Presentation is loading. Please wait.

Presentation is loading. Please wait.

LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.

Similar presentations


Presentation on theme: "LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International."— Presentation transcript:

1 LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International Context Vilnius, Lithuania 16 April 2015 Sergej Chaniutko Lithuanian Criminal Police Bureau

2 LITHUANIAN CRIMINAL POLICE BUREAU Trends What does the police do in Lithuania? Identity thefts online Against whom to protect and how

3 GLOBAL TRENDS There are 2.8 bn internet users, 10 bn devices; The EU is one of the main targets for criminals; The number of attacks on the EU will increase from the regions where the percentage of internet users will be growing; Attacks on the EU are more often external; Cross-border nature of the internet makes investigations more difficult.

4 GLOBAL TRENDS Crime-as-a-Service; Use of malware; Anonymity online; Sexual abuse of children on the internet; Crimes online using payment instruments or their data; Use of electronic payment systems and virtual currencies for criminal purposes; Cyber attacks against the critical infrastructure and IS hacking;

5 CRIME-AS-A-SERVICE Organised criminal groups buy IT services to commit crimes; Underground forums promote criminal communication and criminal relations; Abuse of anonymity, encrypting technologies and virtual currencies; Technologically sophisticated malware and infrastructure is available as a service;

6 ABUSE OF ANONYMITY Anonymous networks used to commit traditional crimes (trafficking in drugs, stolen items, arms, information, human beings); Anonymous networks used to commit sexual crimes against children; Anonymity leads to new forms of property extortion;

7 WHAT DOES THE POLICE DO: We investigate crimes involving the use of viruses (attacks against clients of financial institutions, property extortion):

8 WHAT DOES THE POLICE DO: We investigate online fraud, unlawful use of payment instruments or their data online:

9 WHAT DOES THE POLICE DO: We investigate online fraud, unlawful use of payment instruments or their data online:

10 WHAT DOES THE POLICE DO: We investigate the facts of sexual abuse of children on the internet:

11 WHAT DOES THE POLICE DO: We take part in international operations:

12 WHAT DOES THE POLICE DO: We have formed units to investigate crimes online at County Police Offices, we are always learning and we teach:

13 OFFICIAL STATISTICS: Registered criminal acts under Chapter 30 of the Criminal Code of the Republic of Lithuania: 622 in 2013 1089 in 2014 75 per cent growth in 2014. 265 over three months of this year (37.3 per cent growth compared to the same period of 2014)

14 CRIMES POTENTIALLY RELATED TO ID THEFT Article 154. Libel (53) Article 155. Insult (33) Article 166. Violation of Inviolability of a Person’s Correspondence Article 167. Unlawful Collection of Information about a Person’s Private Life (4) Article 168. Unauthorised Disclosure or Use of Information about a Person’s Private Life (4) Article 182. Fraud (1247) Article 198. Unlawful Interception and Use of Electronic Data (89-235) Article 198(2). Unlawful Disposal of Installations, Software, Passwords, Login Codes and Other Data (6-17) Article 207. Credit Fraud (7) Article 214. Production of a Counterfeit Electronic Means of Payment, Forgery of a Genuine Electronic Means of Payment or Unlawful Possession of an Electronic Means of Payment or Data Thereof (332) Article 215. Unlawful Use of an Electronic Means of Payment or Data Thereof (887) Article 236. False Denunciation or Report about a Non Existent Crime (1) Article 285. False Report about a Danger Threatening the Community or Occurred Disaster Article 289. Assuming the Name of a Civil Servant or a Person Performing the Functions of Public Administration (5) Article 300. Forgery of a Document or Possession of a Forged Document (5) Article 304. Provision of False Information for the Purpose of Acquisition of a Document

15 VIOLATIONS OF THE CODE OF ADMINISTRATIVE OFFENCES? Violations of the Code of Administrative Offences potentially related to ID theft: Introducing oneself as another person in order to avoid liability; Data of another person used in order to get financial or any other gain; What are the possibilities of identifying the persons who have committed such offences?

16 WHAT DO CRIMINALS NEED? Your money Your information

17 HOW YOU LOSE YOUR MONEY: From your account or your company's account after login data are conned out of you; From your account or your company's account by infecting your computers with a virus; When you lose your payment card data; When you pay ransom; When you pay for non-existing or unrealistic goods and services; When you transfer money to the wrong beneficiary;

18 RELEASE OF LOGIN DATA TO FRAUDSTERS: You get a call "from law enforcement"; The caller asks for your login data because they have to "inspect the accounts"; The caller accuses you of money laundering, tax evasion and other "crimes"; Solution - never release any data to anybody by phone.

19 USE OF VIRUSES Crime-as-a-service scheme; Your or your company's computer is infected with a virus; The virus takes over your login data; Criminals transfer money from your bank account.

20 HOW VIRUSES GET TO COMPUTERS: By e-mail (SPAM); When browsing online (unsafe websites that spread viruses); Via USB; Using the same devices for personal and office needs (BYOD); Etc.

21 HOW TO PROTECT THE MONEY IN BANK ACCOUNTS FROM VIRUSES: Restrict in the computers you use to log in to internet banking: access to e-mails; access to online browsing except reliable websites; USB use and installation of applications; use two-level authorisation for payments.

22 LOSS OF PAYMENT CARDS Data can be lost by you; Data can be stolen if your devices are infected with viruses; Your data may be lost by third parties.

23 LOSS OF PAYMENT CARDS How to protect? Check the reputation of buyers and sellers when shopping online; Maintain "computer hygiene"; Use two-level authorisation; Insure the money in bank accounts; Set limits on transaction amounts; Get an SMS sent by the bank when money is debited from your accounts.

24 EXTORTION OF PROPERTY Methods: Scamming under the pretence of law enforcement institutions; Ransomware; Property extortion by threatening to make public some compromising information.

25 EXTORTION OF PROPERTY. HOW TO PROTECT? Maintain "computer hygiene"; In case of scamming, do not transfer money. Law enforcement does not impose or collect fines by such methods; Make back-up copies of important data.

26 ONLINE SHOPPING SCAM Purchase of non-existing/unrealistic goods and services in real stores or according to advertisements; Fake stores; Wins in non-existing lotteries; Sale of non-existing securities; Etc.

27 ONLINE SHOPPING SCAM How to protect: Check the reputation of sellers/buyers; Consider the realistic market price of the goods/services purchased; Do not buy prohibited goods/services; Do not make your data, private photographs public; Save as much information as possible to enable identifying the buyer's/seller's identity.

28 TRANSFERRING MONEY TO THE WRONG BENEFICIARY: Target – companies with business partners abroad; Criminals get unauthorised access to the computers/e-mail accounts of the company or its business partners; The company gets a fake request from "the business partner" to transfer the money to a different business account than normally; One-off cases but significant losses.

29 TRANSFERRING MONEY TO THE WRONG BENEFICIARY: How to protect: Maintain "computer hygiene". If possible, two-level authorisation for the transfer of money. Before transferring money to a different bank account than normally, contact your business partners and clarify the account number once again.

30 LITHUANIAN CRIMINAL POLICE BUREAU Thank you for the attention! Sergej Chaniutko LKPB NEETV


Download ppt "LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International."

Similar presentations


Ads by Google