Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

Dealing with Counterfeit at Retail Dave Simpson, Director of Security Nike, Inc. Richard Nessary, Senior Intellectual Property Counsel, e-Bay Brian Brokate,
Prosecuting Intellectual Property Cases Arnold H. Huftalen Assistant U.S. Attorney U.S. Department of Justice
2 Language of Computer Crime Investigation
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Robert Morgester Deputy Attorney General of California Deputy Attorney General of California.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Time Share Fraud Investigations
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Security, Privacy, and Ethics Online Computer Crimes.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Unit 5 BANKING –Banking Basics
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Meeting the Demands for Vital Statistics: The Challenges of Collecting, Preparing, and Promoting Baltimore, MD May 31 st – June 4 th, 2009 Vital Records.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Federal Bureau of Investigation
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
The Reality of Identity Theft Dan Clements CardCops CBAI Sept 26, 2009.
WHEN THE DEPARTMENT OF JUSTICE KNOCKS DOJ Enforcement Trends: What to Expect and How to Respond Jacqueline Arango Shareholder Akerman Senterfitt.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Cyber Security Nevada Businesses Overview June, 2014.
Identity Theft.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Kelly Herd Rebecca Hofeling IDENTITY THEFT AND PROTECTION Communication 2500.
E-Finance in India A Perspective Geneva October 24, 2001.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
By: Asfa Khan and Huda Mukhtar
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Cybercrime What is it, what does it cost, & how is it regulated?
You. are at risk for the fastest growing crimes crime.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
TYLER GROUP
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
Challenges We Face On the Internet
Red Flags Rule An Introduction County College of Morris
Overview of the Budapest Convention on Cybercrime (2001)
Patent Information Annual Conference 2011
Protecting Yourself from Fraud including Identity Theft
Prosecuting International Intellectual Property Crimes
Protecting Yourself from Fraud including Identity Theft
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice

CCIPS Established in 1991 and now almost 40 attorneys Prosecute – –Computer intrusion and damage cases –Intellectual property cases Provide technical advice re: search and seizure of electronic evidence Legislation and Policy development Train prosecutors and investigators

What we can do for you– Advise on searching and seizing electronic evidence Assist in investigation and prosecution of hacking and IP crimes Research resources –Search & Seizure Manual (2002) –IP Manual (2006) –Network Crimes Manual (forthcoming) 24/7 duty line: (202)

Agenda Investigation of a Major Database Theft Investigation of a Secondary Market for Identity Information Complications in Online Investigations Conclusion

Agenda Investigation of a Major Database Theft Investigation of a Secondary Market for Identity Information Complications in Online Investigations Conclusion

United States v. Scott Levine Victim: Axciom, Little Rock, AK Crime: Theft of over a BILLION customer records Trail led back to Snipermail, and its CEO: Scott Levine Various other employees pled and cooperated Convicted after lengthy trial Sentence: 96 months

Agenda Investigation of a Major Database Theft Investigation of a Secondary Market for Identity Information Complications in Online Investigations Conclusion

Carding Sites

Centers of Online Crime Financial Crime –Credit Card Fraud –Bank Fraud and Money Laundering –Identity Documents Computer Crime –Hacking Services (Intrusion, DDOS, etc.) –Custom Malware (Viruses, Trojans, etc.)

WHAT CAN YOU PURCHASE? Financial account information Credit Cards Passports Driver’s licenses Birth certificates Social Security cards Credit Reports Insurance cards Diplomas

Counterfeit Licenses and Credit Cards

Shadowcrew.com

Hierarchical Structure

Control over Shadowcrew USSS Newark FO Took Control of Site –Complete Monitoring of Content –Knowledge of Criminal Activity –Offering of Auxiliary Services Targeting of Highly Placed Members –Administrators –Reviewed Vendors –Other Key Criminals October 2004: Takedown

Takedown Summary (Nov 2004) Total Arrests: 28 –21 Arrests in USA –7 Foreign Arrests Total Search Warrants Executed: 27 More Than 100 Individual Computers Seized

Domestic Arrests (USA)

Foreign Targets/Arrests

Agenda Investigation of a Major Database Theft Investigation of a Secondary Market for Identity Information Complications in Online Investigations Conclusion

Hotmail SUBPOENA #1 IP Address Cable ISP SUBPOENA #2 Subscriber info and computer location Simple Example

Blocks in the Road Record Retention Open WiFi networks Foreign hosts

IP Address from Hotmail Hotmail WiFi CLIENTS Broadband Modem Subject’s House

Solution:  Use a Pen Trap order to get IP data  Start at physical location of the IP address  Follow the WiFi signal to subject’s location

Agenda Investigation of a Major Database Theft Investigation of a Secondary Market for Identity Information Complications in Online Investigations Conclusion

ID Theft is a exploding problem Federal investigators alone can’t handle the problem There is a need for more training President’s ID Theft Task Force Report (forthcoming)

Questions? Richard W. Downing Assistant Deputy Chief