fighting ecrime agencies and other involved parties investigative and procedural powers affecting...
TRANSCRIPT
![Page 1: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/1.jpg)
Fighting eCrime
Agencies and other involved partiesInvestigative and procedural powers affecting computers
![Page 2: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/2.jpg)
I Who’s Who
• ‘Who’s Who in eSecurity and eCrime’ Dale (2001) [2001] CyberLRes 17http://www.austlii.edu.au/au/other/CyberLRes/2001/17
![Page 3: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/3.jpg)
Who’s Who
• Federal Government Agencies• State and Territory Agencies• Industry Associations• E-security solutions vendors and
consultants• Providers of eSecurity
qualifications/training• E-security professionals within
organisations
![Page 4: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/4.jpg)
Federal Government
• NOIE• A-G’s Department• DSD• ASIO• AFP• AGEC grouping of Cth Law
Enforcement agencies
![Page 5: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/5.jpg)
State and Territory agencies
• Police forces• Attorney-General’s/Justice
Departments• Co-ordinating agencies for
Government online activities
![Page 6: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/6.jpg)
Providers of qualifications/training
• University IT Departments• TAFE sector• Professional bodies (eg Australian
Computer Society)• Private sector providers
![Page 7: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/7.jpg)
II Powers
![Page 8: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/8.jpg)
CoE Convention
• Cybercrime Convention Sec 2 requires investigatory powers (A14(1)) covering: Expedited preservation of stored computer data Production orders Search and seizure of stored computer data Real-time collection of computer data See also Ch. III - International co-operation
![Page 9: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/9.jpg)
Article 16 - Preservation of Data
• “enable the competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data”
![Page 10: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/10.jpg)
Article 18 - Production Order
• Enable competent authorities to order the production of data
![Page 11: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/11.jpg)
Article 19 - Search and Seizure
• Enable competent authorities to search and seize data, or computer systems
![Page 12: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/12.jpg)
Article 20 - Real-time Collection
• Enable competent authorities to intercept and record traffic data in real-time
![Page 13: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/13.jpg)
ASIO
• Australian Security Intelligence Organisation Act 1979 s 25A Computer Access Warrant
• Criminal Code Act 1995 - s 476.5 Liability for certain acts
![Page 14: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/14.jpg)
General
• Telecommunications (Interception) Act 1997
![Page 15: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/15.jpg)
Crimes Act 1914 (Cth)Search Warrants
• Division 2• In particular, s3LA Person with
knowledge of a computer or a computer system to assist access etc.
![Page 16: Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f565503460f94c7ac2f/html5/thumbnails/16.jpg)
http://www.auscert.org.au/