SlideShare a Scribd company logo
1 of 41
Security Wars episode 3  Revenge of Myth.   Ikuo Takahashi
A long time ago in a  network far ,far away Internet has been messed up by the  unprecedented  attacks from people who  covet  the Internet by lust, people who impose on  others for economic interests, people who juggle with the bot. The society has made up the mind to defend the Internet. However, conventional law  enforcement measures are  useless against organized attack such as phishing and botnet. Is messed up Internet dying to Wild World Web? How can we repair the Internet ? ……………… ..
previously Security Wars ,[object Object],[object Object],[object Object],エピソートⅠ 闇に堕ちたハッカー
Sec Wars Episode 2 Attack of  anonymous troops エピソード2 匿名軍団の攻撃
Anonymous Troops ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],匿名軍団 ・匿名BBS ・ボットネット
Change of backgrounds  of Cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],サイバー犯罪の組織化・金銭目的化・国際化
Order 66 vs ”Bot net” Order ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order “Bot Net” & ISP’s Network Management Honey Pot ②  infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
Dark side of Web 2.0 ,[object Object],[object Object],cannot be defraud defraud
Conventional ways  against phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権侵害を理由とする刑事事件・特定電子メール法
Actual cases 1 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Actual cases 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],組織犯罪としてのフィッシング
Limitation of conventional measure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Episodes3 Revenge of Myth. エピソード3    通信の秘密の足かせ
Paradigm shift to  Mass Internet society ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],  大衆インターネット社会へのパラダイムシフト ・ジェファーンデモクラシー 自己実現 自己統治 ・「永遠のビギナー」「匿名の卑怯者」
Defend “Innocent User (Forever Beginner)” ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ Weapon” of Cyber Attack  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is this WAR? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to “repair” the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions from War against ” furikome  – fraud ” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions from War against  ” furikome  – fraud ”  legal aspect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Other Star Wars concept ,[object Object],[object Object]
Rediscover of  Communication sovereign -role of sovereign- ,[object Object],[object Object],[object Object]
Inspection of border ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concept of proactive defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISP against Myth.-dogma (JP)  “secrecy of communication “ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],通信の秘密のドグマとの闘い ・電気通信事業法4条 ・違法性阻却事由のなかでの活動
Development of Dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ドグマの肥大化 ・通信データへの適用  法執行への制限 匿名性強化 発信者情報開示-無用さ ・ISPへの萎縮効果
Two aspects of  Secrecy of Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],追跡可能性と伝達の保証
Traceability ,[object Object],[object Object],[object Object]
Traceability -Beyond the dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],追跡可能性におけるドグマを超えるために ・米国における提出命令制度・d命令 ・ISPの行為規範
US network and privacy real time Stored communication acquisition use disclosure content Provider exception Network Neutrality Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception (civil org.) Prohibited/ exception (LE) ditto. compulsory (LE) Title 3(Interception) 、 FISA (LE) search warrant/subpoena with notice Communication data Aggressive acquisition ? (civil org.)? (LE) Pen register/Trace Trap Order  (civil  org.) subpoena (LE) subpoena/ (d)order
ISP’s cooperation ,[object Object],[object Object],[object Object],ISPとLEとの協力
Against illegal/inappropriate traffic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Framework against illegal / inappropriate information against public order misc illegal  infringing right harmful to  juvenile ISP may delete on contract. disclose suicide information filtering by disclose of sender ISP may delete on contract. ISP may delete on contract. illegal inappropriate
ISP’s issue  against illegal traffic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],フィッシングの遮断 ウイルス感染 PC のお知らせ  P2P トラフィックの制限?
“ Revenge” of secrecy of communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interpretation of secrecy of communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More burden ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Guardian? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権制度の擁護者?
ISP’s grief  ,[object Object],[object Object],[object Object],[object Object],ISPの悲しみ ・言論の自由の制限のつもりはない ・どのように・何を・コストは誰が Does not intend to regulate “Freedom of speech” concepts How to control? What control? Who control? Who pay for costs?
CU @Episode 4  May the Force be with U! どのようなエピソード4を描けるのか

More Related Content

What's hot

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market PlaceWojciech Filipkowski
 
Ukraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyUkraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyAxon.Partners
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as publishedRalph Schumann
 
Dubai 2
Dubai 2Dubai 2
Dubai 2mmavis
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolutioninternetbar
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

What's hot (20)

Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market Place
 
Ukraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and PrivacyUkraine: Cybercrmes and Privacy
Ukraine: Cybercrmes and Privacy
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law
Cyber lawCyber law
Cyber law
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolution
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Viewers also liked

A2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personalA2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personaliejcg
 
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Darrell Jordan-Smith
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community KlassificeringHans Leijström
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarrerasiejcg
 
Tudeseo
TudeseoTudeseo
Tudeseoiejcg
 
Solo Llamame
Solo LlamameSolo Llamame
Solo Llamameiejcg
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1iejcg
 
Ser Amigo Es..
Ser Amigo Es..Ser Amigo Es..
Ser Amigo Es..iejcg
 
Vuelode Gansos
Vuelode GansosVuelode Gansos
Vuelode Gansosiejcg
 
La Amistad
La AmistadLa Amistad
La Amistadiejcg
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idagHans Leijström
 
14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )mr.green die
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal IssuesIkuo Takahashi
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingDarrell Jordan-Smith
 

Viewers also liked (17)

Ikuoedisclosure Uk
Ikuoedisclosure UkIkuoedisclosure Uk
Ikuoedisclosure Uk
 
A2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personalA2 fr03 seguimiento a competencia del personal
A2 fr03 seguimiento a competencia del personal
 
Hans Leijström
Hans LeijströmHans Leijström
Hans Leijström
 
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
Sun-Vidiator IPTVMobileTV Architecture Apr-14-09
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community Klassificering
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarreras
 
Tudeseo
TudeseoTudeseo
Tudeseo
 
Solo Llamame
Solo LlamameSolo Llamame
Solo Llamame
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1
 
Ser Amigo Es..
Ser Amigo Es..Ser Amigo Es..
Ser Amigo Es..
 
Vuelode Gansos
Vuelode GansosVuelode Gansos
Vuelode Gansos
 
Seminare Fridays
Seminare FridaysSeminare Fridays
Seminare Fridays
 
La Amistad
La AmistadLa Amistad
La Amistad
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idag
 
14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )14a. Penawaran Umum ( Go Public )
14a. Penawaran Umum ( Go Public )
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing
 

Similar to Sec Wars Episode 3

Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxpatricke8
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxanitramcroberts
 

Similar to Sec Wars Episode 3 (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Polinter11
Polinter11Polinter11
Polinter11
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
 

More from Ikuo Takahashi

Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Ikuo Takahashi
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Ikuo Takahashi
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?Ikuo Takahashi
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseIkuo Takahashi
 

More from Ikuo Takahashi (9)

ACDPub.pptx
ACDPub.pptxACDPub.pptx
ACDPub.pptx
 
Ikuo0823.pdf
Ikuo0823.pdfIkuo0823.pdf
Ikuo0823.pdf
 
Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
20slide0306
20slide030620slide0306
20slide0306
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi case
 

Recently uploaded

Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 

Recently uploaded (20)

Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 

Sec Wars Episode 3

  • 1. Security Wars episode 3 Revenge of Myth. Ikuo Takahashi
  • 2. A long time ago in a network far ,far away Internet has been messed up by the unprecedented attacks from people who covet the Internet by lust, people who impose on others for economic interests, people who juggle with the bot. The society has made up the mind to defend the Internet. However, conventional law enforcement measures are useless against organized attack such as phishing and botnet. Is messed up Internet dying to Wild World Web? How can we repair the Internet ? ……………… ..
  • 3.
  • 4. Sec Wars Episode 2 Attack of anonymous troops エピソード2 匿名軍団の攻撃
  • 5.
  • 6.
  • 7.
  • 8. Order “Bot Net” & ISP’s Network Management Honey Pot ② infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Episodes3 Revenge of Myth. エピソード3    通信の秘密の足かせ
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. US network and privacy real time Stored communication acquisition use disclosure content Provider exception Network Neutrality Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception (civil org.) Prohibited/ exception (LE) ditto. compulsory (LE) Title 3(Interception) 、 FISA (LE) search warrant/subpoena with notice Communication data Aggressive acquisition ? (civil org.)? (LE) Pen register/Trace Trap Order (civil org.) subpoena (LE) subpoena/ (d)order
  • 32.
  • 33.
  • 34. Framework against illegal / inappropriate information against public order misc illegal infringing right harmful to juvenile ISP may delete on contract. disclose suicide information filtering by disclose of sender ISP may delete on contract. ISP may delete on contract. illegal inappropriate
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. CU @Episode 4 May the Force be with U! どのようなエピソード4を描けるのか