SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
www.eLLblog.com
info@eLLblog.com
Where law, technology, and human error collide
Fernando M. Pinguelo, Esq.
Norris McLaughlin & Marcus, P.A.
New York | New Jersey | Pennsylvania
fmp@nmmlaw.com
Virtual Crimes – Real Damages
Challenges Posed By Electronic
Crimes In The United States
www.eLLblog.com
info@eLLblog.com
Email Questions
info@eLLblog.com
www.eLLblog.com
info@eLLblog.com
Tweet me
@ellblog_dot_com
www.eLLblog.com
info@eLLblog.com
“Cybercrime”
Criminal activity conducted through
the Internet
www.eLLblog.com
info@eLLblog.com
A brief history
 1967 “number-cropping operation” by a
New York bank employee.
 1970s rare and isolated:
 MIT student used university computer to
generate tones needed to access phone service.
 John Draper discovers whistle in Cap'n Crunch
cereal boxes and reproduces a 2600Hz tone.
www.eLLblog.com
info@eLLblog.com
A brief history
 1980s computer crimes grow:
 Ian “Captain Zap” Murphy - first felon convicted of
computer crime. Murphy hacked AT&T’s
computers and changed billing clock so as to
provide discounted rates during business hours.
 U.S. Comprehensive Crime Control Act gives
Secret Service jurisdiction over computer fraud.
 War Games introduces public to the phenomenon
of hacking (i.e., war-dialing).
www.eLLblog.com
info@eLLblog.com
A brief history
 After break-ins into gov’t and corporate
computers, Congress passes Computer Fraud
and Abuse Act, making it a crime. The law does
not cover juveniles.
 Computer Emergency Response Team (CERT)
created.
 First large-scale computer extortion case is
investigated (under the pretence of a quiz on
the AIDS virus, users download program which
threatens to destroy all their computer data
unless they pay $500 into a foreign account).
www.eLLblog.com
info@eLLblog.com
A brief history
 1990s
 16-year-old student (“Data Stream”) arrested by UK
police for penetrating computers at the Korean
Atomic Research Institute, NASA and several U.S.
government agencies.
 CIA Director John Deutsh testifies foreign organized
crime groups behind hacker attacks against U.S.
private sector.
 U.S. Communications Decency Act makes it illegal to
transmit indecent/obscene material over Internet.
www.eLLblog.com
info@eLLblog.com
A brief history
 2000s:
 Hackers break into Microsoft's corporate network and
access source code for the latest versions of
Windows and Office software.
 Cyberattacks have grown more frequent and
destructive in recent years.
 TODAY (Literally): September 27, 2010
 “U.S. Wants to Make It Easier to Wiretap Internet”
Federal law enforcement and national security officials are
preparing to seek sweeping new regulations for the Internet.
www.eLLblog.com
info@eLLblog.com
Traditional Investigations
• Fingerprints
• Blood
• Fibers
• DNA
• Soil, fluids, debris
• Etc.
Digital Investigations
• Emails
• Documents, spreadsheets, data
bases, images, etc.
• File attributes (i.e., metadata)
• Internet activity
• File transfer and copying
• More…
Forensics
www.eLLblog.com
info@eLLblog.com
Electronically Stored Information - EVERYWHERE
•Laptops/Desktops
•Servers
•Phone Systems (VoIP)
•Printers & Copiers
•PDA’s/Cell phones
•CDs/DVDs
•USB Thumb Drive
www.eLLblog.com
info@eLLblog.com
The Corporate Enterprise Network
www.eLLblog.com
info@eLLblog.com
Statistics
INTERNET CRIME COMPLAINT CENTER 2009
 Received 336,655 complaints
 22.3% increase from 2008
 Total dollar loss: $559.7M USD
 In 2008 amount was $264.6M USD
 Companies pay $3.8M USD annually
www.eLLblog.com
info@eLLblog.com
Statistics
 Most Popular Cybercrime Targets
 Financial sector
 Hospitality industry
www.eLLblog.com
info@eLLblog.com
Statistics
 Most Common Complaints
 FBI Scam
 Non-Delivery Merchandise Payment
 Advance Fee Fraud
 Identity Theft
 Overpayment Fraud
 Miscellaneous Scam & Fraud
 Credit Card Fraud
 Auction
www.eLLblog.com
info@eLLblog.com
Cybercriminal Profile
American consumers & businesses?
www.eLLblog.com
info@eLLblog.com
Cybercriminal Profile
Male from the
United States
www.eLLblog.com
info@eLLblog.com
Data Security Risk
Type of Data
Credit Card #
Social Security #
“Secret Sauce”
Personal Information X
D.O.B. X
Drivers License X
Customer Information
www.eLLblog.com
info@eLLblog.com
Case Examples
.
.
www.eLLblog.com
info@eLLblog.com
Cybercrimes causing concern
U.S. government and businesses:
1. Corporate or Foreign Espionage
2. Malicious Insiders
3. E-mail Extraction Programs & Spamming
4. Hacking
www.eLLblog.com
info@eLLblog.com
Cyber Insurance Protection
Protection for Internet and network exposures
1. Liability: privacy and confidentiality
2. Copyright, trademark, defamation
3. Malicious code and viruses
4. Business interruption: network outages,
computer failures
5. Attacks, unauthorized access, theft, website
defacement and cyber extortion
6. Technology errors & omissions
7. Intellectual property infringement
Marsh: http://global.marsh.com/risk/ecommerce/
Chubb: http://www.chubb.com/businesses/csi/chubb822.html
www.eLLblog.com
info@eLLblog.com
Corporate or Foreign Espionage
Regardless of how large a cyber defense
budget is, it is difficult to protect from
covert activity of cyber spies
www.eLLblog.com
info@eLLblog.com
Malicious Insiders
Proactive:
 Watch historical patterns, which may help
catch employee who, for example, regularly
accessed sensitive corporate information
when others within the company did not
 Train employees so as to raise staff
awareness about insider threats
 Implement effective security policies
www.eLLblog.com
info@eLLblog.com
Email Extraction & Spamming
Sending email to thousands of people in
effort to sell a product or for data
collection purposes.
According to the U.S. Attorney’s Office,
nearly every college and university in the
U.S. was impacted by this scheme. Schools
spent significant funds to repair damage
and implement preventive measures.
www.eLLblog.com
info@eLLblog.com
Hacking
Hackers break into government or
business networks for profit, for the pure
thrill, or for bragging rights.
While off-site hacking once required
expertise in computer programming,
hackers can now retrieve attack scripts
and protocols from the Internet and use
them against victim websites.
www.eLLblog.com
info@eLLblog.com
Hacking
Some of our U.S.’s most popular
websites are vulnerable to hacking.
September 21, 2010 Twitter ravaged
with posts that took advantage of a
programming weakness to play pranks,
distribute pornography, and spread
worms to victim-users.
www.eLLblog.com
info@eLLblog.com
Hacking
One of the victims was the wife of the
former British Prime Minister Gordon
Brown as a link on her Twitter page sent
visitors to a hard-core porn site.
www.eLLblog.com
info@eLLblog.com
GoDaddy sites Hacked: myblindstudioinfoonline.com and
Hilary Kneber
Posted on September 17, 2010
www.eLLblog.com
info@eLLblog.com
U.S. Federal & State Action to
Combat Cybercrime
What are federal & state governments doing
to protect the U.S. from cyber attacks?
 Federal: Executive, Legislative & Judicial
Action
 State: Most proactive states - VA & FL
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government –
Executive Branch
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government –
Executive Branch
Executive Action
January 2008
President Bush issues Presidential
Directive establishing the
Comprehensive National Cybersecurity
Initiative (CNCI)
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government –
Executive Branch
 CNCI directive established twelve cyber defense
projects, identifying lead agencies for each.
 Department of Homeland Security (DHS) becomes lead
agency to protect U.S. computer-reliant critical
infrastructure.
 Report reveals deficiencies in key responsibilities since
2005:
 Cyber analysis and warning capabilities, cybersecurity
infrastructure, recovery from internet disruption, secure
internal information systems, organizational inefficiencies.
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government –
Executive Branch
President Obama
 February 2009 - Orders review of cybersecurity
plans and programs throughout federal
government (May 2009 report &
recommendations)
 April 2009 - Creates high-level Federal CIO
 Coordinate efforts to combat hackers and
cybercriminals
 June 2010 - Proposes National Cyber Identity law
 September 2010 - Seeks sweeping new regulations
for the Internet
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government –
Executive Branch
2009 Report
 Significant weakness and
vulnerability in security controls
 23 of the 24 major federal agencies
report problems
 Problems include reauthentication of
users, encryption, monitor for
security-related events
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government –
Executive Branch
Projects include
 Trusted Internet Connections
 Einstein 2, Einstein 3
 Research & Development Efforts
 Cyber Counterintelligence Plan
 Security of Classified Networks
 Expand Education
 Leap-Ahead Technology
 Deterrence Strategies and Programs
 Global Supply Chain Risk Management, and
 Public/Private Partnerships
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government –
Executive Branch
 Despite these efforts, executive branch fell victim to
successful cyber attack in July 2009, when
coordinated assault over several days targeted
websites of several government agencies, causing
major disruptions.
 Much work still to be undertaken, but proactive
measures are being employed and progress
continues to be made.
 Recent attacks led to proposed legislation to
empower President to disconnect any federal or U.S.
critical infrastructure info system or network for
national security.
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government
Agencies with Cyber Crime Efforts
 Department of Justice and FBI lead
the effort to investigate and prosecute
 Secret Service
 Immigration & Customs Enforcement
Agency
 Postal Inspection Service
 Bureau of Alcohol Tobacco &
Firearms
www.eLLblog.com
info@eLLblog.com
FBI Mission on Cyber Crime
o The FBI's cyber mission is four-fold:
o Stop those behind the most serious computer
intrusions and the spread of malicious code.
o Identify & thwart online sexual predators who
exploit children & circulate child pornography.
o Counteract operations that target U.S.
intellectual property, endangering national
security and competitiveness.
o Dismantle national and transnational organized
criminal enterprises engaging in Internet fraud.
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government
Legislative Cyber Crime Efforts
 February 2010 House of Representatives passed
(pending) the Cybersecurity Enhancement Act of 2010.
 Assist federal government efforts in developing skilled
personnel for its cybersecurity team
 Organize and prioritize various aspects of government’s
cybersecurity research and development
 Improve the shifting of cybersecurity technologies to the
marketplace, and
 Strengthen role of the National Institute of Standards &
Technology in developing and implementing cybersecurity
public awareness and education programs to promote best
practices.
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government
Legislative Cyber Crime Efforts
 The Senate’s cybersecurity proposed legislation
(March 2010): Cybersecurity Act of 2009
 Authorize grants to enhance cybersecurity
through research and workforce development
 Impose intergovernmental and private sector
mandates on owner/operator of info systems
designated by president as U.S.-critical
infrastructure
 i.e., financial networks, electric providers, petro
industry
 U.S.-critical infrastructure “threat alerts”
 Expands DHS authority
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government
Legislative Cyber Crime Efforts
 The Senate’s cybersecurity proposed legislation
(March 2010): Cybersecurity Act of 2009
 Problems:
 Industry opposition
 Upcoming election makes it unlikely that
comprehensive reform will pass this year
 Cost approximately $1.4 billion from 2011 to
2015
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government
Legislative Efforts
Computer Fraud and Abuse Act (CFAA):
Fraud and related activity in connection with computers
Internet Fraud:
Unfair or deceptive acts or practices; false advertising
Mail, wire, and bank fraud
Internet Sale of Alcohol or Firearms:
Firearms, Liquor traffic, and Shipments into states for
possession or sale
Online Child Pornography, Child Luring, and
Related Activities:
Sexual exploitation and other abuse of children; Transportation
for illegal sexual activity
CAN-SPAM Act 2003:
Delineates between unlawful spam and legal commercial email;
preempts states
www.eLLblog.com
info@eLLblog.com
Software Piracy and Intellectual Property
Theft:
Criminal copyright infringement
Frauds and swindles
Protection of trade secrets
Internet Sale of Prescription Drugs and Controlled Substances :
Unfair or deceptive acts or practices; false advertising
Smuggling goods into the United States
Mail, wire, and bank fraud
Federal Food, Drug, and Cosmetic Act
Drug Abuse Prevention and Control
Commonly Applied Federal
Laws
www.eLLblog.com
info@eLLblog.com
U.S. Federal Government
Existing Legislative Efforts
•SOX - Sarbanes Oxley Act
•HIPAA – Health Insurance Portability &
Accountability Act
•FACTA - Fair and Accurate Credit
Transaction Act of 2003
•GLB – Gramm-Leach-Bliley Act
•FCRA – Fair Credit Reporting Act
•RFR - “Red Flags Rule”
•FRCP – Amended Federal Rules of Civil
Procedure “eDiscovery”
•Related Industry Regulations
www.eLLblog.com
info@eLLblog.com
State Government –
Legislative Efforts
 Play key role in security
 Suffer from problems experienced
by federal and private sectors
 Budget crisis
 Delicate balance between security
and constitutional rights
 Faulty & Conflicting laws
www.eLLblog.com
info@eLLblog.com
State Government – Virginia Model
Legislative Efforts
Virginia Computer Crimes Act
(“VCCA”)
 Takes a multifaceted approach to
cybersecurity that includes:
 Virginia anti-spam statute
 Virginia Cyber Strike Force works with
the U.S. Attorney’s Office, State Police,
and FBI to fight cybercrime
www.eLLblog.com
info@eLLblog.com
State Government – Virginia Model
Legislative Efforts
VCCA criminalizes use of
 computer/computer network
 with intent to falsify/forge electronic mail
transmission info or other routing info
 in any manner in connection with
transmission of spam through or into
computer network of an electronic mail
service provider or its subscribers.
www.eLLblog.com
info@eLLblog.com
State Government – Virginia Model
Enforcement Efforts
Virginia Computer Crimes Unit
 Formed July 1999
 Works in cooperation with the U.S.
Attorney’s Office, State Police, and FBI
 Investigates & Prosecutes under VCCA
 Illegal spamming
 Child pornography: production,
distribution & possession
 Online enticement of children
 Identity theft
www.eLLblog.com
info@eLLblog.com
State Government – Virginia Model
Enforcement Efforts
VCCA penalties
 Violation of a portion of the statute is a misdemeanor, but it
may be upgraded to a felony if either
 the volume of spam transmitted exceeds a number of
recipients or revenue generated from a specific transmission
of spam exceeds an amount.
 Makes it a misdemeanor to knowingly sell, give, or otherwise
distribute or possess with the intent to sell, give, or distribute
software that
 primarily designed for purpose of facilitating falsification of
transmission info or other routing info of spam;
 has only limited commercially significant purpose or use; or
 is marketed in facilitating or enabling the falsification of the
transmission information or other routing information of spam
www.eLLblog.com
info@eLLblog.com
Conclusion
Crime is a problem that is impossible to solve.
Statutes and law enforcement measures have been one
step behind the criminals in the cyber realm.
Nevertheless, our government and the nation’s
businesses must take whatever steps possible to
combat cybercrime.
Tools for deterrence: Awareness & Education
Cybercrime is NOT a technology issue, it’s a
business issue
www.eLLblog.com
info@eLLblog.com
Thank You for your attention!
Any
Questions?
www.eLLblog.com
info@eLLblog.com
Fernando M. Pinguelo, Esq.
fmp@nmmlaw.com
@ellblog_dot_com
www.eLLblog.com
721 Route 202-206
Bridgewater, NJ 08807-5933
908-252-4128
Contact Information
www.eLLblog.com
info@eLLblog.com
You’re Fired!

Mais conteúdo relacionado

Mais procurados

III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinFecomercioSP
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
computer crime
computer crimecomputer crime
computer crime00jitesh00
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringJack Kessler
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption disputeHaniAbdallah4
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship ConversationsDarren Kuropatwa
 

Mais procurados (20)

Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
computer crime
computer crimecomputer crime
computer crime
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship Conversations
 

Destaque

Wclf infomation for participants
Wclf infomation for participantsWclf infomation for participants
Wclf infomation for participantsKj Hong
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Destaque (6)

Wclf infomation for participants
Wclf infomation for participantsWclf infomation for participants
Wclf infomation for participants
 
RDC Sales Overview
RDC Sales OverviewRDC Sales Overview
RDC Sales Overview
 
M&A Outlook 2012
M&A Outlook 2012 M&A Outlook 2012
M&A Outlook 2012
 
Kec training report
Kec training reportKec training report
Kec training report
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Semelhante a Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – apresentação de fernando pinguelo

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpFabio Ghioni
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solutionShohag Prodhan
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 

Semelhante a Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – apresentação de fernando pinguelo (20)

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
L Scope
L ScopeL Scope
L Scope
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Hacking
Hacking Hacking
Hacking
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 

Mais de FecomercioSP

irbem 2015 indicadores-sp_completa
irbem 2015  indicadores-sp_completairbem 2015  indicadores-sp_completa
irbem 2015 indicadores-sp_completaFecomercioSP
 
irbem 2015 indicadores-sp ppt
irbem 2015  indicadores-sp pptirbem 2015  indicadores-sp ppt
irbem 2015 indicadores-sp pptFecomercioSP
 
Apresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaApresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaFecomercioSP
 
Apresentação Renato Dolci
Apresentação Renato Dolci   Apresentação Renato Dolci
Apresentação Renato Dolci FecomercioSP
 
Dados e tendências sobre e-commerce
Dados e tendências sobre e-commerceDados e tendências sobre e-commerce
Dados e tendências sobre e-commerceFecomercioSP
 
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico FecomercioSP
 
A dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroA dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroFecomercioSP
 
Apresentação Anny Matumura - EY
Apresentação Anny Matumura - EYApresentação Anny Matumura - EY
Apresentação Anny Matumura - EYFecomercioSP
 
Apresentação Pesquisa Internet - Viviânne Martins
Apresentação Pesquisa Internet  - Viviânne MartinsApresentação Pesquisa Internet  - Viviânne Martins
Apresentação Pesquisa Internet - Viviânne MartinsFecomercioSP
 
Apresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoApresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoFecomercioSP
 
Apresentação Viviânne Martins
Apresentação Viviânne MartinsApresentação Viviânne Martins
Apresentação Viviânne MartinsFecomercioSP
 
Apresentação Antonio Borges
Apresentação Antonio BorgesApresentação Antonio Borges
Apresentação Antonio BorgesFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoReforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaReforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoReforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielReforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielFecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 

Mais de FecomercioSP (20)

irbem 2015 indicadores-sp_completa
irbem 2015  indicadores-sp_completairbem 2015  indicadores-sp_completa
irbem 2015 indicadores-sp_completa
 
irbem 2015 indicadores-sp ppt
irbem 2015  indicadores-sp pptirbem 2015  indicadores-sp ppt
irbem 2015 indicadores-sp ppt
 
Apresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaApresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia Esmeralda
 
Apresentação Renato Dolci
Apresentação Renato Dolci   Apresentação Renato Dolci
Apresentação Renato Dolci
 
Dados e tendências sobre e-commerce
Dados e tendências sobre e-commerceDados e tendências sobre e-commerce
Dados e tendências sobre e-commerce
 
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
 
A dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroA dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiro
 
Apresentação Anny Matumura - EY
Apresentação Anny Matumura - EYApresentação Anny Matumura - EY
Apresentação Anny Matumura - EY
 
Apresentação Pesquisa Internet - Viviânne Martins
Apresentação Pesquisa Internet  - Viviânne MartinsApresentação Pesquisa Internet  - Viviânne Martins
Apresentação Pesquisa Internet - Viviânne Martins
 
Apresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoApresentação Pesquisa de Emprego
Apresentação Pesquisa de Emprego
 
Apresentação Viviânne Martins
Apresentação Viviânne MartinsApresentação Viviânne Martins
Apresentação Viviânne Martins
 
Apresentação Antonio Borges
Apresentação Antonio BorgesApresentação Antonio Borges
Apresentação Antonio Borges
 
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoReforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
 
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaReforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
 
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoReforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
 
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielReforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – apresentação de fernando pinguelo

  • 1. www.eLLblog.com info@eLLblog.com Where law, technology, and human error collide Fernando M. Pinguelo, Esq. Norris McLaughlin & Marcus, P.A. New York | New Jersey | Pennsylvania fmp@nmmlaw.com Virtual Crimes – Real Damages Challenges Posed By Electronic Crimes In The United States
  • 5. www.eLLblog.com info@eLLblog.com A brief history  1967 “number-cropping operation” by a New York bank employee.  1970s rare and isolated:  MIT student used university computer to generate tones needed to access phone service.  John Draper discovers whistle in Cap'n Crunch cereal boxes and reproduces a 2600Hz tone.
  • 6. www.eLLblog.com info@eLLblog.com A brief history  1980s computer crimes grow:  Ian “Captain Zap” Murphy - first felon convicted of computer crime. Murphy hacked AT&T’s computers and changed billing clock so as to provide discounted rates during business hours.  U.S. Comprehensive Crime Control Act gives Secret Service jurisdiction over computer fraud.  War Games introduces public to the phenomenon of hacking (i.e., war-dialing).
  • 7. www.eLLblog.com info@eLLblog.com A brief history  After break-ins into gov’t and corporate computers, Congress passes Computer Fraud and Abuse Act, making it a crime. The law does not cover juveniles.  Computer Emergency Response Team (CERT) created.  First large-scale computer extortion case is investigated (under the pretence of a quiz on the AIDS virus, users download program which threatens to destroy all their computer data unless they pay $500 into a foreign account).
  • 8. www.eLLblog.com info@eLLblog.com A brief history  1990s  16-year-old student (“Data Stream”) arrested by UK police for penetrating computers at the Korean Atomic Research Institute, NASA and several U.S. government agencies.  CIA Director John Deutsh testifies foreign organized crime groups behind hacker attacks against U.S. private sector.  U.S. Communications Decency Act makes it illegal to transmit indecent/obscene material over Internet.
  • 9. www.eLLblog.com info@eLLblog.com A brief history  2000s:  Hackers break into Microsoft's corporate network and access source code for the latest versions of Windows and Office software.  Cyberattacks have grown more frequent and destructive in recent years.  TODAY (Literally): September 27, 2010  “U.S. Wants to Make It Easier to Wiretap Internet” Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet.
  • 10. www.eLLblog.com info@eLLblog.com Traditional Investigations • Fingerprints • Blood • Fibers • DNA • Soil, fluids, debris • Etc. Digital Investigations • Emails • Documents, spreadsheets, data bases, images, etc. • File attributes (i.e., metadata) • Internet activity • File transfer and copying • More… Forensics
  • 11. www.eLLblog.com info@eLLblog.com Electronically Stored Information - EVERYWHERE •Laptops/Desktops •Servers •Phone Systems (VoIP) •Printers & Copiers •PDA’s/Cell phones •CDs/DVDs •USB Thumb Drive
  • 13. www.eLLblog.com info@eLLblog.com Statistics INTERNET CRIME COMPLAINT CENTER 2009  Received 336,655 complaints  22.3% increase from 2008  Total dollar loss: $559.7M USD  In 2008 amount was $264.6M USD  Companies pay $3.8M USD annually
  • 14. www.eLLblog.com info@eLLblog.com Statistics  Most Popular Cybercrime Targets  Financial sector  Hospitality industry
  • 15. www.eLLblog.com info@eLLblog.com Statistics  Most Common Complaints  FBI Scam  Non-Delivery Merchandise Payment  Advance Fee Fraud  Identity Theft  Overpayment Fraud  Miscellaneous Scam & Fraud  Credit Card Fraud  Auction
  • 18. www.eLLblog.com info@eLLblog.com Data Security Risk Type of Data Credit Card # Social Security # “Secret Sauce” Personal Information X D.O.B. X Drivers License X Customer Information
  • 20. www.eLLblog.com info@eLLblog.com Cybercrimes causing concern U.S. government and businesses: 1. Corporate or Foreign Espionage 2. Malicious Insiders 3. E-mail Extraction Programs & Spamming 4. Hacking
  • 21. www.eLLblog.com info@eLLblog.com Cyber Insurance Protection Protection for Internet and network exposures 1. Liability: privacy and confidentiality 2. Copyright, trademark, defamation 3. Malicious code and viruses 4. Business interruption: network outages, computer failures 5. Attacks, unauthorized access, theft, website defacement and cyber extortion 6. Technology errors & omissions 7. Intellectual property infringement Marsh: http://global.marsh.com/risk/ecommerce/ Chubb: http://www.chubb.com/businesses/csi/chubb822.html
  • 22. www.eLLblog.com info@eLLblog.com Corporate or Foreign Espionage Regardless of how large a cyber defense budget is, it is difficult to protect from covert activity of cyber spies
  • 23. www.eLLblog.com info@eLLblog.com Malicious Insiders Proactive:  Watch historical patterns, which may help catch employee who, for example, regularly accessed sensitive corporate information when others within the company did not  Train employees so as to raise staff awareness about insider threats  Implement effective security policies
  • 24. www.eLLblog.com info@eLLblog.com Email Extraction & Spamming Sending email to thousands of people in effort to sell a product or for data collection purposes. According to the U.S. Attorney’s Office, nearly every college and university in the U.S. was impacted by this scheme. Schools spent significant funds to repair damage and implement preventive measures.
  • 25. www.eLLblog.com info@eLLblog.com Hacking Hackers break into government or business networks for profit, for the pure thrill, or for bragging rights. While off-site hacking once required expertise in computer programming, hackers can now retrieve attack scripts and protocols from the Internet and use them against victim websites.
  • 26. www.eLLblog.com info@eLLblog.com Hacking Some of our U.S.’s most popular websites are vulnerable to hacking. September 21, 2010 Twitter ravaged with posts that took advantage of a programming weakness to play pranks, distribute pornography, and spread worms to victim-users.
  • 27. www.eLLblog.com info@eLLblog.com Hacking One of the victims was the wife of the former British Prime Minister Gordon Brown as a link on her Twitter page sent visitors to a hard-core porn site.
  • 28. www.eLLblog.com info@eLLblog.com GoDaddy sites Hacked: myblindstudioinfoonline.com and Hilary Kneber Posted on September 17, 2010
  • 29. www.eLLblog.com info@eLLblog.com U.S. Federal & State Action to Combat Cybercrime What are federal & state governments doing to protect the U.S. from cyber attacks?  Federal: Executive, Legislative & Judicial Action  State: Most proactive states - VA & FL
  • 31. www.eLLblog.com info@eLLblog.com U.S. Federal Government – Executive Branch Executive Action January 2008 President Bush issues Presidential Directive establishing the Comprehensive National Cybersecurity Initiative (CNCI)
  • 32. www.eLLblog.com info@eLLblog.com U.S. Federal Government – Executive Branch  CNCI directive established twelve cyber defense projects, identifying lead agencies for each.  Department of Homeland Security (DHS) becomes lead agency to protect U.S. computer-reliant critical infrastructure.  Report reveals deficiencies in key responsibilities since 2005:  Cyber analysis and warning capabilities, cybersecurity infrastructure, recovery from internet disruption, secure internal information systems, organizational inefficiencies.
  • 33. www.eLLblog.com info@eLLblog.com U.S. Federal Government – Executive Branch President Obama  February 2009 - Orders review of cybersecurity plans and programs throughout federal government (May 2009 report & recommendations)  April 2009 - Creates high-level Federal CIO  Coordinate efforts to combat hackers and cybercriminals  June 2010 - Proposes National Cyber Identity law  September 2010 - Seeks sweeping new regulations for the Internet
  • 34. www.eLLblog.com info@eLLblog.com U.S. Federal Government – Executive Branch 2009 Report  Significant weakness and vulnerability in security controls  23 of the 24 major federal agencies report problems  Problems include reauthentication of users, encryption, monitor for security-related events
  • 35. www.eLLblog.com info@eLLblog.com U.S. Federal Government – Executive Branch Projects include  Trusted Internet Connections  Einstein 2, Einstein 3  Research & Development Efforts  Cyber Counterintelligence Plan  Security of Classified Networks  Expand Education  Leap-Ahead Technology  Deterrence Strategies and Programs  Global Supply Chain Risk Management, and  Public/Private Partnerships
  • 36. www.eLLblog.com info@eLLblog.com U.S. Federal Government – Executive Branch  Despite these efforts, executive branch fell victim to successful cyber attack in July 2009, when coordinated assault over several days targeted websites of several government agencies, causing major disruptions.  Much work still to be undertaken, but proactive measures are being employed and progress continues to be made.  Recent attacks led to proposed legislation to empower President to disconnect any federal or U.S. critical infrastructure info system or network for national security.
  • 37. www.eLLblog.com info@eLLblog.com U.S. Federal Government Agencies with Cyber Crime Efforts  Department of Justice and FBI lead the effort to investigate and prosecute  Secret Service  Immigration & Customs Enforcement Agency  Postal Inspection Service  Bureau of Alcohol Tobacco & Firearms
  • 38. www.eLLblog.com info@eLLblog.com FBI Mission on Cyber Crime o The FBI's cyber mission is four-fold: o Stop those behind the most serious computer intrusions and the spread of malicious code. o Identify & thwart online sexual predators who exploit children & circulate child pornography. o Counteract operations that target U.S. intellectual property, endangering national security and competitiveness. o Dismantle national and transnational organized criminal enterprises engaging in Internet fraud.
  • 39. www.eLLblog.com info@eLLblog.com U.S. Federal Government Legislative Cyber Crime Efforts  February 2010 House of Representatives passed (pending) the Cybersecurity Enhancement Act of 2010.  Assist federal government efforts in developing skilled personnel for its cybersecurity team  Organize and prioritize various aspects of government’s cybersecurity research and development  Improve the shifting of cybersecurity technologies to the marketplace, and  Strengthen role of the National Institute of Standards & Technology in developing and implementing cybersecurity public awareness and education programs to promote best practices.
  • 40. www.eLLblog.com info@eLLblog.com U.S. Federal Government Legislative Cyber Crime Efforts  The Senate’s cybersecurity proposed legislation (March 2010): Cybersecurity Act of 2009  Authorize grants to enhance cybersecurity through research and workforce development  Impose intergovernmental and private sector mandates on owner/operator of info systems designated by president as U.S.-critical infrastructure  i.e., financial networks, electric providers, petro industry  U.S.-critical infrastructure “threat alerts”  Expands DHS authority
  • 41. www.eLLblog.com info@eLLblog.com U.S. Federal Government Legislative Cyber Crime Efforts  The Senate’s cybersecurity proposed legislation (March 2010): Cybersecurity Act of 2009  Problems:  Industry opposition  Upcoming election makes it unlikely that comprehensive reform will pass this year  Cost approximately $1.4 billion from 2011 to 2015
  • 42. www.eLLblog.com info@eLLblog.com U.S. Federal Government Legislative Efforts Computer Fraud and Abuse Act (CFAA): Fraud and related activity in connection with computers Internet Fraud: Unfair or deceptive acts or practices; false advertising Mail, wire, and bank fraud Internet Sale of Alcohol or Firearms: Firearms, Liquor traffic, and Shipments into states for possession or sale Online Child Pornography, Child Luring, and Related Activities: Sexual exploitation and other abuse of children; Transportation for illegal sexual activity CAN-SPAM Act 2003: Delineates between unlawful spam and legal commercial email; preempts states
  • 43. www.eLLblog.com info@eLLblog.com Software Piracy and Intellectual Property Theft: Criminal copyright infringement Frauds and swindles Protection of trade secrets Internet Sale of Prescription Drugs and Controlled Substances : Unfair or deceptive acts or practices; false advertising Smuggling goods into the United States Mail, wire, and bank fraud Federal Food, Drug, and Cosmetic Act Drug Abuse Prevention and Control Commonly Applied Federal Laws
  • 44. www.eLLblog.com info@eLLblog.com U.S. Federal Government Existing Legislative Efforts •SOX - Sarbanes Oxley Act •HIPAA – Health Insurance Portability & Accountability Act •FACTA - Fair and Accurate Credit Transaction Act of 2003 •GLB – Gramm-Leach-Bliley Act •FCRA – Fair Credit Reporting Act •RFR - “Red Flags Rule” •FRCP – Amended Federal Rules of Civil Procedure “eDiscovery” •Related Industry Regulations
  • 45. www.eLLblog.com info@eLLblog.com State Government – Legislative Efforts  Play key role in security  Suffer from problems experienced by federal and private sectors  Budget crisis  Delicate balance between security and constitutional rights  Faulty & Conflicting laws
  • 46. www.eLLblog.com info@eLLblog.com State Government – Virginia Model Legislative Efforts Virginia Computer Crimes Act (“VCCA”)  Takes a multifaceted approach to cybersecurity that includes:  Virginia anti-spam statute  Virginia Cyber Strike Force works with the U.S. Attorney’s Office, State Police, and FBI to fight cybercrime
  • 47. www.eLLblog.com info@eLLblog.com State Government – Virginia Model Legislative Efforts VCCA criminalizes use of  computer/computer network  with intent to falsify/forge electronic mail transmission info or other routing info  in any manner in connection with transmission of spam through or into computer network of an electronic mail service provider or its subscribers.
  • 48. www.eLLblog.com info@eLLblog.com State Government – Virginia Model Enforcement Efforts Virginia Computer Crimes Unit  Formed July 1999  Works in cooperation with the U.S. Attorney’s Office, State Police, and FBI  Investigates & Prosecutes under VCCA  Illegal spamming  Child pornography: production, distribution & possession  Online enticement of children  Identity theft
  • 49. www.eLLblog.com info@eLLblog.com State Government – Virginia Model Enforcement Efforts VCCA penalties  Violation of a portion of the statute is a misdemeanor, but it may be upgraded to a felony if either  the volume of spam transmitted exceeds a number of recipients or revenue generated from a specific transmission of spam exceeds an amount.  Makes it a misdemeanor to knowingly sell, give, or otherwise distribute or possess with the intent to sell, give, or distribute software that  primarily designed for purpose of facilitating falsification of transmission info or other routing info of spam;  has only limited commercially significant purpose or use; or  is marketed in facilitating or enabling the falsification of the transmission information or other routing information of spam
  • 50. www.eLLblog.com info@eLLblog.com Conclusion Crime is a problem that is impossible to solve. Statutes and law enforcement measures have been one step behind the criminals in the cyber realm. Nevertheless, our government and the nation’s businesses must take whatever steps possible to combat cybercrime. Tools for deterrence: Awareness & Education Cybercrime is NOT a technology issue, it’s a business issue
  • 51. www.eLLblog.com info@eLLblog.com Thank You for your attention! Any Questions?
  • 52. www.eLLblog.com info@eLLblog.com Fernando M. Pinguelo, Esq. fmp@nmmlaw.com @ellblog_dot_com www.eLLblog.com 721 Route 202-206 Bridgewater, NJ 08807-5933 908-252-4128 Contact Information