Slide 1 23rd May, 2008 Salma Abbasi Chairperson, e WWG Delivering Value Through Information Communication Technology Overview of Cyber Crime Slide 2 Background Growth of Internet Use Source: www.internetworldstats.com Copyrights © e Worldwide Group, 2008 2 Slide 3 Impact Today Transformation of Criminal Battle Field Conventional Crime – Single plane Cyber Crime – Multiple platforms and planes Copyrights © e Worldwide Group, 2008 3 Slide 4 Information Super Highway Copyrights © e Worldwide Group, 2008 4 Slide 5 Growing Sophistication in Attacks Hacking Social Engineering Cyber Stalking Identity theft Denial of Service Attack Net Extortion Virus Dissemination Phishing Software Piracy Spoofing IRC Crime Salami Attack Botnets Cyber Defamation Copyrights © e Worldwide Group, 2008 5 Slide 6 Complex Problem Multiple Layers of Vulnerability - Criminal Penetration Economic Front Economic Fraud Stock Market Loss “Entertainment” Pornography Pedophiles Human Trafficking Prostitution Financial market Bank Frauds Personal Identity Infrastructure Credit Cards Thefts Identity Card Thefts VIP – Movies Stores Harassment Botnet Denial Of Service attack - DOS Industry Airline Reservation Net Extortion Terrorism Copyrights © e Worldwide Group, 2008 6 Slide 7 Facts & Figures 237 Million Security Attacks Globally (Aug, 2005) 54 Million Attacks on Government Agencies 36 Million Attacks on Manufacturing Agencies 34 Millions Attacks on Financial Services 17 Million Attacks on Health Care Source: CRS Report for Congress (Jan, 2008) Copyrights © e Worldwide Group, 2008 7 Slide 8 Facts & Figures More than 4 Million people worldwide are victims of Human Trafficking every year Organization for Security and Cooperation in Europe Source: www.radio.cz/en/article/60695 18,000 to 20,000 Persons are Trafficked into US Annually U.S. Department of State, 2003 Source: www.blackwell-sygnery.com Human Trafficking is a $ 32 billion Industry International Labor Office (ILO) Human Trafficking Awareness Conference – Denver, CO – Oct . 25,2008 Copyrights © e Worldwide Group, 2008 8 Slide 9 Global Problem Vulnerable impact everyone Every country Developed or Developing North or South Problem transcends Culture and Values Development Wealth “Borders “Cascading Effect” Copyrights © e Worldwide Group, 2008 9 Slide 10 Challenges Trust – “Building Confidence in each other” Share negative incidents – data Share impact on any level Fear of compromising position in business Banks don’t admit frauds openly Pentagon has breach by hackers Army cantonment being penetrated Copyrights © e Worldwide Group, 2008 10 Slide 11 What do we do? Focus and Prioritize Partner in the True Sense to Create and Build Comprehensive “Implementable Policies” Holistic Strategies with “Realistic Roadmaps” Integrated across Multiple Dimensions Implement HLEG Concept Creating layers of Protection across Boarders Cultures Copyrights © e Worldwide Group, 2008 11 Slide 12 Complex Task HGLC Cyber Space Crime Security Borderless Different Laws Cultural Differences Holistic Partnerships Awareness Different Systems Acceptable Behaviors Multi-Stakeholder ITLiteracy Different Monitoring Differing Priorities Multi-Sector Vulnerability Different Groups Vulnerable Awareness Partnerships Human Trafficking & Terrorism Copyrights © e Worldwide Group, 2008 12 Slide 13 Prioritize and Mobilize – Next Steps • Focus – Create Neutral Platforms – Counter Terrorism - Prevent Radicalization – Human Trafficking – Sexual exploitation Create multiple “Access” points Counter Negative Influences Build Awareness in Youth Innocent and Vulnerable Easy target Recruitment Brainwashing ....................... Copyrights © e Worldwide Group, 2008 13 Slide 14 Eg. Neutral Platform CT Prevent Suicide Attacks Prevent Extremism & Hatred Promote Neutral Platform and Discussionfor CT Understanding and Forum Peace Through ICTs respect Promote Interfaith Harmony Youth Groups Moderate Clerics Copyrights © e Worldwide Group, 2008 Academia 14 Slide 15 Eg CT and Radicalization Creating a group of neutral/moderate clerics to present counter arguments for suicide bombing and hatred Creating group of interfaith clerics and priests to argue peace – all faith, all human life is precious Creating discussion groups for youth to dialogue across faith Suzanne Mubarak ICT for Peace Using technology “Entertainment platform” Freedom Theatre Copyrights © e Worldwide Group, 2008 15 Slide 16 Eg CT and Radicalization The Freedom Theatre - Palestine The aim of project is to empower and give voice to the children of Jenin Refugee Camp A unique programme of workshops and activities in theatre supporting arts and multi-media. Suzanne Mubarak’s International Peace Movement It focuses on the positive and holistic aspects of peace, helping to forge alternative communication networks, Developing capacities, creating avenues for cooperative action and making silent voices heard. Copyrights © e Worldwide Group, 2008 16 Slide 17 Management Framework - Closed Loop Feedback System - Cyber Crime Technology Industry Academia R&D Government Organization Law Enforcement Think Tanks Channel of Information Common Global Neutral Platform Monitoring & Analysis Reaction & Communicate All ITU Member Countries Jointly Agreed Jointly Jointly Agreed Agreed Jointly Jointly Agreed Agreed Standards Standards & & Definition Definition Rapid Rapid Response Response for for Containment Containment Corrective Action Lesson Learned Preventive Measures Internationally Agreed Legal Framework is Key Agreed Minimum Response for “Containment” Protect Affected Countries Alert & Notification System for Global Members Alert Alert Systems Systems Proactive Proactive Emergency Emergency Rapid Rapid Response Response Copyrights © e Worldwide Group, 2008 Build Build ““Shared” Shared” Shared” Knowledge Knowledge Base Base Slide 18 Thank You