Technology & Crime Cyber – Mini Conference ADIL ILYAS CYBER CRIME CONSULTANT – CID HQ.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
Introduction and Overview of Digital Crime and Digital Terrorism
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Chapter 14 Crime and Justice in the New Millennium
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
Mobile Financial Services Fraud ADIL ILYAS. Introduction Any electronic Device that can either STORE, PROCESS or COMMUNICATE can be used to either commission.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Forensics BACS 371
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
CYBER CRIME AND SECURITY TRENDS
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Bank Crime Investigation Techniques by means of Forensic IT
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Unit 4 – Impact of the use of IT on Business Systems.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Cyber crime & Security Prepared by : Rughani Zarana.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Cyber Security Nevada Businesses Overview June, 2014.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Warfare Playgrounds to Battlegrounds.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Add video notes to lecture
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 11 crime and security in the networked economy
COMPUTER CRIME.
Preventing Information Technology Crimes
Challenges and Successes in the Zambian ICT Security Sector
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

Technology & Crime Cyber – Mini Conference ADIL ILYAS CYBER CRIME CONSULTANT – CID HQ

Agenda Status:- Situational Analysis of Cyber Crimes in the country. Threats:- Current and Future Threats & Threat Sources Trends:- Patterns and roadways of Cyber Crimes in the country Challenges:- Technical to Administrative Challenges Solutions:- A way forward Case Studies

Introductions Technology is a double-edge sword, and it's a good idea to understand how both sides of the blade cut. The Good Part: Medicine, Education, Communication, Trade/Commerce, Entertainment and much more It facilitates crime but it has been also mobilized to successfully combat crimes, even in Tanzania. There are negative externalities brought about by the increased use of technology and some of these pose serious challenges on the course of our daily lives.

Cyber Crime - Explained Any electronic Device that can either STORE, PROCESS or COMMUNICATE can be used to either commission an offense or be used as a target of an Offense. Technological Enabled Crimes ( Cyber Crimes ) o Traditional Crimes using new technology. o Examples: - Fraud, Counterfeiting, Tax Evasion, Money Laundering Computer Crimes o Crimes brought fourth by new technology Hacking, Denial of Service Attacks, System Manipulation, Phishing, Spamming Tools Regular Phones, Smart Phones Computers Storage Devices ( Flash Disk, CDs etc)

Who can commit an offense ? Over 18 million people in Tanzania are connected to Mobile Phone Networks Over 8 million people in Tanzania are connected to the internet, with or without knowledge of their connection state. More than 7% of the population owns a PC Anyone of these can commit an offense Mostly likely they will use the same available technology to facilitate that offense. Practically they have the weapon for the offense.

Our Status Quick Fact :- The beauty about technology it does not wait for a country or region to fully mature into a developed state, but rather its instantaneously available across globe. The same technology may impact regions differently and bring about positive and negative outcomes. Noticeable Government Efforts TCRA Harmonized Communication Sector ( Pricing, Service Structure, Resource Management ) Tanzania Police Force – Cyber Crime Unit. o Newly Revamped Department o Covers: Computer & Mobile Forensics, Hi-Tech Crimes, Research & Emerging Crimes, First Responders, Stake Holder Liason, Cyber Prosecution o Continuous Training Efforts :- Over 250 First Responders / Officers have been trained CERT – Establishment in progress. Establishment of eGA Establishment of EPOCA, and ongoing process of Establishing Cyber Law

Our Status Communication Sector:- Mobile Subscriber Registration has helped in identifying culprits misusing the technology. But still some phones continue to operate un-registered and other with false pre-registered information Storage of Corroborative Evidence as CDRs with mobile operators has helped a great deal in combating crimes, but Most Operators fail to retain DHCP Logs on internet activities. Insider collaboration, SIM Swapping and Soft Engineering on victims has been the latest trend in Mobile Money Theft.

Our Status … Financial Sector Tanzania has over 26 Banks; all these banks use the latest technology available in the market to offer services. Some of these banks even inter-connect their services to Mobile Communication Networks. Banks have been in the frontline of attacks by both Locals and Foreigners Technology used against banks are :- Key Loggers, Skimmers, ATM Cloners, Insiders, Sniffers, Identity Theft, Card Trading

Threats & Threat Sources.. Threat SourceDescription & Technology usedTypical Threats Posed Organized Criminal Groups Criminal groups seek to attack systems for monetary gain.  Key Loggers  ATM Skimmers  Card Cloners  Identify Theft  Computer & Computer Software  SMS ID Manipulation  GSM Gateways  Internet  Fraud  Theft  Forgery & Counterfeiting  Money Laundering  Tax Evasion  Call Termination Fraud  Scams, Fake Websites  Denial of Service Attacks  Piracy  Defamation and Offensive Content  Impersonation

Threats & Threat Sources.. Threat SourceDescription & Technology usedTypical Threats Posed Amateur Offenders Offenders with various motivations some monetary gains while others focus on personal agendas  Mobile Phones  Computers  Internet  Harassment & Threats  Theft  Defamation  Impersonation

Threats & Threat Sources.. Threat SourceDescription & Technology usedTypical Threats Posed Insiders The disgruntled organization insider is a principal source of computer crime. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a target system often allows them to gain unrestricted access to cause damage to the system or to steal system data.  Theft  Fraud  Denial of Service Attacks  Theft of Information

In order to commit the offense MOTIVATION & OPPORTUNITY

MOTIVATORS t FINANCIAL PERSONAL MOTIVATIONS ADVENTURE / POWER HI-TECH

Motivators FINANCIAL GAIN (fraud, theft, scams, forgery) REVENGE (against people, communities, corporates, governments, countries) CURIOSITY (knowledge, sensation, intellectual challenge); FAME (media attention, boasting, political).

Opportunities 7 YEARS AGO Ally Dar Es Salaam Joanitha Arusha

Opportunities 4 YEARS AGO Ally Dar Es Salaam Joanitha Arusha MPESA

Opportunities 1 YEAR AGO Ally Dar Es Salaam Joanitha Arusha MPESATIGO PESA

Opportunities NOW Ally Dar Es Salaam Joanitha Arusha CRDB BANK NMB BANK MPESA TIGO PESA MPESA OR MOBILE BANKING CARDLESS WITHDRAWO

Opportunities for Criminals Increased volume of E-Commerce and online corporate transactions Increased connectivity for both targets and offenders Increased vulnerability of targets Convergence of Technologies

Typical Offenses Fraud Call Termination Fraud Credit/Debit Card Trading Organized Scams Terrorism Money Laundering Denial of Services Piracy Counterfeiting Tax Evasion Impersonation and concealment of identity Illegal Interception of Communication

Administrative Challenges Enactment of Cyber Laws that will encompass all aspects of Cyber Crimes and Computer Related Offenses Delay Educational Sectors to introduce Disciplines in Cyber Crimes Lack National Strategy in Combating Cyber Crimes Consumer & End User Education on New Products Admissibility of Electronic Evidence in Courts Education and Training to Law Enforcement Officers, Prosecutors and Judicial Retaining of Corroborative Evidence by Third Party Providers Stakeholder collaboration still a challenge No Standard Operating Procedures or Best Practices Adopted Working IN Border but fighting a borderless crime Costs

Technical Challenges Many Offenses are never detected Many detected Offenses are never reported Difficult to Quantify offenses Distributed Systems make search and seizure difficult Encryption Skills sets required to Investigate and Forensically extract ESI Difficult to Police Cyber Space Convergence of Technologies The Constantly Evolving Technological Landscape and Emerging Crime ware Technique

Tools Using Hardware based Key loggers. A common method across Asia/African Markets

Card Cloning /Skimming

ATM Fraud

Way Forward On a more holistic level, a multifaceted approach is certainly required in order to comprehensively deal with the problem most effectively. o EDUCATION Educating information technology users including individuals, corporate entities and organizations is a largely preventative measure. Universities & Institutions should accommodate Information Security o PUBLIC & PRIVATE PARTNERSHIPS Both are inter-dependent on one another. o DEFENSIVE TECHNOLOGY Monitoring & Forensic Technology