Cyber enabled crime The challenge for national and local police.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

UN Comprehensive Study on Cybercrime
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
E-commerce Law Crime and e-commerce. There are various ways that crime and e-commerce overlap. Some are peculiar to e-commerce – fraud, others are relevant.
Delivering Protection.  Community expectations - protection, value for money  They expect the police to:  Prevent crime and disorder,  Respond to.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
A partnership approach to tackling Cybercrime Prof Bernard Silverman Home Office Chief Scientific Adviser.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Insert title/footer text here SAFER FUTURE COMMUNITIES Clinks | 59 Carter Lane | London | EC4V 5AQ
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Computer Forensics BACS 371
Ethical Hacking by Shivam.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Cyber Cops The Challenges Detective Sergeant Cath Elvey NW Regional Cyber Crime Unit.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Cybersecurity Governance in Ethiopia
Crime & Malpractice AS Module Heathcote Ch. 10.
Cyber Security Nevada Businesses Overview June, 2014.
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
Ealing Learning Disability Partnership Board 13 January 2010 Presentation on the Government’s Action Plan on Hate Crime.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
Annex A ASBOs are a powerful tool for protecting victims and stopping anti-social behaviour. Much effort goes into getting the ASBO by the agencies involved.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
E-CRIME Ian Johnston CBE QPM DL Chief Constable British Transport Police Chair of ACPO Crime.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
1 Protecting Communities: Managing Harm 22 nd February 2016 Chief Constable Simon Cole QPM leics.police.uk.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Managed IT Services in Charlotte NC. We are leading managed IT services providers in Charlotte NC. Call us now on (704) for managed IT services.
Fraud and the internet Sandra Peaston Assistant Director, Insight Cifas, The UK’s Fraud Prevention Service.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Sally Bourner Chief WMP2020 PCC Business Summit Monday 18 th January 2016.
Tackling Cyber threats together
Measures to enhance and assure trust and security
Legal and ethical issues
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
What is ‘Crime’?.
The Third Wave of Hacking Cyber-Crime as a Service
A Project on CYBER SECURITY
The Computer Misuse Act 1990
Stephen Kavanagh Nick Alston
Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)
Year 10 ICT ECDL/ICDL IT Security.
COMPUTER CRIME.
National Cyber Security Programme Local : Building Resilience Together
“CYBER SPACE” - THE UNDERGROUND ECONOMY
GDPR General Data Protection Regulation EU: Coming May 25, 2018
SMB practice development: Security play
Becoming the force we want to be
Computer Systems D Stainton.
Computer Misuse Act 1990.
SMB practice development: Security play
Tackling Cyber threats together
Preventing Information Technology Crimes
Computer Misuse Act 1990 GCSE ICT.
National Child Sexual Exploitation Work Group Implementing the national plan… Moira McKinnon Chair National Work Group 2019.
LO1 - Know about aspects of cyber security
Chief Constable Essex Police
LO1 - Know about aspects of cyber security
End User Support By Dominique Stainton.
Thames Valley Chamber / Claire Logic
Presentation transcript:

Cyber enabled crime The challenge for national and local police. Nick Alston CBE Chair of PIER 25 January 2017

PIER’s core activities Facilitating police-led research Continuing professional development Knowledge exchange

PIER Victims, witnesses and perpetrators ARU faculties Police forces, national policing bodies Universities/policing networks Public sector partners and third sector agencies PIER Victims, witnesses and perpetrators

UK response to Cyber crime National Cyber Security Centre National Crime Agency (National Cyber Crime Unit) Action Fraud - National Cyber Crime reporting centre Metropolitan Police Cyber Crime Unit Local police forces

CSEW fraud and computer misuse – numbers of incidents for year ending September 2016 Offence group Number of incidents (thousands) Fraud 3,617 Bank and credit account fraud 2,452 Non-investment fraud 39 Advance fee fraud 118 Other fraud 108 Computer misuse 1,966 Computer virus 1,300 Unauthorised access to personal information (including hacking) 667 ONS Jan 17 data

Chief Constable Stephen Kavanagh Jan ‘17 The internet challenges our existing geographical structure of policing and concepts of social space, victimhood and crime types. A fraudster or hacker can target multiple victims in numerous locations from the comfort of their bedroom. Evidence can exist in multiple jurisdictions and formats but needs to be brought together into one digital case file for presentation at court.

In reality… The threat to data is growing but policing action and prosecutions are likely to be the exception rather than the rule Good protection will be essential – so thanks for taking an interest The GDPR may help bring a focus but national laws will lag behind and responsible national authorities may well struggle There could be perverse impacts: ‘dare to share’ is crucial in delivering better, ‘joined up’ public protection from the police and partner agencies – even though police data excluded from GDPR

Contact details Where you can find us: Chelmsford: Marconi 304 Cambridge: Helmore 257 Email: samantha.lundrigan@anglia.ac.uk nicholas.alston@anglia.ac.uk jason.slater@@anglia.ac.uk