35
Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut #DLTm

Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Investigative powers and Power of intervention for DLT applications

Presented by Trevor Sammut

#DLTm

Page 2: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Public DLT/blockchain applications(i) Run over multiple machines (called nodes); (ii) connected in an ad hoc manner; (iii) typically anonymous; (iv) redundant data i.e. blocking a number of machines does not affect it; (v) the network is dynamic (nodes may appear or disappear at will).

Page 3: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Public DLT/blockchain applications(i) Run over multiple machines (called nodes); (ii) connected in an ad hoc manner; (iii) typically anonymous; (iv) redundant data i.e. blocking a number of machines does not affect it; (v) the network is dynamic (nodes may appear or disappear at will).

Page 4: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Public DLT/blockchain applications(i) Run over multiple machines (called nodes); (ii) connected in an ad hoc manner; (iii) typically anonymous; (iv) redundant data i.e. blocking a number of machines does not affect it; (v) the network is dynamic (nodes may appear or disappear at will).

Page 5: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Public DLT/blockchain applications(i) Some of the nodes may be running under Maltese jurisdiction, but not necessarily; (ii) remember that stopping these nodes does not stop the execution of the application.

Maltese jurisdiction

Page 6: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Users of the application(i) May interact by sending transactions to any node; (ii) users are typically also anonymous; (iii) although who the user is may not be known, all transactions to and from a user-address is visible and cannot be modified.

Page 7: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Maltese jurisdiction

Users of the application(i) Users may be operating from Malta or outside; (ii) through a node located in Malta or beyond.

Page 8: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Users of the application(i) For simplicity of use, many DLT applications are accessed via mobile apps or websites; but (ii) this does not stop users from accessing it directly through the DLT; (iii) for these users, the decentralized network can be seen as a monolithic database but which is immune to individual attacks.

Page 9: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Users of the applicationThe server may have access to certain information about access to the DLT application which is normally not available on the DLT nodes themselves e.g. IP address of user. Enforcement here shares options and challenges as when enforcing activity on normal websites. The architecture of any system NEEDS TO BE UNDERSTOOD CAREFULLY first.

Page 10: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

MDIA Certified DLT ApplicationsITAs require (i) a Forensic Node in Malta; and (ii) a Technical Administrator based in Malta who is responsible for maintaining and giving access to the forensic node to the relevant authorities.

Maltese jurisdictionForensic nodeTechnical

Administrator

Page 11: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Forensic NodeThe Forensic Node keeps an audit trail of all that is happening on the application be it (i) on the DLT (e.g. transactions); (ii) web site (e.g. IPs of users); (iii) website back-end (e.g. any KYC/AML checks done by the service provider to white list users); and (iv) mobile app (e.g. relevant user interaction).

Maltese jurisdictionTechnical

Administrator Forensic node

Page 12: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Power-of-InterventionThe Forensic Node must also contain the logic to be able (where and when possible) to use the information stored in the node audit trail to intervene when things go wrong (e.g. when a court decides that a certain transaction should be reversed). This can be invoked by the technical administrator. The data must be handed over in a traceable form to investigative authorities (ex: Police). Full details are in the Forensic Node Guidelines by MDIA.

Maltese jurisdictionTechnical

Administrator Forensic node

Page 13: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Investigation and Intervention (I)Keep in mind that intervening on the DLT itself is impossible. Intervening at the website/server-level is also useless since the application can still be accessed by users.

Maltese jurisdictionTechnical

Administrator Forensic node

Page 14: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Investigation and Intervention (II)If the Forensic Node is seized and blocked, the functionality of the DLT application is not impaired, and will proceed nonetheless.

Maltese jurisdictionTechnical

Administrator Forensic node

Page 15: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Investigation and Intervention (III)Even worse, if the Forensic Node is seized and its functionality stopped for investigative reasons, power-of-intervention may be impaired e.g. if an application is performing illegal transactions, and the FN is stopped, information about transactions taking place after would NOT be kept for PoIicing purposes.

Maltese jurisdictionTechnical

Administrator Forensic node

Page 16: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Investigation and Intervention (IV)If the Forensic Node contains multiple copies of the database, certified by the MDIA to be identical, it would suffice to seize one of the servers storing all the data, but allow the Forensic Node to proceed unhindered thus not compromising power-of-intervention.

Maltese jurisdictionTechnical

Administrator Forensic node

Page 17: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Thank YouQ&A

On Scams, User Exploitation, Phishing and the innovative technologies that cybercriminals can employ with criminal intent.

website: https://www.mdia.gov.mt

DLT Guidelines Link: https://mdia.gov.mt/ita-guidelines/

AI Guidelines (Consultation Drafts to be finalised soon): https://mdia.gov.mt/consultation

Email: [email protected]

Page 18: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

New Technologies …Different Risks?

Timothy J. ZAMMITInspector of Police

Cyber Crime Unit#DLTm

Page 19: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Never ever have I said or thought …

Updates slowthings down ..

better avoid them!

It will neverhappen to me ..

He’s an expert cos he’s always got the latest smartphone

I don’t need the user manual!

It does what it’s supposed to do .. I

don’t need to know how it works!

If it’s not broken ..don’t change it!!

Page 20: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Case Study: Chain of Events (1)• A computer server is found damaged. ICT support agency believes

that it is a technical fault. Computer server is formatted and a newoperating system is installed.

• Another computer server belonging to same company starts actingsuspiciously. Once again, ICT support agency blames it down to atechnical fault.

• Two other servers indicate an intrusion with files modified ordeleted.

Page 21: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Case Study: Chain of Events (2)• Police are called in after data on servers is restored from back-ups.

• Remaining logs indicate an intrusion. Analysis indicates a commonIP address in two of these instances.

• Information is obtained from ISPs establishes a suspect ..

Page 22: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Case Study: Findings• Suspect is an ex-employee who was recently sacked. Motive is

revenge.

• Login information and passwords were never returned or changed.

• Suspect was authorized to administer all systems remotely.

• Remote access was always available and not monitored.

No policies in place = a recipe for disaster!

Page 23: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Some Examples …

Page 24: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

SUPPORT ENDED IN APRIL 2014

SUPPORT ENDED IN JANUARY 2020

Page 25: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm
Page 26: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm
Page 27: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm
Page 28: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm
Page 29: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm
Page 30: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

A risk based approach

Page 31: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

A risk based approach

• How important is this information?

• Why should I protect it?

• Who am I engaging to protect it?

• What technical measures should I put in place?

• Are users informed too?

• What should be done when something goes wrong?

Page 32: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

A risk based approach

• Account Settings

• Password policy

• Control over personal data

• Logs and auditing mechanisms

• Updated software (operating system, browsers, etc).

• Updated technical security measures (firewall, anti-virus, etc)

Page 33: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

A risk based approach

• What information am I sharing and how can this be used?

• Do you know who you’re dealing with?

• Can information provided be independently verified?

• What remedial action is available?

• Are you aware of the latest risks?

Page 34: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

A risk based approach

Page 35: Investigative powers and Power of intervention for DLT ... · Investigative powers and Power of intervention for DLT applications Presented by Trevor Sammut ... Cyber Crime Unit #DLTm

Thank You For Your Attention

Timothy J. ZAMMITInspector of Police

Cyber Crime UnitMalta Police Force

(+356) 2294 2231 - 2

[email protected]@gov.mt

#DLTm