Technological Crime. 2 Who Are We? The Royal Canadian Mounted Police is the Canadian national police service. We are an agency of the Ministry of Public.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Its a new digital world with new digital dangers….
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Emergency Management Unit “S ETTING THE T ABLE ” T O A CCOMPLISH THE T ACTICAL O BJECTIVE C ITY OF O TTAWA S ECURITY AND E MERGENCY M ANAGEMENT B RANCH.
Introduction and Overview of Digital Crime and Digital Terrorism
Security Classification Practical Issues in dealing with different types of cybercrime.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Forensics BACS 371
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
(Geneva, Switzerland, September 2014)
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Submitted by: Abhashree Pradhan CA (1)
Combating cyber-crime: the context Justice Canada March 2005.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
PART THREE E-commerce in Action Norton University E-commerce in Action.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Information Sharing Challenges, Trends and Opportunities
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer crimes.
Computer Security By Duncan Hall.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Security Mindset Lesson Introduction Why is cyber security important?
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
U.S. NATIONAL CYBERSECURITY BY: SEIF ABOU NAR. WHY ARE WE TALKING ABOUT CYBERSECURITY? Attacks received the attention of president Clinton and Attorney.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Securing Information Systems
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Trafficking in Persons (TIP)
Presentation transcript:

Technological Crime

2 Who Are We? The Royal Canadian Mounted Police is the Canadian national police service. We are an agency of the Ministry of Public Safety Canada. The RCMP is a national, federal, provincial and municipal policing body. We provide federal policing service to all Canadians and policing services under contract to the three territories, eight provinces (except Ontario and Quebec) and more than 200 municipalities and 600 Aboriginal communities.

3 Technological Crime mandate Investigate Pure Computer Crimes Criminal offences detailed in OM.IV.1 Primarily unauthorized access and mischief to data CIP mandate Computer Investigative Support to Technologically Facilitated Crimes Any traditional crime assisted by information technologies Search, seizure, analysis of digital evidence

4 Service Delivery Structure

5 The Cyber Crime Threat Why is it a problem? What is the nature of it? How is it evolving? What are our most successful techniques in combating this threat?

6 Cost and Means of Attack Source: SA Robert Flaim FBI

7 Why is it a problem? Transnational nature of the Internet = vulnerability Anonymous access to infrastructures via the Internet and SCADA Interdependencies of systems make attack consequences harder to predict and more severe Malicious software is widely available and does not require a high degree of technical skill to use More individuals with malicious intent on Internet New cyber threats outpace defensive measures

8 Why is it a problem? Threat not merely in the value of the data compromised, stolen, or altered, but in the nature of an attack. Ex: Damage from a cyber attack usually much greater than the resources needed to accomplish the attack. Attacks aided by the anonymity, openness, connectivity, and speed of the Internet. Ramifications include loss of confidence in the systems that form our national core.

9 Cyberthreats Due to the nature of globally interconnected networks, cyber attacks can be launched from anywhere in the world, with rapid cascading effects in multiple jurisdictions. The extent of the cyber threat ranges from individuals and organizations to national security. Estimates show that as few as 5% percent of cybercriminals are caught and convicted.* *Source: Mcafee: (McAfee North America Criminology Report - Organized Crime and the Internet 2007)

10 Cyberthreats Attacks against individuals often fall into two categories: malicious software social engineering. Malicious software attacks compromise home and small business computers. Once infected, the malicious code harvests personal data while the user is online. Social engineering attacks are aimed at home users and try to trick them into revealing sensitive personal information, such as bank logins and credit card details.

11 Cyberthreats Criminals are also targeting corporate networks to steal information, usually financial data, held on customer databases. Successful hacking attacks on businesses can yield huge amounts of personal information which can then be easily exploited. Since the possibility of attack is great and the volume of attackers is essentially limitless, without a defensive strategy, all users are potentially vulnerable over the Internet to criminals worldwide.

12 Sophistication of Cybercrime Simple Unstructured: Individuals or groups working with little structure, forethought or preparation Advanced Structured: Groups working with some structure, but little forethought or preparation Complex Coordinated: Groups working with advance preparation with specific targets and objectives.

13 Source: Carnegie Mellon University Attack Sophistication vs Intruder Knowledge

14 Threats and Capabilities

15 Source: Carnegie Mellon University Vulnerability Exploit Cycle

16 What is the nature of the threat? Technical Threats How IT systems are configured/deployed (Speed & Convenience vs. security) Some systems are highly vulnerable until the worst bugs in the software have been reported and corrected, which creates a window of opportunity for criminals to exploit these systems. Blended Threats: Botnets/Malware/Viruses/etc

17 How is the threat evolving? The race between criminals to exploit data/systems before security measures protect it or law enforcement catches them. Blended threats are expected to increase, especially within the following areas: - Exploitation frameworks and rootkits - BOT-NETS, Trojan-Horse malicious code - Increasingly Sophisticated Attacks - Wireless devices - Zero-day exploits - ID-Theft (Phishing) - “High-Yield” Investment Offers

18 How is the threat evolving? Blended threats continued: - Online “419” Schemes - Electronic Billing Fraud - Auction on Line/ Non Delivery of Goods - Targeted Attacks - Hackers - Child Exploitation - SCADA – Supervisory Control and Data Acquisition - Exploit process/software vulnerabilities for cash

19 How is the threat evolving? Financially Motivated Cyber Crime Digital currency ( theft/layering stage of the money laundering process) Legislation Anonymous Borders Internet Payment Systems Online Banking Online Casinos Pre-paid Credit Cards

20 Internal & External Drivers Emerging 3rd generation of convergent communications device technologies Increased criminal use of Internet Increased public use of technology = increased demand for analysis Enhanced use of security products & services Capacity/proliferation of devices with increasing storage capabilities and continually shrinking electronic footprints (encryption & compression) Development of new technologies (VHS vs. DVR)

21 Internal & External Drivers Complex tracking of identification and transactions Jurisdiction/Nonexistent or differing laws Speed of cooperation and information sharing Private sector concerns re privacy/shareholders/solutions Large scale investigations with multiple sites and suspects which can also cross international boarders

22 MOST SUCCESSFUL TECHNIQUES Sharing information between government agencies, the private sector and the public Canadian Cyber Incident Response Centre (CCIRC) Cybertip.ca portal Phonebusters Strong networking / relationship building with our partners Leveraging partnerships maximizing potential/minimizing duplication NRCAN, Bell Security Solutions, ARIN Combining Efforts to Combat Cyber Crime Cyber Crime Council Locally, Provincially, Nationally and Internationally G8 – HTC Sub Committee, CACP E-crimes,etc

23 MOST SUCCESSFUL TECHNIQUES Focused Enforcement Strategies Integrated Policing Sharing of tools, techniques and/or best practices Enhancing our communications strategy – internal and external Continuous development: employees, tools and techniques Continuously look to the future to identify trends & technology Prevention and Public Education

24 How can you help? Observe Identify Notify Partner = positive impact

25 With ever increasing numbers, Canadians are embracing the internet. Only by working in partnership we can achieve the goal of making the Internet a safe community for Canadians.

26 Insp. Carole Bird OIC Program Management Support Services Technological Crime Branch Royal Canadian Mounted Police (613)