SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Global Perspectives on
                                   Cybercrime
                                             Eddan Katz
                                    International Affairs Director
                                   Electronic Frontier Foundation

                                  Thai Netizen Network Public Forum
                                         Bangkok, Thailand
                                             July 27, 2009



Wednesday, December 29, 2010                                          1
International Efforts to
                               Harmonize Cybercrime
                  • Council of Europe (CoE): Conference on Criminological Aspects of
                       Economic Crime - Strasbourg (1976)

                  • U.S. Justice Department: Criminal Justice Resource Manual (1979)
                  • First Interpol Training Seminar for Investigators of Computer Crime -
                       Paris (1981)

                  • Organization for Economic Cooperation and Development (OECD):
                       Committee for Information and Communications Policy (ICCP)
                       Recommendations (1986)

                  • G-8 Senior Experts on Transnational Organized Crime: High Tech
                       Subgroup (1998)

                  • Association of Southeast Asian Nations (ASEAN): Ministerial Meeting on
                       Transnational Crime (AMMTC) (2004)

                  • International Telecommunications Union (ITU) Global Cybersecurity
                       Agenda (2007)

Wednesday, December 29, 2010                                                                 2
Defining Cybercrime
                  • Computer Crime
                         • “any illegal act for which knowledge of computer technology is essential for a successful
                               prosecution.” US DoJ


                         • “any illegal, unethical or unauthorized behavior relating to the automatic processing and the
                               transmission of data.” OECD Rec.



                  • updating technical means of prosecuting
                       existing crimes committed using a computer

                  • new crimes where computer is object of crime
                  • Internet Jurisdiction

Wednesday, December 29, 2010                                                                                               3
Unauthorized Access
                  • define a computer system as a protected
                       environment and make control of access to this
                       environment a protected right

                  • normal operations and exceptions
                         • Security Research
                         • Quality Assurance
                         • Lack of harm or damage
                         • Legitimate Use
                         • Anti-Competitive Behavior


Wednesday, December 29, 2010                                            4
Mens Rea: Guilty Mind
                  • automation of processing and transmission
                  • complex operation of computer systems
                  • computer as subject of crime
                         • Worms - viruses that self-replicate

                         • Trojan Horses - contain hidden malicious code

                         • Logic Bombs - activate at specific time

                         • Sniffers - network analyzers

                  • functionality of code lacks specific intent

Wednesday, December 29, 2010                                               5
Convention on Cybercrime
                  • Illegal Access - infringing security measures, intent of obtaining data

                  • Illegal Interception - interception, without right, by technical means, of
                       non-public transmission

                  • Data Interference - damage, deletion, deterioration, alteration, suppression

                  • System Interference - inputting, transmitting, damaging, deleting,
                       deteriorating, altering, or suppressing

                  • Misuse of Devices - production, sale, procurement for use, import,
                       distribution, making available; designed or adapted primarily for offense

                  • Computer-Related Forgery - inauthentic data, intent to defraud

                  • Computer-related Fraud - causing of a loss of property to another person

Wednesday, December 29, 2010                                                                       6
CoE Cybercrime Convention
                   Explanatory Report
                  • legitimate and common activities inherent in the design of networks, or
                       legitimate and common operating or commercial practices should not be
                       criminalized. (38)

                  • must be the specific (i.e. direct) intent that the device is used for the
                       purpose of committing any of the offences. (76)

                  • Liability arises for aiding or abetting where the person who commits a
                       crime established in the Convention is aided by another person who also
                       intends that the crime be committed. (119)

                  • there is no duty on a service provider to actively monitor content to avoid
                       criminal liability under this provision. (119)

                  • A service provider does not incur liability by virtue of the fact that a crime
                       was committed on its system by a customer, user or other third person,
                       because the term "acting under its authority" applies exclusively to
                       employees and agents acting within the scope of their authority. (125)



Wednesday, December 29, 2010                                                                         7
Guidelines for the Cooperation between Law
                Enforcement and Internet Service Providers Against
                      Cybercrime - Council of Europe (2008)

                  • written procedures, information sharing, culture of cooperation, formal
                       partnerships (10-13)

                  • protect fundamental rights of citizens - civil, political, & human rights (14)

                  • enforcing domestic & international data protection & privacy (15)

                  • procedures, training, technical resources, designated personnel (17-21)

                  • standardizing requests, specificity and accuracy requirements (25-27)

                  • ISPs encouraged to report offenses. not obligated to monitor (42)

                  • ensure that customer data and personal information not disclosed (51-52)



Wednesday, December 29, 2010                                                                         8
Information Intermediaries
                  • Hosting Providers
                  • Internet Service        • Search Engines
                       Providers
                                            • Participative Web
                                              Platforms
                  •    Domain Name
                       Registrars
                                            • Virtual Worlds
                  • Financial               • Distributed Computing
                       Intermediaries

                  • Auction Platforms and   • Social Networks
                       eCommerce actors

Wednesday, December 29, 2010                                          9
Privacy
                  • Notice/Disclosure/Collection
                  • Choice/Consent
                  • Access
                  • Security/Integrity
                  • Enforcement/Redress
                         • mandatory disclosure of personal information
                         • public-private space distinction
                         • content of communications
                         • specificity of warrant


Wednesday, December 29, 2010                                              10
Access to Knowledge

                  • Innovation
                         • Open Infrastructure
                         • Collaborative Production
                  • Development
                         • Economic Growth
                         • Individual Autonomy

Wednesday, December 29, 2010                          11
Open Innovation

                  • End-to-End Principle   • Granularity

                  • Interoperability       • Freedom to Tinker

                  • Creative Destruction   • Distributed
                                             Responsibility
                  • Level Playing Field    • Self-Organizing
                                             Community
                  •    Collaborative
                       Production
                                           • Reputation Economies
                  • Modularity             • Correctability

Wednesday, December 29, 2010                                        12
Domestic Economic Growth

                  • Translation
                  • Adaptability to Local Customs
                  • Network Effects
                  • Open Standards
                  • Skill Development


Wednesday, December 29, 2010                        13
Thank you.



                  • Eddan Katz
                         • eddan@eff.org




Wednesday, December 29, 2010                    14

Más contenido relacionado

Destacado

Destacado (6)

Omni Channel Fundraising- 2014
Omni Channel Fundraising- 2014Omni Channel Fundraising- 2014
Omni Channel Fundraising- 2014
 
Zehren, Peter Management Lessons
Zehren, Peter Management LessonsZehren, Peter Management Lessons
Zehren, Peter Management Lessons
 
Peter Zehren.BD DVSTY & RV-5.21.15
Peter Zehren.BD DVSTY & RV-5.21.15Peter Zehren.BD DVSTY & RV-5.21.15
Peter Zehren.BD DVSTY & RV-5.21.15
 
Copyrightcontraband
CopyrightcontrabandCopyrightcontraband
Copyrightcontraband
 
Peter Zehren, Amazon Headwaters Expedition
Peter Zehren, Amazon Headwaters ExpeditionPeter Zehren, Amazon Headwaters Expedition
Peter Zehren, Amazon Headwaters Expedition
 
Handboek operationele interne logistiek, hoofdstuk 8
Handboek operationele interne logistiek, hoofdstuk 8Handboek operationele interne logistiek, hoofdstuk 8
Handboek operationele interne logistiek, hoofdstuk 8
 

Similar a Global Perspectives on Cybercrime

Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
OTC Data Mining Anomaly Detection Methods
OTC Data Mining Anomaly Detection MethodsOTC Data Mining Anomaly Detection Methods
OTC Data Mining Anomaly Detection MethodsTECHdotMN
 
Forensics intro
Forensics introForensics intro
Forensics introtest tt
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynetsRasool Irfan
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Network security
Network securityNetwork security
Network securityhajra azam
 

Similar a Global Perspectives on Cybercrime (20)

Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Lecture5
Lecture5Lecture5
Lecture5
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
OTC Data Mining Anomaly Detection Methods
OTC Data Mining Anomaly Detection MethodsOTC Data Mining Anomaly Detection Methods
OTC Data Mining Anomaly Detection Methods
 
Forensics intro
Forensics introForensics intro
Forensics intro
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber law
Cyber lawCyber law
Cyber law
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Network security
Network securityNetwork security
Network security
 
180 184
180 184180 184
180 184
 

Más de Eddan Katz

Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslidesEddan Katz
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTAEddan Katz
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaEddan Katz
 
Eddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdataEddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdataEddan Katz
 
Eddankatz democratic culture_freecultureforum_slides
Eddankatz democratic culture_freecultureforum_slidesEddankatz democratic culture_freecultureforum_slides
Eddankatz democratic culture_freecultureforum_slidesEddan Katz
 
Copyrightcontraband cepe2007
Copyrightcontraband cepe2007Copyrightcontraband cepe2007
Copyrightcontraband cepe2007Eddan Katz
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1Eddan Katz
 

Más de Eddan Katz (10)

Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslides
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTA
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
 
Eddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdataEddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdata
 
Eddankatz democratic culture_freecultureforum_slides
Eddankatz democratic culture_freecultureforum_slidesEddankatz democratic culture_freecultureforum_slides
Eddankatz democratic culture_freecultureforum_slides
 
Copyrightcontraband cepe2007
Copyrightcontraband cepe2007Copyrightcontraband cepe2007
Copyrightcontraband cepe2007
 
A2krussia
A2krussiaA2krussia
A2krussia
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1
 
A2k rit
A2k ritA2k rit
A2k rit
 

Global Perspectives on Cybercrime

  • 1. Global Perspectives on Cybercrime Eddan Katz International Affairs Director Electronic Frontier Foundation Thai Netizen Network Public Forum Bangkok, Thailand July 27, 2009 Wednesday, December 29, 2010 1
  • 2. International Efforts to Harmonize Cybercrime • Council of Europe (CoE): Conference on Criminological Aspects of Economic Crime - Strasbourg (1976) • U.S. Justice Department: Criminal Justice Resource Manual (1979) • First Interpol Training Seminar for Investigators of Computer Crime - Paris (1981) • Organization for Economic Cooperation and Development (OECD): Committee for Information and Communications Policy (ICCP) Recommendations (1986) • G-8 Senior Experts on Transnational Organized Crime: High Tech Subgroup (1998) • Association of Southeast Asian Nations (ASEAN): Ministerial Meeting on Transnational Crime (AMMTC) (2004) • International Telecommunications Union (ITU) Global Cybersecurity Agenda (2007) Wednesday, December 29, 2010 2
  • 3. Defining Cybercrime • Computer Crime • “any illegal act for which knowledge of computer technology is essential for a successful prosecution.” US DoJ • “any illegal, unethical or unauthorized behavior relating to the automatic processing and the transmission of data.” OECD Rec. • updating technical means of prosecuting existing crimes committed using a computer • new crimes where computer is object of crime • Internet Jurisdiction Wednesday, December 29, 2010 3
  • 4. Unauthorized Access • define a computer system as a protected environment and make control of access to this environment a protected right • normal operations and exceptions • Security Research • Quality Assurance • Lack of harm or damage • Legitimate Use • Anti-Competitive Behavior Wednesday, December 29, 2010 4
  • 5. Mens Rea: Guilty Mind • automation of processing and transmission • complex operation of computer systems • computer as subject of crime • Worms - viruses that self-replicate • Trojan Horses - contain hidden malicious code • Logic Bombs - activate at specific time • Sniffers - network analyzers • functionality of code lacks specific intent Wednesday, December 29, 2010 5
  • 6. Convention on Cybercrime • Illegal Access - infringing security measures, intent of obtaining data • Illegal Interception - interception, without right, by technical means, of non-public transmission • Data Interference - damage, deletion, deterioration, alteration, suppression • System Interference - inputting, transmitting, damaging, deleting, deteriorating, altering, or suppressing • Misuse of Devices - production, sale, procurement for use, import, distribution, making available; designed or adapted primarily for offense • Computer-Related Forgery - inauthentic data, intent to defraud • Computer-related Fraud - causing of a loss of property to another person Wednesday, December 29, 2010 6
  • 7. CoE Cybercrime Convention Explanatory Report • legitimate and common activities inherent in the design of networks, or legitimate and common operating or commercial practices should not be criminalized. (38) • must be the specific (i.e. direct) intent that the device is used for the purpose of committing any of the offences. (76) • Liability arises for aiding or abetting where the person who commits a crime established in the Convention is aided by another person who also intends that the crime be committed. (119) • there is no duty on a service provider to actively monitor content to avoid criminal liability under this provision. (119) • A service provider does not incur liability by virtue of the fact that a crime was committed on its system by a customer, user or other third person, because the term "acting under its authority" applies exclusively to employees and agents acting within the scope of their authority. (125) Wednesday, December 29, 2010 7
  • 8. Guidelines for the Cooperation between Law Enforcement and Internet Service Providers Against Cybercrime - Council of Europe (2008) • written procedures, information sharing, culture of cooperation, formal partnerships (10-13) • protect fundamental rights of citizens - civil, political, & human rights (14) • enforcing domestic & international data protection & privacy (15) • procedures, training, technical resources, designated personnel (17-21) • standardizing requests, specificity and accuracy requirements (25-27) • ISPs encouraged to report offenses. not obligated to monitor (42) • ensure that customer data and personal information not disclosed (51-52) Wednesday, December 29, 2010 8
  • 9. Information Intermediaries • Hosting Providers • Internet Service • Search Engines Providers • Participative Web Platforms • Domain Name Registrars • Virtual Worlds • Financial • Distributed Computing Intermediaries • Auction Platforms and • Social Networks eCommerce actors Wednesday, December 29, 2010 9
  • 10. Privacy • Notice/Disclosure/Collection • Choice/Consent • Access • Security/Integrity • Enforcement/Redress • mandatory disclosure of personal information • public-private space distinction • content of communications • specificity of warrant Wednesday, December 29, 2010 10
  • 11. Access to Knowledge • Innovation • Open Infrastructure • Collaborative Production • Development • Economic Growth • Individual Autonomy Wednesday, December 29, 2010 11
  • 12. Open Innovation • End-to-End Principle • Granularity • Interoperability • Freedom to Tinker • Creative Destruction • Distributed Responsibility • Level Playing Field • Self-Organizing Community • Collaborative Production • Reputation Economies • Modularity • Correctability Wednesday, December 29, 2010 12
  • 13. Domestic Economic Growth • Translation • Adaptability to Local Customs • Network Effects • Open Standards • Skill Development Wednesday, December 29, 2010 13
  • 14. Thank you. • Eddan Katz • eddan@eff.org Wednesday, December 29, 2010 14