Measuring Cybercrime Pieter Hartel. How? Victim reporting initiatives »FBI Internet Criminal Complaint Centre Population and business surveys »CBS (Statistics.

Slides:



Advertisements
Similar presentations
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Security Classification Practical Issues in dealing with different types of cybercrime.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
The British Crime Survey Face to face interviews with a sample of adults (16+) living in private households in England and Wales Measures crime victimisation.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By Brianna Byard. What is it? The Internet is a place where you can buy products, meet people, and socialize. But it is very easy for people.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Cyber Bullying Cyber bullying can happen in many different ways. The mains ways are either texting on a phone or ing. Cyber bullying is a criminal.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright © 2012 Carolina Academic Press Chapter 1: Crime in California Georgia Spiropoulos.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Aim: How much crime is there in the United States?
A threat to global security and economy Koushik Mannepalli CMPE 294.
Protecting Your Assets By Preventing Identity Theft 1.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Protecting Your Assets By Preventing Identity Theft
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
IT Security  .
Protecting Your Identity:
#1 Consumer Fraud Complaint – 5th straight year!
Internet Fraud By (NAMES).
Understanding the Criminal Justice System
Andy Hall – Cyber & Tech INSURANCE Specialist
Background to the development of a European Victimisation Survey
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Measuring Cybercrime Pieter Hartel

How? Victim reporting initiatives »FBI Internet Criminal Complaint Centre Population and business surveys »CBS (Statistics Netherlands) Technology based information »Verizon Risk team Meta analyses »United Nations Office of Drugs & Crime Police recorded crime statistics »Lecture 5 Cyber-crime Science 2

3

Victim reporting initiatives 2012 was the 13 th year Almost 300,000 complaints in M$ loss 91% US, 1.4% CA, 0.14% NL Numerous investigations, arrests Cyber-crime Science 4 [IC312] IC Internet Crime Report. Internet Crime Complaint center, Mar

Method Cyber-crime Science 5

Complaint form See Description of the actors »Target Information (name, …) »Offender information (name, IP…) »Witnesses (name, …) »Local police office (name, …) Description of the incident »Related to an online service? (mail, …) »Monetary Loss ($) »Means of payment (Cash, PayPal, …) Cyber-crime Science 6

Frequently reported crimes ComplaintFemaleMaleTotal Auto fraud6,28210,87717,159 Real estate fraud8,9295,50314,432 FBI impersonation 5,9118,23014,141 Intimidation/extortion5,1343,1908,324 Romance scams2,5491,9274,476 Scareware/Randomware6441,3251,969 Hit man ,354 Total30,07831,77761,855 Cyber-crime Science 7

Discussion And the other 240,000 complaints? Is this the tip of the iceberg? How effective is case matching? How many arrests? Cyber-crime Science 8

9

Population and business surveys 2012 was the 5 st year N=78,000, response 38% Uniform geographical distribution 95% confidence interval <2% Cyber-crime Science 10 [CBS13] CBS. Veiligheidsmonitor Centraal Bureau voor de Statistiek, Den Haag, veiligheidsmonitor-2012-pub.htm. veiligheidsmonitor-2012-pub.htm.

Method Random sample from NL population 15+ »First letter with link to online form »Second letter two weeks later with paper form »Phone reminder again two weeks later Cyber-crime Science 11

Question 13: Hacking During the last 12 MONTHS has it ever happened that somebody with malicious intent broke in or logged in on a computer, account, website or profile site (e.g. Hyves, Facebook, Twitter) of your own of anyone else in your household? a)Someone broke in / logged in on a computer b)Someone broke in / logged in on an account c)Someone broke in / logged in on a website Cyber-crime Science 12

Victimization in NL % of the population affected2012 Property crime13% Vandalism8% Violent crime3% Traditional Crime20% Hacking6% Cyber bullying3% E-commerce fraud3% Identity theft2% Cyber crime12% Cyber-crime Science 13

Crime drops Cyber-crime Science 14 [Far11] G. Farrell, A. Tseloni, J. Mailley, and N. Tilley. The crime drop and the security hypothesis. Journal of Research in Crime and Delinquency, 48(2): , May

Discussion Do the respondents understand the cyber questions? Should the cyber questions be integrated? Cyber-crime Science 15

Cyber-crime Science 16

Technology based information 2013 was the 9 th year 47,000 incidents Of which 621 confirmed data breaches Cyber-crime Science 17 [Ver13] Verizon. Data Breach Investigations report. Verizon Risk Team,

Method 19 partners First-hand forensic evidence Reviewed and validated Cyber-crime Science 18

Who? Threat actor categories trend Cyber-crime Science 19 N=621

What? Threat action categories Cyber-crime Science 20 N=47626

Discovery Late and by someone else! Cyber-crime Science 21

Discussion What does this say about the population? Why are incidents discovered so late and by others? Cyber-crime Science 22

Cyber-crime Science 23

Meta analysis 1 st year Global connectivity revolution Much of the Internet is privately owned Cyber-crime Science 24 [UNO13] UNODC. Chapter 2 of Comprehensive Study on Cybercrime. United Nations Office on Drugs and Crime, Feb crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_ pdf. crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_ pdf

Method Surveys from 69 countries, 40 businesses, 16 universities, and 11 organizations Caveat Cyber-crime Science 25 Number of specialised police per 100,000 Police recorded offence per 100,000

Cybercrime is increasing More in the news than homicide Law enforcement sees increasing trends Increasing use of ICT creates opportunity »More suitable targets online »Few opportunities for guardianship »Reduced self control Cyber-crime Science 26

Compared to conventional crime Cyber-crime Science 27 % respondents reporting victimization in last year, 2011 or latest available acc. hacked Phish- ing Iden- tity theft Online credit card fraud Burg- lary Rob- bery Car theft

Conclusions “Cyber” creates opportunity Cybercrime is increasing Measuring cybercrime correctly is hard Cyber-crime Science 28