UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

Security Classification Practical Issues in dealing with different types of cybercrime.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Cyber Crime in the Digital Age
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007.
(Geneva, Switzerland, September 2014)
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
CYBER CRIME AND SECURITY TRENDS
Cyber Cops The Challenges Detective Sergeant Cath Elvey NW Regional Cyber Crime Unit.
Mobil e 65% of companies are deploying at least one social software tool. SocialClou d Digital content grew to Over 80% of new apps were distributed or.
Combating cyber-crime: the context Justice Canada March 2005.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
PREVENTION & RESPONSE “ARE YOU PREPARED” Security & Emergency Management Conference 1 June 2006 FA Frank Prendergast National Manager Counter Terrorism.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Cyber Security Nevada Businesses Overview June, 2014.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Australia’s Implementation of the People Trafficking Protocol Presentation by Sandra Bennett International Crime Branch Australian Government Attorney-General’s.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Hurdles in implementation of cyber security in India.
Cybercrime What is it, what does it cost, & how is it regulated?
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
A threat to global security and economy Koushik Mannepalli CMPE 294.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
IMPLEMENTING THE SALVADOR DECLARATION The United Nations Programme Network of Crime Prevention and Criminal Justice Institutes (PNI)
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
A Project on CYBER SECURITY
Computer Crime CJ 520 / CJ October 27, 2010.
Securing Information Systems
CSI Survey 2007 Tiffany Gorman
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
CYBER CRIME Matthew Purchase.
Andy Hall – Cyber & Tech INSURANCE Specialist
CRITICAL INFRASTRUCTURE CYBERSECURITY
AVI AFRIQUE October 2018 Tshepo Peege
Threats Facing Industry –
Deborah Housen-Couriel, ADV.
Presentation transcript:

UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris AM APM National Manager, High Tech Crime Operations Australian Federal Police

UNCLASSIFIED Cybercrime: Australian Trends  Cyber crime is now a ubiquitous mainstream & ‘traditional’ crime  5.4 million Australian victims in 2012 at cost of an estimated $AU1.06 billion  Availability of tools required to carry out a cyber attack are widely accessible  Financially motivated crime groups target the financial sector to chase high returns

UNCLASSIFIED Cyber crime: Australian threats  Intelligence shows an increase in cross- platform malware production  Key business targets (such as banking and finance)  Intrusion, modification & denial of service  Data theft  Requirement for target hardening: the AFP is closely aligned with private industry to combat cybercrime through intelligence, information sharing and prevention strategies

UNCLASSIFIED Cybercrime: International Trends Emerging international cybercrime trends:  Multi-platform threats  Social engineering scams – creating level of trust at first  Highly targeted (malware)  Increasing complexity and ingenuity

UNCLASSIFIED The AFP’s Cyber Crime Operations Teams are responsible for investigating significant computer intrusions such as: − Distributed Denial of Service attacks − breaches of major computer systems − collective large scale breaches to harvest personal, business and/or financial data − creating, controlling or distributing malicious software, and − crime which directly impacts critical infrastructure AFP Cyber Crime Operations

UNCLASSIFIED Melbourne Team  Malware deployment and sophisticated malware kits Sydney Team  Threats to banking sector Canberra Teams  Issue Motivated Groups (Hacktivism)  CSOC/ACSC Key common goals  Prosecution  Disruption  Prevention of loss  Intelligence sharing

UNCLASSIFIED Activity Victim Type Commonwealth Government State Government Major financial institution / corporation Small BusinessIndividual Unauthorised intrusion AFPState PoliceAFPState Police HactivismAFPState PoliceAFPState Police Online fraudAFPState Police Identity theftState Police Unauthorised impairment AFPState PoliceAFPState Police Intellectual property AFP Data theftAFPState PoliceAFPState Police Production of malware AFP

UNCLASSIFIED Addressing cybercrime: Challenges & opportunities  Common frameworks or protocols to support investigations  Data sovereignty – where is the data, stored processed and transmitted?  Jurisdictional Issues - Criminal acts can be carried out in Australia from anywhere in the world  Speed at which cyber criminals act and the ease with which digital evidence is destroyed  Way forward: implementation of regulation on metadata retention  Is the Mutual Assistance in Criminal Matters Act 1987 up to the task?

UNCLASSIFIED Policies and Initiatives The Australian government has a number of initiatives and policies including:  Australian Cyber Security Centre  Cyber Security Operations Centre  CERT Australia  The National Plan to Combat Cybercrime  Australian Government Cyber Security Strategy  Australia is also party to the Council of Europe Convention on Cybercrime

UNCLASSIFIED Questions & comments