FBI Cyber Presentation

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

Cyber Safety Assessment Review
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
ELOC Bank Table Top Exercise Executive Leadership of Cybersecurity Austin, TX December 3,
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Module 5: financial services review
1 Identity Theft and Phishing: What You Need to Know.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Discovering Computers 2010
Data Protection Act. Lesson Objectives To understand the data protection act.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
Securing Information Systems
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Federal Bureau of Investigation
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Protecting Your Information Assets
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Community Connections and VBI Overview October 12, 2015.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
CCT355H5 F Presentation: Phishing November Jennifer Li.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Topic 5: Basic Security.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
By: Asfa Khan and Huda Mukhtar
1 Executive Leadership of Cybersecurity Austin, TX December 3, 2014 ELOC Bank Table Top Exercise.
Cybercrime What is it, what does it cost, & how is it regulated?
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Very Important Documents
Protecting Your Assets By Preventing Identity Theft
Surveillance around the world
Common Methods Used to Commit Computer Crimes
IT Security  .
U.S. Department of Justice
Prosecuting International Intellectual Property Crimes
Business Compromise and Cyber Threat
Laws Against Computer Hacking
Presentation transcript:

FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office

ALL PART OF YOUR SECURITY POLICY Best Practices Logs are your “internet security cameras” Point them at what matters! Store them for a reasonable time Study them to know what is normal Know Your Systems Accountability Patches ALL PART OF YOUR SECURITY POLICY

Threats on the Rise Advanced Persistent Threat (APT) Nation-States Long-term, unauthorized access to your network Hard to detect (impossible without logs) Prevention is great…DETECTION is a must Devastating consequences

APT Signs Five signs of APT attacks: Abnormal logon activity (logs) Widespread backdoor Trojans (logs) Unexpected data flows (logs) Discovering unexpected data bundles Hacking tools left behind

Threats on the Rise Ransomware Man-in-the-Email Encrypts your data until you pay a fee to get it unlocked Either securely back up your data, or pay the bad guys and pray… Man-in-the-Email Customer needs urgent transfer of funds Often the Financial Controller is tricked Keep tabs on what you post online

Investigating Internationally What to do when the criminals operate exclusively beyond U.S. borders? Have a law-firm on call (e.g. China) FBI global law enforcement presence FBI Legal Attaches (LEGAT) Global coverage from more than 60 embassies Interpol Mutual Legal Assistance Treaties (MLAT)

Case Study Case began in June 2005 when an InfraGard member received a phishing e-mail from Peoples Bank Member did not have an account with Peoples Bank and immediately recognized it as phishing A spoofed e-mail address and graphical images were created to look like the message was truly from Peoples Bank Phishing e-mail contained a link to a phishing web site unwittingly hosted in Minnesota

Romanian Phishing Case Study Unwitting owner of phishing web site provided copies of files used to produce the web site From the scripts, it was determined that phished data was sent to an e-mail collector account, vercarti1@yahoo.com Search warrants and subpoenas to Yahoo! and various ISPs revealed a connection to Romania

Romanian Phishing Case Study Investigative assistance provided by Peoples Bank revealed numerous ATM withdrawals made in Romanian cities using phished data The LEGAT in Bucharest was brought into the investigation The LEGAT worked closely with the Romanian National Police (RNP) in a joint investigation

Romanian Phishing Case Study Timeline 06/2005 – case begins from e-mail receipt 08/2005 – first of many search warrants issued 01/2007 – Seven Romanians indicted in CT 06/2007 – First arrest made in Bulgaria November 10, 2010 – fourteen new indictments Between December 2011 and November 2013, nine Romanians were arrested and extradited directly from Romania 07/2014 – Last subject sentenced to 45 months

Romanian Phishing Case Study Results 13 Arrests 1 Bulgaria, 1 Canada, 1 Croatia, 9 Romania, 1 Sweden None had ever been to the United States 13 Extraditions from 5 different countries 13 Convictions 12 guilty pleas and 1 at trial 13 Sentences ranging from 7 – 80 months Average around 50 months First extradition for computer crimes committed by someone who had never been to the U.S. First extraditions directly from Romania of Romanian citizens

Reaching out to Law Enforcement Who KNOW IN ADVANCE WHO YOU WILL CALL!!! Call a known person Calling publically listed numbers is BAD PLANNING! Verify at least annually your contact information What Computer intrusions and Internet-crimes Report regardless of loss Share what you know

Reaching out to Law Enforcement Why Because the security of the Internet is a global community concern All of us need to work together on this A secure Internet will boost every legitimate business A non-secure Internet may knock out some competition, but the bottom line of the survivors will not reap the benefits that a secure Internet can provide

Reaching out to Law Enforcement Where Location of intrusion Where are the computers? Location of subject Often not known until deep into investigation Company headquarters Often better equipped to assist with investigation

Reaching out to Law Enforcement When As soon as you can, however… Collect as much information as you can before calling law enforcement Once law enforcement becomes involved, restrictions on gathering evidence may attach More information will help to determine if an investigation will be opened and what, if any, public exposure the victim may face

Reaching out to Law Enforcement How However you had it planned Work day, work hours Work day, after hours Weekend Holiday POC on vacation

SA Andrew P. Dodd 203-503-5488 andrew.dodd@ic.fbi.gov Questions??? SA Andrew P. Dodd 203-503-5488 andrew.dodd@ic.fbi.gov