SlideShare a Scribd company logo
1 of 14
@Padma Resort, Bali
Republic of Indonesia
23 April 2013

Yu-feng (Harris)
Chen,
Chinese Taipei
Prosecutor, Chiayi
District Prosecutors
Office

2013/10/30

APECTEL 47

1
AGENDA


 Brief overview of latest cybercrime
prosecution, Chinese Taipei
 Characteristics of criminality information in cyber
world
 Web-based investigation and prosecution
 Challenges
 Conclusion and outlook

2013/10/30

APECTEL 47

3
Brief overview of latest cybercrime
prosecution, Chinese Taipei (1)
 Time frame



 Sep. 2012 to Feb. 2013

 Types of cybercrime

 Criminal Code Chapter 36-- “Offenses Against the Computer
Security “
 Few cases
 Low penalty

 Major types of crimes committed via computer and internet





2013/10/30

Fraudulence
Forging instruments
Gambling
Intellectual property rights
Defamation

APECTEL 47

4
Brief overview of latest cybercrime
prosecution, Chinese Taipei (2)



 From defendants perspective(Nationwide)

 5,517 defendants in cases disposed, 1,892 were
indicted, 34.3% indictment rate
 Relatively low compared with the average 40.6% indictment
rate of all types of cases nationwide,
 Defendants without criminal record, or just with slight
misdemeanor
 Deferred prosecution with discretion are likely to be
rendered by prosecutors.

 16.9% of all, higher than the average 9.5% deferred prosecution
rate of all types of crimes.
 Defendants are usually ordered to make a written statement of
repentance, or pay a certain sum to governmental account or a
designated non-profit or local self-governing organization.

2013/10/30

APECTEL 47

5
Brief overview of latest cybercrime
prosecution, Chinese Taipei (3)



 From caseload perspective (Nationwide)
 467 cybercrime cases commenced, 0.24% of all
 4,218 cybercrime cases disposed, 2.3% of all
(source: Ministry of Justice)

2013/10/30

APECTEL 47

6
Characteristics of criminality
information in cyber world



 Vastly distributed
 Rapidly transmitted
 Long Archived
 Easily collected
 Quickly searched
 Possibly manipulated
 Effectively analyzed

2013/10/30

APECTEL 47

7
Web-based investigation


2013/10/30

APECTEL 47

8
Web-based investigation(1)


 Growing reliance on digital database
 DNA
 fingerprints, face
 ID number
 “family book”: the Three-level Connection system

 Financial records
 Insurance records
 Immigration records

2013/10/30

APECTEL 47

9
Web-based investigation(2)


 “The Middle-finger Xiao” Incident

2013/10/30

APECTEL 47

10
Challenges

 On-line communication takes over
 Decline of wiretapping approach
 Burden of data collection

 Cloud computing
 Advanced encryption
 Urgent investigation
 Lack of justice obstruction penalties
 Shortage of cyber specialists
2013/10/30

APECTEL 47

11
Conclusion and Outlook

 Cyber world is an enormous crime database

 User data requests worldwide have increased by more than 70% since
2009. From July 2012 through December 2012, Google received 21,389
requests for information about 33,634 user accounts(Google
Transparency Report).

 Increasing information demand from the authority concerned
 National security section

 CISPA (Cyber Intelligence Sharing and Protection Act ) of the U.S.

 Law enforcement

 More laws or regulation of internet governance would be enacted
 Creating unified online platform for criminal evidence
 Cross-jurisdiction mutual assistance
 Global E-Crime Prosecutors Network, GPEN (under International
Association of Prosecutors)

2013/10/30

APECTEL 47

12
Thank You

Yu-feng(Harris) Chen
Delegate of Chinese Taipei
harrisychen@gmail.com
yufone@mail.moj.gov.tw

2013/10/30

APECTEL 47

13

More Related Content

What's hot

Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaMohammed Mahfouz Alhassan
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Clinton DSouza
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is RealChristos Beretas
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsrcorrigan
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open DataSecuRing
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?loglogic
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryptionAcad
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialogiosrjce
 

What's hot (20)

Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is Real
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRs
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open Data
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 

Viewers also liked

Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281Nurul Yakin
 
Indonesia ina002 1366765311
Indonesia ina002 1366765311Indonesia ina002 1366765311
Indonesia ina002 1366765311Nurul Yakin
 
Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379Nurul Yakin
 
Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516Nurul Yakin
 
Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392Nurul Yakin
 
Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182Nurul Yakin
 
Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Nurul Yakin
 
Consumer’s Perspective on Broadband Performance
Consumer’s Perspective on Broadband PerformanceConsumer’s Perspective on Broadband Performance
Consumer’s Perspective on Broadband PerformanceNurul Yakin
 
Indonesia ina002 1366684227
Indonesia ina002 1366684227Indonesia ina002 1366684227
Indonesia ina002 1366684227Nurul Yakin
 
Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132Nurul Yakin
 
Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119Nurul Yakin
 
Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013Nurul Yakin
 
Japan jpn002 1366610568
Japan jpn002 1366610568Japan jpn002 1366610568
Japan jpn002 1366610568Nurul Yakin
 
Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449Nurul Yakin
 
Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231Nurul Yakin
 
Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553Nurul Yakin
 

Viewers also liked (17)

Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281
 
Indonesia ina002 1366765311
Indonesia ina002 1366765311Indonesia ina002 1366765311
Indonesia ina002 1366765311
 
Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379
 
Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516
 
Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392
 
Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182
 
Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053
 
Consumer’s Perspective on Broadband Performance
Consumer’s Perspective on Broadband PerformanceConsumer’s Perspective on Broadband Performance
Consumer’s Perspective on Broadband Performance
 
Indonesia ina002 1366684227
Indonesia ina002 1366684227Indonesia ina002 1366684227
Indonesia ina002 1366684227
 
Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132
 
Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119
 
Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013
 
Japan jpn002 1366610568
Japan jpn002 1366610568Japan jpn002 1366610568
Japan jpn002 1366610568
 
Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449
 
Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231
 
Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553
 

Similar to Chinese taipei 1366688667

BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1MalikPinckney86
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensicsIJECEIAES
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayDeja Lewis
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolIJMER
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 

Similar to Chinese taipei 1366688667 (20)

BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 

More from Nurul Yakin

Consumer’s Perspective on Mobile Payment Transaction
Consumer’s Perspective on  Mobile Payment  Transaction  Consumer’s Perspective on  Mobile Payment  Transaction
Consumer’s Perspective on Mobile Payment Transaction Nurul Yakin
 
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...Nurul Yakin
 
Indonesia ina018 1366698387
Indonesia ina018 1366698387Indonesia ina018 1366698387
Indonesia ina018 1366698387Nurul Yakin
 
Indonesia ina002 1366687034
Indonesia ina002 1366687034Indonesia ina002 1366687034
Indonesia ina002 1366687034Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013Nurul Yakin
 
Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275Nurul Yakin
 
Consumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performanceConsumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performanceNurul Yakin
 
Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275Nurul Yakin
 
Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151Nurul Yakin
 

More from Nurul Yakin (12)

Industry
IndustryIndustry
Industry
 
Consumer’s Perspective on Mobile Payment Transaction
Consumer’s Perspective on  Mobile Payment  Transaction  Consumer’s Perspective on  Mobile Payment  Transaction
Consumer’s Perspective on Mobile Payment Transaction
 
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
 
Indonesia ina018 1366698387
Indonesia ina018 1366698387Indonesia ina018 1366698387
Indonesia ina018 1366698387
 
Indonesia ina002 1366687034
Indonesia ina002 1366687034Indonesia ina002 1366687034
Indonesia ina002 1366687034
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
 
Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275
 
Consumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performanceConsumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performance
 
Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275
 
Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151
 

Recently uploaded

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Chinese taipei 1366688667

  • 1. @Padma Resort, Bali Republic of Indonesia 23 April 2013
  • 2.  Yu-feng (Harris) Chen, Chinese Taipei Prosecutor, Chiayi District Prosecutors Office 2013/10/30 APECTEL 47 1
  • 3.
  • 4. AGENDA   Brief overview of latest cybercrime prosecution, Chinese Taipei  Characteristics of criminality information in cyber world  Web-based investigation and prosecution  Challenges  Conclusion and outlook 2013/10/30 APECTEL 47 3
  • 5. Brief overview of latest cybercrime prosecution, Chinese Taipei (1)  Time frame   Sep. 2012 to Feb. 2013  Types of cybercrime  Criminal Code Chapter 36-- “Offenses Against the Computer Security “  Few cases  Low penalty  Major types of crimes committed via computer and internet      2013/10/30 Fraudulence Forging instruments Gambling Intellectual property rights Defamation APECTEL 47 4
  • 6. Brief overview of latest cybercrime prosecution, Chinese Taipei (2)   From defendants perspective(Nationwide)  5,517 defendants in cases disposed, 1,892 were indicted, 34.3% indictment rate  Relatively low compared with the average 40.6% indictment rate of all types of cases nationwide,  Defendants without criminal record, or just with slight misdemeanor  Deferred prosecution with discretion are likely to be rendered by prosecutors.  16.9% of all, higher than the average 9.5% deferred prosecution rate of all types of crimes.  Defendants are usually ordered to make a written statement of repentance, or pay a certain sum to governmental account or a designated non-profit or local self-governing organization. 2013/10/30 APECTEL 47 5
  • 7. Brief overview of latest cybercrime prosecution, Chinese Taipei (3)   From caseload perspective (Nationwide)  467 cybercrime cases commenced, 0.24% of all  4,218 cybercrime cases disposed, 2.3% of all (source: Ministry of Justice) 2013/10/30 APECTEL 47 6
  • 8. Characteristics of criminality information in cyber world   Vastly distributed  Rapidly transmitted  Long Archived  Easily collected  Quickly searched  Possibly manipulated  Effectively analyzed 2013/10/30 APECTEL 47 7
  • 10. Web-based investigation(1)   Growing reliance on digital database  DNA  fingerprints, face  ID number  “family book”: the Three-level Connection system  Financial records  Insurance records  Immigration records 2013/10/30 APECTEL 47 9
  • 11. Web-based investigation(2)   “The Middle-finger Xiao” Incident 2013/10/30 APECTEL 47 10
  • 12. Challenges   On-line communication takes over  Decline of wiretapping approach  Burden of data collection  Cloud computing  Advanced encryption  Urgent investigation  Lack of justice obstruction penalties  Shortage of cyber specialists 2013/10/30 APECTEL 47 11
  • 13. Conclusion and Outlook   Cyber world is an enormous crime database  User data requests worldwide have increased by more than 70% since 2009. From July 2012 through December 2012, Google received 21,389 requests for information about 33,634 user accounts(Google Transparency Report).  Increasing information demand from the authority concerned  National security section  CISPA (Cyber Intelligence Sharing and Protection Act ) of the U.S.  Law enforcement  More laws or regulation of internet governance would be enacted  Creating unified online platform for criminal evidence  Cross-jurisdiction mutual assistance  Global E-Crime Prosecutors Network, GPEN (under International Association of Prosecutors) 2013/10/30 APECTEL 47 12
  • 14. Thank You  Yu-feng(Harris) Chen Delegate of Chinese Taipei harrisychen@gmail.com yufone@mail.moj.gov.tw 2013/10/30 APECTEL 47 13