UNCLASSIFIED. Definitional - Issues Post Sept 11 th Realizations.. * In drafting Patriot Act, Congress noted: Criminal conduct potentially tied to.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
1 John Harries Managing Director, ANZ Banking Products National Consumer Congress 14 March 2007.
FBI Intelligence Houston Field Intelligence Group Overview Carlos J. Barrón FIG Coordinator Field Intelligence Group H O U S T O N UNCLASSIFIED.
Breaking Trust On The Internet
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Who pays? Prioritising Prevention Through Collaboration in Austere Times Alan Dobie, Executive Director, SBCC.
Cyber Crime The current threat to the UK Security Marking.
DHS, National Cyber Security Division Overview
South Carolina Cyber.
InfraGard A Partnership For Protecting America. What is InfraGard “ A cooperative undertaking between the U.S. Government (the FBI) and an association.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Network security policy: best practices
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
FBI’s InfraGard.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
How CERN reacted to the Blaster and Sobig virus attack Christian Boissat, Alberto Pace, Andreas Wagner.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Larry Clinton Operations Officer Internet Security Alliance
Cyber Warfare Case Study: Estonia
Cyber Security Nevada Businesses Overview June, 2014.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March
USE OF BSA REPORTING BY THE FBI. BSA Requirements The regulators Your customer Money Laundering – traditional targets.
Western Union Confidential ©2009 Western Union Holdings, Inc. All Rights Reserved. Document Number FAC001 The Government Sanctions List.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
MODULE 3 Composition & Roles. TAT TEAM APPROACH UPON COMPLETION OF THIS MODULE, PARTICIPANTS SHOULD UNDERSTAND: 3 – 2  Composition of the Threat Assessment.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
CONTROLLING INFORMATION SYSTEMS
Homeland Security UNCLASSIFIED Coast Guard Cyber Strategy Awareness Training.
Regional Cyber Crime Unit
Friday 22nd April 2016 DS Chris Greatorex SEROCU
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Crown capital management international relations International Affairs.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
1 What will be the Coming Super Worms and Viruses By Alan S H Lam.
Jennifer Hurst Assistant Director Public Safety and Terrorism International Co-operation in Combatting Terrorism.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Maritime Security as an Integral Part of an
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Presentation of the Hungarian Chamber System   Péter Dunai Secretary General Hungarian Chamber of Commerce and Industry   Brussels, 23rd May 2013.
Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)
Information Security Session October 24, 2005
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Computers in Society 12/1/2018.
Prevention, Intelligence
Internet Safety By: Ayana Shiggs.
Internet Safety By: Ayana Shiggs.
Presentation transcript:

UNCLASSIFIED

Definitional - Issues

Post Sept 11 th Realizations.. * In drafting Patriot Act, Congress noted: Criminal conduct potentially tied to terrorism is “inexorably woven through the Internet”… * Critical information regarding such tentacles, more often resides with industry or academia long before it migrates into Govt/LE’s hands… *Terrorism support tentacles stretch far, and are often not easily identifiable with known terrorist groups at the outset..

Initiative Based Partnerships

NCFTA = Resource Fusion Center: NCFTA PPA Teams Industry SME’s Law EnforcementAcademia (Intel & Analysis) *Alerts *PSA’s *Proactive Options *Target Initiatives *Impact *Lessons Learned =Training (Output – Benefit)

NCFTA Space FBI Secure Space DPN DB SPAM DB Other DB Contract DB’s Trilogy IDW Fidelity DB’s IDT-BITS DB’s BSA-Other DB’s CIDDAC Intel MRC DB’s Referral to Law Enforcement & Coordination

Nature of the Threat: Complex & more sophisticated,Complex & more sophisticated, Increasingly International in origin or supportIncreasingly International in origin or support Organized Criminal Groups with distinct rolesOrganized Criminal Groups with distinct roles Social Engineering = Common Theme….Social Engineering = Common Theme….

OPERATION RELEAF (Retailers & Law Enforcement Against Fraud) (Retailers & Law Enforcement Against Fraud) 2003 IC3 received 35,000 transactions for a potential economic loss in excess of $10 million. Six week period ending 12/31/2003, IC3 received from 29 Industry members, 1434 fraudulent transactions of a potential loss in excess of $600,000. Of these transactions 733 addresses were identified.

Recruiting Methods

UNCLASSIFIED

Organized Crime In The 21 st Century International Carder’s Alliance International Carder’s Alliance

Sobig.F 18 August 2003 In a single day, 1 in every 17 s sent worldwide came from Sobig.F. In a single day, 1 in every 17 s sent worldwide came from Sobig.F. Time delayed action. Time delayed action. Due to contact 20 servers for instructions Due to contact 20 servers for instructions Like the Blaster worm, that pointed some 400,000 host PCs to Microsoft's windowsupdate.com at the same time on the same day. Like the Blaster worm, that pointed some 400,000 host PCs to Microsoft's windowsupdate.com at the same time on the same day. windowsupdate.com Picture a future Sobig using millions of infected machines to hack into the servers of a major bank. "The virus-writer world and the hacker world have come together. Picture a future Sobig using millions of infected machines to hack into the servers of a major bank. "The virus-writer world and the hacker world have come together. *From “Attack of the World Wide Worms”Attack of the World Wide Worms Time Magazine, Aug 25, 2003, CERT® Incident Note IN

Industry List serve Joint Triage Team Direct Contact 24/7 With Triage Members Matched with other Teams Input L.E.T.F

Develop & Refine Initiatives

Defining Success (Impact) Disrupt & Disable –Shut Down sites –Label/Banner links-Images –Search/Seizure (Recover customer data) Investigate (Proactively) –Maximize informal intelligence sharing –Keep strategy focused – Tweek periodically Public Service Advisories (PSA’s) –Utilize DPN team to maximize this…

Organized Crime In The 21 st Century 13 Arrests - Estonia 17 Arrests - Estonia 4 Arrests - Russia 4 Arrests - Austria 3 Arrests - Nigeria 4- Va Wash Ariz Calif

Spoofed Website Hosted on the server in China Legitimate Website

Hosted in Germany Source of Spam Harvested Data Victim Login from Romania

*FBI*FTCWorking: *Postal*DHSUSSS? *NW3C*TargetDHL *State and LocalsSEC Others.. CIRFU * FBI *Postal *DHS *State *Local *USCERT INDUSTRY Co-Located IN HOUSE *Discover *BSA *Fidelity *Microsoft *PNC *Target *Pfizer IN THE WORKS *eBay/Pay Pal *Symantec *Google *Fiserv *Merril Lynch *PSI Intel Products PSA’s-Alerts Case Referrals /year to L.E.T.F Follow-up /Support. T.F and International L.E. Out-Put,Products Industry Intel not turned on yet….. *Western Union *NRF *Mastercard *CypherTrust *VISA *Escrow.com *Experian *Autotrader *Corillean RELEAF 80+ Industry DPN 60+ Industry Anti-S 95 Industry MRC 800 Industry DHL,UPS, Fed EX Consumer Complaint Website 18K/Month PSA’s Joint Training Govt Agency Input FBI.Postal,DHS,FTC, SEC,USCERT,IRS Non-Profit 501 ©

Why Bother??  Critical Intelligence = Fast!  Exponential SME Analysis – Input  2 Way Information Sharing  Alerts  PSA’s  Other Intel Products  Voluntary Data Input  (minimize legal process needs)  1-Stop Shop  Stake Holders Define Threat/Problem

UNCLASSIFIED