Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.

Slides:



Advertisements
Similar presentations
Viet Nam Hitech Crime Investigation Department Dr. Tran Van Hoa
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
2 Language of Computer Crime Investigation
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Bank Crime Investigation Techniques by means of Forensic IT
By Drudeisha Madhub Data Protection Commissioner Date:
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Unit 4 – Impact of the use of IT on Business Systems.
Securing Information Systems
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Cyber Security & Fraud – The impact on small businesses.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Cyber-security and Encryption © Sergeant Paul Johnstone LLB MLitt Garda Bureau of Fraud Investigation.
Regional Cyber Crime Unit
Centre for Cybercrime Investigation University College Dublin (UCD)
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Cell Phone Forensics Investigator - ICFECI
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
Presented by: Assistant Superintendent Debra Thompson
Seminar On Cyber Crime Submitted To: Submitted By:
Lecture 14: Business Information Systems - ICT Security
8 Building Blocks of National Cyber Strategies
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Issues Facing Medical Practice Managers
Red Flags Rule An Introduction County College of Morris
Digital $$ Quiz Test your knowledge.
Stable and Acute 2007 – Challenges for An Garda Síochána
Computers in Society 12/1/2018.
CompTIA Security+ Study Guide (SY0-401)
Protecting Yourself from Fraud including Identity Theft
Cybercrime and Canadian Businesses
Protecting Yourself from Fraud including Identity Theft
Ad Hoc Phase Structured Phase Enterprise Phase
Challenges and Successes in the Zambian ICT Security Sector
Policies and Procedures to Protect you, your Office and your Data
Protecting Yourself from Fraud including Identity Theft
Introduction to Digital Forensics
West Midlands Police response to Cybercrime:
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit Unions 26 th Jan 2016

Intended Learning Outcomes  Computer Crime Investigation Unit  Role of CCIU  Unit Capabilities  Interaction with unit partners  Risk analysis – Credit Unions  Mitigation  Unit contacts

D/Chief Superintendent D/Superintendent Inspector Administration Forensics Clerical Staff (3) D/Sergeant CFEII Forensics D/Gardaí (8) CFEII Forensics D/Gardaí (8) CFEI Triage Gardaí (3) Sergeant R & D Forensics Training Computer Crime Investigation Unit Est 1991

Role of the CCIU….  National Central Reference Point for Computer Forensics and Hi Tech Crime Investigations  Assist and advise other Garda members in the seizure and recovery of computer evidence  The Forensic (SECURE) examination of all computer related media in criminal/governmental/civil investigations  Via ‘Interpol’ to liaise with other NCRP’s in relation to computer crime  Conduct enquiries for Europol – external agencies  To advise on Security Measures and Prevention Techniques for combating cybercrime.  Training courses – civilian/military/law enforcement  AOB

 Cases  Distribution of Child Pornography – (circa 60%)  Distributed Denial of Service attacks (DDoS)  Online Frauds  Internet Abuse - Hacked ‘Websites’, Harassment  Searches and search scene advice  Liaison with international agencies – Europol, Interpol  PABX Frauds  Suicide/Missing Persons  CCTV and Mobile device examinations  Evidence retrieval - Major Investigations  Murder, Rape, Drugs, Extortion, Criminal Assets, Discipline etc.  Any process in which computers are involved Operational Activities…

Unit Capabilities 1. Forensic examinations of computer media Usual STORAGE MEDIA and unusual HARD DRIVES. SMART CARDS, FLASH CARD PDA’s And the Fridge (not joking)

Garda Bureau of Fraud Investigation Networks….  Windows  Linux  Wired  Wireless  Local

Interaction with Unit Partners Banking and Payments Federation of Ireland Insurance Federation of Ireland Central Bank – others through MLIU and Cards Section Data Protection Commissioner ComReg LE Partners – Europol/EC3/Interpol/FBI/NCA/etc Government Departments – IRISS Internet Service Providers Association of Ireland Academia – UCD/TCD/Queen Mary Univ (London) Industry – Microsoft/IBM/Apple/Facebook/Google/etc

Risks for Credit Unions Same as any institution with online presence DDoS attacks CEO frauds Phishing attempts – If mobile banking SMShing Same as any institution with offline presence Data Protection Fraud BYOD

Mitigation Robust IT Policy – Sec 55 Credit Union Act 1997 as amended Strong protection of systems – Antivirus/Firewall/Cloud/Backup/updates/encryption... IT provider – Big enough then work with security company Secure Wi-Fi BYOD policy Log on Protocols Password Policy – change and share Strategic Plan – Fitness and Probity (CF and PCF) – Central Bank Regulation – trust staff (internal and external) Training – DPA and IT security CEO fraud – know addresses and suppliers. Two step check on outgoing electronic payments

UNIT CONTACT DETAILS Computer Crime Investigation Unit Garda Bureau of Fraud Investigation Harcourt Square Harcourt Street Dublin 2 D02 PT89  Tel: /96  Fax: 

Questions !!!!!!!!