Cyber Security
Data challenges in digital forensics In 2013, in what the prosecution described as “the largest, most prolific cyberattacks ... against IT systems in Singapore”, as many as 19 government websites were taken down, servers of a town council website were illegally accessed, media blogs, server containing confidential data belonging to 650 of Standard Chartered Bank’s clients was compromised. The hacker “The Messiah” was caught and sentenced to nearly five years in jail, after pleading guilty to 39 charges under the Computer Misuse Act. This Act together with the recent Cybersecurity bill and Personal Data Protection Act, Act adds a further dimension to Singapore’s data privacy, cybersecurity and cybercrime legal framework, reflecting the increasingly digital era we live in.
T Jane Lo APSM Correspondant
he High Technology Crime Investigation Association (HTCIA) Singapore Chapter 2nd Annual Conference hosted by Deloitte (29th November 2018) in the heart of Singapore’s Commercial Business District was timely and informative on recent regulations and bills passed in Singapore and globally: • the EU General Data Protection Regulation (GDPR) which came into force in May 2018, with new measures such as mandatory breach reporting. • the Singapore’s Cybersecurity Act 2018 which came into force on 31 August 2018, in which the relevant CII owners are subject to statutory duties to comply with codes and directions, and report incidents to the Commissioner of CyberSecurity. • amendments to Singapore’s Computer Misuse and Cybersecurity Act in 2017, such as making it an offense to trade, for example hacked credit card information or to deal in tools such as malware and port scanners for hacking use. Enforcement was also a topic of focus. While Information
28 | Asia Pacific Security Magazine
sharing and training to keep up with technological changes and the latest criminal tactics are necessary, digital forensics also plays an important part. Digital forensics is not straight forward in this Internetof-Things era, where rapid pace of innovations means a relentless proliferation of devices. Aside from ensuring a robust chain of “digital asset and data” custody to avoid allegations of evidence tampering (as with physical evidence), the extraction of this evidence is notoriously challenging. Terry Loo (VP Sales, APAC, Cellebrite) at the Counter Terror Asia Conference (CTAC) 2018 (Marina Bay Sands, 4th -5th December 2018) pointed out that for most cases, the initial problem to overcome is gaining access to the device and its data. Coping with variety is inevitable. Each new feature, hardware, operating systems and applications requires the development of new tools and techniques. Additionally, as case evidences typically reside on several devices, ability to integrate data from these heterogeneous sources for analysis is crucial.