Professional Documents
Culture Documents
SLIDE #1 INTRO
GOOD MORNING. Thanks for the chance to talk with you about our
more challenging and dangerous world...
and the need for effective offensive security and online surveillance.
Let me put the focus on being on offense. Much of what we have heard
about here at Interpol World has been about keeping bad guys out of
your systems -- playing defense. I want to talk about the importance of
going after and hunting down the bad guys
History
State of public opinion an public policy
Implications and what we can do about it
SLIDE #2 MITNICK
So lets start in the 1970s. Thats when a 16-year-old named Kevin Mitnick
used a dial-up modem to break into the computers of Digital Equipment
Corporation (DEC) Once in, Mitnick stole software helping himself to
whatever interested him.
SLIDE #8 TOR
The Tor network deserves special mention in this context of old crimes
committed in new ways. Tor takes pride in providing anonymous Internet
connections to allow individuals to communicate in secret.
Advocates say Tor protects free expression, whistle bowers and activists
working to overcome repressive regimes.
Business Week magazine called Tor, perhaps the most effective means of
defeating the online surveillance efforts of intelligence agencies around the
world.
But lets make no mistake about this: Tor is the reason that the DarkNet is
growing and growing fast.
Tor is the doorway to the DarkNet for pornographers, sex traffickers,
contract killers, extortionists and, of course, a healthy market for illegal
drugs.
SLIDE #9 ULBRICHT
Of course, there have been successes by law enforcement like the arrest and
conviction of Ross William Ulbricht. The master-mind of the Silk Road
drug market was convicted in February (2015), and he faces life in prison at
his sentencing in May.
Despite this success, there is ample evidence that the sale and delivery of
narcotics remains robust on the DarkNet along with weapons trafficking,
pornography, and services for terrorists.
As Mumbai illustrates, for many years, it has been important that police
investigators be able to track the activity of criminals and terrorists as they
use mobile phones, computers and the Internet.
But coordinating attacks is only one of four objectives terrorists have in
mind when they think using of digital.
Others are:
(1) recruitment
(2) psychological warfare and promoting fear
(3) fund raising.
There are three new developments that make terrorist and criminal use of
digital technology far more dangerous than it has ever been.
SLIDE #13 DANGEROUS DEVELOPMENTS: Rise of Digital
Criminals
The first is the rise of criminals and terrorists of the digital generation.
Today's young terrorists grew up in the digital age.
They are fully conversant with modern communications technologies and
how to use them anonymously.
SLIDE #13A DANGEROUS DEVELOPMENTS: Global Reach
#2 The criminals and terrorists have global reach.
40% of the world's population is online. Criminals and their victims are
brought together in a new, unprecedented proximity.
11
13
14
More regulation
Slower technology development
Investigators unable to do their job and
A safe refuge for criminals online
Even here in Asia, restrictive action by government in the west has the
potential to take important tools out of your hands. And not just your
hands, but also the hands of investigators everywhere.
If advocates have their way, the development of surveillance technology
from Hacking Team and others could be stopped in its tracks.
This cannot be allowed to happen.
15
16
References:
Sage Reference: Henson, B., Reyns, B. (2011). Internet crime. In W.
Chambliss (Ed.), Key Issues in Crime and Punishment: Crime and criminal
behavior. (pp. 155-168). Thousand Oaks: SAGE Publications, Inc. doi
10.4135/9781412994118.12
http://www.sagepub.com/haganintrocrim8e/study/chapter/handbooks/42347
_10.2.pdf
17
18