ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.

Slides:



Advertisements
Similar presentations
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Australian Competition & Consumer Commission
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1 Financial Crimes Enforcement Network “FinCEN” Anna Fotias Senior Regulatory Compliance Specialist Office of Regulatory Policy
Preparing Supervisory Authority and Pension Industry for Risk-based Supervision Nzomo Mutuku Manager, Research & Development Retirement Benefits Authority,
E-Commerce Chapter 5. Electronic commerce : E-commerce : eCommerce o Is Trading in products or services using computer networks, such as the Internet.
SOURCES OF FINANCIAL ADVICE? Sources of financial advice Money Works: Level 2 Topic 2.
1 Chapter 9 Electronic Commerce and Electronic Business.
FINANCIAL SER V ICES MANAGEMENT
The Financial Conduct Authority (FCA); and
Chapter 11.1 Saving and Investing
Investment Fraud By Seyvon Jones. What is Investment Fraud? Investment fraud is any scheme or deception relating to investments that affect a person or.
Source: Section 2 General Code of Conduct A n t i m o n e y l a u n d e r i n g ( A M L ) i s a t e r m m a i n l y u s e d i n t h e f i n a n c i a.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
BUSINESS 1. Types of Business Small business International Public sector Multinational National Secondary Private sector Voluntary Tertiary Primary Goods.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Section 12-2-Regulatory Agencies and Laws.   These agencies make or enforce rules and regulations  Agencies provide oversight or supervision of activities.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
C4- Social, Legal, and Ethical Issues in the Digital Firm
How to Choose a FOREX Provider Middle East Money Summit Dubai October 2008 Betsy Waters dbFX Global Director Deutsche Bank.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
ANTI-MONEY LAUNDERING TRAINING FOR LENDERS Bill Heyman Offit Kurman
Regional Conference Intellectual Property Crime Bahrain April 2008.
Marketing Management Online marketing
“Scandals” or media beat ups? Crisis or blessing? The United States Australia – how does the Australian system work? What responses have we seen in Australia?
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Monitoring as a key tool to improve energy policy & markets Cristina Cifuentes, Commissioner, ACCC/AER.
Chapter 2 Companies and Corporate Regulation. Lecture Topics Characteristics of a company Types of companies and other regulated entities Historical evolution.
FIN 402 Investment Fundamentals and Portfolio Management.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
The Ontario Securities Commission Investigate before you invest.
Preparing Supervisory Authority and Pension Industry for Risk-based Supervision Charles Machira, Manager, Supervision Retirement Benefits Authority, Kenya.
Directors’ Duties in the On-line Environment Simon Rubenstein Solicitor ASIC.
Internet Services. Internet Services: Discussion Groups The Internet is not just the world wide web, it also includes: discussion groups: newsgroups,
2-1 Copyright © 2014 McGraw-Hill Education (Australia) Pty Ltd PPTs to accompany Barron, Fundamentals of Business Law 7Rev This is the prescribed textbook.
Chief Chip! Helping our children & young adults to stay safe online.
The U.S. Securities and Exchange Commission (SEC).
Finance & Finance Law. What is finance? Finance describes the act of providing money, capital or other financial resources to assist in facilitating a.
Overview of the SEC Summer What is the SEC? Securities and Exchange Commission The mission of the U.S. Securities and Exchange Commission is to.
Page 1 | Proprietary and Copyrighted Information The Australian framework Marisa Orbea IESBA Meeting New York April 2015.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Terms to Review Treaty Treaty Bureaucracy Bureaucracy Ambassador Ambassador Domestic vs foreign policy Domestic vs foreign policy Executive agreement Executive.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Consumer Credit Act 1974 Rebecca & Lee. What is it The Consumer Credit Act 1974 regulates consumer credit and consumer hire agreements for amounts up.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Logon.ni Welcome. Introduction  Free Advisory Service established by Department of Enterprise, Trade and Investment  Financed under the European Regional.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Independent Agencies -15 Executive Departments handles only a portion of the government’s functions -Special parts of government were formed to meet special.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Global Financial Regulatory Framework Regulating International Capital Market Masters in Accountancy (MACC508)
#scamaware.
LAWYERS AND CAPITAL MARKETS
Judy Graham, Program Officer
1. Capital Markets (meaning, functions, and constituents); 2
Chapter 9: Internet Law, Social Media, and Privacy
Customized by Professor Ludlum December 6, 2016
Chapter 6 Administration of the Corporations Act and Securities Industry Corporate Governance.
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Independent Agencies.
Protecting Yourself from Fraud including Identity Theft
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
Presentation transcript:

ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000

ASIC Corporations Law watchdog “Promoting honesty and fairness in securities and futures markets and in company affairs.”

ASIC ASIC regulates: Companies Investment advisers Superannuation funds Managed investments Insurance agents and brokers Company auditors and liquidators Life and general insurance companies Australian Stock Exchange Ltd (ASX Ltd), Sydney Futures Exchange and other authorized markets Deposit-taking by banks, credit unions, building societies, friendly societies

ASIC Law enforcement agency 400+ investigative staff 400+ investigative staff criminal and civil actions criminal and civil actions

ASIC ASIC & Cyberspace Entry barriers to crime have dropped Entry barriers to crime have dropped –easy to use –cheap –access to a very large consumer base –anonymous

ASIC Old economy scams + New economy scams + New economy scams = Significant increase in volume = Significant increase in volume Trend?

ASIC E-Scams –Illegal Investment schemes IPOs without prospectus Free Stock offers High Yield Schemes Exotic Schemes –Market Manipulation (Pump & Dump) –Unlicensed advice (Financial Gurus) –Non-Disclosure of interests –Hawking Trading software Exaggerated claims Unlicensed advice

ASIC Spam Bulletin Board Postings

ASIC Independent Relay Servers

ASIC IP 1IP 2 Suspect 1 #1#2 Suspect 2 Spam Bulletin Board Postings ISPs

ASIC The Challenge? Trace the source Trace the source –Postings on BBs –SPAM s Understand the technology Understand the technology –Content Providers –ISPs –Telecommunication Carriers Gather & present evidence Gather & present evidence

ASIC Dog years !!! Dog years !!! –1 day = 1 month The Challenge?

ASIC What is ASIC doing? ASIC

Leverage Web technologies Internal Learning & Development Internal Learning & Development Consumer Education Consumer Education “Self Help” Resources “Self Help” Resources Detection Detection

ASIC Electronic Enforcement Unit (EEU) Small, national team Small, national team  “Centre of expertise” Dedicated resources Dedicated resources  Legal  Investigative  Technical

ASIC National volunteer network of 60 staff National volunteer network of 60 staff Specialized web tracing/forensic computing training Specialized web tracing/forensic computing training Linked through an intranet site Linked through an intranet site ASIC

EEU Intranet

ASIC ASIC Scam Site?

ASIC 11,000 visitors between April 1 and April 30 11,000 visitors between April 1 and April asked for more information 1200 asked for more information 233 wished to invest 233 wished to invest $4.02 million pledged to scam $4.02 million pledged to scam ASIC ASIC Scam Site - results?

ASIC ‘Self Help’ Resources On-line consumer advice On-line consumer advice Due diligence searches Due diligence searches –“Look left and right before you click..”

ASIC Detection ASIC’s “Web Hound” Project ASIC’s “Web Hound” Project Automatically Automatically –identify “high risk” web sites –assess & aggregate the risk –analyze risk associated to mentioned entities –identify and refer high risk matters

ASIC Public Secure Internet Public Search Engines Content Gathering Data Collection Query Collect Risk Assessment Analyse Report Corporate DBs AIR GAP

ASIC Sought after tools Use of equipment for search warrants Use of equipment for search warrants –Mirror Imaging Retention of ISP records Retention of ISP records Monitoring by ISP Monitoring by ISP Removal of internet material Removal of internet material Removal if ISP services Removal if ISP services New offence for SPAMMING New offence for SPAMMING

ASIC Electronic Enforcement Keith Inman October 2000