14
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service

Enforcing Cyber Security in the Digital Environment

Embed Size (px)

DESCRIPTION

Enforcing Cyber Security in the Digital Environment. Presented Insp. Amos Sylvester Trinidad and Tobago Police Service. Definition. - PowerPoint PPT Presentation

Citation preview

Page 1: Enforcing  Cyber  Security in the Digital  Environment

Page 1

Presented Insp. Amos Sylvester

Trinidad and Tobago Police Service

Page 2: Enforcing  Cyber  Security in the Digital  Environment

Page 2

• Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may have been an instrumental tool or target in the commission of a crime. Three Categories mainly:-

– Crimes against Persons

– Crimes against Property

– Crimes against Government or Country

Page 3: Enforcing  Cyber  Security in the Digital  Environment

Page 3

• Cybercrime is viewed by law enforcement in T&T as traditional crimes, where perpetrators use technology as the vehicle for their nefarious activities.

Page 4: Enforcing  Cyber  Security in the Digital  Environment

Page 4

Current TrendsCurrent Trends

Online Lottery Scams Online Lottery Scams Identity theftIdentity theft Credit card fraudCredit card fraud ATM FraudATM Fraud Money launderingMoney laundering Spoofing and PhishingSpoofing and Phishing Child PornographyChild Pornography Cyber BullyingCyber Bullying Bombs threatsBombs threats Nigerian ScamsNigerian Scams

Page 5: Enforcing  Cyber  Security in the Digital  Environment

Page 5

Page 6: Enforcing  Cyber  Security in the Digital  Environment

Page 6

Cyber PerspectiveCyber Perspective

The The

modern thiefmodern thief

can steal more with a computercan steal more with a computer

than with a gun.than with a gun.

Tomorrow's terrorist may be able to do Tomorrow's terrorist may be able to do more damage with a keyboard than with a more damage with a keyboard than with a

bomb". bomb".

National Research Council, U S A "Computers at Risk”.1991National Research Council, U S A "Computers at Risk”.1991

Page 7: Enforcing  Cyber  Security in the Digital  Environment

Page 7

TTPS Investigative Framework TTPS Investigative Framework

Reports of technology based crimes are made to Reports of technology based crimes are made to Police Stations/ Sections of TTPS/ Online from Police Stations/ Sections of TTPS/ Online from TTPS Website.TTPS Website.

Investigators are appointed, who are promptly Investigators are appointed, who are promptly assisted by the experts of the Cyber Crime Unit assisted by the experts of the Cyber Crime Unit as it relates to technical investigations.as it relates to technical investigations.

Page 8: Enforcing  Cyber  Security in the Digital  Environment

Page 8

Legislative FrameworkLegislative Framework

There are four (4) main pieces of legislationThere are four (4) main pieces of legislation

at present in Trinidad and Tobago that governat present in Trinidad and Tobago that govern

investigation and prosecution of High Technologyinvestigation and prosecution of High Technology

Crimes. They are as follows:-Crimes. They are as follows:- Computer Misuse Act of 2000Computer Misuse Act of 2000 Telecommunications Act of 2001Telecommunications Act of 2001 Interception of Communications Act 2010Interception of Communications Act 2010 Offences against the Person “Harassment”Offences against the Person “Harassment”

Page 9: Enforcing  Cyber  Security in the Digital  Environment

Page 9

Proposed LegislationProposed Legislation

CYBER CRIME BILL

•The Trinidad and Tobago Cybercrime Bill 2014 was introduced in the House of Representatives in March 2014 to provide for the creation of offences related to cybercrime and for other related matters in Trinidad and Tobago.

•In July 2014 when parliament dissolved the Cyber Crime Bill Lapsed as a result there is to be a reintroduction of the said Bill in Parliament.

Page 10: Enforcing  Cyber  Security in the Digital  Environment

Page 10

Cyber Crime BillCyber Crime Bill

The Cyber Crime Bill is intended to provide offences relating to the following matters:-

Child Pornography Using a computer system to set up a meeting

with a child for the purpose of abusing the child.

The offence of violating a person’s  privacy by capturing and sharing pictures or videos of a person’s private area without his consent.

Cyber Bullying

Page 11: Enforcing  Cyber  Security in the Digital  Environment

Page 11

Collaborative AspectsCollaborative Aspects

With the advent of the world wide web coupled with With the advent of the world wide web coupled with the prolific rate of technological advancements in our the prolific rate of technological advancements in our region, criminals are using these advancements as region, criminals are using these advancements as catalysts for worldwide iniquitous activities.catalysts for worldwide iniquitous activities.

Thus in order to realistically combat the “dark-side of Thus in order to realistically combat the “dark-side of technology” law enforcement officials from different technology” law enforcement officials from different nationalities must co-operate to detect, apprehend and nationalities must co-operate to detect, apprehend and successfully prosecute Cyber-Criminals.successfully prosecute Cyber-Criminals.

Page 12: Enforcing  Cyber  Security in the Digital  Environment

Page 12

• Ministry of National Security– Cyber Security Agency

- Computer Policies at National Level

- Computer Security Incident Response Team (C.S.I.R.T)

• - Education and Awareness

Page 13: Enforcing  Cyber  Security in the Digital  Environment

Page 13

ConclusionConclusion

Successful Successful

Cyber-Crime investigationCyber-Crime investigation

and effective Cyber Security and effective Cyber Security can only be achieved using can only be achieved using

holistic multi-national holistic multi-national approaches.approaches.

Page 14: Enforcing  Cyber  Security in the Digital  Environment

Page 14

I Click Therefore I am.I Click Therefore I am.