E-CRIME Ian Johnston CBE QPM DL Chief Constable British Transport Police Chair of ACPO Crime.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Introduction and Overview of Digital Crime and Digital Terrorism
Globalisation and Transnational Crime Each slide can be advanced using a mouse click. Alternatively, moving the cursor to the: Right Hand edge of the.
NEW TECHNOLOGIES IN CASH TRANSFER PROGRAMMING. PURPOSE AND SCOPE OF THE STUDY Review of new technologies applied to humanitarian CTP at every stage of.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Serving with pride and confidence Knowledge for Change Chief Constable Sara Thornton CBE QPM Cambridge Evidence Based Policing Conference 4-6 July 2011.
Chapter 14 Crime and Justice in the New Millennium
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
Cyber Crime in the Digital Age
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
“Limiting electronic fraud through an Information Security Management System (ISMS): An Introduction to ISO 27001" Presented to the ICGFM Annual Conference.
Wireless Access Code:
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Det. Supt. Charlie McMurdie. Why?? MPA scrutiny into MPS e-crime capability 2006/7 Primary finding was a lack of oversight and co-ordination across silos.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
CYBER CRIME AND SECURITY TRENDS
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Institute for Manufacturing Manufacturing and Innovation Prof. M.J. Gregory.
Parliamentary Oversight of Internal Security Forces Basic oversight features in liberal democracies: the role of Parliaments vis-à-vis internal security.
The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber.
Developing a Community Indicators System for Winnipeg’s First Nations Community. A Community-based Approach Presentation for: The Canadian Sustainability.
Applicability of Traditional Substantive Criminal Law Concepts to Contemporary Cybercrime Igor Vuletić, Ph.D. assistant professor Department of criminal.
Cyber Crimes.
Management Information Systems
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Strengths of Networking Strengths of Networking Presentation By Salome Mbugua (MSC Equality Studies) National Director- AkiDwA Ireland Conference on Good.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Sheamus Cassidy, European Commission Vienna, 4 December 2007
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
EU responses to international terrorism. Definition of terrorism Schmit & Jongman: ‘an anxiety-inspiring method of repeated violent action, employed by.
Copyright © 2006 Pearson Education Canada Inc Chapter 14 Future Directions in Criminology “You can never plan the future by the past” – Edmund.
Imapact of I.T on International Commerce: Management of transnational corporations and Business Concentrations.
C YBER C RIME any criminal act dealing with computers and networks traditional crimes conducted through the Internet.
Security Challenges Facing Seaport Operations Day 1 - Module 3.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Violence and the Media Andrew Trotter OBE QPM Deputy Chief Constable, British Transport Police Chair, ACPO Media Advisory Group.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
VoIP Privacy April ©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 2 About BroadSoft Market Leader Market.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Rebalancing Defense Science and Technology to Security Priorities in the Asia Pacific Region Herman Finley 4 March 2013 Information Technology (IT) and.
The Role of the Police in Public Protection Roger Baker Chief Constable, Essex Chair, ACPO Youth Issues Group and ACPO Performance Management Business.
1 Your reference A Case for Gender Statistics in National Statistical System Mr. Pali Lehohla Statistics South Africa 26 January 2009.
Community Service Delivery Paul Broadbent Assistant Chief Constable & Chief Executive.
Computer crimes.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Dimple Faujdar C.S 4 th year 08ERWCS017. INTRODUCTION TO CYBER CRIME Crime, E-crime, Hi-tech Crime Or Electronic Crime Is Where A Computer Is The Target.
The Economy of Culture in Europe The Economy of Culture in Europe Study prepared for the European Commission.
1 Protecting Communities: Managing Harm 22 nd February 2016 Chief Constable Simon Cole QPM leics.police.uk.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Scottish Policing 2011 – Risks To Communities & Information-Sharing Russell Scott Visiting Academic Edinburgh Napier University Serious Organised Crime.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
NATIONAL EFFORTS ON ADDRESSING AND RESPONDING TO VIOLENCE AGAINST SRI LANKAN WOMAN AND GIRL CHILD: RECOMMENDATIONS OF THE PRIME-MINISTER’S TASK FORCE.
Cyber enabled crime The challenge for national and local police.
MODUS OPERANDI OF CYBER CRIME
The Cyber Threats Landscape
Advancing South-South Cooperation for Effective Implementation of
Cyber Security professions Overview
The Crime and Deviance Channel
County Lines – safeguarding advice for parents and carers
Presentation transcript:

E-CRIME Ian Johnston CBE QPM DL Chief Constable British Transport Police Chair of ACPO Crime

Introduction Introduction What is it What is it Why is it a challenge Why is it a challenge What we need to do about it What we need to do about it

ACPO definition ACPO definition ‘The use of networked computers, telephony or internet technology to commit or facilitate the commission of crime’

What is it? What is it? A methodology A methodology MP3, PDA, mobile phones MP3, PDA, mobile phones Computer hacking Computer hacking Phishing Phishing Virus attacks Virus attacks Identity fraud Identity fraud

What is it (cont.) What is it (cont.) Facilitation of terrorism, stalking, extortion, people smuggling, rape, murder, pornography distribution Facilitation of terrorism, stalking, extortion, people smuggling, rape, murder, pornography distribution Frustration of police communication interception (VOIP) Frustration of police communication interception (VOIP)

Why is it a problem Why is it a problem Most rapidly expanding form of criminality Most rapidly expanding form of criminality The scope of crime The scope of crime The scale of crime The scale of crime Continuing exponential growth in technology Continuing exponential growth in technology Lack of technical knowledge Lack of technical knowledge Lack of ability to grow that knowledge Lack of ability to grow that knowledge Practicalities of identifying the evidence trail Practicalities of identifying the evidence trail

Why is it a problem (cont.) Global Global Lack of political salience Lack of political salience Police structures, processes and policies Police structures, processes and policies Potential public outcry Potential public outcry UK seen as soft target UK seen as soft target

Why is it a problem (cont.) No intelligence overview No intelligence overview No national coordination No national coordination No holistic response No holistic response Vulnerability of CNI and government bodies to attack Vulnerability of CNI and government bodies to attack A methodology for new terrorism A methodology for new terrorism Limitation of role / involvement of existing bodies Limitation of role / involvement of existing bodies

Competing priorities Guns and gangs Guns and gangs Anti social behaviour Anti social behaviour Violence Violence National Police Performance Framework National Police Performance Framework

What needs to be done Raise public awareness Raise public awareness Raise political interest Raise political interest Build international appetite Build international appetite Harness industry support Harness industry support Enlighten the CJ system Enlighten the CJ system Refocus policing effort Refocus policing effort

What are we doing Meetings with Ministers and key political figures Meetings with Ministers and key political figures Lobbying for industry support Lobbying for industry support Setting up a new ACPO portfolio Setting up a new ACPO portfolio Build a police E-Crime Unit Build a police E-Crime Unit