Trans National Crime Kuala Lumpur 06 July 2011 David Napper

Similar documents
National Report Japan

Computer Search and Seizure

Cyber Crime & Information Security A Legislative Regime. Dr. Adrian McCullagh Information Security Institute Queensland University of Technology

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Creating an enabling business environment in Asia: To what extent is public support warranted?

REPORT OF APT PREPARATIONS FOR THE ITU WORLD TELECOMMUNICATION DEVELOPMENT CONFERENCE (WTDC-10)

TG AGROSOLUTIONS LIMITED

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

Within Mainland China, Macau SAR, Hong Kong SAR, and Taiwan: Foreign Language Teaching and Research Press (FLTRP)

CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007

Cybercrime Legislation Amendment Bill 2011

Session 7: Trade in the digital era: technology, innovation, e-commerce

It is... in Australia's interests to help protect the political and economic structures of countries in the Asia-Pacific region

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

2007/ACT/WKSP1/016 Corruption Control in Singapore Effective National Anti-Corruption Strategies: Prosecuting High-Level Corruption

Enforceability of IP Agreements and Enforcement Strategies

Seizure of property in cross-border crime on the territory of Common Market

Environmental crimes as an emerging form of crime managed by transnational organized networks

Curriculum Vitae. Victoria Bannon Principal Consultant

Figure 1. International Student Enrolment Numbers by Sector 2002 to 2017

Annex M. Voluntary Briefing by Southeast Asia Regional Center for Counter-Terrorism (SEARCCT)

Government Online. an international perspective ANNUAL GLOBAL REPORT. Global Report

THE CHALLENGES AND OPPORTUNITIES OF ASIA-PACIFIC TRADE

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

Electronic Communications Convention as trade facilitation legal framework

EXAMINING NORTH KOREA S PURSUIT OF CRYPTOCURRENCIES

October Next Generation Smart Border Security Ability. Quality. Delivery.

Place and role of DIICOT in the Romanian Criminal Justice System

Cybercrime in the spotlight

AGREEMENT FOR KIB KENANGA AGENCY NETWORK SERVICE

Submission of the. New South Wales Council for Civil Liberties. to the. Commonwealth Attorney-General s Department

THE ROLE OF IDENTITY MANAGEMENT IN FACILITATION AND ENHANCING BORDER SECURITY

Questionnaire for important consumer and trading countries of saiga parts and derivatives

Opening Remarks at ASEM Trust Fund Meeting

TRAINING MODULE WILDLIFE AND CRIMINAL LAW STRENTHENING LEGAL MECHANISMS TO COMBAT ILLICIT WILDLIFE TRADE EXERCISE 1. Mock Trial

Consumer Travel Perceptions & Spending Patterns. Paul Wilke Director Corporate Relations Visa International Asia Pacific Guilin, China 29 June 2007

Growing Knowledge about Globalization (GKG)

White Paper Corruption-related risks in decision-making

National Police Board INSTRUCTION 1 (10)

SEG: Trafficking session

Rules of Origin Process (Chile)

The Normalisation of Corruption: Why it occurs and What can be done to minimise it? Author: Prof Jon Quah Presenter: Prof David Jones

Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes?

Anti-Counterfeiting - Southern Africa

Support for Harmonization of the ICT Policies in Sub-Sahara Africa (HIPSSA)

BALI PROCESS AD HOC GROUP CO-CHAIRS STATEMENT

Global Trends in Location Selection Final results for 2005

Asia-Pacific Development Journal Vol. 11, No. 2, December Economic and Social Commission for Asia and the Pacific ASIA-PACIFIC DEVELOPMENT

Freedom of Contract in Click Wrap Agreements in Malaysia and the United States of America

Council of the European Union Brussels, 14 September 2017 (OR. en)

The Roles of the Respective Enforcement Agencies

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

East Asia and the Pacific

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

UPDATE. Asia at the Crossroads: 5 forces transforming Asia-Pacific region Fraser Thompson, AlphaBeta

NSW strategy for business migration & attracting international students

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

ASEAN Integration & ICT Opportunities. Mark Hefner

Asia Pacific Travel & Tourism: A 2014 Update on Key Metrics

EUROPEAN COMMUNITIES TRADEMARK ASSOCIATION

Myer Siemiatycki Ryerson University

Issue: Strengthening measures regarding international security as a way of combating transnational organized crimes

Deed. Lookout Road Hard Rock Quarry. Planning Agreement

60 th UIA CONGRESS Budapest / Hungary October 28 November 1, UIA Biotechnology Law Commission Sunday, October 30, 2016

The Internet Society and African Union Commission Survey on African ICT Policy Makers

Managing Bribery and Corruption. The hands on Partner experience is the difference quickly getting to the core issues.

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

Keynote speech at 8th Pan Asian Regulatory Summit

Archival Legislation in Singapore

Consumer Barometer Study 2017

H. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation

ORGANISED CRIME INVESTIGATIONS: POLICE STATION LEVEL. Doraval Govender

CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA

Identity Theft: Trends and Issues

Rethinking Australian Migration

EUROPEAN COMMISSION DIRECTORATE-GENERAL ENVIRONMENT Directorate F - Global Sustainable Development ENV.F.3 - Multilateral Environmental Cooperation

The extent of trafficking with children

Mr Teisaburo Seta Executive Committee Member Mr Lawrence Lim Executive Committee Member Mr Warren Salisbury New Zealand Lotteries

The economic contribution of international students. Australian Council for Private Education and Training

Cross-border higher education: trends and strategies

Corruption-related risks in decisionmaking

You and Your Records Management Obligations

Australian Government

Pop Internationalism: Has A Half Century of World Music Trade Displaced Local Culture? Joel Waldfogel Carlson School University of Minnesota

Law of Banking and Security DR. ZULKIFLI HASAN

Combating Public Sector Corruption in Singapore & Hong Kong: Lessons for the Private Sector in Asian Countries

Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2.

DRAFT RECOMMENDATION ON THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE OUTLINE

International Activities

Case: 1:18-cv Document #: 24 Filed: 05/16/18 Page 1 of 11 PageID #:499

COUNTERFEIT AND FAKE DRUGS AND UNWHOLESOME PROCESSED FOODS (MISCELLANEOUS PROVISIONS) ACT

12027/16 FR,EB/dk 1 DGD 1C LIMITE EN

Administration of Rules of Origin

Where to locate a new software business

Proceeds of Crime Act 2002 (POCA)

CURRICULUM VITAE MRS. HUN BORAMEY. #11, St. 05, Sangkat Kraing Thnung, Sen Sok, Phnom Penh Tel:

Australasian University Safety Association 2016 Fiona Austin

Ethical Hacking. Countermeasures Version 6. Hacking Laws

THE ANTI COUNTERFEITING BILL, 2010 ARRANGEMENT OF CLAUSES PART I PRELIMINARY. PART II ADMINISTRATION.

Consortium of Non-Traditional Security Studies in Asia

Transcription:

Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES Trans National Crime Kuala Lumpur 06 July 2011 David Napper 5 July 2011

Today s Presentation Considerations and Challenges Cross Border Crime Types Eastern European Modus Operandi West African Modus Operandi How ebay partners with law enforcement to fight Cross Border crime 2

OVERCONNECTED The world is over connected, corporations are over whelmed and the Internet is now a cowboy zone that is out of control Quote by Internet Historian Bill Davidow. 3

The Future? Government Why is the world not more conscious of the role that the technology is taking in shaping the environment in which we live. Society Law Makers Private Sector Social Networking Internet 4

DISINTERMEDIATION BY INTERNET Travel Music Movies 5

Abrupt Change If the number of interconnections are strengthened dramatically, they will change your environment, because basically your environment is shaped by the things that you're connected to. So to strengthen them quickly, you go through abrupt, environmental change, and most L.E. organisations are maladapted to that circumstance. Going UP Internet Penetration Internet Usage Cross Border Dealings Loss to business Red Tape 6 Going DOWN LE Budgets LE Resources Personal Responsibility Victims Reporting

Positive Feedback There's a second thing that happens. When interconnections are increased you get a lot more positive feedback in the system - where change adds to change and makes change progress much faster. This will be evident when Asia Pacific enters the era of implementing mobile applications that will allow the mass populations of Asia, Middle East and Africa access to internet processes that are currently not available to them. 7

Considerations Cost Likelihood of success Ability to support prosecution to conclusion International Support Network Sophistication and resources available in jurisdiction of suspect Legal landscape Privacy Issues Death Penalty 8

BAPTIST CASE Malaysian National residing Indiana (USA) Student of Computer Science 384 JP Morgan Bank Accounts Feb to Sept 2006 568 Fake Half.com accounts Selling text books Over 100,000.00 complaints $5.3 million proceeds Left Indianna / returned Malaysia Majority of funds seized Arrest warrant issued. Interpol watch list. 9

Eastern Europe Use Spoof and Phishing techniques Ghost legitimate listings Payment by way of International Wire companies (with legitimate links to an organisation) Details not to advise Wire Company that payment is for an ebay transaction. High Social Engineering content Payment destination in Europe or United Kingdom Usually devoid of English and Grammatical mistakes Goods stored in ebay warehouse Seller has a security bond held with ebay Motors, or ebay Safe Harbour 1

West Africa Target sellers through phishing emails Compromised payment Instrument Use of innocent agents in home country Washing of counterfeit cheques and money orders Advance Fee Fraud

Hong Kong Police Cyber Training in Sydney EFCC Visits to Australia Ongoing training of Australian Law Enforcement by highly regarded training staff attached to the Hong Kong Police Cyber Training Unit. Sponsored Visits to Australia by members of the Economic Financial Crimes Commission of Nigeria to undertake best practice sharing.

Contacting ebay Dedicated email specifically for Law Enforcement. Information requests aupolicerequest@ebay.com david.napper@ebay.com asiapacificpolice@ebay.com Address: Level 23, 1 York Street, Sydney NSW 2000 Emergency Contact Computer Crime or Fraud Squads can contact after hours