Download presentation
Presentation is loading. Please wait.
Published byArchibald Howard Modified over 9 years ago
1
C0c0n 2014 23 August 2014 Dinesh O Bareja @God’s Own Country in the year 2014
3
\ Problems, issues, solutions are indicative and not finite The reason is that if one gets down to brass tacks, the list can go on and on…
4
\ The world is a global village Level playing field (was said about business but also applies to criminals and cops) Non-existent Borders or Jurisdiction Anonymity
5
\
6
\ The Bottomline, Topline, Middle line Or … any line… is.. Cybercrime is BIG business and is highly profitable Whether it is ethical or unethical
7
\ If it is ethical it (may) mean it is legal then how can we call it a crime
8
\ The IT Act requires a body corporate to have “reasonable security” in place By law an ISO certification will suffice which I buy in the open market Government or private organizations do not disclose the extent of damage in event of a cybercrime – collusion ? Abetment ? Shame ?
9
\ Complaints are dropped once an informal investigation is done – usually the complainant does not want to proceed Will we let go of a person who has attacked another with a gun or knife
10
\ Body corporate has to have “reasonable” security in place! ISO Certification is available for sale off the shelf Organizations authorize hackers to exploit their systems. Will someone ‘authorize’ a bomb explosion too
11
\ 1.Companies and Government bodies do not disclose when they have been hacked – can they desist if money has been stolen thus hiding a crime 2.LEA usually drops investigation on the request of the complainant!
12
\
13
\ But… because it can be the cause of frustration, anger and other stress disorders in the LEA
14
\ And we do not want to talk about capacity, capability and such challenges as this is not within the scope of this talk / topic / panel
15
\ Breakaway from conventional thinking Move at speed Empower team members Accept reality / need of transparency…
16
\ COLLABORATE Make your expertise, information, intelligence, resources, tools available across the country and taste Glory! BENEFIT & SUCCEED Adopt the open source philosophy to give unconditionally – your goodwill will always come around to you SHARE Reap the benefit of the information and expertise received through the sharing mechanism
18
\
19
\ Pain
20
\ Global Pain
21
\ Report Lodged Crime Perpetrated Identifies Modus Operandi Starts Investigation Obtains Evidence Discovers IP Address Stop Investigatio n There’s hope Domestic International File Papers Go Home This is illustrative and does not purport to be the actual / complete lifecycle
22
\ The Solution of collaboration
23
\ Directory of primary ‘intermediary’ organizations Relationships with International LEA, CERT, Intelligence, Home, Judiciary Collaborative Relationships Sharing…. - Advisories - Crime Information - Cybercriminal Profiles - Modus Operandi - Technology advances Partnership Framework A central agency which will act as a clearing house (e.g. CyberDome)
24
\
25
\ A central agency which will act as a clearing house and contribute information and intelligence to the Exchange Information is provided back to the national agency which will update the domestic system and investigation can come to close Also facilitate collaborative investigations, arrests or actions
26
\ PRIZE
27
\ Charity begins at home Cyber Dome can bring all states on one platform and establish an international example Central Information Request Agency at national level for communication
28
\ PRIDE & PREJUDICE
29
\ At the forefront… Microsoft, Facebook, Google and other technology majors
30
\
31
\ o Cross Border Crimes o Non availability of information o No proactive policing (pre- cog) o Differing protocols and laws o Multiple LEAs o Corporate challenges of ISP EYE OPENERS
32
\ Internet of Things Mobile technology Dis-satisfied young geeks Easy availability of mal-tools Easy availability of targets Continued practice of LEA transfers Keeping your head in the sand My daddy strongest attitude
33
\ Logic bombs Data Theft ATM Credit / Debit card cloning Child Porn Dark Markets/Underground Corporate Espionage Wearable / blowable technology 419 Scams & variants Spear Phishing Website defacement Cyber Bullying Money mules Bank account cleanout Ransomware Keyloggers Privacy infringement Identify Theft – account takeover Cyber blackmail Man in the middle Spam Critical Infrastructure Power Sector
34
\
35
\ Lving Information Security Contact Information: E: dinesh@opensecurityalliance.org T: +91.9769890505 T: @bizsprite F: dineshobareja L: http://in.linkedin.com/in/dineshbareja
37
\ Logic bombs Data Theft ATM Credit / Debit card cloning Child Porn Dark Markets/Underground Corporate Espionage 419 Scams & variants Spear Phishing Website defacement Cyber Bullying Money mules Bank account cleanout Ransomware Keyloggers Privacy infringement Identify Theft – account takeover Cyber blackmail Man in the middle Spam Critical Infrastructure Power Sector
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.