SlideShare una empresa de Scribd logo
1 de 41
Security Wars episode 3  Revenge of Myth.   Ikuo Takahashi
A long time ago in a  network far ,far away Internet has been messed up by the  unprecedented  attacks from people who  covet  the Internet by lust, people who impose on  others for economic interests, people who juggle with the bot. The society has made up the mind to defend the Internet. However, conventional law  enforcement measures are  useless against organized attack such as phishing and botnet. Is messed up Internet dying to Wild World Web? How can we repair the Internet ? ……………… ..
previously Security Wars ,[object Object],[object Object],[object Object],エピソートⅠ 闇に堕ちたハッカー
Sec Wars Episode 2 Attack of  anonymous troops エピソード2 匿名軍団の攻撃
Anonymous Troops ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],匿名軍団 ・匿名BBS ・ボットネット
Change of backgrounds  of Cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],サイバー犯罪の組織化・金銭目的化・国際化
Order 66 vs ”Bot net” Order ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order “Bot Net” & ISP’s Network Management Honey Pot ②  infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
Dark side of Web 2.0 ,[object Object],[object Object],cannot be defraud defraud
Conventional ways  against phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権侵害を理由とする刑事事件・特定電子メール法
Actual cases 1 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Actual cases 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],組織犯罪としてのフィッシング
Limitation of conventional measure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Episodes3 Revenge of Myth. エピソード3    通信の秘密の足かせ
Paradigm shift to  Mass Internet society ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],  大衆インターネット社会へのパラダイムシフト ・ジェファーンデモクラシー 自己実現 自己統治 ・「永遠のビギナー」「匿名の卑怯者」
Defend “Innocent User (Forever Beginner)” ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ Weapon” of Cyber Attack  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is this WAR? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to “repair” the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions from War against ” furikome  – fraud ” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions from War against  ” furikome  – fraud ”  legal aspect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Other Star Wars concept ,[object Object],[object Object]
Rediscover of  Communication sovereign -role of sovereign- ,[object Object],[object Object],[object Object]
Inspection of border ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concept of proactive defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISP against Myth.-dogma (JP)  “secrecy of communication “ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],通信の秘密のドグマとの闘い ・電気通信事業法4条 ・違法性阻却事由のなかでの活動
Development of Dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ドグマの肥大化 ・通信データへの適用  法執行への制限 匿名性強化 発信者情報開示-無用さ ・ISPへの萎縮効果
Two aspects of  Secrecy of Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],追跡可能性と伝達の保証
Traceability ,[object Object],[object Object],[object Object]
Traceability -Beyond the dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],追跡可能性におけるドグマを超えるために ・米国における提出命令制度・d命令 ・ISPの行為規範
US network and privacy real time Stored communication acquisition use disclosure content Provider exception Network Neutrality Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception (civil org.) Prohibited/ exception (LE) ditto. compulsory (LE) Title 3(Interception) 、 FISA (LE) search warrant/subpoena with notice Communication data Aggressive acquisition ? (civil org.)? (LE) Pen register/Trace Trap Order  (civil  org.) subpoena (LE) subpoena/ (d)order
ISP’s cooperation ,[object Object],[object Object],[object Object],ISPとLEとの協力
Against illegal/inappropriate traffic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Framework against illegal / inappropriate information against public order misc illegal  infringing right harmful to  juvenile ISP may delete on contract. disclose suicide information filtering by disclose of sender ISP may delete on contract. ISP may delete on contract. illegal inappropriate
ISP’s issue  against illegal traffic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],フィッシングの遮断 ウイルス感染 PC のお知らせ  P2P トラフィックの制限?
“ Revenge” of secrecy of communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interpretation of secrecy of communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More burden ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Guardian? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権制度の擁護者?
ISP’s grief  ,[object Object],[object Object],[object Object],[object Object],ISPの悲しみ ・言論の自由の制限のつもりはない ・どのように・何を・コストは誰が Does not intend to regulate “Freedom of speech” concepts How to control? What control? Who control? Who pay for costs?
CU @Episode 4  May the Force be with U! どのようなエピソード4を描けるのか

Más contenido relacionado

La actualidad más candente

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market PlaceWojciech Filipkowski
 
Ukraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyUkraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyAxon.Partners
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as publishedRalph Schumann
 
Dubai 2
Dubai 2Dubai 2
Dubai 2mmavis
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolutioninternetbar
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

La actualidad más candente (20)

Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market Place
 
Ukraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyUkraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and Privacy
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law
Cyber lawCyber law
Cyber law
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolution
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Destacado

A2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personalA2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personaliejcg
 
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Darrell Jordan-Smith
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community KlassificeringHans Leijström
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarrerasiejcg
 
Tudeseo
TudeseoTudeseo
Tudeseoiejcg
 
Solo Llamame
Solo LlamameSolo Llamame
Solo Llamameiejcg
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1iejcg
 
Ser Amigo Es..
Ser Amigo Es..Ser Amigo Es..
Ser Amigo Es..iejcg
 
Vuelode Gansos
Vuelode GansosVuelode Gansos
Vuelode Gansosiejcg
 
La Amistad
La AmistadLa Amistad
La Amistadiejcg
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idagHans Leijström
 
14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )mr.green die
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal IssuesIkuo Takahashi
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingDarrell Jordan-Smith
 

Destacado (17)

Ikuoedisclosure Uk
Ikuoedisclosure UkIkuoedisclosure Uk
Ikuoedisclosure Uk
 
A2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personalA2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personal
 
Hans Leijström
Hans LeijströmHans Leijström
Hans Leijström
 
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community Klassificering
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarreras
 
Tudeseo
TudeseoTudeseo
Tudeseo
 
Solo Llamame
Solo LlamameSolo Llamame
Solo Llamame
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1
 
Ser Amigo Es..
Ser Amigo Es..Ser Amigo Es..
Ser Amigo Es..
 
Vuelode Gansos
Vuelode GansosVuelode Gansos
Vuelode Gansos
 
Seminare Fridays
Seminare FridaysSeminare Fridays
Seminare Fridays
 
La Amistad
La AmistadLa Amistad
La Amistad
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idag
 
14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing
 

Similar a Sec Wars Episode 3

Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxpatricke8
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxanitramcroberts
 

Similar a Sec Wars Episode 3 (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Polinter11
Polinter11Polinter11
Polinter11
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
 

Más de Ikuo Takahashi

Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Ikuo Takahashi
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Ikuo Takahashi
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?Ikuo Takahashi
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseIkuo Takahashi
 

Más de Ikuo Takahashi (9)

ACDPub.pptx
ACDPub.pptxACDPub.pptx
ACDPub.pptx
 
Ikuo0823.pdf
Ikuo0823.pdfIkuo0823.pdf
Ikuo0823.pdf
 
Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
20slide0306
20slide030620slide0306
20slide0306
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi case
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Sec Wars Episode 3

  • 1. Security Wars episode 3 Revenge of Myth. Ikuo Takahashi
  • 2. A long time ago in a network far ,far away Internet has been messed up by the unprecedented attacks from people who covet the Internet by lust, people who impose on others for economic interests, people who juggle with the bot. The society has made up the mind to defend the Internet. However, conventional law enforcement measures are useless against organized attack such as phishing and botnet. Is messed up Internet dying to Wild World Web? How can we repair the Internet ? ……………… ..
  • 3.
  • 4. Sec Wars Episode 2 Attack of anonymous troops エピソード2 匿名軍団の攻撃
  • 5.
  • 6.
  • 7.
  • 8. Order “Bot Net” & ISP’s Network Management Honey Pot ② infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Episodes3 Revenge of Myth. エピソード3    通信の秘密の足かせ
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. US network and privacy real time Stored communication acquisition use disclosure content Provider exception Network Neutrality Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception (civil org.) Prohibited/ exception (LE) ditto. compulsory (LE) Title 3(Interception) 、 FISA (LE) search warrant/subpoena with notice Communication data Aggressive acquisition ? (civil org.)? (LE) Pen register/Trace Trap Order (civil org.) subpoena (LE) subpoena/ (d)order
  • 32.
  • 33.
  • 34. Framework against illegal / inappropriate information against public order misc illegal infringing right harmful to juvenile ISP may delete on contract. disclose suicide information filtering by disclose of sender ISP may delete on contract. ISP may delete on contract. illegal inappropriate
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. CU @Episode 4 May the Force be with U! どのようなエピソード4を描けるのか