SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
Belgian Senate
Brussels, 14 March 2014
Luc Beirens
Federal Computer Crime Unit
1101011001110110110011010100010
Give input for reflexions
on judicial action on social media
Why we need new solutions
Even in an era of NSA ...
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Judicial actions
 Basic principles of police interventions
 Pre digital era methods
 Footprint & digital footprint
 Digital era impact on police methods
 Problems
 Solutions
(c) 2014 Luc Beirens - Federal Computer Crime Unit
Detect & stop crime
Gather evidence
Identify and arrest criminal(s)
Bring him to court
Execute court decisions
(c) 2014 Luc Beirens - Federal Computer Crime Unit
(c) 2014 Luc Beirens - Federal Computer Crime Unit
To maintain law and order in cyberspace
 Detect crime in cyberspace ?
=> patrolling => Privacy intrusion ?
 Identify users (criminals, victims) in cyberspace
 Locate communications geographically and in time
 Identify correspondents => contact network
 Gather and analyse electronic evidence
 Protect ourselves and methods
 Enforce court decisions also in cyberspace
Legality
• Police action must be based on legal provisions
(general law / police specific law)
Loyalty
• Whenever in action :
give proof of your quality as policeman
except when legally allowed not to do so
(c) 2014 Luc Beirens - Federal Computer Crime Unit
Goals of criminals Money
Power / influence
Banks /
moneytransport
Merchants / politicians
Activities Traces Police methods
-Meeting crime
partners
-Search victims
-Reconnaissance
-Perpetrate crime
-Hide criminal
proceeds
-Wipe out – traces ??
- seen with victim
- present on crime
scene
- paper traces
- material traces
-Interrogate witnesses
-Use informants
-House searches
-Forensic analysis of
traces
Location of the crime Physically present
in our jurisdiction
We were territorially
competent
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Made by himself
 Not intentionally created
 Unique
 Proof of presence
 Non intentional safeguarding
 Non intentional erasure
(c) 2010 Luc Beirens - Federal Computer Crime Unit
 House search and closed door
=> proportionate force allowed
to open the door
=> use lock smith or special forces
 Telecom interceptions with help of operator
 Special investigative measures
• Observation / infiltration / informants
• Use of fictive identity : only
 For serious crime and if serious indications available
 after very strict evaluation procedure
(c) 2014 Luc Beirens - Federal Computer Crime Unit
Nearly everyone
• has a computer
• has a mobile phone
• has a digital camera
• is internet connected
Every company is present on the net
• is connecting more and more internal networks
Wireless connections become dominant
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Text spreadsheet
 Presentations
 E-mails
 Music
 Pictures
 Movies
 E-Banking
 Social networking
 Instant messaging
 Blogging
 Twittering
(c) 2010 Luc Beirens - Federal Computer Crime Unit(c) 2014 Luc Beirens - Federal Computer Crime Unit
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Cloud computing & virtualization
• Data and applications in the cloud for enterprises and enduser
• Security depends on cloud provider (too often still user id & pw)
 Social media : integrators and identity providers
• bring access to all your internet services together
 Geolocated services
• Based on location – user or device based signal
• Buddy list information
• Commercial links
 Instant broadcasting of information
 Internet of things everything connected
(c) 2014 Luc Beirens - Federal Computer Crime Unit
(c) 2014 Luc Beirens - Federal Computer Crime Unit
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Very dynamical digital footprint (based on user actions)
 Dispersed over different systems (internet)
 Often very easily searchable and accessable
 A lot of people give an awfull lot of private information
free on the internet in different formats
(identity, education, contact, family, social life)
 Information storage is moving towards internet accounts
 Who are these service providers ?
Do they want to help end users ?
How do they take care (or not) of your data ?
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 They are so much like everyone else
• Communication with friends / collegues
• Show off their wealth (voyages / parties ...)
 Search for & communication with victims
 Getting personal data of victim
 Creation of false profiles
 Hacking & abuse of existing profiles
 Vector for infection with malware
 Abuse of profiles buying possibilities
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Encryption tools
• Storage / Communication end to end
• Unability for police / authorities
 to make effective legal intercept
 to get to the content of stored information
 Peer 2 peer applications
• No more central provider
• Hiding escaping from responsability
 Strong authentication procedures
(c) 2014 Luc Beirens - Federal Computer Crime Unit
Goals of criminals Money
Power / influence
Banks /
moneytransport
Merchants / politicians
Activities Traces Police methods
-Meeting crime partners
-Search victims
-Reconnaissance
-Perpetrate crime
-Hide criminal proceeds
-Wipe out – traces ??
- not seen with victim
- not present on crime
scene
- no paper traces
- no material traces
-Only digital traces
-Interrogate witnesses ?
-Use informants
-House searches
-Forensic analysis of
traces
Location of the crime Not physically present
in our jurisdiction
are we were competent
territorially?
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 EU directive 54 / 2002
• obligation to delete / anonimize traces of electronic
communications after end of comm.
• except if there is a national law that obliges it
 EU directive 24/2006
• tries to harmonize EU national laws
• general dataretention for traffic data for all users
• between 6 and 24 months
• Carrier / internet access / IP telephony & e-mail
• Not about content
• Resistance in implementation
• Invalidated laws by consitutional courts in DE and RO
• BE implementation since 2013 => 12 month
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 EU Directive
• 2006 : for technology of 2005 (pre social media)
• Only for EU member states
• Not for social media
• Didn’t regulate organizational aspects
(exchange formats / time frames / technical)
 Very strict legal limitations to obtain
• Prosecutor / Investigating judge
• Serious crime ?
• => slowing down identification process
(c) 2014 Luc Beirens - Federal Computer Crime Unit
Internet
access
Internet
Services
Internet access
E-mail
IPTelephony
Web
publish
Chat
Instant
messenging
Newsgroups
Communities
Peer2Peer
Video-
conference
SMSgateway
....
Signal
carrier
Fixedlines
Telephony
Mobile
Telephony
xDSL
Cable
WIMAX
Satelite
telephony
....
....
(c) 2014 Luc Beirens - Federal Computer Crime Unit
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Data freeze :
keep available data from moment of request
 Data preservation
start storing comm. data from moment of request
 These instruments are needed but not sufficient
• no proof – no traces of criminal activity
if “one time attack” e.g. terrorism
• does not show links with crimes that happend in the past
(links with places where crimes happened)
• does not show networks if actor is arrested
 Network investigations (art 88 ter BE Crim Proc C)
• No hacking allowed ? (opening doors ?)
Intelligence purposes
• Look and find criminals “digital identity”
• Verify content of social media profile
 Often need for “own” profile to use service
 Using our own ”real” identity (?) => risk for private life
 Fictive identity (?) => based on which law
Gathering evidence
• Public available content / request IP-addresses
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 RCCU => specialized ICT forensics
Are social media “specialized”
 Via FCCU : identity data and historical
connexion data to international ISPs
Microsoft, Facebook, Google,...
On voluntary base => no obligation
No content / no complete answers
Risks cfr Twitter
 But every case officer should know
National security plan => training
(c) 2014 Luc Beirens - Federal Computer Crime Unit
The old investigation methods are not
so effective anymore
Social media : international (USA) providers
Sometimes difficult to contact / get cooperation
Ineffective in removing content from social
media even when there is a court decision
(no international directive => volontary)
(c) 2014 Luc Beirens - Federal Computer Crime Unit
 Necessity for new laws ?
• Extended data retention => legal obligation
• “Infiltration” light / use of fictive identity to patrol
• Legal hacking
 Opening the digital locker
 Get access to be able to intercept before encryption
• Obligations to remove / block content for social media
 International legal framework
 Organizational matters
• Collaboration with internet service providers
to automate exchange (national & international)
=> faster / improved transparency
(c) 2014 Luc Beirens - Federal Computer Crime Unit
Vragen ?
Federal Judicial Police
Direction for Economical and Financial crime
Federal Computer Crime Unit
Notelaarstraat 211 - 1000 Brussels – Belgium
Tel office : +32 2 743 74 74
E-mail : luc.beirens@fccu.be
Twitter : @LucBeirens
Slides : www.slideshare.net/lucbeirens
(c) 2014 Luc Beirens - Federal Computer Crime Unit

Más contenido relacionado

La actualidad más candente

Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-worldLuc Beirens
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsBenjamin Ang
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 

La actualidad más candente (20)

Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
File000161
File000161File000161
File000161
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 

Similar a 20140314 Belgian Senate Judicial action of police on social media

Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptOlusegun Mosugu
 
1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdf1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdfSIPLLEMDIKLAT
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from AccuracyThe challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from AccuracyPaul Wright MSc
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14Jorge Sebastiao
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...
FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...
FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...FIWARE
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensicsijcsa
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.Trilateral Research
 

Similar a 20140314 Belgian Senate Judicial action of police on social media (20)

Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdf1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdf
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Dw communication
Dw communicationDw communication
Dw communication
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from AccuracyThe challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...
FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...
FIWARE Global Summit - Presentation of CEF – Purpose of Program, Digital Sing...
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.
 

Último

complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendFabwelt
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 

Último (10)

complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming Trend
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 

20140314 Belgian Senate Judicial action of police on social media

  • 1. Belgian Senate Brussels, 14 March 2014 Luc Beirens Federal Computer Crime Unit 1101011001110110110011010100010
  • 2. Give input for reflexions on judicial action on social media Why we need new solutions Even in an era of NSA ... (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 3.  Judicial actions  Basic principles of police interventions  Pre digital era methods  Footprint & digital footprint  Digital era impact on police methods  Problems  Solutions (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 4. Detect & stop crime Gather evidence Identify and arrest criminal(s) Bring him to court Execute court decisions (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 5. (c) 2014 Luc Beirens - Federal Computer Crime Unit To maintain law and order in cyberspace  Detect crime in cyberspace ? => patrolling => Privacy intrusion ?  Identify users (criminals, victims) in cyberspace  Locate communications geographically and in time  Identify correspondents => contact network  Gather and analyse electronic evidence  Protect ourselves and methods  Enforce court decisions also in cyberspace
  • 6. Legality • Police action must be based on legal provisions (general law / police specific law) Loyalty • Whenever in action : give proof of your quality as policeman except when legally allowed not to do so (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 7. Goals of criminals Money Power / influence Banks / moneytransport Merchants / politicians Activities Traces Police methods -Meeting crime partners -Search victims -Reconnaissance -Perpetrate crime -Hide criminal proceeds -Wipe out – traces ?? - seen with victim - present on crime scene - paper traces - material traces -Interrogate witnesses -Use informants -House searches -Forensic analysis of traces Location of the crime Physically present in our jurisdiction We were territorially competent (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 8.  Made by himself  Not intentionally created  Unique  Proof of presence  Non intentional safeguarding  Non intentional erasure (c) 2010 Luc Beirens - Federal Computer Crime Unit
  • 9.  House search and closed door => proportionate force allowed to open the door => use lock smith or special forces  Telecom interceptions with help of operator  Special investigative measures • Observation / infiltration / informants • Use of fictive identity : only  For serious crime and if serious indications available  after very strict evaluation procedure (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 10. Nearly everyone • has a computer • has a mobile phone • has a digital camera • is internet connected Every company is present on the net • is connecting more and more internal networks Wireless connections become dominant (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 11.  Text spreadsheet  Presentations  E-mails  Music  Pictures  Movies  E-Banking  Social networking  Instant messaging  Blogging  Twittering (c) 2010 Luc Beirens - Federal Computer Crime Unit(c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 12. (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 13.  Cloud computing & virtualization • Data and applications in the cloud for enterprises and enduser • Security depends on cloud provider (too often still user id & pw)  Social media : integrators and identity providers • bring access to all your internet services together  Geolocated services • Based on location – user or device based signal • Buddy list information • Commercial links  Instant broadcasting of information  Internet of things everything connected (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 14. (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 15. (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 16.  Very dynamical digital footprint (based on user actions)  Dispersed over different systems (internet)  Often very easily searchable and accessable  A lot of people give an awfull lot of private information free on the internet in different formats (identity, education, contact, family, social life)  Information storage is moving towards internet accounts  Who are these service providers ? Do they want to help end users ? How do they take care (or not) of your data ? (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 17.  They are so much like everyone else • Communication with friends / collegues • Show off their wealth (voyages / parties ...)  Search for & communication with victims  Getting personal data of victim  Creation of false profiles  Hacking & abuse of existing profiles  Vector for infection with malware  Abuse of profiles buying possibilities (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 18.  Encryption tools • Storage / Communication end to end • Unability for police / authorities  to make effective legal intercept  to get to the content of stored information  Peer 2 peer applications • No more central provider • Hiding escaping from responsability  Strong authentication procedures (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 19. Goals of criminals Money Power / influence Banks / moneytransport Merchants / politicians Activities Traces Police methods -Meeting crime partners -Search victims -Reconnaissance -Perpetrate crime -Hide criminal proceeds -Wipe out – traces ?? - not seen with victim - not present on crime scene - no paper traces - no material traces -Only digital traces -Interrogate witnesses ? -Use informants -House searches -Forensic analysis of traces Location of the crime Not physically present in our jurisdiction are we were competent territorially? (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 20.  EU directive 54 / 2002 • obligation to delete / anonimize traces of electronic communications after end of comm. • except if there is a national law that obliges it  EU directive 24/2006 • tries to harmonize EU national laws • general dataretention for traffic data for all users • between 6 and 24 months • Carrier / internet access / IP telephony & e-mail • Not about content • Resistance in implementation • Invalidated laws by consitutional courts in DE and RO • BE implementation since 2013 => 12 month (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 21.  EU Directive • 2006 : for technology of 2005 (pre social media) • Only for EU member states • Not for social media • Didn’t regulate organizational aspects (exchange formats / time frames / technical)  Very strict legal limitations to obtain • Prosecutor / Investigating judge • Serious crime ? • => slowing down identification process (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 23. (c) 2014 Luc Beirens - Federal Computer Crime Unit  Data freeze : keep available data from moment of request  Data preservation start storing comm. data from moment of request  These instruments are needed but not sufficient • no proof – no traces of criminal activity if “one time attack” e.g. terrorism • does not show links with crimes that happend in the past (links with places where crimes happened) • does not show networks if actor is arrested  Network investigations (art 88 ter BE Crim Proc C) • No hacking allowed ? (opening doors ?)
  • 24. Intelligence purposes • Look and find criminals “digital identity” • Verify content of social media profile  Often need for “own” profile to use service  Using our own ”real” identity (?) => risk for private life  Fictive identity (?) => based on which law Gathering evidence • Public available content / request IP-addresses (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 25.  RCCU => specialized ICT forensics Are social media “specialized”  Via FCCU : identity data and historical connexion data to international ISPs Microsoft, Facebook, Google,... On voluntary base => no obligation No content / no complete answers Risks cfr Twitter  But every case officer should know National security plan => training (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 26. The old investigation methods are not so effective anymore Social media : international (USA) providers Sometimes difficult to contact / get cooperation Ineffective in removing content from social media even when there is a court decision (no international directive => volontary) (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 27.  Necessity for new laws ? • Extended data retention => legal obligation • “Infiltration” light / use of fictive identity to patrol • Legal hacking  Opening the digital locker  Get access to be able to intercept before encryption • Obligations to remove / block content for social media  International legal framework  Organizational matters • Collaboration with internet service providers to automate exchange (national & international) => faster / improved transparency (c) 2014 Luc Beirens - Federal Computer Crime Unit
  • 29. Federal Judicial Police Direction for Economical and Financial crime Federal Computer Crime Unit Notelaarstraat 211 - 1000 Brussels – Belgium Tel office : +32 2 743 74 74 E-mail : luc.beirens@fccu.be Twitter : @LucBeirens Slides : www.slideshare.net/lucbeirens (c) 2014 Luc Beirens - Federal Computer Crime Unit