Overview of National
Cybercrime Strategies
Benjamin Ang, Head Cyber Homeland Defence
Centre of Excellence for National Security, RSIS, NTU
twitter.com/benjaminang
Cybercrime or Cybersecurity?
Cybercrime Strategy
• Crime prevention
• Criminal justice policies,
programmes, and practices
Cybersecurity Strategy
• Objectives e.g.
• Protecting Critical Infrastructure
• Building public awareness
• Building a skills ecosystem
• Building international ties
• Action plans and the
responsibilities of institutions
3
Cybercrime or Cybersecurity?
Source: UNODC. (2013). Draft Comprehensive Study on
Cybercrime , p. 228.
4
Cybercrime and Cybersecurity are linked
• Laws against misuse of ICTs
• Policies supporting cooperation between government
authorities, the private sector and citizens
• International cooperation and coordination
• Building technical protection systems
• Education of users
http://www.itu.int/ITU-
D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
5
Strategies contain
• Context – why the strategy is needed
• Objectives – goals
• Scope – what it covers; what and whom it impacts
• Priority actions – for allocation of resources
• Expected outcomes and evaluation mechanisms – how
to know if you have succeeded
Example of Scope question: Definition?
Cyber-enabled crime
• Fraud / bank robbery
• Blackmail / extortion
• Child pornography
• Money laundering
• Terror financing
• Hate speech, incitement
• Intellectual Property theft
Crimes against computers
• Illegal access – data breach,
espionage
• Illegal interception
• Data interference– virus,
ransomware
• System interference – DDOS
http://www.itu.int/ITU-
D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
7
Life Cycle of Strategies
Initiation
Stock taking
ProductionImplementation
Monitoring
8
Life Cycle of Strategies
Initiation
Stock taking
ProductionImplementation
Monitoring
Source: ITU. (2018). A Guide to Developing a National
Cybersecurity Strategy , p. 17.
9
Life Cycle of Strategies
Initiation
Stock taking
ProductionImplementation
Monitoring
10
Life Cycle of Strategies
Initiation
Stock taking
Implementation
Monitoring
Production
11
Life Cycle of Strategies
Initiation
Stock taking
ProductionImplementation
Monitoring
12
Life Cycle of Strategies
Initiation
Stock taking
ProductionImplementation
Monitoring
13
Principles for an effective strategy
• Flexible and innovative – explore new methods, tools
• Build resilience – what happens after the crime
• Look beyond institutions –
• Work across divisions
• Work across government
• Work across nations
https://magazine-the-european.com/2018/06/21/a-european-
strategy-to-counter-cybercrime/
14
Cooperation and complementarity:
European Cybercrime Centre (EC3)
• Joint Cybercrime Action Taskforce (J-CAT) against
transnational cybercrime
• 20 successful largescale operations
• December 2016 ops on users of Distributed Denial of Service
(DDoS) cyberattack tools in 13 countries: 34 arrests, 101
suspects interviewed, multi-language prevention campaign
https://magazine-the-european.com/2018/06/21/a-european-
strategy-to-counter-cybercrime/
15
Pillars of an effective strategy
– get help from other sectors
Legal
• Laws
• Procedure
• MLA
Technical
• Methods
• Standards
Organization
• Prevention
• Detection
• Response
Capacity
• Skills
• Awareness
International
• Cooperation
http://www.itu.int/ITU-
D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
16
What about developing countries?
Lack resources
Insecure systems
Breach by
cybercriminals
Connected to
developed st
Cybercriminals
cross over
17
How developed countries could help
Share resources
Make systems
secure by design
Share
information
Joint operations
Prevent
cybercrime
18
Examples
• UK Home Office Cyber Crime Strategy
• https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/228826/7842.pdf
• Royal Canadian Mounted Police Cybercrime Strategy
• http://www.rcmp-grc.gc.ca/wam/media/1088/original/30534bf0b95ec362a454c35f154da496.pdf
• Singapore National Cybercrime Action Plan
• https://www.mha.gov.sg/docs/default-source/press-releases/ncap-document.pdf
Singapore’s National Cybercrime Action
Plan
Four key principles
• a) Prevention is key;
• b) Agile responses are needed
to combat the evolving threat of
cybercrime;
• c) Our criminal justice system
must be robust and supported
by effective laws;
• d) Combating cybercrime is a
shared responsibility.
Four key priorities
• a) Educating and empowering the
public to stay safe in cyberspace;
• b) Enhancing the Government’s
capacity and capability to combat
cybercrime;
• c) Strengthening legislation and
the criminal justice framework;
• d) Stepping up partnerships and
international engagement.
It’s your turn
Slides available at twitter.com/benjaminang

More Related Content

PPTX
Public key infrastructure
PDF
The top 10 windows logs event id's used v1.0
PDF
Red Team Framework
PPTX
introduction to Botnet
PPTX
Encryption algorithms
PPT
Penetration Testing Basics
PPTX
What is Threat Hunting? - Panda Security
PPTX
Community detection in social networks
Public key infrastructure
The top 10 windows logs event id's used v1.0
Red Team Framework
introduction to Botnet
Encryption algorithms
Penetration Testing Basics
What is Threat Hunting? - Panda Security
Community detection in social networks

What's hot (20)

PPTX
Intrusion Detection with Neural Networks
PPT
Cyber Security in Energy & Utilities Industry
PPTX
Network protocols and vulnerabilities
PPSX
Cyber crime
PPTX
Brute force-attack presentation
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
Ethical hacking ppt
PPTX
Intrusion detection
 
PDF
3. The Data Encryption Standard (DES) and Alternatives
PDF
Cyber threat intelligence ppt
PPTX
Threat hunting for Beginners
PPTX
Cyber crime ppt
PDF
Cyber security and demonstration of security tools
PPTX
Trojan virus & backdoors
PPTX
Cyber security ppt final
PDF
MITRE AttACK framework it is time you took notice_v1.0
PPT
Ethical hacking
PPTX
Transposition Cipher
PDF
Block Ciphers and the Data Encryption Standard
PPTX
IP Security
Intrusion Detection with Neural Networks
Cyber Security in Energy & Utilities Industry
Network protocols and vulnerabilities
Cyber crime
Brute force-attack presentation
Introduction to Cybersecurity Fundamentals
Ethical hacking ppt
Intrusion detection
 
3. The Data Encryption Standard (DES) and Alternatives
Cyber threat intelligence ppt
Threat hunting for Beginners
Cyber crime ppt
Cyber security and demonstration of security tools
Trojan virus & backdoors
Cyber security ppt final
MITRE AttACK framework it is time you took notice_v1.0
Ethical hacking
Transposition Cipher
Block Ciphers and the Data Encryption Standard
IP Security
Ad

Similar to Overview of national cybercrime strategies (20)

PPTX
NCSS_Global trends in cyberspace (2).pptx
PPT
ILG CERT Presentation Final
PPTX
CTO-CybersecurityForum-2010-Richard Simpson
PDF
National cyber security strategies
PPTX
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
PDF
Scot Secure 2017
PDF
Cyber Security Strategies and Approaches
PPTX
Lecture 2 Threats and Strategy.pptx
PDF
http://www.slideshare.net/slideshow/embed_code/28627951
PDF
Internet safety and security strategies for building an internet safety wall
PPTX
Final presentation cyber security submit copy
PDF
Overview of National Cybersecurity Strategy 2023.pdf
PDF
National Cybersecurity - Roadmap and Action Plan
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PDF
International laws and standards controlling information security. Latest dev...
PPTX
Introduction to Cyber Diplomacy
DOCX
092012UNDERSTANDING.docx
PPT
Russia and cybercrime
PPT
Indusrty Strategy For Action
PPTX
Cyber Threat Overview for Euro IT counsel
NCSS_Global trends in cyberspace (2).pptx
ILG CERT Presentation Final
CTO-CybersecurityForum-2010-Richard Simpson
National cyber security strategies
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Scot Secure 2017
Cyber Security Strategies and Approaches
Lecture 2 Threats and Strategy.pptx
http://www.slideshare.net/slideshow/embed_code/28627951
Internet safety and security strategies for building an internet safety wall
Final presentation cyber security submit copy
Overview of National Cybersecurity Strategy 2023.pdf
National Cybersecurity - Roadmap and Action Plan
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
International laws and standards controlling information security. Latest dev...
Introduction to Cyber Diplomacy
092012UNDERSTANDING.docx
Russia and cybercrime
Indusrty Strategy For Action
Cyber Threat Overview for Euro IT counsel
Ad

More from Benjamin Ang (20)

PDF
Case study on Building Singapore’s National Cybersecurity Workforce and Resea...
PPTX
Fake News and New Media - impact of disinformation and synthetic media (deepf...
PDF
Online echo chambers, misinformation, disinformation, identity politics, how ...
PDF
Summary of Final Report of the UN OEWG on State Use of ICT (Cyber) 2025.pdf
PDF
Cyber Resilience and Critical Information Infrastructure Singapore Case Studi...
PDF
Changing Domains - Cyber and Information Domains 2024 lecture.pdf
PDF
Regulatory Approaches in Digital Security (OECD Global Forum on Digital Secur...
PDF
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
PDF
International Cooperation to Impose Consequences for Malicious Cyber Activity...
PDF
Changing Domains - The Cyber Info Realm 2023.pdf
PDF
Cooperation between ASEAN military civil academic in international cybersecur...
PDF
Technology Disruption Digital Inclusion and the Law.pdf
PDF
Why Application of International Law Applies to ASEAN.pdf
PDF
Lessons learned from Capacity Building on International Cyber Norms in Southe...
PDF
Cybersecurity and National Security in Southeast Asia 2022.pdf
PDF
Cybersecurity and Geopolitical Risk.pdf
PDF
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
PDF
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
PDF
Foreign Interference and National Security - Law Society Public Law conferenc...
PDF
Technology Disruption in the New Normal, Digital Inclusion and the Law
Case study on Building Singapore’s National Cybersecurity Workforce and Resea...
Fake News and New Media - impact of disinformation and synthetic media (deepf...
Online echo chambers, misinformation, disinformation, identity politics, how ...
Summary of Final Report of the UN OEWG on State Use of ICT (Cyber) 2025.pdf
Cyber Resilience and Critical Information Infrastructure Singapore Case Studi...
Changing Domains - Cyber and Information Domains 2024 lecture.pdf
Regulatory Approaches in Digital Security (OECD Global Forum on Digital Secur...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Changing Domains - The Cyber Info Realm 2023.pdf
Cooperation between ASEAN military civil academic in international cybersecur...
Technology Disruption Digital Inclusion and the Law.pdf
Why Application of International Law Applies to ASEAN.pdf
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and Geopolitical Risk.pdf
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Foreign Interference and National Security - Law Society Public Law conferenc...
Technology Disruption in the New Normal, Digital Inclusion and the Law

Recently uploaded (20)

PPT
Judicial Process of Law Chapter 2 Law and Legal Systems
PPTX
Introduction_to_ICT_in_Legal_Education.pptx
PPTX
The-Specific-Relief-AmendmentAct2018.pptx
PDF
Dangers In The Oil Field: Helping Injured Workers Hold Oil And Gas Companies ...
PPT
Federalism lecture note power point for law
PDF
UNIT-4 - Limited Liability Partnership_2008.pdf
PDF
UNIT-7_ IPR_Final PPT.pdf (Applicable for India)
PPTX
Database Management Systems - akash dbms - abar tomake - nitei-hbe - na hle h...
PDF
Divorce Attorney Chicago – Guiding You Through Every Step
PDF
Manipur-Report.pdf governance failure in Manipur
PDF
Civil Court Procedure by Shivam Dhawal.pdf
PPTX
ADR-Lecture-ten-1 North South University
PPTX
Principles_of_Forensic_Science_Presentation.pptx
PPTX
INTRODUCTION OF Philippine Politics and Governance.pptx
PDF
Data Act Effective from September 2025: Here is a Guide to the Main Obligations
PPTX
Nature and Scope of Administrative Law.pptx
PPTX
SOURCES OF LAW (Legal Research and Writing)
PDF
UNIT-8_COMPETITION ACT-2002_DSS Final.pdf
PDF
LATEST AMENDMENT COMPANY LAW 2016 FOR MALAYSIAN LAW
PDF
Case Digest_ G.R. No. 46076 - People vs. Rosenthal.pdf
Judicial Process of Law Chapter 2 Law and Legal Systems
Introduction_to_ICT_in_Legal_Education.pptx
The-Specific-Relief-AmendmentAct2018.pptx
Dangers In The Oil Field: Helping Injured Workers Hold Oil And Gas Companies ...
Federalism lecture note power point for law
UNIT-4 - Limited Liability Partnership_2008.pdf
UNIT-7_ IPR_Final PPT.pdf (Applicable for India)
Database Management Systems - akash dbms - abar tomake - nitei-hbe - na hle h...
Divorce Attorney Chicago – Guiding You Through Every Step
Manipur-Report.pdf governance failure in Manipur
Civil Court Procedure by Shivam Dhawal.pdf
ADR-Lecture-ten-1 North South University
Principles_of_Forensic_Science_Presentation.pptx
INTRODUCTION OF Philippine Politics and Governance.pptx
Data Act Effective from September 2025: Here is a Guide to the Main Obligations
Nature and Scope of Administrative Law.pptx
SOURCES OF LAW (Legal Research and Writing)
UNIT-8_COMPETITION ACT-2002_DSS Final.pdf
LATEST AMENDMENT COMPANY LAW 2016 FOR MALAYSIAN LAW
Case Digest_ G.R. No. 46076 - People vs. Rosenthal.pdf

Overview of national cybercrime strategies

  • 1. Overview of National Cybercrime Strategies Benjamin Ang, Head Cyber Homeland Defence Centre of Excellence for National Security, RSIS, NTU twitter.com/benjaminang
  • 2. Cybercrime or Cybersecurity? Cybercrime Strategy • Crime prevention • Criminal justice policies, programmes, and practices Cybersecurity Strategy • Objectives e.g. • Protecting Critical Infrastructure • Building public awareness • Building a skills ecosystem • Building international ties • Action plans and the responsibilities of institutions
  • 3. 3 Cybercrime or Cybersecurity? Source: UNODC. (2013). Draft Comprehensive Study on Cybercrime , p. 228.
  • 4. 4 Cybercrime and Cybersecurity are linked • Laws against misuse of ICTs • Policies supporting cooperation between government authorities, the private sector and citizens • International cooperation and coordination • Building technical protection systems • Education of users http://www.itu.int/ITU- D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
  • 5. 5 Strategies contain • Context – why the strategy is needed • Objectives – goals • Scope – what it covers; what and whom it impacts • Priority actions – for allocation of resources • Expected outcomes and evaluation mechanisms – how to know if you have succeeded
  • 6. Example of Scope question: Definition? Cyber-enabled crime • Fraud / bank robbery • Blackmail / extortion • Child pornography • Money laundering • Terror financing • Hate speech, incitement • Intellectual Property theft Crimes against computers • Illegal access – data breach, espionage • Illegal interception • Data interference– virus, ransomware • System interference – DDOS http://www.itu.int/ITU- D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
  • 7. 7 Life Cycle of Strategies Initiation Stock taking ProductionImplementation Monitoring
  • 8. 8 Life Cycle of Strategies Initiation Stock taking ProductionImplementation Monitoring Source: ITU. (2018). A Guide to Developing a National Cybersecurity Strategy , p. 17.
  • 9. 9 Life Cycle of Strategies Initiation Stock taking ProductionImplementation Monitoring
  • 10. 10 Life Cycle of Strategies Initiation Stock taking Implementation Monitoring Production
  • 11. 11 Life Cycle of Strategies Initiation Stock taking ProductionImplementation Monitoring
  • 12. 12 Life Cycle of Strategies Initiation Stock taking ProductionImplementation Monitoring
  • 13. 13 Principles for an effective strategy • Flexible and innovative – explore new methods, tools • Build resilience – what happens after the crime • Look beyond institutions – • Work across divisions • Work across government • Work across nations https://magazine-the-european.com/2018/06/21/a-european- strategy-to-counter-cybercrime/
  • 14. 14 Cooperation and complementarity: European Cybercrime Centre (EC3) • Joint Cybercrime Action Taskforce (J-CAT) against transnational cybercrime • 20 successful largescale operations • December 2016 ops on users of Distributed Denial of Service (DDoS) cyberattack tools in 13 countries: 34 arrests, 101 suspects interviewed, multi-language prevention campaign https://magazine-the-european.com/2018/06/21/a-european- strategy-to-counter-cybercrime/
  • 15. 15 Pillars of an effective strategy – get help from other sectors Legal • Laws • Procedure • MLA Technical • Methods • Standards Organization • Prevention • Detection • Response Capacity • Skills • Awareness International • Cooperation http://www.itu.int/ITU- D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
  • 16. 16 What about developing countries? Lack resources Insecure systems Breach by cybercriminals Connected to developed st Cybercriminals cross over
  • 17. 17 How developed countries could help Share resources Make systems secure by design Share information Joint operations Prevent cybercrime
  • 18. 18 Examples • UK Home Office Cyber Crime Strategy • https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/228826/7842.pdf • Royal Canadian Mounted Police Cybercrime Strategy • http://www.rcmp-grc.gc.ca/wam/media/1088/original/30534bf0b95ec362a454c35f154da496.pdf • Singapore National Cybercrime Action Plan • https://www.mha.gov.sg/docs/default-source/press-releases/ncap-document.pdf
  • 19. Singapore’s National Cybercrime Action Plan Four key principles • a) Prevention is key; • b) Agile responses are needed to combat the evolving threat of cybercrime; • c) Our criminal justice system must be robust and supported by effective laws; • d) Combating cybercrime is a shared responsibility. Four key priorities • a) Educating and empowering the public to stay safe in cyberspace; • b) Enhancing the Government’s capacity and capability to combat cybercrime; • c) Strengthening legislation and the criminal justice framework; • d) Stepping up partnerships and international engagement.
  • 20. It’s your turn Slides available at twitter.com/benjaminang