UNODC-ITU Asia-Pacific Regional Workshop On Fighting Cybercrime

1y ago
15 Views
2 Downloads
1.00 MB
37 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Mia Martinelli
Transcription

UNODC–ITUAsia-Pacific Regional Workshop onFighting CybercrimeTransnational organized groups andCybercrimeDr Kim-Kwang Raymond ChooSenior Lecturer / 2009 Fulbright (DFAT Professional) ScholarUniversity of South AustraliaVisiting ResearcherARC Centre of Excellence in Policing and Security, Australian National UniversityAssociateAustralian Institute of Criminology

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeSource: http://www.internetworldstats.com/stats.htm

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeDigitisation of information Lower entry barrier for digitisation of information Broadband connection, technological innovations, declining cost of electronicdata storage devices, etc

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimePoll 1Please RAISE your hands if your company oragency has NOT encountered any computersecurity incidents (e.g. malware infection anddata breaches) in the last 12-month or financialyear?

Securing ourcyber space 360-degree challenge Cyber threats, top tiernational securitypriorities (e.g.Australia’s NationalSecurity Statement2008; UK Home OfficeNational SecurityStrategy 2010)Reported incidents ofmalicious cyber activitytargeting US DoD’s system71,66154,64043,88030,21523,031

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimePoll 2If I am a financially-motivated cyber criminal, which ofthe following group of victims would/should I target?a) Small and medium size companies such as retailoutlets?b) Big companies such as major banks and financialinstitutions?c) Government agencies?d) End/home users?e) None of these?

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimePoll 3Who would criminally- and/or politicallymotivated cyber criminals target for privilegedinformation?a) Actual targets such as Department of Defense?b) Third-party vendors or security contractors?c) Others?In recent headlines (2011) ManTech and Vanguard Defense Industries (Aug),HBGary (Feb), Infraguard (Jun), L-3 Communications(May), Booz Allen Hamilton (Jul)

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeEffective threat assessment Understand current threat environment Look ahead to future offending Official statistics unlikely to be indicative of the entirecyber threat landscapeIncreased variety and volume of cyber attacks inevitableAccurate statistics? Victims unlikely to report incidents to police? Perception that “Cybercriminals will not be brought toA One–Stop 24/7 Cybercrime reportingjustice”?Website?

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeOrganised crime groups: A typology Traditional organised crime (OC) groups Organised cybercriminal groups Financially-motivated Examples: Online hacker/fraud groups (e.g.Russian Business Networks)? Criminally-motivated Examples: Online (non-commercial)child exploitation group Organised groups of ideologically &?politically motivated individuals

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeTraditional OC groups Motivations Illicit financial gains Exercising political power CharacteristicsDarwinism: Survival of the fittest Versatile and innovative Leverage ICT to extend their reach andbusiness scope (e.g. counterfeit software) Entrepreneurial OPPORTUNITIES: When bad times strike, sodo criminals!

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeTraditional OC groups Financial adversity(An Ideal CriminogenicEnvironment?) Cuts in Gov budgets,impacting on operationalcapability and effectiveness of LEAS?(Easier to?) recruit (Cyber) criminals Insiders / vendors(or compromisingtheir systems)

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeTraditional OC groups Threats from insider / vendor Motivations Financial gainBusiness advantage Proprietary knowledge is huge chunk ofbusiness’s information portfolios’ value Examples of risks Deliberately introduce vulnerabilities duringcoding? Hardware Trojans

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeOrganized cybercrime groups Organisational structure Individual members coalesce for a limited periodof time to conduct a specifically defined task More loosely structured and flexible Somewhat different structures between groupsfrom different regions Very “developed” Eastern European organisedcybercriminal groups can be similar to traditionalorganised crime groups?Insulation of layersPhysical strength is insignificant in cyberspace

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeMore concerning are EXCLUSIVE cyber crimeforums!

Cyber attacks: More sophisticatedand going ‘under the radar’Companies, Large and Small / Securityor Non-Security, are more vulnerablethan they would like to believe

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeOrganized cybercrime groups Emerging threat vectors for exploitation Mobile smart devices Malware / malicious apps; DDoSCloud computing Vulnerability in shared-tenancy cloud computingenvironment?; VM-based malware; Botnet hosting;Launching pad for cyberattacks Scan / search data of interest to ‘national security’? /Report on / monitor particular types of transactionaldata?

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeOrganized cybercrime groups Underground economy Overestimated?; Offer-for-sale actual sale?;Honest seller/buyer?Are we promoting FALSE hope that “Cyber Crime isEasy money”)?

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeIdeologicallymotivated groupsvs Traditional OCgroups Would traditionalOC group send asuicide bomber to aconference?

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeIdeologically motivated groups Cyber terrorism? BUT terrorist attacks generally highly visible andwhich result in mass casualties Using ICT as a communication / recruitment toolwith GLOBAL reach Medium for propaganda Facilitate radicalisation and recruitmentEarly intervention to counterradicalisation

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimePoliticallymotivatedgroups Culprit(s)1. Organizedfinancially-motivated cybercriminal groups?2. Politically- /issue-motivated groups?3. Nation state?4. Skillful teenagers?

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeThe way forward Routine ActivityTheoryIdeal criminogenic environment?OpportunityCrimeGuardianMotivation Abundant opportunities(worldwide ‘audience/target’?) Highly motivated offenders (financial?) Not a great deal of coordinated and effective regulation(cyber/transnational policing harder than traditionalpolicing?)

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeThe way forwardCyber crimepreventionstrategiesIncreasing theeffort required tooffendIncreasing therisk of gettingcaughtReducing therewards ofoffendingFostering a cultureof securityYesNoYesPublic PrivatePartnershipYesYesNoPolicing andpreventativestrategyNoYesYes

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and CybercrimeThe way forwardA better prepared societyagainst cyber attacks Public Private Partnership (PPP) (Appropriately vetted) Volunteer cyber defenders E.g. Cyber Defense League, an Estonian volunteer organization;Professional Cyber Defender Programme in Singapore Joint user awareness and education initiatives Joint Research and Development (R&D) initiatives E.g. How do we address the technical and operational challengesassociated with securing fundamental ICT infrastructure against cyberattack and resultant cyber crime? How do we more accurately identify,analyse and attribute the source of a cyber attack in a timely fashion?Untold riches await those who can design systems thatare easy to use, but difficult to exploit

Asia-Pacific Regional Workshop on Fighting CybercrimeTransnational organized groups and lbrightmail.org

c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 1 ) 1 e1 3available at www.sciencedirect.comjournal homepage: www.elsevier.com/locate/coseThe cyber threat landscape: Challenges and futureresearch directionsKim-Kwang Raymond Choo*School of Computer and Information Science, University of South Australia, Mawson Lakes campus (Room F2-28), Mawson Lakes,SA 5095, Australiaarticle infoabstractArticle history:Cyber threats are becoming more sophisticated with the blending of once distinct types ofReceived 17 June 2011attack into more damaging forms. Increased variety and volume of attacks is inevitableReceived in revised formgiven the desire of financially and criminally-motivated actors to obtain personal and5 August 2011confidential information, as highlighted in this paper. We describe how the RoutineAccepted 9 August 2011Activity Theory can be applied to mitigate these risks by reducing the opportunities forcyber crime to occur, making cyber crime more difficult to commit and by increasing theKeywords:risks of detection and punishment associated with committing cyber crime. PotentialCulture of securityresearch questions are also identified.ª 2011 Elsevier Ltd. All rights reserved.Cyber crimeCyber exploitationPolicing and preventative strategyPublic private partnershipRoutine Activity Theory1.IntroductionThe culturally and economically open nations of Australia,United Kingdom (UK) and the United States (US) have thrivedon the wealth that information and communications technologies (ICT) have enabled. However, just as ICT provide newopportunities for governments and businesses to operate andexpand their presence and reach, ICT also present opportunities for those with criminal intentions and leaves us, as individuals, communities, organisations and as a nation, highlyexposed to the threat of cyber attack and cyber crime. Newmedia channels such as Facebook and Twitter, for example,allow individuals to voice their opinions easily, without theneed to go through intermediaries (e.g., printed media) and toplay a more active role in shaping the societal and politicallandscapes online e as we see the events in Egypt and itsneighbouring countries unfolding since late 2010. On the otherhand, minority views such as extremist and subversive viewsthat might not have been heard in the past are more able toreceive exposure. Terrorist groups tend to conduct attacks thatare highly visible and which result in mass casualties. Thenature of cyberspace makes both of those objectives hard toachieve. However, these new media channels can be used asa medium for propaganda such as publishing doctrinespromoting extremism activities, recruitment and training ofpotential terrorists, and transferring information. Forexample, Jihad-oriented sites are designed to facilitate radicalisation among the Muslim community, and enable individuals linking up with like-minded people and makingcontact with extremists from overseas involved in terroristrecruitment and financing using new media channels. Thesechannels target the digital generation (the young and theinternet-aware), particularly among the Muslim community.The latter, particularly those with a shallow understanding of* Tel.: þ61 8 8302 5876.E-mail address: raymond.choo.au@gmail.com.0167-4048/ e see front matter ª 2011 Elsevier Ltd. All rights reserved.doi:10.1016/j.cose.2011.08.004Please cite this article in press as: Choo K-KR, The cyber threat landscape: Challenges and future research directions,Computers & Security (2011), doi:10.1016/j.cose.2011.08.004

2c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 1 ) 1 e1 3their religion, could be easily misled by the propaganda postedon these channels Choo (2008).An open nation cannot shut down its cyber systems forfear of these threats. Instead it must build the national resilience needed to maintain an open yet secure cyberspace. Tomitigate cyber criminal risks and make informed decisionsabout cyber security, it is essential to have a clear understanding of the threat landscape and look ahead to futureoffending in the online environment. This paper seeks tocontribute to a better understanding of this ever-evolvingcyber threat landscape by providing a snapshot of severalrisk areas (mainly focusing on financially-motivated cybercriminal activities). Criminological theories based on choicetheories can be applied to explain cyber crime. As an example,we explain how the Routine Activity Theory can help toinform and enhance cyber crime prevention strategies.2.The cyber threat landscape: an snapshotIn our increasingly interconnected world, threats to ournational (and cyber) security can come from unexpectedsources and directions. This is what one may label as a 360degree challenge. In recent years, cyber exploitation andmalicious activity are becoming increasingly sophisticated,targeted, and serious. The Australian Government DefenceSignals Directorate, for example, reported that an average of700 cyber incidents targeting Defence networks were detectedin 2010 e an increase of 250% from 2009 (AAP 2010). Morerecently in 2011, the parliamentary computers of at least 10Australian Federal ministers, including the Prime Minister,Foreign Minister and Defence Minister, were reportedlycompromised (Benson, 2011). The 2010 report to US Congressby the US-China Economic and Security Review Commissionalso indicated that the number of reported incidents of malicious cyber activity targeting US Department of Defense’ssystem has been on the increase since 2000 e see Table 1.Cyber crime is not a victimless crime. Examples of shortand long-term impacts of cyber crime on their victims include:Table 1 e Number of reported incidents of malicious cyberactivity targeting US Department of Defense’s systemfrom 2000 to 0082009Number of reportedincidents of maliciouscyber activityPercent increasefrom previous 3%24.52%31.15%Adapted from US-ChinaCommission, 2010: Fig. 1.EconomicandSecurityReviewShort term impact Impacting the daily activities of individual end users (e.g.affecting their ability to receive up-to-date information andcarrying out financial transactions such as withdrawingcash from ATMs) Impacting the day-to-day activities of businesses andgovernment. This can result in significant financial andother losses to businesses, such as exposure to law suits(e.g. in cases involving breaches of customers’ data) andincrease in operational costs (e.g. losses due to fraudulentactivities and increase in security spending).Long term impact National security breaches (e.g. the incident in 2010 whereclassified/confidential government information was leakedto Wikileaks). Social discontent and unrest (e.g. loss of public confidencein the government even if the actual damage caused by thecyber criminal activities was minimal). Loss of intellect property, which can affect the long-termcompetitiveness of businesses and governments in industrial and military espionage incidents.The million-dollar question is “How prevalent isfinancially-motivated cyber criminal activity such as unauthorised access, online extortion and Distributed Denial ofService (DDoS) attacks?”. Official crime statistics compiled bylaw enforcement, prosecution and other governmentagencies, and private sector agencies are unlikely to indicatethe entire cyber threat landscape. For example, victims werenot aware that their organizations had experienced one ormore cyber security incidents, and therefore indicated thatthey had not experienced any such incidents when asked. Inaddition, victimized organizations may be reluctant to reportbreaches due to a range of reasons, such as believing the incident was not serious enough to warrantreporting it to law enforcement and other competent agencies, believing that there is little chance of a successfulprosecution, fearing negative publicity and that reporting would result ina competitive disadvantage (Richards, 2009).Victimized organizations may also deal with the incidentinternally and decided not to report such incidents to anexternal party, including law enforcement and governmentagencies.Cyber threats are increasingly important and strategicallyrelevant in developed economies such as Australia, UK andUS. The 2008 report of the Center for Strategic and International Studies (CSIS) Commission on Cybersecurity for the44th Presidency, for example, reported: ‘We began with onecentral finding: The United States must treat cybersecurity asone of most important national security challenges it faces’(CSIS, 2008). The concern of cyber crime is not only perceivedby computer scientists and ICT professionals, but politiciansalso understand its potential impact as well (Obama, 2009). In2009, US President Barack Obama remarked:Please cite this article in press as: Choo K-KR, The cyber threat landscape: Challenges and future research directions,Computers & Security (2011), doi:10.1016/j.cose.2011.08.004

c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 1 ) 1 e1 3This world e cyberspace e is a world that we depend on everysingle day. It’s our hardware and our software, our desktops andlaptops and cell phones and Blackberries that have become woveninto every aspect of our lives. It’s the broadband networksbeneath us and the wireless signals around us, the local networksin our schools and hospitals and businesses, and the massivegrids that power our nation. It’s the classified military andintelligence networks that keep us safe, and the World Wide Webthat has made us more interconnected than at any time in humanhistory. So cyberspace is real. And so are the risks that come withit. It’s the great irony of our Information Age e the very technologies that empower us to create and to build also empowerthose who would disrupt and destroy. And this paradox e seenand unseen e is something that we experience every day(Obama, 2009).In Australia, the then Prime Minister Kevin Rudd in hisinaugural 2008 National Security Statement to Parliamentacknowledged that cyber threats now form one of the country’s top tier national security priorities (Rudd, 2008). Cybercrime was also identified as one of the four highest priority/tier one national security risks by UK’s National SecurityCouncil (HM Government, 2010: 27).Tier One: The National Security Council considered the followinggroups of risks to be those of highest priority for UK nationalsecurity looking ahead, taking account of both likelihood andimpact. International terrorism affecting the UK or its interests, includinga chemical, biological, radiological or nuclear attack by terrorists;and/or a significant increase in the levels of terrorism relating toNorthern Ireland. Hostile attacks upon UK cyber space by other states andlarge-scale cyber crime. A major accident or natural hazard which requires a nationalresponse, such as severe coastal flooding affecting three or moreregions of the UK, or an influenza pandemic. An international military crisis between states, drawing inthe UK, and its allies as well as other states and non-stateactors.It is evident that cyber threats are seen as one of the topissues in crime and national security today, and an increasingly challenging policy area for governments e Cyber spaceis the new front line.2.1.Malicious software (malware)Malware has consistently been ranked as one of the key cyberthreats to businesses, governments and individuals. Forexample, in 2009 the number of new malware signatures wasreported to be just under 2.9 million, a 71 percent increaseover 2008 (Symantec, 2010), but more than 286 million newmalware variants were detected by Symantec in 2010(Symantec, 2011).The shift in motivation from curiosity and fame seeking/thrill-seeking to illicit financial gain has been marked bya growing sophistication in the evolution of malware (Choo,2011). The latter, further exacerbated by an increase in the3availability of easy-to-use toolkits to build malware, is likely toremain a threat to businesses, governments and consumers inthe foreseeable future. The Zeus bot malware creator kit, forexample, was sold at a nominal cost e between US 400 andUS 700 (Symantec, 2010). Detailed instructions on how to usesuch kits are readily available, too. Anybody including individuals with limited programming and/or hacking skills coulduse the purchased kit to create sophisticated malware orlaunch sophisticated attacks beyond their skill level to stealonline banking credentials or sensitive information. Moreconcerning is the study by Symantec (2010: 11) which‘observed nearly 90,000 unique variants of the basic Zeustoolkit and it was the second most common new maliciouscode family observed in the [Asia Pacific/Japan] region’ in the2009 calendar year. The widespread availability of such toolkitlowers the technical bar to commit cyber crime. Consequently, there is a marked increase in the number of amateurcyber criminals who usually make their money from distributing spam or selling stolen credentials and information. Thismay result in the unintended consequence of an increasinglypronounced division between the sophisticated and theamateur cyber criminals, and the sophisticated cyber criminals moving more underground (migrating from publicforums to more exclusive forums with their partners incrime).Choo (2011) explained that malware can be broadly categorised into (a) generic malware that targets the generalpopulation and (b) customised information-stealing malwaretargeting specific institutions. An example of the former is botmalware designed to exploit particular vulnerabilities onmachines of individual end users, businesses and governments. Such malware can, for example, be hosted on webservers by exploiting vulnerabilities of the servers. Anyunwitting visitors to website hosted on the compromisedservers and whose internet browsers and/or operating systemare unpatched may have their machines infected with the botmalware e an activity also known as a “drive-by attack”. Asobserved by IBM X-Force (2011), the US continues to reign asthe top hosting country for malicious links and more than onethird of all malware links are reportedly hosted in that nation.Machines infected with bot malware are then turned into“zombies” and can be used as remote attack tools or to formpart of a botnet under the control of the botnet controller.Zombies are compromised machines waiting to be activatedby their command and control (C&C) servers. The C&C serversare often machines that have been compromised andarranged in a distributed structure to limit traceability. Thecomputational power of botnets can then be leveraged toorchestrate other cyber criminal activities such as DDoSattacks, disseminating spam and other malware, facilitatingphishing and click fraud, and hosting illegal data such as childabuse materials (Choo, 2007).An example of customised information-stealing malwareis phishing-based keylogger (program designed to monitoruser activity including keystrokes) that target specific organisations. For example, in 2010, there were several incidentsin the US involving cyber criminals sending a targetedphishing email, aimed at whoever was in charge of the organisation’s IT operations. By tricking the victim(s) into openinga harmful attachment or visiting a malicious website, thePlease cite this article in press as: Choo K-KR, The cyber threat landscape: Challenges and future research directions,Computers & Security (2011), doi:10.1016/j.cose.2011.08.004

4c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 1 ) 1 e1 3cyber criminals were able to install the Zeus malware, whichincludes a phishing-based keylogger component, onto themachine. In addition, the malware could propagate throughthe organisation’s network, enabling cyber criminals to gainaccess to and/or compromise other workstations and servers.Once the keylogger was installed on the victim’s machine, theprogram then “faithfully” did what it was designed to do (i.e.,send harvested account numbers, login credentials andpersonal information to a compromised collection server, tobe collected by cyber criminals). Cyber criminals were thenable to initiate funds transfers by masquerading as the legitimate user using the harvested login credentials and personalinformation. Money could be transferred out of the accountusing the ACH system that banks use to process paymentsbetween institutions and/or using traditional wire transfers.Financial losses due to these fraudulent wire transfers averaged US 100,000 to US 200,000 per victim (McGlasson, 2010). Anumber of law suits are currently before the courts in US (seePatco Construction Company, Inc. vs People’s United Bank D/B/AOcean, Case no No. 2:09-cv-503-DBH of 2011).The use of individuals, often unrelated to the criminalactivity that creates the illicit funds, to transfer money tocriminals interstate or overseas is a long standing practice ofthe criminal fraternity and is no exception in the onlineenvironment. These individuals, also known as “moneymules”, are a consequence of the need for cyber criminals totransfer and disguise the origins of their criminal proceeds(AIC, 2008, Choo, 2008). They are an integral part in a numberof financially-motivated cyber criminal cases including theexample described in the preceding paragraph. In a typicalmoney mule transaction, an individual is recruited throughvarious means including the use of fictitious online companies that appear legitimate and spam email advertisementsoffering bogus employment opportunities. Unlike victims ofmost cyber criminal activities, the money mules are “participants” who provide full consent to the use of their bankaccounts to receive and send wire transfers to overseasaccounts controlled/owned by the cyber criminals, minusa commission payment (usually between 5 and 15 percent).When arrested by law enforcement agencies, money mulestypically have their bank accounts suspended. They can alsobe criminally liable for their involvement in the money muletransactions. For example, a number of alleged members ofthe money mule organization responsible for repatriating theproceeds of the Zeus malware attack described in thepreceding paragraph to overseas accounts were charged withvarious offences including conspiracy to commit bank fraud,conspiracy to possess false identification documents andmoney laundering (FBI 2010).2.1.1.Emerging attack vectors: smart devicesIn recent years, an increasing number of banking and financialinstitutions and businesses are offering mobile banking andpayment services. The increasing use of smart devicesincluding smart phones (e.g. iPhone and Blackberry) constitutes another opportunity for cyber attacks e malwaredesigned and spread onto mobile devices to compromiseinformation such as online banking login credentials andaccount information as well as other data stored on thesemobile devices (Choo et al., 2007; Choo, 2011). In addition,cyber criminals can place malicious mobile applications(apps) disguised as legitimate apps to increase their yield,such as the Geinimi malware. For example, researchers havereported finding malware and potentially malicious softwareat third-party apps stores targeting the Chinese market.Legitimate versions of the applications in the official Androidmarket appear to be safe, they said. Compromised phones callback to a remote computer for instructions on what to do at5 min intervals. Then they transmit information on thedevice’s location, its hardware ID and SIM card back to theremote computer (SMH 2010).Smart devices can also be used to launch DDoS attacksagainst governments and corporate networks. For example tolaunch a DDoS attack using the Java Script-based variant ofthe Low Orbit Ion Cannon software, users are only required toopen a JavaScript-enabled Internet browser or visit a websitethat hosts the program and enter the URL or IP address ofa target into the program (see Pras et al., 2011 for an overviewof the software). Although this particular tool is not known tobe optimized to run on smart devices, such programs have thepotential to be used by malicious actors (including individualswith rudimentary computer knowledge) to participate inDDoS attacks from smart devices.In 2010, Kaspersky Lab reportedly identified more than1550 mobile malware signatures (Gross, 2010). Symantec(2011: 6) reported a similar observation e ‘there was a sharprise in the number of reported new mobile operating systemvulnerabilities e up to 163 [in 2010] from 115 in 2009’. Lookout(2011: 3) also reported that ‘[a]n estimated half million to onemillion people were affected by Android malware in the firsthalf of 2011; Android apps infected with malware went from80 apps in January to over 400 apps cumulative in June 2011’.Mobile malware while emerging are quite real. Anti-virusand anti-malware applications for mobile devices are still intheir infancy despite the emergence of mobile malware.Existing security applications for desktop computers andlaptops are generally unsuitable for resource-limited mobiledevices, especially ‘once the rate of new or mutated malwareinstances reaches a threshold beyond which it is not reasonable to push [signature] updates’ explain

Asia-Pacific Regional Workshop on Fighting Cybercrime Transnational organized groups and Cybercrime Dr Kim-Kwang Raymond Choo Senior Lecturer / 2009 Fulbright (DFAT Professional) Scholar University of South Australia Visiting Researcher ARC Centre of Excellence in Policing and Security, Australian National University Associate

Related Documents:

Tullio Santini Chief Regional Section for South Asia, East Asia and the Pacific, Division for Operations E-mail: tullio.santini@unodc.org Tel: 43 1 26060 4799. Title: Microsoft PowerPoint - CND.16 Nov 2017.RSSAEAP_REVISED.2 Author: audra Created Date:

Asia Pacific School 2019 28-30 October 2019, Conrad Hong Kong Pierre Briens Managing Director, Head of Aviation, Transportation Sector, Investment Banking Asia Pacific BNP Paribas Vincent Lam SVP Asia Pacific - Aircraft Remarketing Air Partner Vivien Guo Vice President, Transportation Sector, Investment Banking Asia Pacific BNP Paribas Simon Ng

sia-Pacific Defense Outlook: Key Numbers4 A 6 Defense Investments: The Economic Context 6 Strategic Profiles: Investors, Balancers and Economizers . Asia-Pacific Defense Outlook 2016 Asia-Pacific Defense Outlook 2016. 3. Asia-Pacific Defense Outlook: . two-thirds of the region's economic product and nearly 75 percent of the 2015 regional .

Pacific Women Shaping Pacific Development Republic of the Marshall Islands Country Plan Summary . updated to document future Pacific Women activities in RMI . Regional Office for Asia and the Pacific, ILO, Asia Pacific Working paper series. 3 UNDP. 2009. Marshall Islands MDG Report p 16-18. 4 Republic of the Marshall Islands Ministry of .

International Triathlon Union ITU Competition Rules 10-12-2017 1 ITU Competition Rules Approved by the ITU Executive Board, in December 2017 Green highlight - added as of December 2017 Red highlight - deleted as of December 2017 The ITU Competition Rules is the master source document, found on ITU's website at www.triathlon.org.

1. ITU Level 1 Triathlon Coach 2. ITU Level 2 Triathlon Coach 3. ITU Performance Development Triathlon Coach (L2 Extension Programme - invitation only) ITU Coach Education Programmes - Level Descriptors ITU Level 1 Triathlon Coach ITU Level 1 coaches will be able to deliver triathlon sessions to groups of triathletes without supervision.

Updated 19/08/2016 3 South East Asia: Ian Mariano, Sub-Regional Secretary for South East Asia at: ian.mariano@world-psi.org South Asia: Kannan Ramana, Sub-Regional Secretary for South Asia at: kannan.raman@world-psi.org East Asia: Hiroo Aoba, Sub-Regional Secretary for East Asia at: hiroo.aoba@world-psi.org Oceania: Michael Whaites, Sub-Regional Secretary for Oceania at: michael.whaites@world .

0452 ACCOUNTING 0452/21 Paper 2, maximum raw mark 120 This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the .