Download presentation
Presentation is loading. Please wait.
Published byClare Sutton Modified over 8 years ago
1
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China
2
Outline The situation of cyber crime Internet Security Legislation Policies against cyber crime
3
Internet Development in China
4
Cyber crimes Cyber crime (Cyber as Object) Hacking in Crucial Information Systems Virus and Malicious Code Cyber facilitated crime (Cyber as Tools) Phishing Pornography online Gambling online
5
Cases of Cyber Crime
6
Trends of Cyber Crime 1 . The property crime trends to be severe Fraud Phishing Ransom online Steal “ Virtual ” Property
7
Trends of Cyber Crime 2 . Cyber Terrorism Threats Cyber Facilitated Terrorism (cyber as tools) Communication Coordination Threaten the victims Disseminate terrorism information or rumors Recruit supports Train the members Acquire intelligence in support of physical violations To be continued …
8
Cyber Facilitated Crime Cases In 2004, we have deal with several terrorism cases in which the criminal threatened to bomb some public facility by Email. In 2003, a criminal put some poison into the milk soled in supermarket and send Email to extort the milk producer. In 2003, a lot of rumors related to SARS were spread via Internet and cause public panic. In 2002, a terrorist was found to teach another one how to produce bomb and poison. To be continued …
9
Cyber targeted terrorism: Attacking crucial networks and information systems In 2002, a “ logic bomb ” was found in software installed in more than 140 Power Quality Recorder which were used to detect power breakdowns Big problem: How to prevent cyber terrorism from inner side? The target includes not only computer network but also other digital devices There are more cyber facilitated terrorism than cyber targeted terrorism till now
10
Cyber Legislation The Criminal Law of China. P.R. Crime Slight Illegal Action Security Management The Public Security Administration Punishment Law of China. P.R. Regulation on Safety Protection of Computer Information Systems Management Regulation of Security and Protection of Computer Information Networks Connected with INTERNET Regulation on Telecommunicaton …
11
Criminal Law Article 285 Whoever violates state regulations and intrudes into computer systems with information concerning state affairs, construction of defense facilities, and sophisticated science and technology is be sentenced to not more than three years of fixed-term imprisonment or criminal detention. The law related to cyber crime emphasizes the protection of crucial information infrastructure For those who intrude into the information systems related to critical infrastructure, no matter the systems were damaged or not, the intruders will be accused To be continued …
12
Article 286 Whoever violates states regulations and deletes, alters, adds, and interferes in computer information systems, causing abnormal operations of the systems and grave consequences, is to be sentenced to not more than five years of fixed-term imprisonment or criminal detention; when the consequences are particularly serious, the sentence is to be not less than five years of fixed-term imprisonment. Whoever violates state regulations and deletes, alters, or adds the data or application programs installed in or processed and transmitted by the computer systems, and causes grave consequences, is to be punished according to the preceding paragraph. Whoever deliberately creates and propagates computer virus and other programs which sabotage the normal operation of the computer system and cause grave consequences is to be punished according to the first paragraph. To be continued …
13
Article 287 Whoever uses a computer for financial fraud, theft, corruption, misappropriation of public funds, stealing state secrets, or other crimes is to be convicted and punished according to relevant regulations of this law. Other related articles: Article 124: sabotage the public telecommunications facilities Article 291: make false threat of terrorism in the form of an explosion, bio-chemical agents or radiation
14
Policies Prevention: Software & Hardware Production Security Evaluation Prevention: Critical information system security evaluation Crime Detection Response and Investigation Deterrence Training Crime Report Mechanism Research
15
1. Prevention in First Place Software & Hardware Production Security Evaluation Mechanism A five-level security criteria
16
2. Fast detecting, reporting and responding mechanism Online cyber crime reporting website were established in each provinces (cities) On-call point-of-contact between ISP, ICP, IDC, administrators of critical information systems and cyber police on 24/7 basis A Coordination center was established in our bureau to deal with cyber security related incidents
17
3. Investigation and forensic technology A lot of cyber-polices were sent to universities for training specialized in cyber crime Co-operate with IT research and production corporations A research center was established in our bureau to promote the technology related to computer forensic and crime investigation.
18
4. International cooperation Asia-South Pacific Working Party on Information Technology Crime, ICPO CTINS Training and discussion Investigation request from 2004, we have dealt with over 250 requests from 40 countries hacking, fraud, phishing, child pornography, fake website …
19
Thank you! The End
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.