“[The] threat will involve the joining of the growing cyber-crime capability we see today with the terrorists' realization that the cyber realm is ripe.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

How to protect yourself, your computer, and others on the internet
K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
Introduction and Overview of Digital Crime and Digital Terrorism
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Cyber Crime The current threat to the UK Security Marking.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Internet Security Awareness Presenter: Royce Wilkerson.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Cyber-Warfare: The Future is Now!
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
CYBER CRIME AND SECURITY TRENDS
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Maritime Cyber Risks – What is real, what is fiction?
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Computer Crime and Information Technology Security
Cyber Crimes.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
Digital Forensics - challenges and opportunities Marc Kirby Cranfield University.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
INTRODUCTION & QUESTIONS.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
Regional Cyber Crime Unit
By: Ted Worthington.  About TJ Max  Discovery  How the break in occurred  The Payment Card Industry-Data Security Standard  Lawsuit and Investigation.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security – Current Challenges
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Dissecting the Cyber Security Threat Landscape
The Global Challenges of Cybersecurity and Digital Terrorism
Protecting Your Company’s Most Valuable Asset
Challenges and Successes in the Zambian ICT Security Sector
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Presentation transcript:

“[The] threat will involve the joining of the growing cyber-crime capability we see today with the terrorists' realization that the cyber realm is ripe for exploitation and that joining with cyber criminals will be their path to that exploitation.” - Steven Bucci, IBM (2010) “It is clear that terrorist groups are using computers and the Internet to further goals associated with spreading terrorism. This can be seen in the way that extremists are creating and using numerous Internet websites for recruitment and fund raising activities.... Several criminals who have recently been convicted of cybercrimes used their technical skills to acquire stolen credit card information in order to finance other conventional terrorist activities.” - Clay Wilson, CRS (2008) So far, the customary practice of nations in cyberspace seems to be, "Do unto others whatever you can get away with." Sadly, until a major player like the United States suffers a catastrophic cyber event, it appears likely to stay that way. – Gary D. Brown, Joint Forces Quarterly (2011)

Sources: National Commission on Terrorist Attacks Upon the United States, UN Monitoring Team Report on al-Qaeda and the Taliban, The United Kingdom Home Office, FBI, Intelligence Bureau (India). AttackDateEstimated Cost in USD Operation HaemorrhageOctober 2010$4200 Failed Times Square Bombing05/01/10$13,000 – 15,000 Mumbai Attacks11/11/08~$750,000 London Transport System07/07/05$15,000 Madrid Train Bombings03/11/04$10,000 Jakarta Marriott Hotel Bombing08/05/03$30,000 Bali Bombings10/12/02$50,000 9/11 Attacks09/11/01~$500,000 USS Cole Attack10/12/00$10,000 Estimated Costs of Physical Attacks

Estimated Costs of Virtual Attacks? Costs are most often represented in lost sales or remediation and clean-up efforts Extraordinary challenge to figure out “how much” it cost to create attack software Recent attacks show that sometimes “simple” moves can have surprisingly powerful effects

 The Kroll annual Global Fraud report notes that 2010 marked the first time ever that the cost of electronic theft has topped that of physical theft.  Attacks now shifting from financial fraud and espionage to disruption and destruction.  North Korea, Iran, China, all have cyber military units that many experts suspect are moving into disruption and destruction Data Points

Differentiations  Hacktivists  Cybercriminals  Warriors

Politically-Oriented Groups Lulzsec Malsec Spexsec

Major Trends in 2012

Rapid Rise in Social Networks If Facebook were a country, it would be the world’s 3 rd largest Globally, people spend over 6 hours a day on social networking sites

 Social network phishing and click-jacking  Mobile attacks  Distributed Denial of Service (DDoS) Most Common Attacks

The UK founder of the infamous GhostMarket.net cyber crime forum was convicted along with three others of computer offenses linked to the theft of 130,000 compromised credit card numbers and a botnet infecting 15,000 computers in over 150 countries. In 2008 Albert Gonzalez was charged with the largest case of credit and debit card data theft ever in the United States: Stealing 130 million credit card accounts on top of 40 million he stole previously, from retailers including 7 Eleven, T.J. Maxx, Barnes & Noble, Sports Authority and OfficeMax.

Cybercriminals: Nigeria, Russia or the United States?

State-sponsored Cyber *Attack* Units: Iran, North Korea, China, Russia, United States, others?

Rapid Technological Shifts

A Proliferation of Mobile Devices

Types of Attacks that Terrorists Could Easily Employ to Raise Money Boy in the Browser Click Fraud Evil Twin Wi-Fi hotspot

Sample Suite: Karmetasploit

- Government should push industry to increase transparency on attacks and exploits - Monitor hacker community exploits and sites; ideally in multiple languages. - Encourage closer cooperation between governments to facilitate information exchange on cyber-crime and terrorism. Don't leave it up to industry. - Keep pursuing international efforts to increase cybercrime legislation and prosecute criminals. - Pursue greater governmental oversight, not just for critical infrastructure but for private companies that rely on big data. - For businesses, continuous monitoring and data analytics to flag suspicious activities. - Sponsor simulations for hackers to raise fast cash for a terrorist attack given openly available tools on the Web. - Generate awareness that cyber attack is unavoidable, and that security is a process, not a product. Recommendations

“Industry and private sector companies have a vested interest in maintaining adequate security and that regulation should be kept at a minimum. But companies have always had that interest, and to date it has not translated into adequate security.” -- William Jackson, Government Computer News Most of my working life has been in CID and counter-terrorism. I don't think that in the future detectives will be equipped to be able to deal with these things if they don't understand the nature of cybercrime and I think that multinational organisations, public and private organisations, need to ensure that they understand the threats to their organisation." -- Janet Williams, Lead on cybercrime at the Association of Chief Police Officers …The media narrative du jour: The digital sky is falling! Hackers are causing internet Armageddon! Wait, never mind, not quite yet! Also: The Justice Department thinks all hackers are cyber terrorists! And: Homeland Security loves hackers and wants to hire them! It can't be all of those things at once. Though somehow it is. -- Simon Dumenco, AdAge.com