SlideShare una empresa de Scribd logo
1 de 14
@Padma Resort, Bali
Republic of Indonesia
23 April 2013

Yu-feng (Harris)
Chen,
Chinese Taipei
Prosecutor, Chiayi
District Prosecutors
Office

2013/10/30

APECTEL 47

1
AGENDA


 Brief overview of latest cybercrime
prosecution, Chinese Taipei
 Characteristics of criminality information in cyber
world
 Web-based investigation and prosecution
 Challenges
 Conclusion and outlook

2013/10/30

APECTEL 47

3
Brief overview of latest cybercrime
prosecution, Chinese Taipei (1)
 Time frame



 Sep. 2012 to Feb. 2013

 Types of cybercrime

 Criminal Code Chapter 36-- “Offenses Against the Computer
Security “
 Few cases
 Low penalty

 Major types of crimes committed via computer and internet





2013/10/30

Fraudulence
Forging instruments
Gambling
Intellectual property rights
Defamation

APECTEL 47

4
Brief overview of latest cybercrime
prosecution, Chinese Taipei (2)



 From defendants perspective(Nationwide)

 5,517 defendants in cases disposed, 1,892 were
indicted, 34.3% indictment rate
 Relatively low compared with the average 40.6% indictment
rate of all types of cases nationwide,
 Defendants without criminal record, or just with slight
misdemeanor
 Deferred prosecution with discretion are likely to be
rendered by prosecutors.

 16.9% of all, higher than the average 9.5% deferred prosecution
rate of all types of crimes.
 Defendants are usually ordered to make a written statement of
repentance, or pay a certain sum to governmental account or a
designated non-profit or local self-governing organization.

2013/10/30

APECTEL 47

5
Brief overview of latest cybercrime
prosecution, Chinese Taipei (3)



 From caseload perspective (Nationwide)
 467 cybercrime cases commenced, 0.24% of all
 4,218 cybercrime cases disposed, 2.3% of all
(source: Ministry of Justice)

2013/10/30

APECTEL 47

6
Characteristics of criminality
information in cyber world



 Vastly distributed
 Rapidly transmitted
 Long Archived
 Easily collected
 Quickly searched
 Possibly manipulated
 Effectively analyzed

2013/10/30

APECTEL 47

7
Web-based investigation


2013/10/30

APECTEL 47

8
Web-based investigation(1)


 Growing reliance on digital database
 DNA
 fingerprints, face
 ID number
 “family book”: the Three-level Connection system

 Financial records
 Insurance records
 Immigration records

2013/10/30

APECTEL 47

9
Web-based investigation(2)


 “The Middle-finger Xiao” Incident

2013/10/30

APECTEL 47

10
Challenges

 On-line communication takes over
 Decline of wiretapping approach
 Burden of data collection

 Cloud computing
 Advanced encryption
 Urgent investigation
 Lack of justice obstruction penalties
 Shortage of cyber specialists
2013/10/30

APECTEL 47

11
Conclusion and Outlook

 Cyber world is an enormous crime database

 User data requests worldwide have increased by more than 70% since
2009. From July 2012 through December 2012, Google received 21,389
requests for information about 33,634 user accounts(Google
Transparency Report).

 Increasing information demand from the authority concerned
 National security section

 CISPA (Cyber Intelligence Sharing and Protection Act ) of the U.S.

 Law enforcement

 More laws or regulation of internet governance would be enacted
 Creating unified online platform for criminal evidence
 Cross-jurisdiction mutual assistance
 Global E-Crime Prosecutors Network, GPEN (under International
Association of Prosecutors)

2013/10/30

APECTEL 47

12
Thank You

Yu-feng(Harris) Chen
Delegate of Chinese Taipei
harrisychen@gmail.com
yufone@mail.moj.gov.tw

2013/10/30

APECTEL 47

13

Más contenido relacionado

La actualidad más candente

Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
Clinton DSouza
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is Real
Christos Beretas
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
Bill Lisse
 

La actualidad más candente (20)

Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is Real
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRs
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open Data
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 

Destacado

Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281
Nurul Yakin
 
Indonesia ina002 1366765311
Indonesia ina002 1366765311Indonesia ina002 1366765311
Indonesia ina002 1366765311
Nurul Yakin
 
Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379
Nurul Yakin
 
Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516
Nurul Yakin
 
Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392
Nurul Yakin
 
Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182
Nurul Yakin
 
Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053
Nurul Yakin
 
Indonesia ina002 1366684227
Indonesia ina002 1366684227Indonesia ina002 1366684227
Indonesia ina002 1366684227
Nurul Yakin
 
Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132
Nurul Yakin
 
Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119
Nurul Yakin
 
Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853
Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013
Nurul Yakin
 
Japan jpn002 1366610568
Japan jpn002 1366610568Japan jpn002 1366610568
Japan jpn002 1366610568
Nurul Yakin
 
Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449
Nurul Yakin
 
Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231
Nurul Yakin
 
Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553
Nurul Yakin
 

Destacado (17)

Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281Chinese taipei ct005 1366644281
Chinese taipei ct005 1366644281
 
Indonesia ina002 1366765311
Indonesia ina002 1366765311Indonesia ina002 1366765311
Indonesia ina002 1366765311
 
Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379Chinese taipei ct019 1366683379
Chinese taipei ct019 1366683379
 
Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516Chinese taipei ct006 1366701516
Chinese taipei ct006 1366701516
 
Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392Chinese taipei ct012 1366641392
Chinese taipei ct012 1366641392
 
Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182Chinese taipei ct005 1366637182
Chinese taipei ct005 1366637182
 
Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053
 
Consumer’s Perspective on Broadband Performance
Consumer’s Perspective on Broadband PerformanceConsumer’s Perspective on Broadband Performance
Consumer’s Perspective on Broadband Performance
 
Indonesia ina002 1366684227
Indonesia ina002 1366684227Indonesia ina002 1366684227
Indonesia ina002 1366684227
 
Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132Hong kong, china hkc001 1366731132
Hong kong, china hkc001 1366731132
 
Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119Chinese taipei ct001 1366598119
Chinese taipei ct001 1366598119
 
Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853Chinese taipei ct005 1366641853
Chinese taipei ct005 1366641853
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013
 
Japan jpn002 1366610568
Japan jpn002 1366610568Japan jpn002 1366610568
Japan jpn002 1366610568
 
Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449Chinese taipei ct002 1366614449
Chinese taipei ct002 1366614449
 
Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231Chinese taipei ct001 1366764231
Chinese taipei ct001 1366764231
 
Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553Chinese taipei ct011 1366563553
Chinese taipei ct011 1366563553
 

Similar a Chinese taipei 1366688667

Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Cameron Brown
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
MalikPinckney86
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
tawnyataylor528
 

Similar a Chinese taipei 1366688667 (20)

BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 

Más de Nurul Yakin

Indonesia ina018 1366698387
Indonesia ina018 1366698387Indonesia ina018 1366698387
Indonesia ina018 1366698387
Nurul Yakin
 
Indonesia ina002 1366687034
Indonesia ina002 1366687034Indonesia ina002 1366687034
Indonesia ina002 1366687034
Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013
Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Nurul Yakin
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Nurul Yakin
 
Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275
Nurul Yakin
 
Consumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performanceConsumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performance
Nurul Yakin
 
Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275
Nurul Yakin
 
Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151
Nurul Yakin
 

Más de Nurul Yakin (12)

Industry
IndustryIndustry
Industry
 
Consumer’s Perspective on Mobile Payment Transaction
Consumer’s Perspective on  Mobile Payment  Transaction  Consumer’s Perspective on  Mobile Payment  Transaction
Consumer’s Perspective on Mobile Payment Transaction
 
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
Mobile Payment Successes and Challenges of the Industry and the Consumer’s Pe...
 
Indonesia ina018 1366698387
Indonesia ina018 1366698387Indonesia ina018 1366698387
Indonesia ina018 1366698387
 
Indonesia ina002 1366687034
Indonesia ina002 1366687034Indonesia ina002 1366687034
Indonesia ina002 1366687034
 
Idtug presentation for apectel 47 in bali 2013
Idtug presentation for  apectel 47 in bali 2013Idtug presentation for  apectel 47 in bali 2013
Idtug presentation for apectel 47 in bali 2013
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
 
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013Idtug presentation for  apectel 47 in bali 2013 rev23-4-2013
Idtug presentation for apectel 47 in bali 2013 rev23-4-2013
 
Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275Hong kong, china hkc002 1366597275
Hong kong, china hkc002 1366597275
 
Consumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performanceConsumer’s perspective on broadband internet performance
Consumer’s perspective on broadband internet performance
 
Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275Chinese taipei ct012 1366641275
Chinese taipei ct012 1366641275
 
Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151Chinese taipei ct001 1366764151
Chinese taipei ct001 1366764151
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Chinese taipei 1366688667

  • 1. @Padma Resort, Bali Republic of Indonesia 23 April 2013
  • 2.  Yu-feng (Harris) Chen, Chinese Taipei Prosecutor, Chiayi District Prosecutors Office 2013/10/30 APECTEL 47 1
  • 3.
  • 4. AGENDA   Brief overview of latest cybercrime prosecution, Chinese Taipei  Characteristics of criminality information in cyber world  Web-based investigation and prosecution  Challenges  Conclusion and outlook 2013/10/30 APECTEL 47 3
  • 5. Brief overview of latest cybercrime prosecution, Chinese Taipei (1)  Time frame   Sep. 2012 to Feb. 2013  Types of cybercrime  Criminal Code Chapter 36-- “Offenses Against the Computer Security “  Few cases  Low penalty  Major types of crimes committed via computer and internet      2013/10/30 Fraudulence Forging instruments Gambling Intellectual property rights Defamation APECTEL 47 4
  • 6. Brief overview of latest cybercrime prosecution, Chinese Taipei (2)   From defendants perspective(Nationwide)  5,517 defendants in cases disposed, 1,892 were indicted, 34.3% indictment rate  Relatively low compared with the average 40.6% indictment rate of all types of cases nationwide,  Defendants without criminal record, or just with slight misdemeanor  Deferred prosecution with discretion are likely to be rendered by prosecutors.  16.9% of all, higher than the average 9.5% deferred prosecution rate of all types of crimes.  Defendants are usually ordered to make a written statement of repentance, or pay a certain sum to governmental account or a designated non-profit or local self-governing organization. 2013/10/30 APECTEL 47 5
  • 7. Brief overview of latest cybercrime prosecution, Chinese Taipei (3)   From caseload perspective (Nationwide)  467 cybercrime cases commenced, 0.24% of all  4,218 cybercrime cases disposed, 2.3% of all (source: Ministry of Justice) 2013/10/30 APECTEL 47 6
  • 8. Characteristics of criminality information in cyber world   Vastly distributed  Rapidly transmitted  Long Archived  Easily collected  Quickly searched  Possibly manipulated  Effectively analyzed 2013/10/30 APECTEL 47 7
  • 10. Web-based investigation(1)   Growing reliance on digital database  DNA  fingerprints, face  ID number  “family book”: the Three-level Connection system  Financial records  Insurance records  Immigration records 2013/10/30 APECTEL 47 9
  • 11. Web-based investigation(2)   “The Middle-finger Xiao” Incident 2013/10/30 APECTEL 47 10
  • 12. Challenges   On-line communication takes over  Decline of wiretapping approach  Burden of data collection  Cloud computing  Advanced encryption  Urgent investigation  Lack of justice obstruction penalties  Shortage of cyber specialists 2013/10/30 APECTEL 47 11
  • 13. Conclusion and Outlook   Cyber world is an enormous crime database  User data requests worldwide have increased by more than 70% since 2009. From July 2012 through December 2012, Google received 21,389 requests for information about 33,634 user accounts(Google Transparency Report).  Increasing information demand from the authority concerned  National security section  CISPA (Cyber Intelligence Sharing and Protection Act ) of the U.S.  Law enforcement  More laws or regulation of internet governance would be enacted  Creating unified online platform for criminal evidence  Cross-jurisdiction mutual assistance  Global E-Crime Prosecutors Network, GPEN (under International Association of Prosecutors) 2013/10/30 APECTEL 47 12
  • 14. Thank You  Yu-feng(Harris) Chen Delegate of Chinese Taipei harrisychen@gmail.com yufone@mail.moj.gov.tw 2013/10/30 APECTEL 47 13