SlideShare a Scribd company logo
Security Wars episode 3  Revenge of Myth.   Ikuo Takahashi
A long time ago in a  network far ,far away Internet has been messed up by the  unprecedented  attacks from people who  covet  the Internet by lust, people who impose on  others for economic interests, people who juggle with the bot. The society has made up the mind to defend the Internet. However, conventional law  enforcement measures are  useless against organized attack such as phishing and botnet. Is messed up Internet dying to Wild World Web? How can we repair the Internet ? ……………… ..
previously Security Wars ,[object Object],[object Object],[object Object],エピソートⅠ 闇に堕ちたハッカー
Sec Wars Episode 2 Attack of  anonymous troops エピソード2 匿名軍団の攻撃
Anonymous Troops ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],匿名軍団 ・匿名BBS ・ボットネット
Change of backgrounds  of Cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],サイバー犯罪の組織化・金銭目的化・国際化
Order 66 vs ”Bot net” Order ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order “Bot Net” & ISP’s Network Management Honey Pot ②  infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
Dark side of Web 2.0 ,[object Object],[object Object],cannot be defraud defraud
Conventional ways  against phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権侵害を理由とする刑事事件・特定電子メール法
Actual cases 1 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Actual cases 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],組織犯罪としてのフィッシング
Limitation of conventional measure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Episodes3 Revenge of Myth. エピソード3    通信の秘密の足かせ
Paradigm shift to  Mass Internet society ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],  大衆インターネット社会へのパラダイムシフト ・ジェファーンデモクラシー 自己実現 自己統治 ・「永遠のビギナー」「匿名の卑怯者」
Defend “Innocent User (Forever Beginner)” ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ Weapon” of Cyber Attack  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is this WAR? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to “repair” the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions from War against ” furikome  – fraud ” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions from War against  ” furikome  – fraud ”  legal aspect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Other Star Wars concept ,[object Object],[object Object]
Rediscover of  Communication sovereign -role of sovereign- ,[object Object],[object Object],[object Object]
Inspection of border ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concept of proactive defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISP against Myth.-dogma (JP)  “secrecy of communication “ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],通信の秘密のドグマとの闘い ・電気通信事業法4条 ・違法性阻却事由のなかでの活動
Development of Dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ドグマの肥大化 ・通信データへの適用  法執行への制限 匿名性強化 発信者情報開示-無用さ ・ISPへの萎縮効果
Two aspects of  Secrecy of Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],追跡可能性と伝達の保証
Traceability ,[object Object],[object Object],[object Object]
Traceability -Beyond the dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],追跡可能性におけるドグマを超えるために ・米国における提出命令制度・d命令 ・ISPの行為規範
US network and privacy real time Stored communication acquisition use disclosure content Provider exception Network Neutrality Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception (civil org.) Prohibited/ exception (LE) ditto. compulsory (LE) Title 3(Interception) 、 FISA (LE) search warrant/subpoena with notice Communication data Aggressive acquisition ? (civil org.)? (LE) Pen register/Trace Trap Order  (civil  org.) subpoena (LE) subpoena/ (d)order
ISP’s cooperation ,[object Object],[object Object],[object Object],ISPとLEとの協力
Against illegal/inappropriate traffic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Framework against illegal / inappropriate information against public order misc illegal  infringing right harmful to  juvenile ISP may delete on contract. disclose suicide information filtering by disclose of sender ISP may delete on contract. ISP may delete on contract. illegal inappropriate
ISP’s issue  against illegal traffic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],フィッシングの遮断 ウイルス感染 PC のお知らせ  P2P トラフィックの制限?
“ Revenge” of secrecy of communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interpretation of secrecy of communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More burden ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Guardian? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権制度の擁護者?
ISP’s grief  ,[object Object],[object Object],[object Object],[object Object],ISPの悲しみ ・言論の自由の制限のつもりはない ・どのように・何を・コストは誰が Does not intend to regulate “Freedom of speech” concepts How to control? What control? Who control? Who pay for costs?
CU @Episode 4  May the Force be with U! どのようなエピソード4を描けるのか

More Related Content

What's hot

Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
Niti Dhruva
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
Jacqueline Fick
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market Place
Wojciech Filipkowski
 
Ukraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyUkraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and Privacy
Axon.Partners
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
Raunaq Jaiswal
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
Ralph Schumann
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
mmavis
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber law
Cyber lawCyber law
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Mayank Garg
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
Ikuo Takahashi
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 
Computer crime
 Computer crime Computer crime
Computer crime
Anika Rahman Orin
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
IPPAI
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolution
internetbar
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
solomon24
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 

What's hot (20)

Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market Place
 
Ukraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyUkraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and Privacy
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law
Cyber lawCyber law
Cyber law
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolution
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Viewers also liked

Ikuoedisclosure Uk
Ikuoedisclosure UkIkuoedisclosure Uk
Ikuoedisclosure Uk
Ikuo Takahashi
 
A2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personalA2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personal
iejcg
 
Hans Leijström
Hans LeijströmHans Leijström
Hans Leijström
Hans Leijström
 
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Darrell Jordan-Smith
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community Klassificering
Hans Leijström
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarreras
iejcg
 
Tudeseo
TudeseoTudeseo
Tudeseo
iejcg
 
Solo Llamame
Solo LlamameSolo Llamame
Solo Llamameiejcg
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1
iejcg
 
Ser Amigo Es..
Ser Amigo Es..Ser Amigo Es..
Ser Amigo Es..
iejcg
 
Vuelode Gansos
Vuelode GansosVuelode Gansos
Vuelode Gansos
iejcg
 
Seminare Fridays
Seminare FridaysSeminare Fridays
Seminare Fridays
Hans Leijström
 
La Amistad
La AmistadLa Amistad
La Amistad
iejcg
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idag
Hans Leijström
 
14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )mr.green die
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
Ikuo Takahashi
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing
Darrell Jordan-Smith
 

Viewers also liked (17)

Ikuoedisclosure Uk
Ikuoedisclosure UkIkuoedisclosure Uk
Ikuoedisclosure Uk
 
A2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personalA2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personal
 
Hans Leijström
Hans LeijströmHans Leijström
Hans Leijström
 
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community Klassificering
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarreras
 
Tudeseo
TudeseoTudeseo
Tudeseo
 
Solo Llamame
Solo LlamameSolo Llamame
Solo Llamame
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1
 
Ser Amigo Es..
Ser Amigo Es..Ser Amigo Es..
Ser Amigo Es..
 
Vuelode Gansos
Vuelode GansosVuelode Gansos
Vuelode Gansos
 
Seminare Fridays
Seminare FridaysSeminare Fridays
Seminare Fridays
 
La Amistad
La AmistadLa Amistad
La Amistad
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idag
 
14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing
 

Similar to Sec Wars Episode 3

Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
samuelrajueda
 
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
patricke8
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rajat Jain
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
infantemiliya
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ranjana Adhikari
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
kamalbhatt9229
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
Olusegun Mosugu
 
Polinter11
Polinter11Polinter11
Polinter11
Jeffrey Hart
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Renu Verma
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
Shatakshi Goswami
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
anitramcroberts
 

Similar to Sec Wars Episode 3 (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
Polinter11
Polinter11Polinter11
Polinter11
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
 

More from Ikuo Takahashi

ACDPub.pptx
ACDPub.pptxACDPub.pptx
ACDPub.pptx
Ikuo Takahashi
 
Ikuo0823.pdf
Ikuo0823.pdfIkuo0823.pdf
Ikuo0823.pdf
Ikuo Takahashi
 
Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法
Ikuo Takahashi
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection
Ikuo Takahashi
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
Ikuo Takahashi
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
Ikuo Takahashi
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
Ikuo Takahashi
 
20slide0306
20slide030620slide0306
20slide0306
Ikuo Takahashi
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi case
Ikuo Takahashi
 

More from Ikuo Takahashi (9)

ACDPub.pptx
ACDPub.pptxACDPub.pptx
ACDPub.pptx
 
Ikuo0823.pdf
Ikuo0823.pdfIkuo0823.pdf
Ikuo0823.pdf
 
Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
20slide0306
20slide030620slide0306
20slide0306
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi case
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

Sec Wars Episode 3

  • 1. Security Wars episode 3 Revenge of Myth. Ikuo Takahashi
  • 2. A long time ago in a network far ,far away Internet has been messed up by the unprecedented attacks from people who covet the Internet by lust, people who impose on others for economic interests, people who juggle with the bot. The society has made up the mind to defend the Internet. However, conventional law enforcement measures are useless against organized attack such as phishing and botnet. Is messed up Internet dying to Wild World Web? How can we repair the Internet ? ……………… ..
  • 3.
  • 4. Sec Wars Episode 2 Attack of anonymous troops エピソード2 匿名軍団の攻撃
  • 5.
  • 6.
  • 7.
  • 8. Order “Bot Net” & ISP’s Network Management Honey Pot ② infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Episodes3 Revenge of Myth. エピソード3    通信の秘密の足かせ
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. US network and privacy real time Stored communication acquisition use disclosure content Provider exception Network Neutrality Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception (civil org.) Prohibited/ exception (LE) ditto. compulsory (LE) Title 3(Interception) 、 FISA (LE) search warrant/subpoena with notice Communication data Aggressive acquisition ? (civil org.)? (LE) Pen register/Trace Trap Order (civil org.) subpoena (LE) subpoena/ (d)order
  • 32.
  • 33.
  • 34. Framework against illegal / inappropriate information against public order misc illegal infringing right harmful to juvenile ISP may delete on contract. disclose suicide information filtering by disclose of sender ISP may delete on contract. ISP may delete on contract. illegal inappropriate
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. CU @Episode 4 May the Force be with U! どのようなエピソード4を描けるのか