Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.

Slides:



Advertisements
Similar presentations
MINISTRY FOR INFORMATION SOCIETY AND TELECOMMINUCATIONS CIRT - Computer Incident Response Team GOVERNMENT OF MONTENEGRO MINISTRY FOR INFORMATION SOCIETY.
Advertisements

1 The Reforms in the Ministry of Interior ( MoI ): Current State and Future Plans Sofia, 31 January, 2012 Tsvetan Tsvetanov Deputy Prime Minister and Minister.
Information Security Overview in the Israeli E-Government April 2010 Ministry of Finance – Accountant General E-government Division.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
E-Security Background IT Infrastructure in Sikkim Current Status of Cyber Security& Cyber Crime in SIkkimCurrent Status of Cyber Security& Cyber Crime.
Fraud and Identity Theft: The United Nations Crime Commission Intergovernmental Expert Group on Fraud and the Criminal Misuse and Falsification of Identity.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Course: European Criminal Law SS 2009 Hubert Hinterhofer.
1 Photo PAMECA IV TEAM Design of PAMECA IV PAMECA IV started in July 2013 and is scheduled to run until October Its overall objective.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
CYBER CRIME.
Lithuania Protection of Intellectual Property Rights Protection of Intellectual Property Rights Belgrad 2011.
INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Ministry of Interior Progress of Bulgaria in the preparation for joining the Schengen area January July 2009 July January
Ministry of the Interior of the Republic of Latvia STATE POLICE of LATVIA CENTRAL CRIMINAL POLICE DEPARTMENT Economic Crime Enforcement Department.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Update on Liberia’s ICT Regulations and E-commerce Services at the Harmonization of ECOWAS Region Cyber Legislation, Accra March 2014 By Cllr. Roosevelt.
Prosecution and investigative authorities in Romania Current status and future reforms Monica Otava Prosecutor Prosecutor’s Office Attached to the High.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Information Sharing and Public Private Partnership in Italy to fight financial cybercrime Consorzio ABI Lab – Centro di Ricerca e Innovazione per la Banca.
Kishinev 2016 MINISTRY OF FINANCE OF THE REPUBLIC OF TAJIKISTAN.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Critical Infrastructure in Varna
PRESENTATION TO SELECT COMMITTEE ON SECURITY AND CONSTITUTIONAL DEVELOPMENT 9 FEBRUARY :00 -11:30 PROCLAMATIONS BY THE PRESIDENT UNDER SECTION 26.
Cybersecurity in Belarus a general overview of support areas
Securing Information Systems
Challenges and Successes in the Zambian ICT Security Sector
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Ministry of Social Security and Labour
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
Presentation transcript:

Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI Servizio Polizia Postale e delle Comunicazioni C.N.A.I.P.I.C.

DIRECTORATE FOR ROAD POLICE, RAILWAY POLICE, COMMUNICATIONS POLICE AND FOR THE SPECIAL UNITS OF THE ITALIAN NATIONAL POLICE DEPARTMENT OF PUBLIC SAFETY POSTAL AND COMMUNICATIONS POLICE SERVICE Organization Chart MINISTRY OF INTERIOR

Our main operational centres POSTAL AND COMMUNICATIONS POLICE SERVICE C N A I P I C C N C P O Online Police Station

Provincial Branches (Sezioni) 80 Regional Districts (Compartimenti) 20 Field Offices

Cyber Crime o Hacking o Crimes affecting: -Home banking -E-currency -E-Commerce o Cyber terrorism o Critical Infrastructure Protection Online Child Pornography Offences against the person committed by means of the internet o Cyber stalking o Online threats, harassment and defamation Safeguarding Communications Crimes affecting postal services o Controls over telecommunication-related activities Enforcing Copyright protection law – Satellite piracy Statutory areas of competence

Servizio Polizia Postale C.N.C.P.O. Established by Law n.38 of February 6, 2006, the National Centre for Combating Online Child Pornography conducts and coordinates all online child abuse investigations and prevention activities. The Centre updates a blacklist of child pornography websites on a daily basis. International cooperation h/24 Monitoring Reception and Notification Blacklisting and Filtering Relations with Financial Institutions Image Analysis Coordinating investigations

Servizio Polizia Postale C.N.A.I.P.I.C. Regulatory framework Art. 7-bis of Law n.155 of 31 July 2005, “Conversion into law, with amendments, of the decree law n. 144 of 27 July 2005 on urgent measures to combat international terrorism” (also known as “Pisanu Law”) Internet and telecommunications security: «Without prejudice to the competences of Intelligence and Security Agencies, set forth in articles 4 and 6 of Law n. 801 of 24 October 1977, the body of the Ministry of Interior entrusted with the security and regularity of telecommunication services * ensures the protection of national critical information infrastructures, as indicated in a specific Decree of the Minister of Interior, availing itself of direct ICT connections with the infrastructures concerned and provided for by specific agreements.» Decree of the Minister of Interior of 9 January 2008 implementing art. 7 bis of decree law n. 144 of 27 July It defines and indicates Critical Information Infrastructures and establishes the CNAIPIC within the Postal and Communications Police Service - Department of Public Safety. Decree of the Chief of Police of 7 August It states the CNAIPIC’s mission and defines its organization.

8 CYBERCRIME scenario Internet users: In ,985,492 Today 2,405,518,376

NEW FORMS OF CYBERCRIME BASED ON DIGITAL IDENTITY THEFT MAINLY TARGETING: - ONLINE BANKING SERVICES - E-COMMERCE - KNOW-HOW THEFT AND INDUSTRIAL ESPIONNAGE

DIFFERENT CASES DIGITAL IDENTITY THEFT DIGITAL IDENTITY THEFT

Attacks against users «Traditional» Phishing techniques Theft of a few dozens of credentials Attacks on users computer systems New generation Botnet - Phishing Theft of thousands of credentials Attacks on large computer systems Data Breach Theft of hundreds of thousands of credentials DIGITAL IDENTITY THEFTS Main targets

12 CYBERCRIME A case study “Between 2005 and 2007 Albert Gonzalez, along with a team of hackers called ShadowCrew, managed to hack into the databases of some leading companies of the retail industry, thus gaining access to more than 180 million payment cards. According to estimates, the damage caused by Gonzalez and his team to the affected companies amounted to more than $ 400 million, including reimbursements, forensic investigations and legal expenses.” Source:

CASE: STRATFOR

CYBERCRIME Yesterday, Today and…

CYBERCRIME … Tomorrow

IDENTITY THEFT IDENTITY THEFT

CYBERCRIMES affecting home banking and e-currency represent a constantly evolving phenomenon exploit increasingly sophisticated techniques and technologies (theft of digital identity and codes through new pharming e phishing techniques, insidious crimeware such as trojan horses and botnets, more and more refined skimming technologies, illegal accesses to databases, etc.) are put in place by cross-border criminal organizations have transnational and cross-sector effects

Identity Theft Cases in Italy Identity theft : Home Banking, E-currency, E-commerce and Theft of non-financial services access codes – Number of cases resulting from complaints filed from 2009 to 2012 Source:Polizia Postale e delle Comunicazioni

Our Activities from January 1 to May Websites monitored7252 Significant attacks detected 161 Alerts sent out relating to serious events453 Investigations conducted32 Individuals informed against to the J.A.33 HTC Emergency Incoming requests10 HTC Emergency Outgoing requests18

BOTNETS Source: Data refer to July 19th, 2012

ZEUS BOTNET Infections Source: Data refer to October 2011 – first detection of Zeus variant c.d. P2P

ZEUS BOTNET Attack on mobile systems

UNDERGROUND ECONOMY

PREVENTION AND RESPONSE synergic approach = public-private partnership = shared security data and information sharing and circulation involvement of specialized law enforcement agencies

In particular creation of a public-private task force data and information sharing and circulation with a view to preventing and countering crimes and to providing appropriate security policies refining operational capacities and law enforcement response International cooperation

Thank you for your attention