Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this


  1. 1. Protecting the Individual while assuring the Freedom of the Net
  2. 2. Cyber Criminals <ul><li>Tens of Thousands enjoying: </li></ul><ul><ul><li>Anonymity </li></ul></ul><ul><ul><li>Multiple jurisdictions </li></ul></ul><ul><ul><li>Lack of common legal definitions </li></ul></ul><ul><ul><li>Data preservation issues </li></ul></ul><ul><ul><li>Lack of accurate registration processes </li></ul></ul><ul><ul><li>Proxy registration and connection </li></ul></ul><ul><ul><li>Corruption </li></ul></ul><ul><ul><li>A small opposition </li></ul></ul>
  3. 3. LE Due Diligence Proposal <ul><ul><li>Three (3) Objectives of LE Proposal: </li></ul></ul><ul><ul><ul><li>Due Diligence </li></ul></ul></ul><ul><ul><ul><li>WHOIS </li></ul></ul></ul><ul><ul><ul><li>Transparency and Accountability </li></ul></ul></ul>
  4. 4. Regional Internet Registries (RIR)
  5. 5. Criminality on the Network Case Study: Russian Business Network
  6. 6. Child Pornography Phishing Rogue Name Servers Malware C&C Malware Infection Server Malware Drop Site Money Mule Sites Spam Content Servers Pharmaceutical Fraud Sites Rogue Payment Processor Sites Botnet C&C Sites Bank Account Intrusion Sites Fast Flux Sites DDOS Sites Carding Forum Sites Criminal IRC Sites
  7. 7. Commercial in Confidence [email_address]