1 / 30

Actions against Cybercrime

Actions against Cybercrime. By: Vivienne K. Tan Thames International Business School. 'NEW WAYS TO EMPOWER INDONESIA WITH INTERNET AND ICTs' Seminar, Indonesia. Thames International Business School. Established in 1999 as the first international college in the Philippines

emilie
Download Presentation

Actions against Cybercrime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Actions against Cybercrime By: Vivienne K. Tan Thames International Business School 'NEW WAYS TO EMPOWER INDONESIA WITH INTERNET AND ICTs' Seminar, Indonesia

  2. Thames International Business School • Established in 1999 as the first international college in the Philippines • Fastest growing educational institution • Catalyst for the globalization of Philippines Higher Education

  3. Suspected Hacking Incident • Suspected that system was hacked into • Sensitive proprietary information copied • Possibility of conspiracy among the employees

  4. Choices • Proceed with investigation and file a case in court • Remain silent, do damage control, and hope it will not happen again

  5. Risks • Generating media curiosity as first case under the new E-commerce law • Damage to Thames’ reputation • “Free advertisement” for hackers

  6. Protecting the Country’s Reputation • Time Magazine portrayed Philippines as a “Hacker Paradise” • Thames’ Cyber-crime case could backfire against Philippines

  7. Challenges of Pursuing the Investigation • In 2001, National Bureau of Investigation (NBI) had no equipment • Deployment of British computer forensic experts • Technical training for NBI agents and lawyers

  8. Thames’ Two-Pronged Approach • File the case in court • Public Relations and Advocacy Campaign

  9. Advocacy Campaign • Public Relations to safeguard Thames’ reputation • Cushion Philippines’ image • Advocacy against cyber-crime and Intellectual Property Rights violators

  10. Manifesto • A call for Ethics on the Use of Information and Information Technology • Supported by industry, academic, and political leaders

  11. A Call for Ethics on the Use of Information and Information Technology The local and international newsbytes of the last few weeks speak volumes of the dilemma we have brought upon ourselves in this emerging information age. Some weeks ago, articles came out in the major dailies revealing the continuing deterioration of intellectual property rights protection in the country. The news spoke of a lack of resolve from the private sector to pursue intellectual property rights cases in court; evidently, companies would rather settle cases out-of-court than go through the trouble of pursuing cases to their conclusion. More recently, a TIME Magazine article portrayed the Philippines as a "Hackers' Paradise." While TIME's portrayal is still to be substantiated in full, such releases speak of the dubious reputation we have earned for ourselves after the Philippine-made Love Bug virus cost the world some $10 billion worth of lost time and data in 2000 alone. Certainly, the time has come for changes in the way we think about the issue of ethics in the use of information and information technology. We believe that we must not, in any manner, show leniency to the perpetrators of intellectual property crimes if we are to partake fully of the benefits of the new economy. The unauthorized use of intellectual property, which has become so pervasive in our society, costs us untold millions in terms of potential investment and trade. More importantly, our lack of respect for intellectual property rights continues to stunt the growth of our information and knowledge pool, something that we cannot do without. Indeed, we have created a situation which requires a new statement regarding our values and beliefs given the changes wrought by the information age. Such a vital, fearless, and frank statement is necessary if we are to make changes that will allow us to chart the course of society and economy in this new landscape. We therefore affirm and commit to implement the following basic principles: First: We believe that information technologies such as computers are powerful tools that must be used prudently and with consideration to those who might be affected by it. Three main tenets are operative here: (1) We will not interfere with other people's computer work. (2) We will not access other people's computer files without authorization. (3) We will not use information technologies to commit any crime. Second: The generation of useful information requires human effort that must be compensated adequately. We are convinced of the intrinsic and independent value of intellectual property and we therefore affirm that the unauthorized copying and use of proprietary material is tantamount to theft. Third: A strong intellectual property rights protection system is in the interest of the nation. We should not believe that enforcing intellectual property rights means conceding power to the large, faceless, uncaring organization. Where intellectual property is protected, opportunities will soon arise for all. So stand these tenets of the information age. We must now set intelligence and will to the task. Who are we? WE AFFIRM:

  12. Results of the Advocacy • Increased awareness about cyber-crime • More support for law enforcers • New organizations formed

  13. The Youth Sector • Formation of I.T. Ethics movement among the university students • “10 Rules of I.T. Ethics” developed

  14. Disappointments and Frustrations • Slow judicial system • Stronger cyber-crime law delayed in congress • New cyber-crime victims remain silent

  15. The Reasons Why… • No sense of urgency regarding dangers of cyber-crime • Asian perspective of “saving face” as a victim

  16. Moving On

  17. Point of View as: • As a cyber-crime victim • As an educator

  18. As Cyber-crime victim • Government’s failure to provide conducive environment for reporting cyber-crime violations

  19. INFRAGARD • Formed in the US in 1996 • Partnership between private industry and government (FBI) • Developed to encourage exchange of information between government and private sector

  20. Quote from INFRAGARD strategic plan for 2003 Creating Trust Networks “Information sharing begins with human relationships-people talking with people whom they trust. The public-private partnership is based on trust, generated by people getting to know one another in business as well as more casual setting such as conferences.”

  21. INFRAGARD ASIA • Creating an Asian model and working with INFRAGARD U.S. • Headed by an Asia Pacific Executive Council through a network of INFRAGARD chapters in all APEC member countries

  22. As an Educator • Advances in Information Communication Technology (ICT) provide access to the general public • Potential good or destructive use • Youth being confused and disoriented regarding cyber-crime

  23. Pro-active Solutions • Youth orientation awareness and information campaign on the responsible use of ICT • Helping the youth distinguish right from wrong in the use of ICT

  24. the Philippine and Indonesian situation is very similar.

  25. “Philippines and Indonesia were rated in the same category, in terms of ICT readiness. According to the audit, both our countries have similar infrastructure in place and more or less the same level of highly skilled I.T. workers. “ audit done by IBM on the e-ASEAN effort

  26. Both Philippines and Indonesia are paralyzed by the heinous and ruthless crimes of a small group of terrorists.

  27. “ …among the terrorist states, the most active in cyber related attacks are Iran, Pakistan, Egypt, and Indonesia.” Stated in the Internet Security Report last July 2002:

  28. Indonesia and Philippines must : • ensure our laws and policies are in place, • must build the capacity of their cybercrime law enforcers to international standards • make certain that our judiciary is ready.

  29. People must be educated and made aware on what it is to be responsible and ethical citizens of technology

  30. Thank You Vivienne K.Tan Thames Int’l Business School Philippines vktan@thames.edu.ph

More Related