C0c0n 2014 23 August 2014 Dinesh O Own Country in the year 2014.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Viet Nam Hitech Crime Investigation Department Dr. Tran Van Hoa
Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
How to protect yourself, your computer, and others on the internet
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Cyber Defence & Cyber Peace
NEW EXISTING TOOLS FOR ENHANCING INTERNATIONAL JUDICIAL COOPERATION WITHIN THE EUROPEAN UNION Towards a new generation of mutual legal assistance mechanisms.
Prescription for Criminal Justice Forensics. The government has all but declared a national state of emergency regarding computer-related crimes and has.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
Christopher Cooney International Liaison Officer Scottish Crime & Drug Enforcement Agency December 2012.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Computer Crime By FUNG Wai-keung Hong Kong Police.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Chapter 5 Legal & Ethical Issues; Privacy & Security Kristin Berglund Meredith Bratus Kathy Sypek.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
The Sixth Annual African Consumer Protection Dialogue Conference
HSBC Bank International
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Social impacts of the use of it By: Mohamed Abdalla.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Ethical and Morality of Digital in 1 Malaysia WELCOME TO.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Consistency in Reporting Data Breaches
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
Computer crimes.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Presentation to CSA November 24 th, 2015 Meredith Kushnir, Marketing and Community Engagement Coordinator, CICMH.
Security Mindset Lesson Introduction Why is cyber security important?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
THE core elements of digital citizenship
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Measures to enhance and assure trust and security
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Presented by: Assistant Superintendent Debra Thompson
Malware – A BILLION DOLLAR BUSINESS
Cyber enabled crime The challenge for national and local police.
A Project on CYBER SECURITY
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
When you get caught for Identity Theft
Cyber Issues Facing Medical Practice Managers
U.S. Department of Justice
Keeping your data, money & reputation safe
IGraphic Social impacts of IT
October is National Cybersecurity Awareness Month
Presentation transcript:

C0c0n August 2014 Dinesh O Own Country in the year 2014

\ Problems, issues, solutions are indicative and not finite The reason is that if one gets down to brass tacks, the list can go on and on…

\ The world is a global village Level playing field (was said about business but also applies to criminals and cops) Non-existent Borders or Jurisdiction Anonymity

\

\ The Bottomline, Topline, Middle line Or … any line… is.. Cybercrime is BIG business and is highly profitable Whether it is ethical or unethical

\ If it is ethical it (may) mean it is legal then how can we call it a crime

\ The IT Act requires a body corporate to have “reasonable security” in place By law an ISO certification will suffice which I buy in the open market Government or private organizations do not disclose the extent of damage in event of a cybercrime – collusion ? Abetment ? Shame ?

\ Complaints are dropped once an informal investigation is done – usually the complainant does not want to proceed Will we let go of a person who has attacked another with a gun or knife

\  Body corporate has to have “reasonable” security in place!  ISO Certification is available for sale off the shelf  Organizations authorize hackers to exploit their systems. Will someone ‘authorize’ a bomb explosion too

\ 1.Companies and Government bodies do not disclose when they have been hacked – can they desist if money has been stolen thus hiding a crime 2.LEA usually drops investigation on the request of the complainant!

\

\ But… because it can be the cause of frustration, anger and other stress disorders in the LEA

\ And we do not want to talk about capacity, capability and such challenges as this is not within the scope of this talk / topic / panel

\ Breakaway from conventional thinking Move at speed Empower team members Accept reality / need of transparency…

\ COLLABORATE Make your expertise, information, intelligence, resources, tools available across the country and taste Glory! BENEFIT & SUCCEED Adopt the open source philosophy to give unconditionally – your goodwill will always come around to you SHARE Reap the benefit of the information and expertise received through the sharing mechanism

\

\ Pain

\ Global Pain

\ Report Lodged Crime Perpetrated Identifies Modus Operandi Starts Investigation Obtains Evidence Discovers IP Address Stop Investigatio n There’s hope Domestic International File Papers Go Home This is illustrative and does not purport to be the actual / complete lifecycle

\ The Solution of collaboration

\ Directory of primary ‘intermediary’ organizations Relationships with International LEA, CERT, Intelligence, Home, Judiciary Collaborative Relationships Sharing…. - Advisories - Crime Information - Cybercriminal Profiles - Modus Operandi - Technology advances Partnership Framework A central agency which will act as a clearing house (e.g. CyberDome)

\

\ A central agency which will act as a clearing house and contribute information and intelligence to the Exchange Information is provided back to the national agency which will update the domestic system and investigation can come to close Also facilitate collaborative investigations, arrests or actions

\ PRIZE

\ Charity begins at home Cyber Dome can bring all states on one platform and establish an international example Central Information Request Agency at national level for communication

\ PRIDE & PREJUDICE

\ At the forefront… Microsoft, Facebook, Google and other technology majors

\

\ o Cross Border Crimes o Non availability of information o No proactive policing (pre- cog) o Differing protocols and laws o Multiple LEAs o Corporate challenges of ISP EYE OPENERS

\ Internet of Things Mobile technology Dis-satisfied young geeks Easy availability of mal-tools Easy availability of targets Continued practice of LEA transfers Keeping your head in the sand My daddy strongest attitude

\ Logic bombs Data Theft ATM Credit / Debit card cloning Child Porn Dark Markets/Underground Corporate Espionage Wearable / blowable technology 419 Scams & variants Spear Phishing Website defacement Cyber Bullying Money mules Bank account cleanout Ransomware Keyloggers Privacy infringement Identify Theft – account takeover Cyber blackmail Man in the middle Spam Critical Infrastructure Power Sector

\

\ Lving Information Security Contact Information: E: T: F: dineshobareja L:

\ Logic bombs Data Theft ATM Credit / Debit card cloning Child Porn Dark Markets/Underground Corporate Espionage 419 Scams & variants Spear Phishing Website defacement Cyber Bullying Money mules Bank account cleanout Ransomware Keyloggers Privacy infringement Identify Theft – account takeover Cyber blackmail Man in the middle Spam Critical Infrastructure Power Sector