Cyber Crime The current threat to the UK Security Marking.

Slides:



Advertisements
Similar presentations
Viet Nam Hitech Crime Investigation Department Dr. Tran Van Hoa
Advertisements

Strategic Centre for Organised Crime Partnerships and engagement with communities.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
Cyber Crime in the Digital Age
Police Service of Northern Ireland Detective Chief Inspector Douglas Grant MSc PSNI Cyber Crime Centre.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007.
(Geneva, Switzerland, September 2014)
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Cyber Cops The Challenges Detective Sergeant Cath Elvey NW Regional Cyber Crime Unit.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Combating cyber-crime: the context Justice Canada March 2005.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Catherine Bowen, Policy & Stakeholder Director. What is the NBCS? The National Business Crime Solution (NBCS) is a ‘Not for Profit’ Initiative that provides.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
‘The United Kingdom Anti-Fraud Policy - A Critical Review’ Wales Fraud Forum 2 nd Annual Conference Dr Nicholas Ryder Head of Commercial Law Research Unit.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber Security Nevada Businesses Overview June, 2014.
FBI Cyber Presentation
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Consistency in Reporting Data Breaches
Get Safe Online Expert advice for everyone In association with.
A better Gauteng is in the making The Gauteng Aggravated Robbery Strategy Institute for Security Studies 8 October 2009.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
December 4 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
December 11 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
January 21 st 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Intelligence-led enforcement An Environment Agency perspective Chris Smith National Intelligence Manager Environment Agency
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
Regional Cyber Crime Unit
Friday 22nd April 2016 DS Chris Greatorex SEROCU
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
1 Protecting Communities: Managing Harm 22 nd February 2016 Chief Constable Simon Cole QPM leics.police.uk.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
“[The] threat will involve the joining of the growing cyber-crime capability we see today with the terrorists' realization that the cyber realm is ripe.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
RCCU Zephyr South West Regional Cyber Crime Unit.
Cyber Security Awareness Workshop
Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)
Police Service of Northern Ireland Detective Chief Inspector Douglas Grant MSc PSNI Cyber Crime Centre Good Evening Introduction Aim - What is the.
Unlimited Cash-out Operations
West Midlands Police response to Cybercrime:
Presentation transcript:

Cyber Crime The current threat to the UK Security Marking

UK Cyber Crime The cost of cyber crime to the UK ? What is cyber crime and what is cyber enabled crime ? The motivation behind cyber attacks. Who are the cyber criminals ? UK Law Enforcement Why you should engage with Law Enforcement Security Marking

Protect4 Pure Cyber

Protect5 What is Cyber Crime? Pure Cyber crime Can only be committed through the use of ICT. Cyber enabled crime Can be committed without technology but are assisted or escalated by the use of ICT.

What is Cyber Crime ? Harvesting of personal and business data to commit fraud (phishing, vishing, spear phishing, targeted malware) Targeted compromise of UK networked systems (network intrusion) Denial of Service to UK networked systems (DDoS, Ransomware) Blended attacks - Obfuscation of real attack (DDOS hiding malware attack/infection) Cyber crime enablers (compromised hosters, cybercrime-as-a-service)

Motivations – Pure Cyber Crime Child abuse images Political / Kudos Financial Reward

Who are the cyber criminals ? Anyone - The threat is global and due to the rise of the cyber service industry technical ability is no longer required. Fraud Organised Crime – Russia & former Soviet Union, Romania, West Africa, South East Asia. UK Organised Crime Hactivists – 'Anonymous', 'Lulzsec' UK 'Hackers' / 'Script Kiddies'

UK Law Enforcement The NCCU launched as part of the National Crime Agency on 7 th October 2013  Providing a highly specialised investigative response, nationally and internationally, to the most serious incidents of cyber crime.  Working proactively to eliminate and prevent opportunities for online criminality.  Assisting Law enforcement to take the lead in tackling cyber-enabled crime.  Building stronger partnerships with industry and supporting a transformational change in law enforcement’s mainstream cyber capabilities.

Current Response – the NCCU Strategic Tactical Operational

Challenges The internet Multi-jurisdictional Legislation Working with industry Skills in policing Competing priorities and sheer volume

Why you should engage with Law Enforcement – Operation Allendale On Saturday 20 th & Sunday 21st October 2012 a major Phishing attack against customers of Barclaycard and First Direct banks phishing sites created, tested and launched online from a server in France. 340 customers visited the sites and 35 accounts compromised. Reported to the Police Central e-crime Unit by Barclays investigators who identified an IP address at Park Plaza Hotel, London used to transfer money from victim accounts.

Operation Allandale - Investigation Working with the hotel, bank and card issuer police identified suspect Godday Sunday ETU staying at the hotel. 24/7 Surveillance operation against ETU who met with Inout CARAMAN and Adrian IORGOVEAN who had flown in from Romania to engage in London spending spree. All three arrested at the hotel on 29 th October and found logged on to a 'dirty' server in the US which was found to contain 73 million addresses and 240,000 phishing victims worldwide

Op Allandale - Suspects

Op Allandale – The Result All three convicted following a trial and sentenced to ETU (8yrs) CARAMAN (7yrs 2mths) IORGOVEAN (5yrs 7mths) imprisonment. Phishing attacks fell by 88% against the UK banking sector following arrests and 'bulk' attacks ended. Based on industry figures £59 million worth of fraud was prevented against UK victims. By working with Law Enforcement you can make a difference !!

OP PAGODE Intelligence received that Zeus Trojan controlled and spread from an address in Manchester. On-line server found at address and suspect Gary Kelly, logged on as admin Carding Forum with 7,995 registered members worldwide. 170,000 recovered UK credit cards

Op Pagode Ghostmarket.net the largest english language carding forum in the world Main organiser, Nicholas Webber ex-public schoolboy 18yrs old, deputy Ryan Thomas 17yrs old. Suspects spent over £40,000 each on lifestyle using compromised cards. Kelly’s ZeuS botnet operation ran over 15,000 infected computers in 159 countries harvesting over 4 million lines of personal information.

Nicholas Webber enjoying the fruits of his labour.

Nicolas Webber 5 Years Gary Kelly 5 Years Ryan Thomas 4 Years Shakira Ricardo 18 Mths Zeus Banking Trojan and GhostMarket Carding Forum

NCCU Contacts :- Industry referrals 24/7 NCCU on Via dedicated NCCU referral unit account - Industry Partnership Team – Simon Mills tel /