Security Classification Practical Issues in dealing with different types of cybercrime.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Prevention of Money Laundering Training session. Overview What is Money laundering? Requirements under the Act Arcadias policy Relevance to your routine.
Office of the Information Commissioner
BARBADOS 2013 RESPONSE OF INTERNATIONAL COMMERCIAL BANKS TO CARD PAYMENT FRAUD Presenter: Denver Frater Regional Director & Chief Security Officer Eastern.
Introduction and Overview of Digital Crime and Digital Terrorism
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Copyright 2010, The World Bank Group. All Rights Reserved. Police Statistics, Crime, Criminals and Resources Part 1 Crime, Justice & Security Statistics.
OVER VIEW OF BANKING FRAUDS
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 7 Crimes Against Property. Common-Law Background It was a very serious offense for someone to permanently deprive another of the possession of.
Measuring Cybercrime Pieter Hartel. How? Victim reporting initiatives »FBI Internet Criminal Complaint Centre Population and business surveys »CBS (Statistics.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Copyright © 2008 Pearson Education Canada Inc Future Directions and Emerging Trends Chapter 12.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Protect Yourself from Identity Theft
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
This Is The Real World Not The Virtual World Alan Batey Detective Sergeant Northumbria Police High Tech Crime Unit.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The difference between a Credit and Debit Card Debit card: Give you access to your funds immediately Credit card: You use money you don’t have but are.
Cyber Crimes.
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
2015 ANNUAL TRAINING By: Denise Goff
TOGOLESE CONSUMERS ASSOCIATION (ATC ) Fifth Annual African Consumer Protection Dialogue Conference (Zambie september 2013) “ Moving Cross Border.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Identifying Risk to Children. Police officers need to have a full understanding of identifying, assessing and investigating child abuse incidents and.
2-1 Copyright © 2014 McGraw-Hill Education (Australia) Pty Ltd PPTs to accompany Barron, Fundamentals of Business Law 7Rev This is the prescribed textbook.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Cybercrime What is it, what does it cost, & how is it regulated?
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
CHILD TRAFFICKING IN SCOTLAND: NETWORKS OF EXPLOITATION? Paul Rigby University of Stirling 2 Sept 2013.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Ministry of the Interior of the Republic of Latvia STATE POLICE of LATVIA CENTRAL CRIMINAL POLICE DEPARTMENT Economic Crime Enforcement Department.
Types of Crimes Classifying and Counting Crime. Five Major Types of Crime 1. Occupational Crime 2. Organized Crime 3. Visible Crime (street crime) 4.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Crimes against property and related defences. Although offences against the person like murder are most likely to draw media attention, many of us are.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
RESOURCES Pacific Area Finance Training February 2008.
Okaloosa County Department of Corrections. Population Reports.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
Presented by: Assistant Superintendent Debra Thompson
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Following the Money ATO Presentation to the International Association of Auto Theft Investigators’ Australian Vehicle Crime Conference Presented by Amanda.
Organised Crime in New Zealand
高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学
Computer Crime CJ 520 / CJ October 27, 2010.
POLICE HEADQUARTERS, NAGURU
Equation Seminar – December 2018
Presentation transcript:

Security Classification Practical Issues in dealing with different types of cybercrime

Security Classification Overview Society Crime Types Resources E-Crime (Electronic Crime) Training Offences Jurisdiction Case studies

Security Classification Society

Security Classification Society Internet Usage 50% of Australian adults accessed the Internet in the 12 months to November % of Australian households were connected to the Internet 13% of Australian adults paid bills or transferred funds online 10% of Australian adults purchased or ordered goods or services via the Internet the value of Internet e-commerce in Australia at June 2000 was estimated to be $A5.1 billion

Security Classification Society 10% of Australian adults purchased or ordered goods or services via the Internet the value of Internet e-commerce in Australia at June 2000 was estimated to be $A5.1 billion National Office for the Information Economy report entitled. The Current State of Play 2000

Security Classification Crime Types

Security Classification Crime Types Crimes Reported to AFP %-Drug Importation cases 34% -Defraud the commonwealth cases 25%-Child Sex related cases 3%-Counterfeit currency/documents cases

Security Classification Crime Types Electronic Crime Incident Type 45% -E-Crime 11%-Interpol 2%-Counter terrorism 42%-Others (Fraud, Credit Card, Money Laundering)

Security Classification Crime types Breakdown of Computer Forensic Work 35% = Child Pornography 20% = Counter Terrorism 10% = Fraud (against the Commonwealth and private) (includes unauthorised access, hacking, unauthorised use of credit cards, make and use false instruments etc) 8% = Child Grooming (using the internet and mobile phones) 5% = Drug Offences 5% = Property Offences (possess stolen property, theft, burglary, armed robbery) 5% = Regional Assistance (referrals from IDG for Solomons, PNG, East Timor etc) 4% = Family Violence/Sexual Assaults etc 3% = Internal Investigations 2% = Homicides 3% = Other

Security Classification E-Crime Training

Security Classification E-Crime Training Continuing cybercrime education from recruit level E-Crime awareness training Introduction to E-Crime Investigate E-Crime Specialist Crime type training

Security Classification E-Crime Training Identify the offence Identify the suspect Identify witnesses Identify the victim

Security Classification Resources

Security Classification Resources Investigators access to resources AFP’s IT Infrastructure Access to computers Covert internet access

Security Classification Resources Development of specialist investigative tools eg. Boot cd’s / logicubes

Security Classification Resources Support investigative personnel in increasing their technical and investigative skills Development of specialised computer crime units Computer Forensic support

Security Classification Offences

Security Classification Offences Is the computer a target of the offence? Is the computer being used to facilitate the offence?

Security Classification Jurisdiction

Security Classification Jurisdiction The internet is transnational in nature Who has jurisdiction?

Security Classification Case Studies

Security Classification Case Study 1 Problem of Jurisdiction

Security Classification Case Study 1 Background Suspect initially resident in Australia then departed overseas. During his stay in Australia the suspect manages to transfer funds from a victims bank account via internet banking to his Australian bank account. The suspect continues with twenty similar offences targeting Australians from his new country.

Security Classification Case Study 2 Problem of identity theft

Security Classification Case Study 2 In 2003 a disgruntled ex Optus employee hacks into a Optus website called “efulfillment.” This website is used by corporate customers of Optus for ordering mobile phones and telecommunication services.

Security Classification Case Study 3 Problem of identification

Security Classification Case Study 3 On the 3rd December 2003 an , directed to David LOWE was received at the RTA Customer Service Centre. The sender wrote: "Unless all traffice infgringements for speeding incurred during the month of June are cancelled immediately, an explosive will be detonated in one of your major facilities. The cancellation of these infringement notices will be done quietly with no public notification. You have 48 hours. This threat is real".

Security Classification Questions?