Actions against Cybercrime

30
Actions against Cybercrime By: Vivienne K. Tan Thames International Business School 'NEW WAYS TO EMPOWER INDONESIA WITH INTERNET AND ICTs' Seminar, Indonesia

description

Actions against Cybercrime. By: Vivienne K. Tan Thames International Business School. 'NEW WAYS TO EMPOWER INDONESIA WITH INTERNET AND ICTs' Seminar, Indonesia. Thames International Business School. Established in 1999 as the first international college in the Philippines - PowerPoint PPT Presentation

Transcript of Actions against Cybercrime

Page 1: Actions against Cybercrime

Actions against Cybercrime

By: Vivienne K. TanThames International Business School

'NEW WAYS TO EMPOWER INDONESIA WITH

INTERNET AND ICTs' Seminar,

Indonesia

Page 2: Actions against Cybercrime

Thames International Business School

• Established in 1999 as the first international college in the Philippines

• Fastest growing educational institution

• Catalyst for the globalization of Philippines Higher Education

Page 3: Actions against Cybercrime

Suspected Hacking Incident

• Suspected that system was hacked into

• Sensitive proprietary information copied

• Possibility of conspiracy among the employees

Page 4: Actions against Cybercrime

Choices• Proceed with investigation and file

a case in court• Remain silent, do damage control,

and hope it will not happen again

Page 5: Actions against Cybercrime

Risks

• Generating media curiosity as first case under the new E-commerce law

• Damage to Thames’ reputation• “Free advertisement” for hackers

Page 6: Actions against Cybercrime

Protecting the Country’s Reputation

• Time Magazine portrayed Philippines as a “Hacker Paradise”

• Thames’ Cyber-crime case could backfire against Philippines

Page 7: Actions against Cybercrime

Challenges of Pursuing the Investigation

• In 2001, National Bureau of Investigation (NBI) had no equipment

• Deployment of British computer forensic experts

• Technical training for NBI agents and lawyers

Page 8: Actions against Cybercrime

Thames’ Two-Pronged Approach

•File the case in court•Public Relations and

Advocacy Campaign

Page 9: Actions against Cybercrime

Advocacy Campaign• Public Relations to safeguard

Thames’ reputation• Cushion Philippines’ image• Advocacy against cyber-crime and

Intellectual Property Rights violators

Page 10: Actions against Cybercrime

Manifesto• A call for Ethics on the Use of

Information and Information Technology

• Supported by industry, academic, and political leaders

Page 11: Actions against Cybercrime

Who are we?

A Call for Ethics on the Use of Information and Information Technology 

The local and international newsbytes of the last few weeks speak volumes of the dilemma we have brought upon ourselves in this emerging information age. Some weeks ago, articles came out in the major dailies revealing the continuing deterioration of intellectual property rights protection in the country. The news spoke of a lack of resolve from the private sector to pursue intellectual property rights cases in court; evidently, companies would rather settle cases out-of-court than go through the trouble of pursuing cases to their conclusion. More recently, a TIME Magazine article portrayed the Philippines as a "Hackers' Paradise." While TIME's portrayal is still to be substantiated in full, such releases speak of the dubious reputation we have earned for ourselves after the Philippine-made Love Bug virus cost the world some $10 billion worth of lost time and data in 2000 alone. Certainly, the time has come for changes in the way we think about the issue of ethics in the use of information and information technology. We believe that we must not, in any manner, show leniency to the perpetrators of intellectual property crimes if we are to partake fully of the benefits of the new economy. The unauthorized use of intellectual property, which has become so pervasive in our society, costs us untold millions in terms of potential investment and trade. More importantly, our lack of respect for intellectual property rights continues to stunt the growth of our information and knowledge pool, something that we cannot do without. Indeed, we have created a situation which requires a new statement regarding our values and beliefs given the changes wrought by the information age. Such a vital, fearless, and frank statement is necessary if we are to make changes that will allow us to chart the course of society and economy in this new landscape. We therefore affirm and commit to implement the following basic principles: First: We believe that information technologies such as computers are powerful tools that must be used prudently and with consideration to those who might be affected by it. Three main tenets are operative here: (1) We will not interfere with other people's computer work. (2) We will not access other people's computer files without authorization. (3) We will not use information technologies to commit any crime. Second: The generation of useful information requires human effort that must be compensated adequately. We are convinced of the intrinsic and independent value of intellectual property and we therefore affirm that the unauthorized copying and use of proprietary material is tantamount to theft. Third: A strong intellectual property rights protection system is in the interest of the nation. We should not believe that enforcing intellectual property rights means conceding power to the large, faceless, uncaring organization. Where intellectual property is protected, opportunities will soon arise for all. So stand these tenets of the information age. We must now set intelligence and will to the task.   

WE AFFIRM:

Page 12: Actions against Cybercrime

Results of the Advocacy• Increased awareness about cyber-

crime• More support for law enforcers• New organizations formed

Page 13: Actions against Cybercrime

The Youth Sector• Formation of I.T. Ethics movement

among the university students• “10 Rules of I.T. Ethics” developed

Page 14: Actions against Cybercrime

Disappointments and Frustrations

• Slow judicial system• Stronger cyber-crime law delayed

in congress• New cyber-crime victims remain

silent

Page 15: Actions against Cybercrime

The Reasons Why…• No sense of urgency regarding

dangers of cyber-crime• Asian perspective of “saving face”

as a victim

Page 16: Actions against Cybercrime

Moving On

Page 17: Actions against Cybercrime

Point of View as:•As a cyber-crime victim•As an educator

Page 18: Actions against Cybercrime

As Cyber-crime victim• Government’s failure to provide

conducive environment for reporting cyber-crime violations

Page 19: Actions against Cybercrime

INFRAGARD• Formed in the US in 1996• Partnership between private

industry and government (FBI)• Developed to encourage exchange

of information between government and private sector

Page 20: Actions against Cybercrime

Quote from INFRAGARD strategic plan for 2003

Creating Trust Networks“Information sharing begins with human relationships-people talking with people whom they trust. The public-private partnership is based on trust, generated by people getting to know one another in business as well as more casual setting such as conferences.”

Page 21: Actions against Cybercrime

INFRAGARD ASIA

• Creating an Asian model and working with INFRAGARD U.S.

• Headed by an Asia Pacific Executive Council through a network of INFRAGARD chapters in all APEC member countries

Page 22: Actions against Cybercrime

As an Educator• Advances in Information

Communication Technology (ICT) provide access to the general public

• Potential good or destructive use• Youth being confused and

disoriented regarding cyber-crime

Page 23: Actions against Cybercrime

Pro-active Solutions

• Youth orientation awareness and information campaign on the responsible use of ICT

• Helping the youth distinguish right from wrong in the use of ICT

Page 24: Actions against Cybercrime

the Philippine and Indonesian situation is very similar.

 

Page 25: Actions against Cybercrime

 

“Philippines and Indonesia were rated in the same category, in terms of ICT

readiness. According to the audit, both our countries have similar

infrastructure in place and more or less the same level of highly skilled

I.T. workers. “audit done by IBM on the e-ASEAN effort

Page 26: Actions against Cybercrime

Both Philippines and Indonesia are paralyzed by the heinous and ruthless crimes of a small group of terrorists.

Page 27: Actions against Cybercrime

“ …among the terrorist states, the most active in cyber related attacks are Iran, Pakistan, Egypt, and

Indonesia.”

Stated in the Internet Security Report last July 2002:

Page 28: Actions against Cybercrime

Indonesia and Philippines must :• ensure our laws and policies are in place, • must build the capacity of their cybercrime law enforcers to international standards• make certain that our judiciary is ready. 

 

Page 29: Actions against Cybercrime

People must be educated and made aware on what it is to be responsible

and ethical citizens of technology 

Page 30: Actions against Cybercrime

Thank You

Vivienne K.TanThames Int’l Business School

[email protected]