SlideShare a Scribd company logo
1 of 18
Ministry of Foreign Affairs of the Russian Federation
   Department on New Challenges and Threats




     Countering cybercrime




              10-th E-Crime Congress
             London, 13-14 March 2012
New general trends in the cybercrime
          market in 2011

 Targeted attacks on the financial
 sector
 Increase in online banking fraud
 incidents
 Surge in the number and complexity
 of DDoS attacks
New general trends in the cybercrime
          market in 2011

 Spread of hacktivism, attacks with
 socio-political motives
 Use of social engineering techniques
 to steal personal information and other
 online fraud
Targeted attacks on the facilities of
 critical infrastructure
Main indicators of the cybercrime
           market in 2011
 Creation of organized groups with a centralized
  management system
 Penetration of the cybercrime market by
  traditional organized crime groups, attempting to
  not only control the cashing of stolen funds, but
  the entire theft process
 Growth of the internal market. This market covers
  the so-called Cybercrime to Cybercrime (C2C)
  services, provided on a paid basis by specialized
  teams of hackers
Main indicators of the cybercrime
            market in 2011
 Strong growth this past year, reflected in the
 number of crimes and the volume of profits earned
 by the hackers
 Professionalization of cybercrime, expansion of
 provided services, and interest from traditional
 organized crime groups, leading to an increase in
 damages from hacker activities
 No clearly defined global geographical centers with
 a high concentration of cybercriminals, they can
 carry out their attacks from anywhere in the world
What are the quantitative results in
               2011?

 Preliminary estimate of the financial
 performance of the global cybercrime
 market in 2011: $12.5 billion

 Two-thirds of global cybercrime is online
 fraud and spam
What does the International
   Information Security (IIS) mean?

IIS based on the nature of the inseparable
  «triad» of threats:

 Politico-military
 Terrorist
 Criminal
What legal basis do we have today?


 Council of Europe Convention on Cybercrime
most important regional legal instrument aimed
at combating crime against computer security



 Council of Europe Convention on Cybercrime
one of the first attempts to codify the rules for
combating cybercrime, which is an especially
dangerous phenomenon owing to its scale and
 consequences for national and international
                     security
Is Convention enough to
respond effectively to the new
  dynamic challenges in the
      computer sphere?

            NO
- Convention on Cybercrime does not provide any systematic
         response to the new trends of cybercrime




- Convention on Cybercrime does not provide any systematic
      response to the new challenge of cyberterrorism



- The notions of cybercrime and cyberterrorism have not been
  codified yet, and its components, in their entirety, have not
          been criminalized at the international level



- There is no definition of terrorist intentions, without which
  criminal sanctions would hardly commensurate with the
             terrorist threat of this criminal act
- Convention on Cybercrime does not incorporate provisions
excluding fully impunity of a person, who has committed an
                         illegal act




 - Responses to the threat of cyberterrorism could not be
 found through the combined application of the Council of
   Europe conventions on Cybercrime (2001) and on the
             Prevention of Terrorism (2005)
What Sectors of Critical Infrastructure Are
Potentially Vulnerable to Cyber Attacks?

                 information, communication
energy                                              water
                      technologies, ICT


                                            public and legal
 food        health         financial
                                            order and safety

    civil                                      space and
                         transport
administration                                 research


                     chemical and nuclear
                          industry
Russian strategy to fight
            Cybercrime
• Based on the comprehensive and balanced
  approach
• Necessity to codify global cyberspace
• Start working out the universal glossary or
  terminology on the IIS issues for further
  elaboration of the UN regulatory documents in
  this area and generally recognized international
  norms and criteria for fighting cyberthreats
Russian Initiatives
• CIS Agreement on cooperation to combat information
  computer crimes was signed in 2001 (July, Minsk)
• In 2009 for the first time in international practice it was
  signed an Agreement among the Governments of the
  SCO Member States on Cooperation in the Field of
  Ensuring International Informational Security
• In 2010 the Russian Federation and Brazil signed a
  bilateral agreement on cooperation in the field of
  international    security      for     information      and
  communication
Russian Initiatives
• Initiated in 2010 within the framework of the UN
  Commission on Crime Prevention and Criminal Justice
  Resolution 19/3 «Strengthening public-private partnerships
  to counter crime in all its forms and manifestations»
• Prepared the draft “Rules of conduct” in the sphere of
  international security disseminated as an official document
  of the 66-th session of the UN General Assembly
• Offered the concept of Convention on ensuring
  international security submitted at the 2nd International
  Meeting of High-Ranking Officials Responsible for
  Security Matters in Yekaterinburg (2011)
Russian Initiatives
• Strongly supports and shares the idea (reflected in the
  Declaration of the 12-th UN Congress of CPCJ) of
  drafting the universal Convention on cooperation in
  combating information/cyber crime under the aegis of
  the UN
What is the purpose of the UN
 Convention on Cybercrime?
• Promote and strengthen measures to prevent
  and combat cybercrime more efficiently and
  effectively
• Promote, facilitate and support international
  cooperation and technical assistance in the
  providing of an adequate response to all
  criminal challenges in the computer sphere
Thank you

More Related Content

What's hot

Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacksvngundi
 
Day 1 From CERT To NCSC
Day 1   From CERT To NCSCDay 1   From CERT To NCSC
Day 1 From CERT To NCSCvngundi
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkIGF Indonesia
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorPaul O'Connor
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesArthit Suriyawongkul
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Doha 2015 Factsheet - Questions and Answers
Doha 2015 Factsheet - Questions and AnswersDoha 2015 Factsheet - Questions and Answers
Doha 2015 Factsheet - Questions and AnswersDr Lendy Spires
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 

What's hot (19)

Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacks
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Day 1 From CERT To NCSC
Day 1   From CERT To NCSCDay 1   From CERT To NCSC
Day 1 From CERT To NCSC
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Doha 2015 Factsheet - Questions and Answers
Doha 2015 Factsheet - Questions and AnswersDoha 2015 Factsheet - Questions and Answers
Doha 2015 Factsheet - Questions and Answers
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 

Similar to Russia and cybercrime

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxalanrgibson41217
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber DiplomacyPetar Radanliev
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxadkinspaige22
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0alisondakintxt
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...
Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...
Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...Oleg Demidov
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 

Similar to Russia and cybercrime (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docx
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Cyber Diplomacy
Cyber DiplomacyCyber Diplomacy
Cyber Diplomacy
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...
Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...
Chatham House Cyber+Space Conference June 2013 - International Norms for Cybe...
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 

More from Russian Embassy

The Moscow Kremlin Museums collections come to London
The Moscow Kremlin Museums collections come to LondonThe Moscow Kremlin Museums collections come to London
The Moscow Kremlin Museums collections come to LondonRussian Embassy
 
Brics, a new global player
Brics, a new global playerBrics, a new global player
Brics, a new global playerRussian Embassy
 
Russian sports posters exhibition
Russian sports posters exhibitionRussian sports posters exhibition
Russian sports posters exhibitionRussian Embassy
 
Russian assessment of missile threat
Russian assessment of missile threat Russian assessment of missile threat
Russian assessment of missile threat Russian Embassy
 
Assessment of missile defence global capabilities
Assessment of missile defence global capabilitiesAssessment of missile defence global capabilities
Assessment of missile defence global capabilitiesRussian Embassy
 
Russian MoD views on NATO missile defence in Europe
Russian MoD views on NATO missile defence in EuropeRussian MoD views on NATO missile defence in Europe
Russian MoD views on NATO missile defence in EuropeRussian Embassy
 
Russian tourism roadshow London
Russian tourism roadshow LondonRussian tourism roadshow London
Russian tourism roadshow LondonRussian Embassy
 

More from Russian Embassy (8)

Ermakov Viktor
Ermakov ViktorErmakov Viktor
Ermakov Viktor
 
The Moscow Kremlin Museums collections come to London
The Moscow Kremlin Museums collections come to LondonThe Moscow Kremlin Museums collections come to London
The Moscow Kremlin Museums collections come to London
 
Brics, a new global player
Brics, a new global playerBrics, a new global player
Brics, a new global player
 
Russian sports posters exhibition
Russian sports posters exhibitionRussian sports posters exhibition
Russian sports posters exhibition
 
Russian assessment of missile threat
Russian assessment of missile threat Russian assessment of missile threat
Russian assessment of missile threat
 
Assessment of missile defence global capabilities
Assessment of missile defence global capabilitiesAssessment of missile defence global capabilities
Assessment of missile defence global capabilities
 
Russian MoD views on NATO missile defence in Europe
Russian MoD views on NATO missile defence in EuropeRussian MoD views on NATO missile defence in Europe
Russian MoD views on NATO missile defence in Europe
 
Russian tourism roadshow London
Russian tourism roadshow LondonRussian tourism roadshow London
Russian tourism roadshow London
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Russia and cybercrime

  • 1. Ministry of Foreign Affairs of the Russian Federation Department on New Challenges and Threats Countering cybercrime 10-th E-Crime Congress London, 13-14 March 2012
  • 2. New general trends in the cybercrime market in 2011  Targeted attacks on the financial sector  Increase in online banking fraud incidents  Surge in the number and complexity of DDoS attacks
  • 3. New general trends in the cybercrime market in 2011  Spread of hacktivism, attacks with socio-political motives  Use of social engineering techniques to steal personal information and other online fraud Targeted attacks on the facilities of critical infrastructure
  • 4. Main indicators of the cybercrime market in 2011  Creation of organized groups with a centralized management system  Penetration of the cybercrime market by traditional organized crime groups, attempting to not only control the cashing of stolen funds, but the entire theft process  Growth of the internal market. This market covers the so-called Cybercrime to Cybercrime (C2C) services, provided on a paid basis by specialized teams of hackers
  • 5. Main indicators of the cybercrime market in 2011  Strong growth this past year, reflected in the number of crimes and the volume of profits earned by the hackers  Professionalization of cybercrime, expansion of provided services, and interest from traditional organized crime groups, leading to an increase in damages from hacker activities  No clearly defined global geographical centers with a high concentration of cybercriminals, they can carry out their attacks from anywhere in the world
  • 6. What are the quantitative results in 2011?  Preliminary estimate of the financial performance of the global cybercrime market in 2011: $12.5 billion  Two-thirds of global cybercrime is online fraud and spam
  • 7. What does the International Information Security (IIS) mean? IIS based on the nature of the inseparable «triad» of threats:  Politico-military  Terrorist  Criminal
  • 8. What legal basis do we have today? Council of Europe Convention on Cybercrime most important regional legal instrument aimed at combating crime against computer security Council of Europe Convention on Cybercrime one of the first attempts to codify the rules for combating cybercrime, which is an especially dangerous phenomenon owing to its scale and consequences for national and international security
  • 9. Is Convention enough to respond effectively to the new dynamic challenges in the computer sphere? NO
  • 10. - Convention on Cybercrime does not provide any systematic response to the new trends of cybercrime - Convention on Cybercrime does not provide any systematic response to the new challenge of cyberterrorism - The notions of cybercrime and cyberterrorism have not been codified yet, and its components, in their entirety, have not been criminalized at the international level - There is no definition of terrorist intentions, without which criminal sanctions would hardly commensurate with the terrorist threat of this criminal act
  • 11. - Convention on Cybercrime does not incorporate provisions excluding fully impunity of a person, who has committed an illegal act - Responses to the threat of cyberterrorism could not be found through the combined application of the Council of Europe conventions on Cybercrime (2001) and on the Prevention of Terrorism (2005)
  • 12. What Sectors of Critical Infrastructure Are Potentially Vulnerable to Cyber Attacks? information, communication energy water technologies, ICT public and legal food health financial order and safety civil space and transport administration research chemical and nuclear industry
  • 13. Russian strategy to fight Cybercrime • Based on the comprehensive and balanced approach • Necessity to codify global cyberspace • Start working out the universal glossary or terminology on the IIS issues for further elaboration of the UN regulatory documents in this area and generally recognized international norms and criteria for fighting cyberthreats
  • 14. Russian Initiatives • CIS Agreement on cooperation to combat information computer crimes was signed in 2001 (July, Minsk) • In 2009 for the first time in international practice it was signed an Agreement among the Governments of the SCO Member States on Cooperation in the Field of Ensuring International Informational Security • In 2010 the Russian Federation and Brazil signed a bilateral agreement on cooperation in the field of international security for information and communication
  • 15. Russian Initiatives • Initiated in 2010 within the framework of the UN Commission on Crime Prevention and Criminal Justice Resolution 19/3 «Strengthening public-private partnerships to counter crime in all its forms and manifestations» • Prepared the draft “Rules of conduct” in the sphere of international security disseminated as an official document of the 66-th session of the UN General Assembly • Offered the concept of Convention on ensuring international security submitted at the 2nd International Meeting of High-Ranking Officials Responsible for Security Matters in Yekaterinburg (2011)
  • 16. Russian Initiatives • Strongly supports and shares the idea (reflected in the Declaration of the 12-th UN Congress of CPCJ) of drafting the universal Convention on cooperation in combating information/cyber crime under the aegis of the UN
  • 17. What is the purpose of the UN Convention on Cybercrime? • Promote and strengthen measures to prevent and combat cybercrime more efficiently and effectively • Promote, facilitate and support international cooperation and technical assistance in the providing of an adequate response to all criminal challenges in the computer sphere