC DEVELOPMENT PRESENTATION BY: PROF. OLIVE M. MUGENDA Ph.D VICE-CHANCELLOR KENYATTA UNIVERSITY.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Note1 (Admi1) Overview of administering security.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
UNCTAD ICT and E-Business Branch 12/5/2015 / 1 ICT Policy and Analysis Unit - ICT and E-Business Branch United Nations Conference on Trade and Development.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
Chapter 17: Foreign Policy and National Defense Section 2.
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Add video notes to lecture
National Workshop on Cyber Crimes and Cyber Laws
Responding to Intrusions
INFORMATION TECHNOLOGY MARKET
INFORMATION TECHNOLOGY MARKET
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Electronic Surveillance, Post 9/11
Presentation transcript:

High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN

Agenda State of High-Tech Crime Countermeasures Framework Facilities and Equipment Human Resources Training Challenges

State of High-Tech Crime

Basic Statistics 56,453,000(44% of whole nation) use Internet in Japan 15,962,000 use broadband connection 48% of households have Internet connection (except by cell phones) Estimation on Feb. 30, 2003, Internet White Paper 2003 (Internet Association Japan)

Intrusive Activities Detected by 57 IDS installed in police organizations

Breakdown of Intrusive Activities

Complaints

Breakdown of Complaints

Arrests

Breakdown of Arrests

Countermeasures Framework Facilities and Equipment Human Resources Training

Framework

Police System in Japan National Police Agency(NPA) National governmental organization Duty: supervision and planning related to national law and budget Prefectural Police Forces(PPF) Local governmental organization Duty: actual police operation

National Efforts High-Tech Crime Technology Division (HTCTD) since 1999 Unauthorized Computer Access Law Official notice of high-tech crime countermeasures to PPFs Official notice of cyber-terror countermeasures to PPFs Subsidy for PPFs

National Center of Computer Forensics(NCCF) Part of HTCTD Technical core of high-tech crime countermeasures Dealing with extremely difficult evidences

Cyber Force Center(CFC) Part of HTCTD Established in 2001 Focusing on protection against cyber attacks to critical infrastructure entities 24/7/365 watch and warning Information hub for computer network security

Local Efforts Establishment of High-Tech Crime Task Forces(HTCTF) High-tech crime reporting point Establishment of Cyber-Terror Task Forces Employment of people with IT skills as special investigators or IT security advisors

Facilities and Equipment

Cost Overview NCCF Initial: 15.3 million USD Maintenance: 1 million USD CFC Initial: 53.5 million USD Maintenance: 13 million USD (1 USD = 120 JPY)

Facilities NCCF National-owned building 5 floors, 1500 sq. meters (approx sq. feet) CFC Private-owned building (rented) 8 floors, 4500 sq. meters

Equipments in NCCF Massive log analysis system Password analysis system Credit card analysis system Virtual Internet environment X-ray inspection system Clean room Various softwares Honey pot

Equipments in CFC 24/7/365 watch and warning center Honey pot Distributed IDS R&D environment Simulation environment Training environment

Equipments in HTCTD HQ WWW server Cybercrime Technical Information Network System(CTINS) Purpose: information sharing among 10 cybercrime law enforcement units in Asia China; Hong Kong, China; India; Indonesia; Korea; Malaysia; Philippines; Singapore; Thai; and Japan

Human Resources

Wanted People NCCF People with EXTREME expertise on computer forensics CFC People with computer/network security expertise Dynamic employment is difficult in Japan

Base of Human Resources 4,000 info-communication specialists inside police organization They have built and maintained police communication infrastructure for 49 years It WAS able to pick-up necessary talent

People from Private Sector Contractor Maintainer of equipments R&D staffs Hiring Some local HTCTFs hires experts as special investigator or IT security advisor

Current State NCCF 12 officials (forensic experts) 5 contractors (experiment staffs) CFC 18 officials (computer/network security specialists) 10 contractors (R&D staffs) HTCTD HQ 18 officials (chief and administrative staffs)

Training

Training program National Police Academy High-tech crime technology course Cyber-terror technology course Training program by private sector Specially designed by various venders International conference OJT in foreign law enforcements FBI, Secret Service, NHTCU(UK)

Challenges Company secrets Dominant system vendor Cell phone vender Personnel circulation Co-ordination with security community FIRST, National CERT, NIRT

Questions?

Thank you! Contact: Ko Ikai, Toshihiko Kamon,