SlideShare a Scribd company logo
Security Wars Ikuo Takahashi
A long time ago in a  network far ,far away The word “hacker”used to be a  respectful word for the master of computer.However many hackers fell  into the Dark World led by  dark side of their  power-anger, exhibitionism and temporary joy. Internet has been messed up by the unprecedented  attacks from people who covet the Internet by lust, people who impose on others for economic interests, people who juggle with the bot. This "Saga" is about the epic of the battle with the society, Engineers who crossed the line of social activity, and ISP who stand up against the messed up Internet. ……………… .. ハッカーは、選ばれし者。 多数の者が、怒り、自己顕示欲、楽しみのために堕ちていった。 社会は、暗黒の技術者と永遠の初心者からネットワークを 守る決心をした。
Episodes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],エピソートⅠ 闇に堕ちたハッカー エピソードⅡ 匿名軍団の攻撃 エピソードⅢ 希望か絶望か
Episode 1 Dark Side of Hackers エピソートⅠ ハッカーと暗黒面
Dark side of Hackers ,[object Object],[object Object],[object Object],[object Object],ハッカーは、尊称であった  怒りや恐れから暗黒面に堕ちるのか
“ Office” case in JP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ACCS ハッカー事件 シンポジウムでの「侵入」事件の公表
Hacking method-Office ,[object Object],[object Object],[object Object],[object Object],[object Object],二つのステップを踏んで、エクセルファイルを取得
Issues in  Office’s case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],不正アクセス禁止法の適用、脆弱性情報の公開手法、メディア対応の問題など
Sentenced guilty ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],アクセス管理者は、そのような行為によるアクセスは認めていない
Tsunami hacker case in UK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],英国におけるツナミ ハッカー事件
Winny Network ,[object Object],[object Object],[object Object],[object Object],Winny ネットワーク  P2P  バックでの複製 暗号化 匿名性特徴 Key (summarized Information) Nord file Key (summarized Information)
Winny programmer criminal case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],正犯者事件あり 作者への刑事事件  「提供行為」についての違法性が認定されている
Kaneko’s allegation ,[object Object],[object Object],[object Object],金子氏は、無罪を主張
Kyoto District court  Dec.13,2006 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],一五○万円の罰金 主観面において、当時の状況を認容して・アップロードして提供
Comments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],公訴事実 状況を前提としてアップロード ( 誤解されがち ) ソースコードの鑑定はないのに意思を判断している
Harada virus case introduced in Ms.Koyama’s presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],原田ウイルス事件 ウイルス作成罪がない ( 日本 )  自己顕示欲を認定
Society’s Combat ,[object Object],[object Object],[object Object],[object Object],[object Object],「侵入者」への厳しい対処の必要性 脆弱性情報の開示への制限 サイバー犯罪条約
Information Security Early Warning Partnership Discoverers of Vulnerability ,[object Object],[object Object],[object Object],[object Object],Users (System Administrators, Individual Users, etc.) Foreign CSIRTs (CERT/CC, NISCC, etc.) Coordination IT Vendors Cooperation Vulnerability Information Portal Site (JVN) http://jvn.jp/ Vulnerability Information Countermeasures JPCERT/CC IPA Countermeasures System Integrators Countermeasures Vulnerability Information Countermeasures from METI presentation
Outline of the Partnership Reporting Receiving Organization Discoverer (JPCERT/CC) Coordinating Organizations Notification Users [Web Applications] Reporting Notification [Software Products] Vendors Coordination Website Operation Manager Foreign CERTs System Integrators Coordinate SPREAD Publicity Portal Site  (JPN: JP Vendor Status Notes)  Publicity* (IPA) (IPA) Analysis Analyzing Organization -  Governments -  Companies -  Individuals *: When personal data has leaked.
Cyber Crime Convention ,[object Object],[object Object],[object Object],[object Object],サイバー犯罪条約六条 ハッカーツールの禁止
Computer Misuse Act through the Police and Justice Act 2006; ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],英国 コンピュータミスユース法の改正 悪用されるだろうという意識のもとでの提供が有罪とされる。作成については、犯罪利用目的が必要
“ Hackers” concern  ,[object Object],[object Object],[object Object],学術的研究なのに? 悪用の可能性まではビジョンを見れない? 一線を画す?
guidelines  for the application of Computer Misuse Act. ,[object Object],[object Object],[object Object],[object Object],英国 コンピュータミスユース法の適用についてのガイドライン ちゃんとした会社なのか、CMAへの意識はどうか 違反意図はあるのか
If you cannot find Mater Yoda, ,[object Object],[object Object],[object Object],[object Object],倫理的セキュリティテスト評議会
Sec Wars Episode2 Attack of  anonymous troops エピソード2 匿名軍団の攻撃
Anonymous Troops ,[object Object],[object Object],[object Object],[object Object],[object Object],匿名軍団 ・匿名BBS ・ボットネット
Change of backgrounds  of Cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],サイバー犯罪の組織化・金銭目的化・国際化
Dark side of Web 2.0 ,[object Object],cannot be defraud defraud
ISP’s Network Management Honey Pot ② infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
Measure Site Honey pots PCs infected by Bot Programs ・・ ・・ Analysis of source attacking ISP !! Making removal tool 【 CCC Cleaner 】 Analysis Isolation Cyber Clean Center ② Number of unique specimens : 215,338 [Since a number of the specimens collected are the same, those that are identical in size and external characteristics are removed to separate unique specimens (binary files).] ④ Number of specimens reflected in removal tools: 7,833 [Unknown specimens are analyzed to create bot removal tools for those that are high-risk and currently infecting many PCs.] ⑤ Bot-removal tools Updated: 61 times [Bot-removal tools are updated every week.] ⑥  Security alerts: 232,487 times [This is the number of security alerts that cooperating ISPs provided to infected users.] Number of recipients: 54,703 ⑦  Ratio of security alert recipients who download bot-removal tools: 29% 1 2 3 4 8 Cyber Clean Center The Cyber Clean Center is a shared initiative of the Ministry of Internal Affairs and Communications and the Ministry of Economy, Trade and Industry. ①  Total number of specimens collected: 7,673,279 [Specimens, such as bot programs are collected from among the countless (binary files).] ③  Number of unknown specimens : 10,082 [Unique specimens are examined using commercial anti-virus software, then those that are undetectable are separated.] Access Infected PC’s IP list ・ ・ ・ ・ 5 Security alert e-mail 6 Download removal tool 7 Total Downloads of Removal Tools : 385,046
Conventional ways against phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権侵害を理由とする刑事事件・特定電子メール法・ 25 番ポートブロック
Examples against phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Episodes3 Repair or Despair エピソード3    希望か絶望か
Paradigm shift to  Mass Internet society ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],  大衆インターネット社会へのパラダイムシフト ・ジェファーンデモクラシー 自己実現 自己統治 ・「永遠のビギナー」「匿名の卑怯者」
“ Weapon” of Cyber Attack  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is this WAR? ,[object Object],[object Object],[object Object],[object Object]
How to “repair” the Internet ,[object Object],[object Object],[object Object],[object Object]
Rediscover of  Communication sovereign -role of sovereign- ,[object Object],[object Object],[object Object]
concept of proactive defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISP’s issue ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],フィッシングの遮断 ウイルス感染 PC のお知らせ  P2P トラフィックの制限?
ISP against dogma (JP)  “secrecy of communication “ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],通信の秘密のドグマとの闘い ・電気通信事業法4条 ・違法性阻却事由のなかでの活動
Development of Dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ドグマの肥大化 ・通信データへの適用  法執行への制限 匿名性強化 発信者情報開示-無用さ ・ISPへの萎縮効果
Beyond the dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ドグマを超えるために ・米国における提出命令制度・d命令 ・ISPの行為規範
US network and privacy (civil  org.) subpoena (LE) subpoena/ (d)order (civil org.)? (LE) Pen register/Trace Trap Order  ? Aggressive acquisition Communication data (LE) search warrant/subpoena with notice compulsory (LE) Title 3(Interception) 、 FISA (civil org.) Prohibited/ exception (LE) ditto. Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception Network Neutrality Provider exception content disclosure use acquisition Stored communication real time
ISP’s role ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISPの後見人としての役割 ・攻撃トラフィックの遮断 ・フィッシングメールの遮断 ・名誉毀損文言の削除 ・著作権侵害のコントロール LEとの協力
Copyright Guardian? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権制度の擁護者?
ISP’s grief  ,[object Object],[object Object],[object Object],[object Object],[object Object],ISPの悲しみ ・言論の自由の制限のつもりはない ・どのように・何を・コストは誰が
CU @Episode 4  May the Force be with U! どのようなエピソード4を描けるのか

More Related Content

What's hot

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
Aldrin SuperGo
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
Harshita Ved
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
Dr. Arun Verma
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
shiela mae dupa
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And TerrorismKislaychd
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
Assignment Studio
 

What's hot (20)

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
File000146
File000146File000146
File000146
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 

Viewers also liked

Seminare Fridays
Seminare FridaysSeminare Fridays
Seminare Fridays
Hans Leijström
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idag
Hans Leijström
 
Respuesta a necesidades
Respuesta a necesidadesRespuesta a necesidades
Respuesta a necesidadesiejcg
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1iejcg
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarrerasiejcg
 
La Amistad
La AmistadLa Amistad
La Amistadiejcg
 
A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2iejcg
 
Hans Leijström
Hans LeijströmHans Leijström
Hans Leijström
Hans Leijström
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community Klassificering
Hans Leijström
 

Viewers also liked (9)

Seminare Fridays
Seminare FridaysSeminare Fridays
Seminare Fridays
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idag
 
Respuesta a necesidades
Respuesta a necesidadesRespuesta a necesidades
Respuesta a necesidades
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarreras
 
La Amistad
La AmistadLa Amistad
La Amistad
 
A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2
 
Hans Leijström
Hans LeijströmHans Leijström
Hans Leijström
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community Klassificering
 

Similar to Security Wars

Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
Ikuo Takahashi
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
Vishni Ganepola
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
Olusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
kamalbhatt9229
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
wremes
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
Vi Tính Hoàng Nam
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
Tushar B Kute
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
Peter Timusk
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 

Similar to Security Wars (20)

Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

More from Ikuo Takahashi

ACDPub.pptx
ACDPub.pptxACDPub.pptx
ACDPub.pptx
Ikuo Takahashi
 
Ikuo0823.pdf
Ikuo0823.pdfIkuo0823.pdf
Ikuo0823.pdf
Ikuo Takahashi
 
Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法
Ikuo Takahashi
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection
Ikuo Takahashi
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
Ikuo Takahashi
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
Ikuo Takahashi
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
Ikuo Takahashi
 
20slide0306
20slide030620slide0306
20slide0306
Ikuo Takahashi
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi case
Ikuo Takahashi
 
Ikuoedisclosure Uk
Ikuoedisclosure UkIkuoedisclosure Uk
Ikuoedisclosure Uk
Ikuo Takahashi
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
Ikuo Takahashi
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
Ikuo Takahashi
 

More from Ikuo Takahashi (12)

ACDPub.pptx
ACDPub.pptxACDPub.pptx
ACDPub.pptx
 
Ikuo0823.pdf
Ikuo0823.pdfIkuo0823.pdf
Ikuo0823.pdf
 
Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
20slide0306
20slide030620slide0306
20slide0306
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi case
 
Ikuoedisclosure Uk
Ikuoedisclosure UkIkuoedisclosure Uk
Ikuoedisclosure Uk
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Security Wars

  • 1. Security Wars Ikuo Takahashi
  • 2. A long time ago in a network far ,far away The word “hacker”used to be a respectful word for the master of computer.However many hackers fell into the Dark World led by dark side of their power-anger, exhibitionism and temporary joy. Internet has been messed up by the unprecedented attacks from people who covet the Internet by lust, people who impose on others for economic interests, people who juggle with the bot. This "Saga" is about the epic of the battle with the society, Engineers who crossed the line of social activity, and ISP who stand up against the messed up Internet. ……………… .. ハッカーは、選ばれし者。 多数の者が、怒り、自己顕示欲、楽しみのために堕ちていった。 社会は、暗黒の技術者と永遠の初心者からネットワークを 守る決心をした。
  • 3.
  • 4. Episode 1 Dark Side of Hackers エピソートⅠ ハッカーと暗黒面
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Outline of the Partnership Reporting Receiving Organization Discoverer (JPCERT/CC) Coordinating Organizations Notification Users [Web Applications] Reporting Notification [Software Products] Vendors Coordination Website Operation Manager Foreign CERTs System Integrators Coordinate SPREAD Publicity Portal Site (JPN: JP Vendor Status Notes) Publicity* (IPA) (IPA) Analysis Analyzing Organization - Governments - Companies - Individuals *: When personal data has leaked.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Sec Wars Episode2 Attack of anonymous troops エピソード2 匿名軍団の攻撃
  • 26.
  • 27.
  • 28.
  • 29. ISP’s Network Management Honey Pot ② infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
  • 30. Measure Site Honey pots PCs infected by Bot Programs ・・ ・・ Analysis of source attacking ISP !! Making removal tool 【 CCC Cleaner 】 Analysis Isolation Cyber Clean Center ② Number of unique specimens : 215,338 [Since a number of the specimens collected are the same, those that are identical in size and external characteristics are removed to separate unique specimens (binary files).] ④ Number of specimens reflected in removal tools: 7,833 [Unknown specimens are analyzed to create bot removal tools for those that are high-risk and currently infecting many PCs.] ⑤ Bot-removal tools Updated: 61 times [Bot-removal tools are updated every week.] ⑥ Security alerts: 232,487 times [This is the number of security alerts that cooperating ISPs provided to infected users.] Number of recipients: 54,703 ⑦ Ratio of security alert recipients who download bot-removal tools: 29% 1 2 3 4 8 Cyber Clean Center The Cyber Clean Center is a shared initiative of the Ministry of Internal Affairs and Communications and the Ministry of Economy, Trade and Industry. ① Total number of specimens collected: 7,673,279 [Specimens, such as bot programs are collected from among the countless (binary files).] ③ Number of unknown specimens : 10,082 [Unique specimens are examined using commercial anti-virus software, then those that are undetectable are separated.] Access Infected PC’s IP list ・ ・ ・ ・ 5 Security alert e-mail 6 Download removal tool 7 Total Downloads of Removal Tools : 385,046
  • 31.
  • 32.
  • 33. Episodes3 Repair or Despair エピソード3    希望か絶望か
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. US network and privacy (civil org.) subpoena (LE) subpoena/ (d)order (civil org.)? (LE) Pen register/Trace Trap Order ? Aggressive acquisition Communication data (LE) search warrant/subpoena with notice compulsory (LE) Title 3(Interception) 、 FISA (civil org.) Prohibited/ exception (LE) ditto. Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception Network Neutrality Provider exception content disclosure use acquisition Stored communication real time
  • 45.
  • 46.
  • 47.
  • 48. CU @Episode 4 May the Force be with U! どのようなエピソード4を描けるのか