Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

CYBERCRIME

No description
by

erik planken

on 5 November 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of CYBERCRIME

CYBERCRIME
PLAY
OF
STATE
Dutch approach to
POWERS
TO
ENFORCE
MINISTRY OF SECURITY AND JUSTICE
C:// INTRODUCTION.EXE
ERIK
PLANKEN
MINISTERY OF SECURITY & JUSTICE
LAW ENFORCEMENT DEPARTMENT
E.PLANKEN@MINVENJ.NL
OUTLINE PRESENTATION
National Cyber Security Strategy II
#2
#3
Action 2 = combat Cyber Crime
#4
international cooperation + EC3
#5
DISCUSSION
What is required?
combatting cyber crime: scope
National efforts
state of the art legislation (new law!)
priority for police and prosecution
raise levels of staff and knowledge

These apply to all criminal offences involving a computer system!
results in enforcement
Setting the stage
Changing landscape
1. Cloud computing
4. TOR-networks
3. Fast flux movement of data
USA
Netherlands
Germany
Spain
China
china
spain
netherlands
germany
portugal
russia
mexico
india
australia
southafrica
greece
italy
france
unitedstates
canada
iceland
norway
sweden
finland
denmark
poland
Discussion
?
What is your opinion
11
NOVEMBER
2013
CYBERCRIME
SEMINAR
Young The Hague
information analysis and sharing
+
operations / JIT
gap in the enforcement
borderless internet
territorial procedural penal law

data are no "goods" ("copy" is the "original")
data can be cut up in pieces

physical speed
virtual speed

anonymous internet
visible reality
contradictions
The Convention on Cybercrime
International Cooperation
next to MLA
Transborder access to data (art. 32b)
Public available data
With voluntary and lawful consent of person who lawfully can disclose
Under debate:
Sovereignty and territoriality
Jurisdiction to enforce
Jurisdisction is territorial, with the
exemption of 32b CCC
Crimes are global
Investigators are in need for:
* Stored data
* Processed data
* Transferring / communicating data
This helps evidence and information gathering

Expand unilateral possibilities to (transborder)
exercise powers to enforce
Cybernaut
VS.
Territoriality

expected
Policy
and
legislation
decisions
are to be
Council of Europe cybercrime convention

EU judicial framework

National laws
#1
introduction
cyber investigations need new
frontiers
NCSS II (2014-2016)
resilience against cyberattacks
combatting cybercrime
investment in secure ICT
building (global) alliances
NL is key in knowledge and skills
on cyber security
Time Frame = 2014 - 2016
International efforts
enhancement of coöperation
pivotal role EC3
JIT's
regional/global laws
2. Encryption
Full transcript