West Midlands Police response to Cybercrime:

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Preventing Child Sexual Exploitation
Strategic Centre for Organised Crime Partnerships and engagement with communities.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
A partnership approach to tackling Cybercrime Prof Bernard Silverman Home Office Chief Scientific Adviser.
Tuesday 14 th October 2014 Assistant Chief Constable Matthew Horne Head of the Serious Crime Directorate Kent Governance Board.
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
SOCA and Beyond- The Role of Science and Technology
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
Cyber Crime in the Digital Age
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Cyber Cops The Challenges Detective Sergeant Cath Elvey NW Regional Cyber Crime Unit.
The National Intelligence Model (NIM)
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Catherine Bowen, Policy & Stakeholder Director. What is the NBCS? The National Business Crime Solution (NBCS) is a ‘Not for Profit’ Initiative that provides.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Cyber Security & Fraud – The impact on small businesses.
JARAP Cybercrime D/Inspector Phil Tebbs – Cybercrime Implementation Lead.
Australia’s Implementation of the People Trafficking Protocol Presentation by Sandra Bennett International Crime Branch Australian Government Attorney-General’s.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Extending the crime survey to include fraud and cyber Joseph Traynor.
Kent & Essex Serious Crime Directorate Cyber Crime – Current/Future Capabilities.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
1. 2 Reducing Crime and Anti-Social Behaviour 3 On a typical Day, Essex police:
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
Regional Cyber Crime Unit
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Metropolitan Police Sexual Offences, Exploitation & Child Abuse Command PROJECT AZURE FEMALE GENITAL MUTILATION DC Natalie Reseigh.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
1 Protecting Communities: Managing Harm 22 nd February 2016 Chief Constable Simon Cole QPM leics.police.uk.
Child Sexual Abuse DS Stuart Barton 04/02/16. Hampshire Police Organisational Response Head of Child Abuse Investigation Team DCI Scott MacKechnie Child.
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.

Disability safeguards
Conducting Reactive and Proactive Internet Investigations
Learning from Complex Child Sexual Exploitation Investigations
Electronic Devices Policy
A Project on CYBER SECURITY
California Cybersecurity Integration Center (Cal-CSIC)
The Albert Kennedy Trust – No young person should have to
INVESTIGATION PROCESS AND TECHNIQUE
Cyber-crime and Forensic Computing
Kent Internet Risk Assessment Tool (KIRAT)
Not Protectively Marked – Public Document
8 Building Blocks of National Cyber Strategies
● SmartLaw Sexting and the Law.
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Becoming the force we want to be
Chapter 10.
Violence and Vulnerability
Technology briefing 4 October 2018
National Child Sexual Exploitation and Trafficking Workshop – Intelligence Led Investigations I will come back to the scenario towards the end of this.
Hate Crime APS Dean Smith.
Equation Seminar – December 2018
Ministry of Social Security and Labour
Sexting and the Law.
Role of US Security and Intelligence Agencies
Child sexual exploitation sessions
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
Thames Valley Chamber / Claire Logic
Presentation transcript:

West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly

What do we mean by Cybercrime?? West Midlands Police must support victims impacted by a very wide range of criminal activities Different crime-types require different responses!

What do we mean by Cybercrime? Cyber dependent: Crimes against computers E.g Remotely accessing or taking control of one or more computers to carry out a range of illegal activities Cyber enabled: Crimes which have been made possible because of computers E.g Online fraud, data theft, extortion/sextortion, online child abuse/grooming

What do we mean by Cybercrime? Cyber attack: a collection of activities undertaken via computers and computer networks in order to steal money, information or damage property. This may also include “social engineering” activities to deceive or trick someone into disclosing useful information which then facilitates a technical attack on systems. Who would pick up a USB drive lying in a car park and take a sneaky peek to see if there was anything interesting on it? Particularly if it had a sticker on it saying “My home movies” or “Sexy girls”

West Midlands Police: The local response Force CID Investigation teams Economic Crime Unit - responsible for financial investigation across the force, including packages received from Action Fraud in London. These will be assessed against Home Office guidelines for severity and victim impact and further investigated. Serious and Organised Crime Unit (SOCU) – responsible for conducting covert investigations into the most serious crime, including demand led kidnap, extortion, product contamination. FCID Priorities Team – responsible for conducting dynamic investigations into complex crime series that are likely to have a cross-border impact. Local Investigation teams – Criminal investigation teams across each of the 10 Local Policing Units (LPUs) to investigate volume offences.

Public Protection Unit Investigation teams West Midlands Police: The local response Public Protection Unit Investigation teams Child Abuse Investigation Teams Investigate allegations of child abuse, including online offences conducted via the internet On-line Child Sexual Exploitation Team (OCSET) Specialist investigators identifying and prosecuting sexual predators and those who make or distribute child abuse imagery. (Working in partnership with NCA/CEOP)

West Midlands Police: The local response Digital media investigators – 59 detectives trained and equipped to examine most forms of electronic devices to quickly extract evidence and intelligence Digital forensics – Technical forensic specialists who will extract evidence from every type of electronic/SMART device Technical Intelligence Development Unit (TIDU) – Specialist technical investigators conducting covert online investigations Communications Data Intelligence Unit – trained and accredited to facilitate lawful acquisition of communications data and effective co-operation between West Midlands Police and communication service providers Open source investigations – 400 staff trained to obtain Intelligence and evidence from the publicly available information on the Internet

The West Midlands Regional response Regional Organised Crime Unit (ROCU) Each region has a ROCU with various capabilities In support of the NCA and local forces each ROCU has a Cyber Crime Unit West Midlands = 1 x DI, 2 x DS (Operational), DS (Protect) 8 x DC’s 4 parts – Investigation/Enforcement, Intelligence, Technical, Protect & Prevent

National (NCA) Cybercrime Unit Spread over hubs covering the UK The National Cybercrime response National (NCA) Cybercrime Unit Spread over hubs covering the UK Support through Region to Local forces International investigations & liaison Close industry and academia links

National 4P’s approach Pursue offenders who target the region / wider UK and its interests Prevent people becoming involved in, or remaining in, cyber crime Protect the public / organisations from becoming victims of cyber crime Prepare for the consequences when cyber incidents occur

West Midlands Police advice to business 1.Prevention is always better than cure – see next section 2.Business Continuity Planning - What are your ‘crown jewels’ that need most protection. Have a plan for the most critical parts of the business that need to be protected/restored first. What does ‘recovery’ look like and how you they achieve it. Who will you turn to for assistance? 3. A live attack- In general terms it will not be the police’s responsibility to stop or mitigate most live attacks. Address this with their BC plans through IT support and service providers, however if it is something like an extortion demand then the police should be included as early as possible to maximise the opportunity to identify a suspect. 4. DDOS/Malware/Crypto locker attacks– work with your IT department to mitigate the immediate threat and refer to Action Fraud immediately. They will assess the most appropriate police response.

Prevention: What can you do to protect yourself? } Excellent HM Govt resources for everyone NCA/CEOP advice to young people, parents, carers and teachers

Prevention: What can you do to protect yourself? GCHQ/CESG advice to business HM Govt Computer Emergency Response Team HM Govt Cyber-security Information Sharing Partnership (West Midlands launch on 11th February at JLR) HM Govt approved certification (From £300 to £2000)

Action Fraud 0300 123 2040 www.actionfraud.police.uk Non-emergencies: 101 Emergency: 999 Website: http://www.west-midlands.police.uk/ Twitter: www.twitter.com/wmpolice Facebook: www.facebook.com/westmidlandspolice YouTube: www.youtube.com/westmidlandspolice Flickr: www.flickr.com/westmidlandspolice Action Fraud 0300 123 2040 www.actionfraud.police.uk