SlideShare a Scribd company logo
1 of 15
Download to read offline
Defending Computer Criminals
Andrea Monti
Adjunct Professor of Law and Order
University of Chieti-Pescara
Agenda
• What this talk is all about
• A Few Caveats
• The Investigation
• What is a ‘Computer Criminal’?
• Taxonomy of the defendants
• Common mistakes in the defence
design
• Tuning the defence
• Defence arguments
• Procedural defence issues
• Conclusions
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
What this talk is all about
• This talk is about computer crime
advocacy from the defendant
perspective.

• It deals with practical matters,
therefore it assumes at least a basic
knowledge of how a criminal
investigation is performed and how a
criminal trial works.

• Tries to be ‘jurisdiction independent’.

• Outlines the basic knowledge and
strategies to handle a computer crime
trial.
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
A Few Caveats
• ‘Nobody really wants justice’ (Dershowitz, A.
‘The Best Defense’, 1982).

• ‘The more experienced a judge is, the less
his decision in a new case will be
influenced by the evidence and arguments
in that case—which infuriates
lawyers’ (Posner, R. ‘How Judges Think’,
2008).

• Corollary: procedural defense may have a
different effectiveness according to the
specific legal Zeitgeist of the Country.
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
The Investigation
• Victim’s reactions, in order
• Making sense about what happened,

• Damage control,

• Internal (often improper) forensics,

• Legal assessment,

• Law Enforcement Involvement

• Law Enforcement course of action
• Crime Scene: impromptu forensics, hard disk/
computer seizure, logs’ collection, employees’
interview, security policy analysis, prior
convictions database query,

• Carrier/ISP: Traffic Data Request

• Internet Governance Entities: information
request on Domains and IP registrations,

• Suspect: calls, IM, email eavesdropping/
wiretapping, searches and seizures, digital
forensics.
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
What is a ‘Computer Criminal’?
• The archetype of the ‘computer
criminal’ is the mighty
übermensch called ‘the
hacker’.

• Do ‘hackers’ exist? Are they
‘criminals’? Are there criminals
who are not ‘hackers’?

• Hackers as scapegoats and law
enforcement’s reputation
enhancers.

• Why do these issues matter?
Artwork by Alberto Maderna for Monti&Ambrosini Editori - All Rights Reserved
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
A Taxonomy of the Defendants
• Knowledge vs Motivation
• Knowledge is Motivation
independent,

• The same technical skills can
be exploited by a hacktivist,
an intelligence operative, an
‘ordinary’ criminal or an
average citizen,

• What matters to the defence
counsel is to position the
defendant in the right part of
the diagram.
Elaboration of a diagram initially published in Winkler, Ira, ‘Corporate Espionage’, 1997 Prima Publishing p. 86 and presented at the lecture 

IT捜査と防御権 – イタリアおよびヨーロッパの20年間の司法史 - 2017年6月10日(土)- 慶應義塾大学
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
Common Mistakes in the Defense Design
• Blindtrusting hired experts,

• Mounting a defense based on exoteric and
non Daubert-compliant technical theories,

• Failing to challenge commonly accepted
assumptions (i.e. ‘cyberspace’, ‘online vs
offline’, AI capabilities, etc.),

• Disregarding the weight of traditional
evidence,

• Lecturing the court.
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
Designing a Defense Strategy
• A computer criminal defense is made of
• Technical knowledge

• Strategy

• Effectiveness

• Technical knowledge is needed to
• Win the heart of the (tech-savvy) defendant,

• Spot possible procedural mistakes of the
investigation,

• Understand when law enforcement and
prosecutor’s expert witness are trying to ‘muddy
the water’ by releasing ‘poisoned technical
statements’,

• Design a strategy.

• Strategy must change according to
• the profile of the defendant,

• the moment when the lawyer becomes involved,

• the IT skill level of the law enforcement,
prosecutor and court.
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
Tuning the Defense Design
A standard defense design implies taking into account:

• The victim statements, in particular about what it did
before handing out the targeted computer (and/or
information) to the police,

• If the police took for granted what the victim handed
them out without further investigations,

• If the police operated the defendant’s seized devices
with improper forensics care,

• How a police-operated malware has been designed,
deployed and exploited,

• How did the police get technical information and
logfiles from carriers and ISPs. Were these information
acquired by a police technician or (insecurely) provided
by the ISPs?

• How the police did get information from foreign entities.
Did they operate under an MLAT or just get a simple e-
mail with the data?

• How the police matched a computer user with a
physical identity.
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
Defense Arguments
• Lack of digital forensics best-practice compliance as
a way to challenge the digital evidence admissibility and/
or weight (United States v. Allen, 106 F.3d 695, 700, 6th
Cir. 1997 v. Italian Supreme Court, Vth Criminal Branch,
ruling 25 March 2015, n. 1105)

• Relevance of data integrity preservation (Italian
Supreme Court Criminal Branch, ruling 6 September
2012 n. 44851) 

• Planted evidence in the defendant’s device. Although
held as unpresentable because of its highly speculative
nature, this argument gained new momentum from the
use of law enforcement-operated malware. The use of
this argument must be grounded on solid hints,
otherwise it would fall back into the ‘highly speculative’
category.

• Carefully assessing the burden of proof. Stipulation
with the prosecutor in technical matters should, as a rule
of thumb, be avoided.

• Ascertain the mens rea
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
Procedural Defense Issues
• When the procedural defense is the main
strategy, it is often implicitly seen by the court
as evidence of guiltiness,

• This perception can be exploited by the
prosecutor, especially in jury-based trials,

• To contain the potential exploitation against
the defendant of the procedural defense, it is
important to stress the point that respecting
the rules of due process is as important as the
merit of the trial.
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
Conclusions
• The protocol to follow in the design of a defense strategy
for a computer crime trial is: 

• Understanding the client's criminological profile, 

• Carefully analysing the technical police activities and look
for prosecution's mistakes, 

• Choosing whether to adopt a procedural defence,
challenge the merits of the accusations or both. 

• Bear in mind that a procedural defense must be handled
with high care because
• It can be seen by the court, and exploited by the
prosecutor as an implicit admission of guilt,

• Must be based on solid arguments, otherwise it will be
dismissed as a ‘wild speculation’,

• Can be obliterated by traditional evidences.

• Manage the relationship with the judge with extreme care
• Do not expose his limited knowledge of the technological
aspects, 

• Restrain from a professorial attitude, 

• And, above all, do not exploit his limited grasp over
technical matters to confuse him.•
Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
© Andrea Monti 2020 - All Rights Reserved
www.ictlex.net - Italian
blog.andreamonti.eu - English
monti.jp - 日本語
www.linkedin.com/in/amonti/
Sorry, no other social networks available
すみません、他のSNSはやっていません。
Thank you!
ありがとございます!
:)
Thank you!
ありがとございます!
:)

More Related Content

What's hot

Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsrcorrigan
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019Ulf Mattsson
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...CODE BLUE
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 

What's hot (20)

Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRs
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Personal Data Protection Law
Personal Data Protection LawPersonal Data Protection Law
Personal Data Protection Law
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 

Similar to [CB20] Defending Computer Criminals by Andrea Monti

computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCompute Forensics
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 

Similar to [CB20] Defending Computer Criminals by Andrea Monti (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
File000166
File000166File000166
File000166
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptxogubuikealex
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Sebastiano Panichella
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptxerickamwana1
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityApp Ethena
 
proposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerproposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerkumenegertelayegrama
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
A Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air CoolerA Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air Coolerenquirieskenstar
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEMCharmi13
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxRoquia Salam
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxAsifArshad8
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per MVidyaAdsule1
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitysandeepnani2260
 
Internship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SEInternship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SESaleh Ibne Omar
 

Recently uploaded (17)

Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptx
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
 
proposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerproposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeeger
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
A Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air CoolerA Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air Cooler
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEM
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptx
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per M
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber security
 
Internship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SEInternship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SE
 

[CB20] Defending Computer Criminals by Andrea Monti

  • 1. Defending Computer Criminals Andrea Monti Adjunct Professor of Law and Order University of Chieti-Pescara
  • 2. Agenda • What this talk is all about • A Few Caveats • The Investigation • What is a ‘Computer Criminal’? • Taxonomy of the defendants • Common mistakes in the defence design • Tuning the defence • Defence arguments • Procedural defence issues • Conclusions Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 3. What this talk is all about • This talk is about computer crime advocacy from the defendant perspective. • It deals with practical matters, therefore it assumes at least a basic knowledge of how a criminal investigation is performed and how a criminal trial works. • Tries to be ‘jurisdiction independent’. • Outlines the basic knowledge and strategies to handle a computer crime trial. Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 4. A Few Caveats • ‘Nobody really wants justice’ (Dershowitz, A. ‘The Best Defense’, 1982). • ‘The more experienced a judge is, the less his decision in a new case will be influenced by the evidence and arguments in that case—which infuriates lawyers’ (Posner, R. ‘How Judges Think’, 2008). • Corollary: procedural defense may have a different effectiveness according to the specific legal Zeitgeist of the Country. Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 5. The Investigation • Victim’s reactions, in order • Making sense about what happened, • Damage control, • Internal (often improper) forensics, • Legal assessment, • Law Enforcement Involvement • Law Enforcement course of action • Crime Scene: impromptu forensics, hard disk/ computer seizure, logs’ collection, employees’ interview, security policy analysis, prior convictions database query, • Carrier/ISP: Traffic Data Request • Internet Governance Entities: information request on Domains and IP registrations, • Suspect: calls, IM, email eavesdropping/ wiretapping, searches and seizures, digital forensics. Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
  • 6. What is a ‘Computer Criminal’? • The archetype of the ‘computer criminal’ is the mighty übermensch called ‘the hacker’. • Do ‘hackers’ exist? Are they ‘criminals’? Are there criminals who are not ‘hackers’? • Hackers as scapegoats and law enforcement’s reputation enhancers. • Why do these issues matter? Artwork by Alberto Maderna for Monti&Ambrosini Editori - All Rights Reserved Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
  • 7. A Taxonomy of the Defendants • Knowledge vs Motivation • Knowledge is Motivation independent, • The same technical skills can be exploited by a hacktivist, an intelligence operative, an ‘ordinary’ criminal or an average citizen, • What matters to the defence counsel is to position the defendant in the right part of the diagram. Elaboration of a diagram initially published in Winkler, Ira, ‘Corporate Espionage’, 1997 Prima Publishing p. 86 and presented at the lecture 
 IT捜査と防御権 – イタリアおよびヨーロッパの20年間の司法史 - 2017年6月10日(土)- 慶應義塾大学 Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT)
  • 8. Common Mistakes in the Defense Design • Blindtrusting hired experts, • Mounting a defense based on exoteric and non Daubert-compliant technical theories, • Failing to challenge commonly accepted assumptions (i.e. ‘cyberspace’, ‘online vs offline’, AI capabilities, etc.), • Disregarding the weight of traditional evidence, • Lecturing the court. Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 9. Designing a Defense Strategy • A computer criminal defense is made of • Technical knowledge • Strategy • Effectiveness • Technical knowledge is needed to • Win the heart of the (tech-savvy) defendant, • Spot possible procedural mistakes of the investigation, • Understand when law enforcement and prosecutor’s expert witness are trying to ‘muddy the water’ by releasing ‘poisoned technical statements’, • Design a strategy. • Strategy must change according to • the profile of the defendant, • the moment when the lawyer becomes involved, • the IT skill level of the law enforcement, prosecutor and court. Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 10. Tuning the Defense Design A standard defense design implies taking into account: • The victim statements, in particular about what it did before handing out the targeted computer (and/or information) to the police, • If the police took for granted what the victim handed them out without further investigations, • If the police operated the defendant’s seized devices with improper forensics care, • How a police-operated malware has been designed, deployed and exploited, • How did the police get technical information and logfiles from carriers and ISPs. Were these information acquired by a police technician or (insecurely) provided by the ISPs? • How the police did get information from foreign entities. Did they operate under an MLAT or just get a simple e- mail with the data? • How the police matched a computer user with a physical identity. Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 11. Defense Arguments • Lack of digital forensics best-practice compliance as a way to challenge the digital evidence admissibility and/ or weight (United States v. Allen, 106 F.3d 695, 700, 6th Cir. 1997 v. Italian Supreme Court, Vth Criminal Branch, ruling 25 March 2015, n. 1105) • Relevance of data integrity preservation (Italian Supreme Court Criminal Branch, ruling 6 September 2012 n. 44851) • Planted evidence in the defendant’s device. Although held as unpresentable because of its highly speculative nature, this argument gained new momentum from the use of law enforcement-operated malware. The use of this argument must be grounded on solid hints, otherwise it would fall back into the ‘highly speculative’ category. • Carefully assessing the burden of proof. Stipulation with the prosecutor in technical matters should, as a rule of thumb, be avoided. • Ascertain the mens rea Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 12. Procedural Defense Issues • When the procedural defense is the main strategy, it is often implicitly seen by the court as evidence of guiltiness, • This perception can be exploited by the prosecutor, especially in jury-based trials, • To contain the potential exploitation against the defendant of the procedural defense, it is important to stress the point that respecting the rules of due process is as important as the merit of the trial. Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 13. Conclusions • The protocol to follow in the design of a defense strategy for a computer crime trial is: • Understanding the client's criminological profile, • Carefully analysing the technical police activities and look for prosecution's mistakes, • Choosing whether to adopt a procedural defence, challenge the merits of the accusations or both. • Bear in mind that a procedural defense must be handled with high care because • It can be seen by the court, and exploited by the prosecutor as an implicit admission of guilt, • Must be based on solid arguments, otherwise it will be dismissed as a ‘wild speculation’, • Can be obliterated by traditional evidences. • Manage the relationship with the judge with extreme care • Do not expose his limited knowledge of the technological aspects, • Restrain from a professorial attitude, • And, above all, do not exploit his limited grasp over technical matters to confuse him.• Defending Computer Criminals - Andrea Monti - Adjunct Professor of Law and Order - University of Chieti-Pescara (IT) © Andrea Monti 2020 - All Rights Reserved
  • 14. www.ictlex.net - Italian blog.andreamonti.eu - English monti.jp - 日本語 www.linkedin.com/in/amonti/ Sorry, no other social networks available すみません、他のSNSはやっていません。