SlideShare a Scribd company logo
1 of 64
Download to read offline
Lessons learned in fighting
  cybercrime and cyber
        terrorism
          Albena Spasova
 International Cyber Investigation
        Training Academy
Evolution of cybercrime

          Web 1.0
          Web 2.0
          Web 3.0
      What’s the future?
The dark side of Web 1.0
   Traditional crime moved online
Web 1.0 - hacking
Web 1.0 - viruses
The dark side of Web 2.0
 Traditional and dynamic phishing
 Botnets
 New tools for organized crime groups
 New tactics for terrorist groups
Cyber tactic

 1. Espionage
 2. Propaganda
 3. Denial of Service (DoS)
 4. Data interference
 5. Infrastructure manipulation
Organized crime?

“Old crimes, new
    tools and
new crimes, new
      tools”
Botnets – What are they?
   Traditionally controlled through Internet
    Relay Chat (IRC)
Botnets – What are they?
Botnets – Chasing New Exploits
 Constantly   looking for new
 exploits

 New infections before patch
 released
Botnets – Security Bulletin –
        08/08/2006
Botnets – DHS Warning –
       08/09/2006
Botnets – Bot in the Wild by
         Weekend
Botnets – How are they used?


Sending  Spam
Denial of Service Attacks
ID Theft
Spyware Delivery
Botnets – How are they used?
               ID Theft
   DDoS / SPAM attracted attention –
    botnets were shut down

     ISPs  and Victims would monitor attacks
      to find bots



   Badguys discovered that they could make
    $$$$ instead
Botnets – How are they used?
           Spyware
 Spyware  / Adware used for
  advertisement delivery
   Popups


 Affiliate   programs pay per install

 Bot Herders will install the spyware
  on their bots in order to get paid
Botnets – How are they used?
          Spyware
Botnets and eCommerce
 Specificuses of botnets targeted
 at abusing eCommerce users

 ID   theft combined with proxy

 Dynamic    Phishing Sites
Cases
   Simple case: mule receives money to a
    bank account and moves the money to an
    other bank account

   Complex case: mule receives money via
    online payment system, transfers the
    money via bank to an other account to an
    other mule; next mule transfers the money
    through online payment system to a
    different mule – all actions happen in
    different states
Example of Fraudulent Scheme
                             •Fraud groups from set up
                             spoof sites all over the
                             world

                             •They convince victims to
                             send money/goods to
                             Spain, Italy, France,
                             Belgium and more
                             recently the UK

                             • Runners or Arrows
                             collect the money/goods
                             from around the world
                             and send it back to
                             Fraudster



               Money flows
Investigation – challenges for law
               enforcement
 Where did the crime happen?
 Is the crime a crime in the jurisdictions
  involved?
 Who will investigate it?
 Who is behind it?
 Tracing back…
Tracing………
 While its happening - where is the illegal
  activity taking place – who are the parties
  involved?
 Using information provided by ISPs and
  other communications providers – different
  legal requirements
 Encrypted communications
Tracing…
   Preservation of data

   Information kept must be sufficient to allow
    tracing

   Fast sharing of information
Tracing scheme…
Sharing electronic evidence
             internationally
   How long does it take to share information
    between two countries?

   What other challenges we have in the
    process?
Challenges
 Legislation and jurisdiction
 Sufficient resources and personnel
 Localizing and identifying the “bad guys”
 Collect and share evidence internationally
Legal Instruments
   CoE Cybercrime Convention - 2001

   Council Framework Decision
    2005/222/JHA on attacks against
    information systems;

   Council Framework Decision 2004/68/JHA
    on combating the sexual exploitation of
    children and child pornography.
Legal Challenges
 Definition
 Jurisdiction
 Investigation
 International Cooperation
 Public-private Partnerships
 Prevention
1. Definition of cyber-crime
 Technology is rapidly evolving
 Definition – open, flexible, vague
 Balance between open legal requirements
  and national constitutional prohibitions
 Technology neutral language
Definition
   CoE Convention – technology neutral
    language - Art 1
     Computer system
     Computer data
     Service provider
Definition
 No universally accepted definition
 Crimes related to cyberspace: no longer
  computer and internet crime
 “Information systems” – any device or a
  group of interconnected or related devices
 “Data”
 E.g. Personal digital assistant, modern
  car, mobile phone
Chapter II, Measures to be taken at
  the national level - Substantive
            criminal law
   Title I – Offences against the confidentiality,
    integrity and availability of data – illegal
    access, illegal interception, data interference,
    system interference, misuse of devices
   Title II – Computer-related offences – forgery,
    fraud;
   Title III - Content-related offences - child
    pornography/ Protocol – hate speech
   Title IV – Offences related to the
    infringements of copyright and related rights
    – copyright and related rights
Council Framework Decision 2005/222/JHA
  on attacks against information systems
   Approximation of criminal law systems:

     Illegal access to information systems
     Illegal system interference
     Illegal data interference
Example – cyber terrorism case
   Large scale attack against information
    systems – E.g. terrorist would attack information
    systems essential for international capital
    markets and break them down
   A computer-related offence – E.g. terrorist
    would take over an information system
    managing a nuclear facility and trigger a nuclear
    meltdown
   A content-related offence – E.g. terrorist
    disseminate propaganda/blueprints for bombs
Example
  Criminal Hate speech: Drafted in one place, transmitted
  Through other and uploaded on a server in a third,
  viewed by
  the whole world
                      State
                        B




State                                       State
  A                                           C
2. Determining Jurisdiction
   CoE Cybercrime Convention:
       Territoriality principle
       Personality principle
       Protection principle

   Council Framework Decision 2005/222/JHA on attacks against
    information systems
       Territoriality principle
       Nationality principle
       When several MS have jurisdiction – decide

   Council Framework Decision 2004/68/JHA on combating the sexual
    exploitation of children and child pornography
       Territoriality principle
       Active personality principle
       The offence committed for the benefit of a legal person established in
        the territory of that MS
Problems
   Dual criminality

   Dual illegality

   Legal harmonization – for extraterritorial or
    universal jurisdiction
Toben Case – dual
          criminality/illegality


                                          Site was viewed by
In 1999 Australian national
                                               Neo-Nazis
   Created a website in
   Australia, in English
Which included a statement
That Shoa never happened


                                      Auschwitz denial is a crime
                                             In Germany
        Under territoriality principle
Counter example

 Advertisement of beer in Germany




Can be accessed in Islamic countries
Counter example


       German Internet Blog critical of a dictatorship
                     In the Far East




            Blog is accessible in these countries



Conclusion: Degree of legal harmonization is necessary for legitimate
Extraterritorial or even universal jurisdiction
3. Investigation:
       CoE Cybercrime Convention provisions

   Title 2 – Expedited preservation of stored
    computer data – “quick freeze”

   Title 3 – Production order

   Title 4 – Search and Seizure of stored
    computer data

   Title 5 – Real-time collection of computer
    data
Observations
   Crimes committed “without right”
Problems
   The use of remote forensic software to carry
    out remote search procedures, record VOIP
    communications, log keystrokes and passwords,
    identify IP addresses

   Data retention/data privacy

       Data Retention Directive – telecommunication
        service providers - anybodies traffic for up to 6
        months
       Production order – produce specific data –
        passwords, encryption codes

   Proportional measures
4. International Cooperation
 “Loopholes of jurisdiction”
 Cooperation is necessary:
     Extradition – serious crime offenses
     Mutual legal assistance
     Minimum of harmonization on substantive and
      procedural laws
     Private-public partnerships
4. International Cooperation – CoE
             Convention
   Cooperation:
     Art. 24 Extradition
     Art. 25 Mutual Legal Assistance
     Art. 26 Spontaneous information
   Coordination:
        which state should do what – points of
        contact

   Harmonization:
     Substantive
     Procedural
Solutions:
 Adopt adequate legislation
 Assure sufficient law enforcement
  personnel with adequate training and
  resources
 Partnerships with industry
 Public awareness
Crime in a virtual world?
   Should we be concerned? Do worlds
    collide?
Virtual worlds
   In worlds populations:
   Second Life (with over 16 million)
   Warcraft (12 million paid subscribers)
   Disney Club Penquin (expected to attract over 30 million
    participants)
   Together the population of these three virtual worlds
    alone exceeds the real- world populations of Canada,
    Australia and Ireland combined
Life in a virtual world:
  What can you do?
Life in a virtual world:
Interesting stats
   567 mil. $ user to user transactions in 2009
   65% jump from 2008
   770.000 unique users made repeat visits to SL
    in December 2009
   Residents cashed 55 mil. $ transferring to
    PayPal
   Land barons make 12 mil. $ untidily per year
   Users control IPRs of what they build
   Average price per island is 1000 $
Virtual money
   Money launderers can now move illicit cash
    through the growing number of virtual reality
    role-playing games, and convert that cash
    into real currency before withdrawing it from
    ATMs worldwide.
   One wonders just how many laundrymen
    have tumbled to this cyberlaundering
    opportunity.
   Compliance officers at financial institutions
    please note that their banks may be guilty of
    money laundering if it facilitates deposits or
    payments in these virtual worlds, for there is
    no functional due diligence on players or
    recipients.
Scenario




           LD$
Imagine this scenario


All account with counterfeit identification
Policing the virtual world: Real
             Police
In conclusion…

 EU Regulations are coming
 Take a step at a time
 Thank you!
Conclusions

   Prevention: Increase Internet culture

   Protection: people and infrastructures

   Cooperation: law enforcement and judiciary

   Responsibility: national, regional, global

   Financing…
Albena Spasova
President of the Management Board,
International Cyber Investigation Training Academy
Sofia, Bulgaria

Associate Professor,
Technical University, Lille – 1, France

www.cybersafetyblog.eu
аspasova@cybercrimeacademy.org
albaadvisors@gmail.com

Teл. 0887 30 32 89

More Related Content

What's hot

International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Internet Intermediaries Liability
Internet Intermediaries LiabilityInternet Intermediaries Liability
Internet Intermediaries LiabilityCedric Manara
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawJon Garon
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider LiabilityAndres Guadamuz
 

What's hot (20)

International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
File000165
File000165File000165
File000165
 
Internet Intermediaries Liability
Internet Intermediaries LiabilityInternet Intermediaries Liability
Internet Intermediaries Liability
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
File000167
File000167File000167
File000167
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
File000161
File000161File000161
File000161
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
File000146
File000146File000146
File000146
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International Law
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
 
File000154
File000154File000154
File000154
 

Similar to Lessons in Fighting Cybercrime and Terrorism

Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebDarius Whelan
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Current and future mass surveillance threats
Current and future mass surveillance threatsCurrent and future mass surveillance threats
Current and future mass surveillance threatsPoint_conference
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.pptJiaJunWang17
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsShoaib Sheikh
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 

Similar to Lessons in Fighting Cybercrime and Terrorism (20)

Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Current and future mass surveillance threats
Current and future mass surveillance threatsCurrent and future mass surveillance threats
Current and future mass surveillance threats
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 

More from USAID CEED II Project Moldova

Consultancy opportunity in Moldova Tourism Development
Consultancy opportunity in Moldova Tourism DevelopmentConsultancy opportunity in Moldova Tourism Development
Consultancy opportunity in Moldova Tourism DevelopmentUSAID CEED II Project Moldova
 
Lista vinurilor pentru degustare la Vernisajul Vinului 2011
Lista vinurilor pentru degustare la Vernisajul Vinului 2011Lista vinurilor pentru degustare la Vernisajul Vinului 2011
Lista vinurilor pentru degustare la Vernisajul Vinului 2011USAID CEED II Project Moldova
 
Transformation and Competitiveness - the Role of Certification
Transformation and Competitiveness - the Role of CertificationTransformation and Competitiveness - the Role of Certification
Transformation and Competitiveness - the Role of CertificationUSAID CEED II Project Moldova
 
Share of Slovenian practices for building competitiveness
Share of Slovenian practices for building competitivenessShare of Slovenian practices for building competitiveness
Share of Slovenian practices for building competitivenessUSAID CEED II Project Moldova
 
Challenges for Successful Information Society Development
Challenges for Successful Information Society Development Challenges for Successful Information Society Development
Challenges for Successful Information Society Development USAID CEED II Project Moldova
 
Enhancing the user experience: moldweb analysis and international trends
Enhancing the user experience: moldweb analysis and international trendsEnhancing the user experience: moldweb analysis and international trends
Enhancing the user experience: moldweb analysis and international trendsUSAID CEED II Project Moldova
 

More from USAID CEED II Project Moldova (20)

Employment opportunity driver ceed ii
Employment opportunity driver ceed iiEmployment opportunity driver ceed ii
Employment opportunity driver ceed ii
 
Consultancy opportunity in Moldova Tourism Development
Consultancy opportunity in Moldova Tourism DevelopmentConsultancy opportunity in Moldova Tourism Development
Consultancy opportunity in Moldova Tourism Development
 
Comunicat Vernisajul Vinului
Comunicat Vernisajul VinuluiComunicat Vernisajul Vinului
Comunicat Vernisajul Vinului
 
Lista vinurilor pentru degustare la Vernisajul Vinului 2011
Lista vinurilor pentru degustare la Vernisajul Vinului 2011Lista vinurilor pentru degustare la Vernisajul Vinului 2011
Lista vinurilor pentru degustare la Vernisajul Vinului 2011
 
Vernisajul Vinului 2011
Vernisajul Vinului 2011Vernisajul Vinului 2011
Vernisajul Vinului 2011
 
Factoring o noua alternativa iunie 2011
Factoring o noua alternativa iunie 2011Factoring o noua alternativa iunie 2011
Factoring o noua alternativa iunie 2011
 
Invitatie piata resurselor financiare
Invitatie piata resurselor financiareInvitatie piata resurselor financiare
Invitatie piata resurselor financiare
 
Invitation to Fashion Forecast Masterclass
Invitation to Fashion Forecast MasterclassInvitation to Fashion Forecast Masterclass
Invitation to Fashion Forecast Masterclass
 
RFQ_BuyMoldovan
RFQ_BuyMoldovanRFQ_BuyMoldovan
RFQ_BuyMoldovan
 
Case study Mexico
Case study Mexico Case study Mexico
Case study Mexico
 
Human Capital Development. Perspectives for Moldova
Human Capital Development. Perspectives for MoldovaHuman Capital Development. Perspectives for Moldova
Human Capital Development. Perspectives for Moldova
 
The Future of ICT Training: Will You Survive?
The Future of ICT Training: Will You Survive?  The Future of ICT Training: Will You Survive?
The Future of ICT Training: Will You Survive?
 
ICT Capacity Building, from Cradle to Grave
ICT Capacity Building, from Cradle to GraveICT Capacity Building, from Cradle to Grave
ICT Capacity Building, from Cradle to Grave
 
Transformation and Competitiveness - the Role of Certification
Transformation and Competitiveness - the Role of CertificationTransformation and Competitiveness - the Role of Certification
Transformation and Competitiveness - the Role of Certification
 
Share of Slovenian practices for building competitiveness
Share of Slovenian practices for building competitivenessShare of Slovenian practices for building competitiveness
Share of Slovenian practices for building competitiveness
 
Country Competitiveness / Needed Actions & Players
Country Competitiveness / Needed Actions & Players Country Competitiveness / Needed Actions & Players
Country Competitiveness / Needed Actions & Players
 
Country Competitiveness / Needed Actions & Players
Country Competitiveness / Needed Actions & Players Country Competitiveness / Needed Actions & Players
Country Competitiveness / Needed Actions & Players
 
Challenges for Successful Information Society Development
Challenges for Successful Information Society Development Challenges for Successful Information Society Development
Challenges for Successful Information Society Development
 
IBM Solutions for Egovernment
IBM Solutions for Egovernment IBM Solutions for Egovernment
IBM Solutions for Egovernment
 
Enhancing the user experience: moldweb analysis and international trends
Enhancing the user experience: moldweb analysis and international trendsEnhancing the user experience: moldweb analysis and international trends
Enhancing the user experience: moldweb analysis and international trends
 

Recently uploaded

Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Recently uploaded (20)

Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 

Lessons in Fighting Cybercrime and Terrorism

  • 1. Lessons learned in fighting cybercrime and cyber terrorism Albena Spasova International Cyber Investigation Training Academy
  • 2.
  • 3. Evolution of cybercrime Web 1.0 Web 2.0 Web 3.0 What’s the future?
  • 4.
  • 5. The dark side of Web 1.0  Traditional crime moved online
  • 6. Web 1.0 - hacking
  • 7. Web 1.0 - viruses
  • 8.
  • 9. The dark side of Web 2.0  Traditional and dynamic phishing  Botnets  New tools for organized crime groups  New tactics for terrorist groups
  • 10.
  • 11. Cyber tactic  1. Espionage  2. Propaganda  3. Denial of Service (DoS)  4. Data interference  5. Infrastructure manipulation
  • 12. Organized crime? “Old crimes, new tools and new crimes, new tools”
  • 13. Botnets – What are they?  Traditionally controlled through Internet Relay Chat (IRC)
  • 14. Botnets – What are they?
  • 15. Botnets – Chasing New Exploits  Constantly looking for new exploits  New infections before patch released
  • 16. Botnets – Security Bulletin – 08/08/2006
  • 17. Botnets – DHS Warning – 08/09/2006
  • 18. Botnets – Bot in the Wild by Weekend
  • 19. Botnets – How are they used? Sending Spam Denial of Service Attacks ID Theft Spyware Delivery
  • 20. Botnets – How are they used? ID Theft  DDoS / SPAM attracted attention – botnets were shut down  ISPs and Victims would monitor attacks to find bots  Badguys discovered that they could make $$$$ instead
  • 21. Botnets – How are they used? Spyware  Spyware / Adware used for advertisement delivery  Popups  Affiliate programs pay per install  Bot Herders will install the spyware on their bots in order to get paid
  • 22. Botnets – How are they used? Spyware
  • 23. Botnets and eCommerce  Specificuses of botnets targeted at abusing eCommerce users  ID theft combined with proxy  Dynamic Phishing Sites
  • 24. Cases  Simple case: mule receives money to a bank account and moves the money to an other bank account  Complex case: mule receives money via online payment system, transfers the money via bank to an other account to an other mule; next mule transfers the money through online payment system to a different mule – all actions happen in different states
  • 25. Example of Fraudulent Scheme •Fraud groups from set up spoof sites all over the world •They convince victims to send money/goods to Spain, Italy, France, Belgium and more recently the UK • Runners or Arrows collect the money/goods from around the world and send it back to Fraudster Money flows
  • 26. Investigation – challenges for law enforcement  Where did the crime happen?  Is the crime a crime in the jurisdictions involved?  Who will investigate it?  Who is behind it?  Tracing back…
  • 27. Tracing………  While its happening - where is the illegal activity taking place – who are the parties involved?  Using information provided by ISPs and other communications providers – different legal requirements  Encrypted communications
  • 28. Tracing…  Preservation of data  Information kept must be sufficient to allow tracing  Fast sharing of information
  • 30. Sharing electronic evidence internationally  How long does it take to share information between two countries?  What other challenges we have in the process?
  • 31. Challenges  Legislation and jurisdiction  Sufficient resources and personnel  Localizing and identifying the “bad guys”  Collect and share evidence internationally
  • 32. Legal Instruments  CoE Cybercrime Convention - 2001  Council Framework Decision 2005/222/JHA on attacks against information systems;  Council Framework Decision 2004/68/JHA on combating the sexual exploitation of children and child pornography.
  • 33. Legal Challenges  Definition  Jurisdiction  Investigation  International Cooperation  Public-private Partnerships  Prevention
  • 34. 1. Definition of cyber-crime  Technology is rapidly evolving  Definition – open, flexible, vague  Balance between open legal requirements and national constitutional prohibitions  Technology neutral language
  • 35. Definition  CoE Convention – technology neutral language - Art 1  Computer system  Computer data  Service provider
  • 36. Definition  No universally accepted definition  Crimes related to cyberspace: no longer computer and internet crime  “Information systems” – any device or a group of interconnected or related devices  “Data”  E.g. Personal digital assistant, modern car, mobile phone
  • 37. Chapter II, Measures to be taken at the national level - Substantive criminal law  Title I – Offences against the confidentiality, integrity and availability of data – illegal access, illegal interception, data interference, system interference, misuse of devices  Title II – Computer-related offences – forgery, fraud;  Title III - Content-related offences - child pornography/ Protocol – hate speech  Title IV – Offences related to the infringements of copyright and related rights – copyright and related rights
  • 38. Council Framework Decision 2005/222/JHA on attacks against information systems  Approximation of criminal law systems:  Illegal access to information systems  Illegal system interference  Illegal data interference
  • 39. Example – cyber terrorism case  Large scale attack against information systems – E.g. terrorist would attack information systems essential for international capital markets and break them down  A computer-related offence – E.g. terrorist would take over an information system managing a nuclear facility and trigger a nuclear meltdown  A content-related offence – E.g. terrorist disseminate propaganda/blueprints for bombs
  • 40. Example Criminal Hate speech: Drafted in one place, transmitted Through other and uploaded on a server in a third, viewed by the whole world State B State State A C
  • 41. 2. Determining Jurisdiction  CoE Cybercrime Convention:  Territoriality principle  Personality principle  Protection principle  Council Framework Decision 2005/222/JHA on attacks against information systems  Territoriality principle  Nationality principle  When several MS have jurisdiction – decide  Council Framework Decision 2004/68/JHA on combating the sexual exploitation of children and child pornography  Territoriality principle  Active personality principle  The offence committed for the benefit of a legal person established in the territory of that MS
  • 42. Problems  Dual criminality  Dual illegality  Legal harmonization – for extraterritorial or universal jurisdiction
  • 43. Toben Case – dual criminality/illegality Site was viewed by In 1999 Australian national Neo-Nazis Created a website in Australia, in English Which included a statement That Shoa never happened Auschwitz denial is a crime In Germany Under territoriality principle
  • 44. Counter example Advertisement of beer in Germany Can be accessed in Islamic countries
  • 45. Counter example German Internet Blog critical of a dictatorship In the Far East Blog is accessible in these countries Conclusion: Degree of legal harmonization is necessary for legitimate Extraterritorial or even universal jurisdiction
  • 46. 3. Investigation: CoE Cybercrime Convention provisions  Title 2 – Expedited preservation of stored computer data – “quick freeze”  Title 3 – Production order  Title 4 – Search and Seizure of stored computer data  Title 5 – Real-time collection of computer data
  • 47. Observations  Crimes committed “without right”
  • 48. Problems  The use of remote forensic software to carry out remote search procedures, record VOIP communications, log keystrokes and passwords, identify IP addresses  Data retention/data privacy  Data Retention Directive – telecommunication service providers - anybodies traffic for up to 6 months  Production order – produce specific data – passwords, encryption codes  Proportional measures
  • 49. 4. International Cooperation  “Loopholes of jurisdiction”  Cooperation is necessary:  Extradition – serious crime offenses  Mutual legal assistance  Minimum of harmonization on substantive and procedural laws  Private-public partnerships
  • 50. 4. International Cooperation – CoE Convention  Cooperation:  Art. 24 Extradition  Art. 25 Mutual Legal Assistance  Art. 26 Spontaneous information  Coordination:  which state should do what – points of contact  Harmonization:  Substantive  Procedural
  • 51. Solutions:  Adopt adequate legislation  Assure sufficient law enforcement personnel with adequate training and resources  Partnerships with industry  Public awareness
  • 52. Crime in a virtual world?  Should we be concerned? Do worlds collide?
  • 53. Virtual worlds  In worlds populations:  Second Life (with over 16 million)  Warcraft (12 million paid subscribers)  Disney Club Penquin (expected to attract over 30 million participants)  Together the population of these three virtual worlds alone exceeds the real- world populations of Canada, Australia and Ireland combined
  • 54. Life in a virtual world: What can you do?
  • 55. Life in a virtual world:
  • 56.
  • 57. Interesting stats  567 mil. $ user to user transactions in 2009  65% jump from 2008  770.000 unique users made repeat visits to SL in December 2009  Residents cashed 55 mil. $ transferring to PayPal  Land barons make 12 mil. $ untidily per year  Users control IPRs of what they build  Average price per island is 1000 $
  • 58. Virtual money  Money launderers can now move illicit cash through the growing number of virtual reality role-playing games, and convert that cash into real currency before withdrawing it from ATMs worldwide.  One wonders just how many laundrymen have tumbled to this cyberlaundering opportunity.  Compliance officers at financial institutions please note that their banks may be guilty of money laundering if it facilitates deposits or payments in these virtual worlds, for there is no functional due diligence on players or recipients.
  • 59. Scenario LD$
  • 60. Imagine this scenario All account with counterfeit identification
  • 61. Policing the virtual world: Real Police
  • 62. In conclusion…  EU Regulations are coming  Take a step at a time  Thank you!
  • 63. Conclusions  Prevention: Increase Internet culture  Protection: people and infrastructures  Cooperation: law enforcement and judiciary  Responsibility: national, regional, global  Financing…
  • 64. Albena Spasova President of the Management Board, International Cyber Investigation Training Academy Sofia, Bulgaria Associate Professor, Technical University, Lille – 1, France www.cybersafetyblog.eu аspasova@cybercrimeacademy.org albaadvisors@gmail.com Teл. 0887 30 32 89