Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

UNODC & the Global Response to Cybercrime
Immigration Intelligence Best Practice Bali Process Ad Hoc Group 8 – 10 February 2012 Theo Kuper Manager Intelligence.
#CPACONGRESS E3: Strengthening integrity in a complex environment Hawari Badri FCPA Assistant Secretary, Department of Immigration and Border Protection.
Social Housing Foundation. SHF Presentation to Parliament Structure of Presentation  Background & Approach  Focus of SHF Reflection on “Capacity building”
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Cyber Crime in the Digital Age
DHS, National Cyber Security Division Overview
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Det. Supt. Charlie McMurdie. Why?? MPA scrutiny into MPS e-crime capability 2006/7 Primary finding was a lack of oversight and co-ordination across silos.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
REGIONAL REPRESENTATION IN BRUSSELS Securing effective working on the European Agenda Jeremy Howell Economic Development and European Policy Consultant.
Building Inclusive Knowledge Societies Session organized by the UNCT in India and other UN entities.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Bureau of Justice Assistance Training & Technical Assistance Resources NGA Executive Policy Forum Santa Fe, NM May 2-3, 2005.
Overview of SAPS roles and responsibilities and demand reduction Assistant Commissioner Tertius Geldenhuys.
PREVENTION & RESPONSE “ARE YOU PREPARED” Security & Emergency Management Conference 1 June 2006 FA Frank Prendergast National Manager Counter Terrorism.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
Cybersecurity Governance in Ethiopia
Information Sharing Challenges, Trends and Opportunities
Community Policing. Developed in Response ● To the changes that put police in cars and removed them from neighborhoods ● To understanding that modern.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Australian High Tech Crime Centre International Cooperation – An Australian Perspective Wednesday, 7 November 2007.
Whole of Government Approach to Combating People Trafficking, including Victim Support Presenter Scott Wilson, Principal Legal Officer Commonwealth Government.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
The United Nations Global Initiative to Fight Human Trafficking (UN.GIFT) at the Informal Joint Briefing to Member States, Vienna, 2 March 2012.
Consistency in Reporting Data Breaches
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
A better Gauteng is in the making The Gauteng Aggravated Robbery Strategy Institute for Security Studies 8 October 2009.
A project implemented by the HTSPE consortium This project is funded by the European Union SECURITY AND CITIZENSHIP RIGHT AND CITIZENSHIP
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
National and International Development Strategy International Development Unit / Gordon Thomson / January 2016.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
ISACA Ireland Cyber Security Policy 9 February 2016.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
IMPLEMENTING THE SALVADOR DECLARATION The United Nations Programme Network of Crime Prevention and Criminal Justice Institutes (PNI)
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Cyber Security and Georgia. New Challenges
Advanced Income Tax Law
8 Building Blocks of National Cyber Strategies
Support for the AASHTO Committee on Planning (COP) and its Subcommittees in Responding to the AASHTO Strategic Plan Prepared for NCHRP 8-36, TASK 138.
  The Second Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms Wednesday.
Cyber Security Ecosystem of Georgia. Experience and Challenges
Challenges and Successes in the Zambian ICT Security Sector
The European Union response to cyber threats
UNODC and CYBERCRIME October 2009.
RCA Workshop on RCARO Future Strategies July 2007
Presentation transcript:

Australian High Tech Crime Centre Resourcing Cybercrime Tuesday, 6 November 2007

Australian High Tech Crime Centre Agenda 1. Background 2. Roles & Responsibilities 3. Business Relationships 4. AHTCC Structure

Australian High Tech Crime Centre Into a Virtual Frontier AHTCC – a response to combat the new ‘virtual’ horizon  Inspired by the National E-crime Strategy  Recognition of e-commerce and e-government growth  Strategy focused on shared responsibilities among sectors  Operating in a new environment with limited knowledge and legislation

Australian High Tech Crime Centre Introducing the AHTCC 2 July AHTCC commenced operation o Unique national model – all States & Territories and Commonwealth agencies to participate. AHTCC manage while State/Commonwealth police services buy-in o By full time & 3 p/time staff from all sectors – Board of Management established as well as a High Tech Managers Group o Established globally unique Joint Banking and Finance Sector Investigations team – 20 May Secondees and part time staff

Australian High Tech Crime Centre Roles & Responsibilities Knowledge Coordination Investigation Intelligence Professional Services AHTCC Establishment Agreement

Australian High Tech Crime Centre Coordination  Between Australian policing jurisdictions  With other public and private sector agencies  With foreign law enforcement

Australian High Tech Crime Centre Investigation  Initial assistance and referral  Assistance to the investigations of participant jurisdictions  Conducting investigations into selected matters

Australian High Tech Crime Centre Intelligence  Report trends in crime and criminals  Support given to investigations (target identification and development)

Australian High Tech Crime Centre Liaison & Professional Services  Advice and assistance in investigations and forensic services  Access to specialised equipment and services  Research and development  Development of policy and advice on law reform

Australian High Tech Crime Centre Knowledge  Promoting best practice standards across jurisdictions  Promoting coordinated training across jurisdictions  Providing expert knowledge and advice to jurisdictions

Australian High Tech Crime Centre AHTCC Functions 3 Objectives  Provide a national coordinated approach to combating serious, complex and multi-jurisdictional technology enabled crimes, especially those beyond the capability of single jurisdictions.  Assist in improving the capacity of all jurisdictions to deal with technology enabled crime.  Support efforts to protect the National Information Infrastructure (NII).National Information Infrastructure

Australian High Tech Crime Centre Approach of the AHTCC  4 pronged attack  Prevention  Disruption  Prosecutions  Capacity building  AHTCC approach shaped by:  Stakeholder cooperation  Offenders’ methods and victim profile for different types of online crime  Available police methodology and infrastructure

Australian High Tech Crime Centre Work of the AHTCC  National Information Infrastructure Protection  Investigations:  Online Child Sex Abuse (historic)  Online Banking investigations  Denial of Service attacks investigations – BOTNETS  IT Investment and Innovations  Including ‘translating’ electronic evidence & data for court  Prevention activities  Capacity building & Awareness raising

Australian High Tech Crime Centre Prevention Rationale :  Online crime is voluminous & difficult to prosecute Leading Examples:  Virtual Global Taskforce – a leading international model for cooperation & tools for technical disruption  ABA-AHTCC website:  Microsoft BotNet conference – technical exchange

Australian High Tech Crime Centre Building Capacity & Awareness  Rationale:  Law enforcement ill-equipped to fight online crime  Lacking technical skills and equipment, international cooperation, recognition of extent of crime or criminal methods  Leading Examples:  Vietnam High Tech Crime Centre & Conference  Training – local and international initiatives  Research partnerships : Australian Institute of Criminology and AusCERT  Media  AHTCC website & links

Australian High Tech Crime Centre NII Protection  Rationale:  NII is a component of Australia’s Critical Infrastructure. Defined as those physical facilities, supply chains, information technologies and communications networks which, if destroyed, degraded or rendered unavailable for an extended period, would significantly impact on the social or economic well-being of the nation or affect Australia’s ability to conduct national defence and ensure national security.  Increasing terrorist threat  Leading Work  Joint Operating Arrangement  Private sector information exchange/response  CT Cyber Exercises

Australian High Tech Crime Centre Investigations  Botnet attacks  High-end technical crime with NII disruption potential  Online Banking crimes  Phishing & Muling  Sectoral liaison  Web portal project for phishing & mule recruitment sites  Online Child Sex Abuse

Australian High Tech Crime Centre Ops & Intel Teams AOCC Intelligence Investigations  manage assets, information & seized materials  assess Online Crime Reports  review website trafficwebsite  enabled & enhanced high tech crimes  Internet Banking Fraud - ’phishing’  provide technical support & advice  develop targets for investigation  provide tactical support to investigations  report on trends

Australian High Tech Crime Centre Current Structure Director Co-ordinator Operations Investigations Team 1 Investigations Team 2 Technical Support Intelligence Operations Support Project Officer Executive Assistant

Australian High Tech Crime Centre Current Staff Members The AHTCC currently has 29 Staff Members which can be broken down into:  10 sworn AFP officers;  13 non-sworn AFP personnel;  6 secondees from government agencies and the private sector.  Defence;  Bank Investigators;  Customs.

Australian High Tech Crime Centre AHTCC Staffing Skill Sets  Investigation Skills;  Technical Skills;  Intelligence Skills;  Finance, Policy and Admin Skills.

Australian High Tech Crime Centre AHTCCnet Cyber TransPyFlag INCOG Coolminer

Australian High Tech Crime Centre AHTCCnet FBI QuanticoMelbourneSydney AHTCCnet AFPnet

Australian High Tech Crime Centre Future Structure Kevin Zuccato Director AHTCC James McCormack Coordinator AHTCC Team 1 NII Ops Team Leader 6 x Team Members Investigative Asst Team 2 JBFSIT Team Leader Team Member Contractor Bank Secondee NII Relationships & Business Delivery Team Leader Project Officer 2 x Education & Crime Prevention Project & Program Manager Industry Liaison Officer Investigative Asst AHTCC Intell Team Leader Senior Intell Analyst Sworn Team Member 2 x Intell Analysts Customs Analyst Admin & Ops Support Team Leader 2 x Admin staff Coordinator Future Technologies Team 3 Technical Investigations T/L Team Member Sys Admin - Contractor DSD Secondee x 2 ITSA Defence Sys Admin Windows Linux Software Engineer Windows Software Engineer System Programmer Coordinator Executive Assistant Project officer

Australian High Tech Crime Centre New Structure ? ?

Australian High Tech Crime Centre Questions or Comments