‘ Cyber crime, security and financial crime - what SMEs need to know and how to protect yourself’ Dr. Nicholas Ryder Professor in Financial Crime Department.

Slides:



Advertisements
Similar presentations
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Security Classification Practical Issues in dealing with different types of cybercrime.
'Greed, for lack of a better word, is good. Greed is right. Greed works (Gordon Gekko, Wall Street, 1987)’. A contemporary review of the relationship between.
‘White Collar Crime – a serious threat or an inconvenience? Dr. Nicholas Ryder Professor in Financial Crime Department of Law UWE
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Western Union Confidential ©2009 Western Union Holdings, Inc. All Rights Reserved. FAC004 What is AML?
Anti-Money Laundering (AML)
Security, Privacy, and Ethics Online Computer Crimes.
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Regulating and Prosecuting Global Money Laundering
Money Laundering 23 September Contents 1 What is money laundering? 2. The ‘primary’ money laundering offences 3. Failure to report and tipping off.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Computer Crime and CyberCrime Why we need Computer Forensics.
PART THREE E-commerce in Action Norton University E-commerce in Action.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
‘The United Kingdom Anti-Fraud Policy - A Critical Review’ Wales Fraud Forum 2 nd Annual Conference Dr Nicholas Ryder Head of Commercial Law Research Unit.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Virtual Financial Crime and Commonwealth Jurisdictional Issues Dr Clare Chambers-Jones Associate Professor of Banking and Finance.
Professional Values and Basic Business Legislation.
Unethical use of Computers and Networks
CYBER CRIME.
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Faculty of Business and Law University of the West of England
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BACFI's seminar on financial services, integrity and the right to a fair hearing Dr. Nicholas Ryder Professor in Financial Crime TBACFI Seminar on Financial.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Dr Nicholas Ryder Commercial Law Research Unit University of the West of England.
Larry J. Siegel Valerie Bell University of Cincinnati, Cincinnati, OH Chapter Twelve Enterprise Crime: White-Collar Crime, Cyber.
Get Safe Online Expert advice for everyone In association with.
Cybercrime What is it, what does it cost, & how is it regulated?
Cyber Safety Jamie Salazar.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Security Mindset Lesson Introduction Why is cyber security important?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Corporate & Business Law ( ENG). 2 Section H: Governance & Ethical Issues Relating To Business Designed to give you knowledge and application of: H1.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
MONEY LAUNDERING “The Basics”.
Money Laundering Awareness. Objectives Define Money Laundering Define Money Laundering Recognize the Three Stages Recognize the Three Stages Work through.
Professor Nicholas Ryder Faculty of Business and Law
Dr. Nicholas Ryder Professor in Financial Crime 28th September 2017
Dr. Nicholas Ryder Professor in Financial Crime
Presentation by Nicholas Ryder Professor in Financial Crime
‘Money Laundering’ Professor Nicholas Ryder
Lesson 2- Protecting Yourself Online
Information Systems for Health:
Wednesday 13th September 2017 Professor in Financial Crime
Lesson 2- Protecting Yourself Online
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

‘ Cyber crime, security and financial crime - what SMEs need to know and how to protect yourself’ Dr. Nicholas Ryder Professor in Financial Crime Department of Law UWE 16 th July 2014

Introduction What is white collar crime? The extent of financial crime Fraud Money Laundering Cyber Crime Conclusions

What is white collar crime? “a crime committed by a person of respectability and high social status in the course of his occupation” (Sutherland, 1939) “someone who has committed a financial crime and who has a certain level of standing (i.e. that of management) within a business or corporation” (Harrison and Ryder, 2013)

What is white collar crime? White collar crime has also been referred to as: – ‘financial crime’, – ‘economic crime’ and – ‘illicit finance’. Examples of white collar crime include money laundering, insider dealing, fraud and market manipulation.

The extent of financial crime Fraud National Fraud Authority (2011) – £39bn National Fraud Authority (2012) – 73bn National Fraud Authority (2013) – £52bn

The extent of financial crime Money Laundering – the FATF have extrapolated amount of the laundered profits could be in the region of 2 per cent of the global GDP. – IMF - $590 billion to $1.5 trillion – FATF $500 billion

The threat of financial crime ‘Destabilise national economies’ (Financial Action Task Force, 2004) ‘The integrity of a nation’s financial institutions can be eroded (Ryder, 2011) ‘The effects of financial crime can ultimately threaten national security (Ryder,2011) Financial crime will almost certainly also have an adverse impact on the economies of countries.

What is money laundering? – Processing of criminal proceeds to disguise their origin – Concealing – Disguising – Converting – Transferring or removing – Facilitates the acquisition – Retention – Use or control – Acquisition – Use – Possession Above relate to proceeds of criminal activity

The scale of money laundering International Monetary Fund – Between 2 and 5 % of Global GDP – $590 billion to $1.5 trillion – £20 to £50 billion (UK) Financial Action Task Force – $500 billion

How is money laundered? Three recognisable stages: – Placement – Layering – Integration

The threat to businesses Criminal sanctions – Proceeds of Crime Act 2002 Financial Penalties – Financial Conduct Authority – Credible Deterrence Reputation – HSBC – Standard Chartered

What is fraud? “Persuading someone to part with something” (Doig, 2006) “Deceit or an intention to deceive” (Omerod and Williams (2007) “Act of deception intended for personal gain or to cause a loss to another party” (Serious Fraud Office, 2006)

Some classic instances of fraud Bank of Credit and Commerce International, Barings Bank, Enron WorldCom Bernard Madoff Alan Stanford Polly Peck (Azil Nadir), Mirror Group Pension Scheme, Guinness Barlow Clowes Mortgage fraud Market manipulation Insider fraud

The threat posed by fraud Criminal sanctions – Fraud Act (2006) – Maximum custodial sentence of 10 years Financial Penalties – Financial Conduct Authority – Unlimited – Applicable to employees and companies Reputation

What is cyber crime? Cybercrime is often interchangeably referred to as ‘Internet crime’ “offences or undesirable behaviour committed through or assisted by, any computer mediated or electronic device committed using the Internet or another computer network as a component of the crime” (Hache and Ryder, 2011)

The threat posed by cyber crime We send 294bn s and five billion SMS messages Over 91 per cent of UK businesses and 73 per cent of UK households have internet In excess of £50bn is spent online in the UK

Threat posed by cyber crime Research indicates that 19 British people fall victim to some sort of online scam every minute. Over 50% of British population has been affected by some sort of cybercrime The most common threats to online security being viruses, credit card scams and social networking fraud.

Extent of cyber crime ‘Cyber-crime has been estimated to cost as much as $1 trillion per year globally’ (HMG 2010) 120,000 cyber attacks against UK computers every day 44m attacks per year Cyber crime costs the UK £27bn per annum

Effect on citizens Economic cost of cyber crime to UK citizens is £3.1bn per annum. This estimate includes: – £1.7bn per annum for identity theft – £1.4bn per annum for online scams – £30m for scareware and fake anti-virus

Effect on business Cost of cyber crime to UK businesses is £21bn per annum. This estimate includes: £9.2bn per annum from IP theft, £7.6bn per annum from industrial espionage £2.2bn per annum from extortion £1.3bn per annum from direct online theft £1bn per annum from the loss or theft

Threat posed by cyber crime Consider the following: – Treat all unsolicited s (especially those from unknown senders) with caution – Don’t open attachments in s that you’re not expecting – Don’t share files or programs with other users – Don’t use free software unless you know it’s reputable and safe – Install anti-virus software

Conclusions Fraud Becoming the crime of choice for organised criminals and terrorists Tougher sanctions Cyber crime Adverse impact on the economy E-Fraud Card fraud Money Laundering Too many vulnerable governments have not criminalised all forms of money laundering Too many governments place restrictions on AML measures International cooperation not sufficient The Internet Laws and regulations fail to keep pace