Cyber Crime & Cyber Terrorism Dr Richard Overill Department of Informatics King’s College London

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Computer Crimes and Security Professor Matt Thatcher.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Information Security Overview in the Israeli E-Government April 2010 Ministry of Finance – Accountant General E-government Division.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber Crime.
Chapter 14 Crime and Justice in the New Millennium
‘ Cyber crime, security and financial crime - what SMEs need to know and how to protect yourself’ Dr. Nicholas Ryder Professor in Financial Crime Department.
Power Laws for Cyber Crime Richard Overill & Jantje Silomon Department of Informatics King’s College London.
ICDFI 2013 Keynote Speech 1: Quantifying Likelihood in Digital Forensic Investigations Dr Richard Overill Department of Informatics, King’s College London.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Information Warfare Theory of Information Warfare
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Forensics BACS 371
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Cyber-Warfare: The Future is Now!
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Computer Crime and Information Technology Security
DID YOU KNOW… According to the Association of Certified Fraud Examiners (ACFE):  The estimated cost of fraud to the world economy in 2012 was US$3.5trillion.
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
CYBER CRIME.
Information Warfare Playgrounds to Battlegrounds.
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Information Warfare Playgrounds to Battlegrounds.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Computer crimes.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Battles in Cyber Space Dr Richard E Overill Department of Informatics.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Regional Cyber Crime Unit
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Securing Information Systems
Computer Crime CJ 520 / CJ October 27, 2010.
CSI Survey 2007 Tiffany Gorman
Cyber Crime Today we will look at: Different types of cyber-crime
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
LO1 - Know about aspects of cyber security
LO1 - Know about aspects of cyber security
Introduction to Digital Forensics
Presentation transcript:

Cyber Crime & Cyber Terrorism Dr Richard Overill Department of Informatics King’s College London

Terminology Cyber prefix – involving the Internet or other wide area digital networks and networked systems. Cyber Crime – aims to make money, often using conventional scams transferred to cyber domain (e.g. financial fraud, extortion) Cyber Terrorism – aims to create public panic, usually in conjunction with conventional terrorism (e.g. a bomb blast, in conjunction with CCTV & mobile phone network outages)

Characteristics of Cyber Crime Technologically driven: −digital economy is critically dependent on databases, websites and networks −e-commerce; e-business; e-banking; critical national infrastructure (CNI) Cost: −estimated at £2.2bn − £27bn pa in the UK −estimated at £1.8bn − £21bn pa to UK business −estimated at £33bn − £643bn pa worldwide −‘guesstimates’ since around 85% goes unreported Frequency: businesses are being targeted by cyber malware attacks once every three minutes on average

“The Perfect Crime”? Crime Scene Investigators (CSIs) gather physical or biological evidence at the crime scene This relies on Locard’s principle (1910): “every contact leaves a trace”, because it leads to a physical exchange of material But in the case of a computer attached to the Internet, what bounds the crime scene? And what if any digital traces will be recoverable? Digital forensics (MPS DEFS, FSA DEU)

FSA Digital Evidence Unit Six sentenced for insider dealing (27 Jul.12) “The defendants were convicted of making a combined profit of £732, on trading between 1 May 2006 and 31 May It was a sophisticated and complex attempt to deal on inside information over a long period” The investigation took the team 3 years’ work /080.shtml

Occupations & Motivations –unemployed individual: technical challenge / information discovery (e.g. Gary Mckinnon); –commercial / financial organisation: financial gain via commercial espionage / IP exfiltration (e.g. PLA based in Shanghai) or financial fraud (e.g. a ‘planted’ / ’turned’ / greedy employee) –‘for hire’ (cyber-mercenary): money laundering for Serious & Transnational Organised Crime; –‘political’ (cyber-terrorist): supporting a sub-state group’s terrorist aims; –‘hacktivist’ (e.g. Anonymous, LulzSec, TeaMP0isoN) for the ‘lulz’ or in support of a movement)

Types of Cyber Crime Forgery (‘making a false instrument’) Fraud (‘criminal deception’) Embezzlement (financial) Commercial espionage (intellectual property loss) Digital Rights piracy (peer-to-peer networks) Blackmail / Extortion Theft (only of laptops, tablets, PDAs, mobiles, etc.) Misuse / Abuse (incl. sabotage, subversion & DoS)

Computer & Network Attacks Four basic ‘external’ types: active penetration by hackers or ‘malware’ (viruses, worms, Trojan horses, etc.) cognitive hacking using deception scams (‘spear-phishing’, ‘drive-by’ downloads, misdirection attacks, etc.) passive eavesdropping by means of specialized listening equipment (TEMPEST, van Eck, etc.) flooding attacks which overwhelm the system (Electronic Siege / Denial of Service, DDoS)

Characterising Cyber Crime A log-log plot of frequency vs value of all US reported cyber crimes produces a straight line with a discontinuity (‘kink’) at $2.8M: Overill & Silomon, J.Inf.War.10(3) (2011) This is interpreted to indicate that there are two modes of operation for cyber criminals: –Lower value cyber crime for individuals and small groups –Higher value cyber crime for serious organised (transnational) cyber criminals with a business model and an organisational infrastructure

Two Cybercrime Modes

Modern Malware 403 million distinct malware variants by 2012-Q1 160,000 new malware variants every day Stuxnet –July 2010: targeted Iran’s nuclear reprocessing ultracentrifuge controllers Duqu –September 2011: gathers commercial / industrial intelligence; shares code with Stuxnet Flame / Flamer / sKyWIper –May 2012: 20MB; digital reconnaissance tool

UK Computer Misuse Act 1990 Basic Hacking Offence (BHO) –unauthorised access (attempted; mens rea) –penalty: 6 months and/or £2,000 fine Ulterior Intent Offence (UIO) –intent to commit a further serious offence –penalty: 5 years and/or unlimited fine

UK CMA (cont’d) & PJA Unauthorised Modification Offence (UMO) –unauthorised modification of computer contents (trans-border; mens rea) –penalty: 5 years and/or unlimited fine UK Police and Justice Act (PJA), 2006 –covers DoS & DDoS ‘flood’ attacks –penalty: 5 years and/or unlimited fine

What you can do... Timely software patch deployment Timely anti-malware update deployment Strictly enforce your BYOD policy Enforce ‘clean’ / ‘dirty’ zones Enforce full disk encryption Fully vet all personnel on appointment Regularly (annually) re-vet all personnel

The Myth of Total Security “The only truly secure computer system is one that is powered off, cast in a block of concrete, and sealed in a lead-lined room with armed guards ~ and even then I have my doubts!” Prof Gene Spafford (CERIAS, Purdue University) - analyst of the first Internet worm (1988)