Вы находитесь на странице: 1из 33

By

Ammar Jaffri
Former Additional DG, FIA
&
Currently Chairman Cyber Security
Task Force of Senate Defense
Committee
Scheme of Presentation
About Information Technology & Internet

Use of Technology by Criminals & Terrorists

Use of Technologies in Crime Investigations.

Use of Technologies by Terrorist organizations

Need for Regional and International cooperation for


better Policing.

Internet & Policing for Public safety

2
Introduction.. About My Self
• Former Additional Director General FIA and Pioneering
Head of National Response Center for Cyber Crimes.

• Currently Heading Cyber Security Task Force of Senate


Defense Committee.

• Chairman ICTs for Development Task Force of


Ministry of Science & Technology.

• Representing Pakistan in Number of Global Initiatives


on ICTD & Cyber Security
About Today’s Topic

Information Technology
As
Enabler for Better Policing

4
History of Information
Technology
• Started from ABACUS in China.
• Accurate Counting & Documenting has
always been a desire of Rulers in the Past.
• From Cash Registers to Computers.
• Computers of 70’s.
• 2nd Generation Computers … 90’s
• 3rd Generation Computers …. 2000-2008
• 4th Generation Computers … In your Hands
5
Internet !!!!
• History of Internet.
• Evolution From Radio To TV …..
• Internet before 2005
• Internet Today & Tomorrow.
• Encompasses Almost Every Walk of Life.
• Equal Opportunity For Good or Bad.
• Internet Today
• Internet of Tomorrow.
6
Historical Usage of Invention
by Criminals
• Criminals & First Industrial Revolution.
• Anti-Taghi Act 1860 by British Rulers.
• Double Shah of the Past.
• Criminals as Fast Learners.
• Always Take advantage of Change.
• Misuse of Telephone System by Criminals.
• Nigerian Scam 419…. Advanced Version
• Telephone Frauds ….
7
Use of Internet by Criminals
• Internet brought Equal Opportunities.
• Initially we did not discourage Hackers.
• From Cyber Crimes To Cyber Terrorism
• Cyber Warfare !!!! States Sponsored.
• Low Cost .. Anonymity …. More Loss.
• Dark Web … Under World of Internet.
• Misuse of Social Media
• Cooperation between Criminals
8
Challenges for Police Force
• Technology is evolving Fast … Revolution.
• Criminals are using latest Technologies.
• Budget Constrains for Eqpt & Trainings.
• Dedicated Technical Manpower with
proper Career Planning.

9
Need For Capacity Building of
Police Force
a) Police is always First Responder.
b) Traditional Criminals also Use Internet.
c) Evidence Collection from Crime Scene.
d) Digital Evidence is Volatile ..
f) Preservation of Evidence for Court.
g) Chain of Custody … Documented
h) NR3C ( FIA ) does not have offices
every where.
10
Coordination between
Departments to Catch Criminals.
• Digital Evidence is normally Distributed.
• No One Department has Full Capability.
• Cooperation Model with ISPs.
• WE need an Eco-System in which all may
work together.
• Scale-up model is Forensic Investigations.
• Universities must be engaged for R&D

11
Where Digital Evidence is
Available ???
• With Mobile / Land Phone Companies.
• With NADRA.
• At Airports .. Movement Record.
• ISPs / Cyber Cafes / Airports.
• CCTV Cameras / Hotels/offices/Safe City.
• Computers in Organizations/Homes.
• At Motor Ways ….
• Financial History / Shopping etc
12
Supporting Technologies
• Facial Recognition.
• AFIS ….. Ten Print Cards.
• Social Media
• Internet of Things.
• GPS Mapping
• Google / Search Engines …
• Priority Communication.
• Handheld Devices …. Policeman Book
13
Power of Link Analysis
• From Unknow To Know.
• One Piece of Information Leads to other.
• Crime Patterns With Fusion of Information
• Connecting the Missing Dots.
• Block Building … Software.
• Crime Dashboards for LE Officers.

14
Digital Forensics
• History of Digital Forensics.
• What is Digital Forensics.
• This is Impossible to Kill Data…
• Preservation of Evidence is Challenge.
• Police be trained as First Responder.
• Tangible Evidence ….
• Expert Witness

15
From Stone Coin To BitCoin
• New Ways to Make huge Payments. Police
need to be trained on ‘ FinTech ‘
• About BitCoin & Crypto Currencies.
• Branchless Banking is Future
• Internet of Things ( IoTs ) are coming in
lives very Fast.
• Policing of Driverless Cars.
• Police Need to align itself with CHANGE.
16
International Liaison
• Interpol.

• Crime Stoppers.

• Open Databases.. (With Search Parameter).

• Need Compliance

17
Tracking The Criminal in Cyber
Space
• Criminal are Vulnerable in Cyber Space.
• Digital Foot Prints.
• International Cooperation is available.
• Criminal Data Bases. ( Centralized )
• Presence / Groupings on Social Media.
• Payments to Hire Buildings / Rent a Car /
Hotel Stay / Movement Record etc.

18
Criminals Operate Beyond
Boarders

• Time & Technology NEVER wait for anyone

19
Use of Cyber Space . Future Trends and
Opportunities.

• By 2025 ….. WWW TO WWE


a) Eight Billion on line users.
b) World would be ‘ Hot Spot ‘.
c) IoT would create new opportunities.
d) Computers would be 64 times faster.
e) Big Data in 2025 would be like ‘Oil’
f) ICTD would be the only option.
g) AI & VRs would Create New Jobs …
h) Crypto Currencies .. Fast adoption.
World around us is Changing Fast
• Change is a law of nature... Internet has
brought the biggest change in History.
• From Evolution To Re
• From Industrial Revolution to VRs
• From Stone Coin To BitCoin
• From THINGs of Internet To Internet
Things.. What is Next !!!

21
World around us is Changing Fast
(Cont’d.)
• Our increasing Dependence on of Social
Networks & VOIP Communication.
Traditional ways to Monitor Criminals
need to Change.
• Without Secure Internet Good
Governance/ Policing is NOT Possible

• Globally Organizations are working


together for Public Safety
22
Correspondingly Increasing
Challenges.
• Increasing dependence on Latest
Technologies without Core Understanding.

• We took 60 years to build existing Internet


infrastructure … who uses it now at this
advanced stage ?????

• Criminals have their own dedicated


Communication networks. 23
Pro-active Defense Approach
• US declared Cyber Space as fourth front for
defense since long. Others followed …..
• Flip side of technology is always there we
need to strike a balance
• We need to be pro-active to combat the
misuse of Internet, Terrorists & Criminals
have already adopted its usage for their
purposes.

24
Use of Technology by Terrorists &
Criminals
• Historical linkages between advancements
& latest trends in crimes.

• Criminals always take advantage of


Change.

• Attacks on Face book & other Social Media


(Cyber Criminals have organized to identify
soft targets and vulnerable segments. 25
Use of Technology by Terrorists
& Criminals (Cont’d.)
• Use of mature technologies by criminals.

– Technologies in the hands of Terrorists.

– Much before Law enforcement drug dealers


had satellite phones in USA.

– Today criminals have their own Secure Mobile


communication networks ( Encrypt )
26
Threat Landscape.
• Due to use of latest technologies, ability of one to affect
many is scaling up exponentially….Equally for good or
bad purposes..

• Use of Robots and remote control devices (Drones ) by


Criminals is understandable. ( Recent arrest of Alqada
Drone expert in Karachi )

• 3D printing an opportunity and a challenge.

• Linkages between terrorists and traditional criminals.

27
From Cyber Crimes to Cyber
Terrorism / Warfare
• Initial success of cyber criminals
encouraged terrorists to use cyber space.
• Anonymity, low cost & scaling up
immediately are other support factors.
• Terrorists are using the cyber space for the
same purposes for which we are using it.
• Attacks on Financial Institutions are
increasing . ( Renent example of
BanglaDesh)
28
From Cyber Crimes to Cyber
Terrorism / Warfare (Cont’d.)
• New technologies have changed the way
terrorist organizations used to` operate.
Terrorists relies on global communications for:
– Command and Control
– Communications
– Propaganda & PsyOps
– Recruitment
– Fundraising
– Data mining
Internet as a Tool for Command &
Control
The same advantages the
Internet brings to the general
public and to business are
useful to international terrorist
groups:
– speed
– Security
– Global linkage
Preparing for Cyber Pearl Harbor

• Like what we saw in Pearl Harbor on December 7, 1941,


some candidates for a cyber "Battleship Row," may be
- Communication Routers;
- Internet Undersea Cables;
- Strategic Communications;
- Air defense / Critical Infrastructures;
- Electricity / Water Supply Systems.
- Banking and other Financial Systems.
- DNS Servers / Internet of Things.
- Rail / Air Travel Systems
31
Some Suggestions
• IT & Computer Systems are now part of
Police Working. Need for a ‘ Capacity
Building Policy ‘ with Implementation Plan
• Training must be part of Career Planning.
• Incentive Based IT Education.
• Promote On-Line Education to Police
• Early Warning Systems … Threat levels.

32
Questions
Ammar@brain.net.pk
0300-8551479

33

Вам также может понравиться