Once we used to keep records on criminals, now they keep records on us, by stealing ours, Peter Warren, chairman, Cyber Security Research Institute.

Slides:



Advertisements
Similar presentations
University Alliance Driving forward excellence in research: institutional strategies and approaches Professor Janet Beer, Vice-Chancellor, Oxford Brookes.
Advertisements

The Creative Learning Journey an introduction . . .
MASS MEDIA Grupo Donos. NEWSPAPERS In Britain, most newspapers are daily (they come out / are published everyday); a few only come out on Sundays. Magazines.
The more technology becomes entwined with our world, the more we want our experiences online to mirror those offline. We’re making permanent the things.
CYBER & Product Liability & Professional Indemnity
Active Citizens: Being Media Literate. Media Literacy If we want to be active citizens we need to know what is happening in the world around us. Where.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Crime in Britain and China today
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Security, Privacy, and Ethics Online Computer Crimes.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
© 2007 IBM Corporation © 2009 IBM Corporation 1 Tran Viet Huan, PhD CTO, IBM Vietnam IBM Research Global Technology Outlook.
Social services approach to Case Assessment
Network Marketing.
1 Criminal Statistics L.O: Identify sources of official criminal statistics Identify trends Analyse reliability & limitations of official crime stats.
Update by: Social Affairs Department African Union Commission (AUC) Addis Ababa, Ethiopia 1 AFRICAN UNION COMMISSION: DEPARTMENT OF SOCIAL AFFAIRS Trafficking.
MIT-AITI Entrepreneurship Lecture 4: Offshore Outsourcing.
John Vanston Chairman Conference Chair, MiniTrends 2014: Insight, Innovation & Strategy Author, MINITRENDS: How Innovators & Entrepreneurs Discover & Profit.
Computer Crime and CyberCrime Why we need Computer Forensics.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Social Informatics (8571) Review on literature review “Why Computer Talents Become Computer Hackers” By Billy Lu Leo Li.
 What are the most common types of media today?
The views expressed are personal and do not necessarily represent those of OECD or G20 Members Fabrizio Pagani, OECD Secretariat 3 rd Compliance & Anti.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Globalization. Hmmm…. How do you think technology effects globalization?
Crime & Malpractice AS Module Heathcote Ch. 10.
Cyber Security Nevada Businesses Overview June, 2014.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Functions of the Media The role of a responsible journalist in a free society Material property of the Arkansas Department of Education Distance Learning.
Google Docs: A New Way to Collaborate ISTC 702 Educational Technology and Leadership Towson University, Summer 2010.
MILITIA OF UKRAINE. Militia is assigned to provide a creative and effective functioning of reliable mechanism to protect a person, his life, dignity,
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Calories, heart rate, footsteps and sleep. People are fascinated with measuring the everyday performance of their bodies and minds. But where we previously.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Ann S. Michaelsen Teacher and administrator Sandvika vgs Using social media to connect students to educators and experts.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Fighting cybercrime in 2009 Magnus Kalkuhl, Senior Virus Analyst Kaspersky Lab ITU-T.
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Internet crime By: Brandon Murphy & Cameron Martin.
Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.
INTRODUCTION TO MOOCs.
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
WHY STUDY ECONOMICS??? Is it really important … Or is it just another REQUIRED high school credit?
CYBER CRIMES Know how's of cyber crimes. I’M HERE………
RUSSIAN TECH INDUSTRY GOING GLOBAL +7 (916) Maria Podlesnova CEO, RusBase.
CENSORSHIP ON THE INTERNET. WHAT IS CENSORSHIP?  “Censorship is the suppression of speech, public communication or other information which may be considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Institute for Security Studies Criminal Justice Monitoring Service Safety and Security Portfolio Committee 5 June 2002.
Prison, Me? No Way! WALT: Consider the current prison population and how it can be reduced. Unfortunately, crime is part of our lives and many people.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Revision Session 6 The Media. So what is the media?
Crimes By 丘丽香 519. Crimes  Britain Britain  China China   In both countries, crimes against property are the most frequently committed crimes.
The BBC structure is when they operate the day to day of the BBC. The Executive Board are the ones who make sure nothing racist, offensive, sexual indoctuctions.
HACKING: THE GOOD AND BAD SIDES In this presentation, we will talk about the good and bad sides of hacking, and also the different points of view on this.
By Patricia Horne.  Learn how to set up a You Tube account.  Learn how to embed a You Tube video onto your PowerPoint.  Learn how to save You Tube.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Consumerism: McDonald’s
Attribution & the globalization of criminal evidence
Global Cyber Insurance Market By Manufacturers, Countries, Type And Application, Forecast To 2022 Publish Date : 04-Dec-2017 No of Pages : 116 Single User.
BFSI Security Market has been witnessing a steady rise by SIZE, TREND, SHARE, OPPORTUNITY ANALYSIS & FORECAST,
Consumerism: McDonald’s
Levels of Organisation. YouTube Video – Levels of Organisation
LO1 - Know about aspects of cyber security
West Midlands Police response to Cybercrime:
SECURITY IN THE DIGITAL AGE
Presentation transcript:

Once we used to keep records on criminals, now they keep records on us, by stealing ours, Peter Warren, chairman, Cyber Security Research Institute.

About the author  Peter Warren, is the chairman of the Cyber Security Research Institute, a not-for-profit organisation committed to producing accurate information about trends in technology crime and what to do about them.  He is a well known investigative journalist with a specialism in technology  Peter has worked frequently with the Sunday Times Insight team, the Sunday Times and the Guardian and most national newspaper.  A former associate producer for BBC 2 news and current affairs and the investigations editor for BBC2’s ‘The Net’  He is also the co=author of the critically acclaimed ‘Cyber Alert’ published in 2005, which accurately warned of the emergence of organised computer crime gangs

The High-tech crimewave  It is not new - criminals have always been fascinated by technology.  Crime is part of the human condition and technology crime is simply using technology to do things the state has legislated against.  What is new are the numbers. The internet and computer technology amplifies everything. Pre-internet what was once a wave is now a tidal wave

So what is happening?  Criminals have focussed on technology for the easy money.  To support this a criminal economy has developed  While the fertile uplands of Silicon Valley developed technology Silicon Hell was spawning crime gangs coming up with ways to subvert it.

Creative and innovative  Criminals are early adopters of technology  Criminals see the potential to make money by subverting technology very quickly  They see need and work quickly to cater to it  They are great technological innovators

How is it done?  The dark side of the internet has built a mirror of the light side that uses the same methods  Silicon Hell is highly specialised  It uses some of the top people.  People work for it without being aware

Where is Silicon Hell  Silicon Hell is now spread all around the world from Russia to Brazil from China to West Africa.  Criminal activities exist in every country in the world – the UK is no exception  Computer criminals have their own cloud.

The internet the new university of crime  Guides exist to teach you to become a hacker  Videos showing you what to do are on Youtube  A lucrative criminal sideline beckons.

The crime emporium  The value is in the data – we are in the information age  The theft of data is at the heart of computer crime  All data has a price

And.. Even the criminals wipe their drives..do you?