LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
2 Language of Computer Crime Investigation
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Internet Fraud By: Noelle Woodman.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Awareness Training
General Purpose Packages
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Onebeaconpro.com t f Cyber Liability Insurance Coverages and Trends Affecting Community Banks Craig M. Collins President,
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Ministry of the Interior of the Republic of Latvia STATE POLICE of LATVIA CENTRAL CRIMINAL POLICE DEPARTMENT Economic Crime Enforcement Department.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Cyberspace fraud and abuse
The Best Way To Secure U R Self
Lesson 2- Protecting Yourself Online
Protecting Yourself from Fraud including Identity Theft
Cyberspace fraud and abuse
Lesson 2- Protecting Yourself Online
Identity Theft By Omer Ersen.
Presentation transcript:

LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International Context Vilnius, Lithuania 16 April 2015 Sergej Chaniutko Lithuanian Criminal Police Bureau

LITHUANIAN CRIMINAL POLICE BUREAU Trends What does the police do in Lithuania? Identity thefts online Against whom to protect and how

GLOBAL TRENDS There are 2.8 bn internet users, 10 bn devices; The EU is one of the main targets for criminals; The number of attacks on the EU will increase from the regions where the percentage of internet users will be growing; Attacks on the EU are more often external; Cross-border nature of the internet makes investigations more difficult.

GLOBAL TRENDS Crime-as-a-Service; Use of malware; Anonymity online; Sexual abuse of children on the internet; Crimes online using payment instruments or their data; Use of electronic payment systems and virtual currencies for criminal purposes; Cyber attacks against the critical infrastructure and IS hacking;

CRIME-AS-A-SERVICE Organised criminal groups buy IT services to commit crimes; Underground forums promote criminal communication and criminal relations; Abuse of anonymity, encrypting technologies and virtual currencies; Technologically sophisticated malware and infrastructure is available as a service;

ABUSE OF ANONYMITY Anonymous networks used to commit traditional crimes (trafficking in drugs, stolen items, arms, information, human beings); Anonymous networks used to commit sexual crimes against children; Anonymity leads to new forms of property extortion;

WHAT DOES THE POLICE DO: We investigate crimes involving the use of viruses (attacks against clients of financial institutions, property extortion):

WHAT DOES THE POLICE DO: We investigate online fraud, unlawful use of payment instruments or their data online:

WHAT DOES THE POLICE DO: We investigate online fraud, unlawful use of payment instruments or their data online:

WHAT DOES THE POLICE DO: We investigate the facts of sexual abuse of children on the internet:

WHAT DOES THE POLICE DO: We take part in international operations:

WHAT DOES THE POLICE DO: We have formed units to investigate crimes online at County Police Offices, we are always learning and we teach:

OFFICIAL STATISTICS: Registered criminal acts under Chapter 30 of the Criminal Code of the Republic of Lithuania: 622 in in per cent growth in over three months of this year (37.3 per cent growth compared to the same period of 2014)

CRIMES POTENTIALLY RELATED TO ID THEFT Article 154. Libel (53) Article 155. Insult (33) Article 166. Violation of Inviolability of a Person’s Correspondence Article 167. Unlawful Collection of Information about a Person’s Private Life (4) Article 168. Unauthorised Disclosure or Use of Information about a Person’s Private Life (4) Article 182. Fraud (1247) Article 198. Unlawful Interception and Use of Electronic Data (89-235) Article 198(2). Unlawful Disposal of Installations, Software, Passwords, Login Codes and Other Data (6-17) Article 207. Credit Fraud (7) Article 214. Production of a Counterfeit Electronic Means of Payment, Forgery of a Genuine Electronic Means of Payment or Unlawful Possession of an Electronic Means of Payment or Data Thereof (332) Article 215. Unlawful Use of an Electronic Means of Payment or Data Thereof (887) Article 236. False Denunciation or Report about a Non Existent Crime (1) Article 285. False Report about a Danger Threatening the Community or Occurred Disaster Article 289. Assuming the Name of a Civil Servant or a Person Performing the Functions of Public Administration (5) Article 300. Forgery of a Document or Possession of a Forged Document (5) Article 304. Provision of False Information for the Purpose of Acquisition of a Document

VIOLATIONS OF THE CODE OF ADMINISTRATIVE OFFENCES? Violations of the Code of Administrative Offences potentially related to ID theft: Introducing oneself as another person in order to avoid liability; Data of another person used in order to get financial or any other gain; What are the possibilities of identifying the persons who have committed such offences?

WHAT DO CRIMINALS NEED? Your money Your information

HOW YOU LOSE YOUR MONEY: From your account or your company's account after login data are conned out of you; From your account or your company's account by infecting your computers with a virus; When you lose your payment card data; When you pay ransom; When you pay for non-existing or unrealistic goods and services; When you transfer money to the wrong beneficiary;

RELEASE OF LOGIN DATA TO FRAUDSTERS: You get a call "from law enforcement"; The caller asks for your login data because they have to "inspect the accounts"; The caller accuses you of money laundering, tax evasion and other "crimes"; Solution - never release any data to anybody by phone.

USE OF VIRUSES Crime-as-a-service scheme; Your or your company's computer is infected with a virus; The virus takes over your login data; Criminals transfer money from your bank account.

HOW VIRUSES GET TO COMPUTERS: By (SPAM); When browsing online (unsafe websites that spread viruses); Via USB; Using the same devices for personal and office needs (BYOD); Etc.

HOW TO PROTECT THE MONEY IN BANK ACCOUNTS FROM VIRUSES: Restrict in the computers you use to log in to internet banking: access to s; access to online browsing except reliable websites; USB use and installation of applications; use two-level authorisation for payments.

LOSS OF PAYMENT CARDS Data can be lost by you; Data can be stolen if your devices are infected with viruses; Your data may be lost by third parties.

LOSS OF PAYMENT CARDS How to protect? Check the reputation of buyers and sellers when shopping online; Maintain "computer hygiene"; Use two-level authorisation; Insure the money in bank accounts; Set limits on transaction amounts; Get an SMS sent by the bank when money is debited from your accounts.

EXTORTION OF PROPERTY Methods: Scamming under the pretence of law enforcement institutions; Ransomware; Property extortion by threatening to make public some compromising information.

EXTORTION OF PROPERTY. HOW TO PROTECT? Maintain "computer hygiene"; In case of scamming, do not transfer money. Law enforcement does not impose or collect fines by such methods; Make back-up copies of important data.

ONLINE SHOPPING SCAM Purchase of non-existing/unrealistic goods and services in real stores or according to advertisements; Fake stores; Wins in non-existing lotteries; Sale of non-existing securities; Etc.

ONLINE SHOPPING SCAM How to protect: Check the reputation of sellers/buyers; Consider the realistic market price of the goods/services purchased; Do not buy prohibited goods/services; Do not make your data, private photographs public; Save as much information as possible to enable identifying the buyer's/seller's identity.

TRANSFERRING MONEY TO THE WRONG BENEFICIARY: Target – companies with business partners abroad; Criminals get unauthorised access to the computers/ accounts of the company or its business partners; The company gets a fake request from "the business partner" to transfer the money to a different business account than normally; One-off cases but significant losses.

TRANSFERRING MONEY TO THE WRONG BENEFICIARY: How to protect: Maintain "computer hygiene". If possible, two-level authorisation for the transfer of money. Before transferring money to a different bank account than normally, contact your business partners and clarify the account number once again.

LITHUANIAN CRIMINAL POLICE BUREAU Thank you for the attention! Sergej Chaniutko LKPB NEETV