Auditing the Hacker s mind: the Hacker s Profiling Project 2.0. Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI
|
|
- Maximillian Blake Norton
- 7 years ago
- Views:
Transcription
1 Auditing the Hacker s mind: the Hacker s Profiling Project 2.0 Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI United Nations Interregional Crime and Justice Research Institute t (UNICRI)
2 Disclaimer The information contained in this presentation ti does not break any intellectual property, nor does it provide detailed information that may be in conflict with actual known laws. Registered brands and logos belong to their legitimate owners. Public release of this talk may eventually not include some pictures, graphs and images. The opinion here represented are our personal ones and do not necessary reflect the United Nations nor UNICRI views.
3 Agenda Part II Introduction and Key Concepts Yesterday s hacking VS today s crime + IEEE Hacking Matrix Cybercrime s drivers Hacking eras and Hacker s generations Profiling the enemy: the Hackers Profiling Project (HPP: ) The 9 emerged profiles Hackers as a National resource? (From Hacktivity 2010, HP Hungary) HPP-NG (HPP V2.0: ) Hacking & Cybercrime: the Dark Links Conclusions Books references Q&A, Contacts Extra Material
4 #whois
5 Raoul Nobody Chiesa Old-school Hacker from 1986 to 1995 Infosec Professional since Mediaservice.net Supporting UNICRI since 2004; Cybercrime Advisor since 2005 OSSTMM Key Contributor; HPP Project Manager; ISECOM International Trainer Member of CLUSIT, AIP/OPSI, TSTF.net (Telecom Security Task Force), oce), APWG, ICANN,, CyberDefcon, e, HostExploit, ot, WINS, etc; ec; ENISA PSG, Advisor; Italian MoD OSN/CASD CyberWorld WG: Group Leader. I work worldwide (so I don t get bored ;) My areas of interest: Pentesting, SCADA/DCS/PLC, National Critical Infrastructures, Security R&D+Exploiting weird stuff,, Security People, X.25, PSTN/ISDN, Hackers Profiling, Cybercrime, Information Warfare & CyberWar, Security methodologies, vertical hard-core Trainings.
6 UNICRI UNICRI was created in 1968 to assist intergovernmental, governmental and non-governmental organizations in formulating and implementing improved policies i in the field of crime prevention and criminal justice. WHQ is in Turin, Italy. In a rapidly changing world, UNICRI s major goals today are advancing security, serving justice and building peace. Our key areas of focus: Applied Research Capacity Building Technical Co-operation Emerging Crimes Unit: cyber crimes, counterfeiting, environmental crimes, trafficking in stolen works of art Fake Bvlgari &Rolex, but also Guess how they update each others? Water systems with sensors Viagra & Cialis (aka SPAM) , chat&im, Skype
7 (INTRO) A quick recap on Cybercrime
8 Traditional Crime
9 ..and Key business
10 The last 10 years (!)
11 a glance Cybercrime = Business = Services (and products ) : Phishing & co Malware (rogue AVs, driven-by attacks, fake mobile games, + standard stuff) Frauds & Scams DDoS Attacks Digital Paedophilia (minors and children pornography ) Generic Porn (who would bother for 10 bucks lost??) On-line casinos; App games
12 Cybercrime turnover? 2011 Cybercrime financial turnover apparently scored up more than Drugs dealing, Human Trafficking and Weapons Trafficking turnovers Various sources (UN, USDOJ, INTERPOL, 2011) Financial Turnover, estimation: 6-12 BLN USD$/year Source: Group IB Report 2011
13 Yesterday and today s Hacking
14 Crime -> Yesterday Every new technology, opens the door to new criminal approaches. The relationship between technologies and criminality has always been since the very beginning characterized by a kind of competition between the good and the bad guys, just like cats and mice. As an example, at the beginning of 1900, when cars appeared, the bad guys started stealing them (!).the police, in order to contrast the phenomenon, defined the mandatory use of car plates.and the thieves began stealing the car plates from the cars (and/or falsifying them).
15 Crime -> Today (Cybercrime) Cars have been substituted by information You got the information,,you got the power.. [at least, in politics, in the business world, in our personal relationships ] Very simply, the above happens because the information can be transformed at once into something else : Competitive advantage (Vodafone Greece; Israel s mobile attacks on Lebanon) Sensible/critical information (Comodo s hack, RSA s hack; DigiNotar hack; KPN hack;.) Money (RBS hack; Sony s hacks; ) Some examples? Telecom Italia Scandal Vodafone Greece Scandal Ferrari-McLaren industrial espionage case (very italian-style ones) : Calciopoli, Vallettopoli, Vittorio Emanuele di Savoia, Corona, The Monaco s mansion, Escorts Scandal, Bisignani, ) Recently, IEEE published a very interesting graph, from which all of us may eventually learn something
16 IEEE Hacking Matrix
17 Cybercrime: drivers QUESTION: May we state that cybercrime along with its many, many aspects and views can be ranked as #1 in rising trend and global diffusion? ANSWER(S): Given that all of you are attendees and speakers here, I would say that we already are on the right track in order to analyze the problem Nevertheless, some factors exist for which the spreading of e-crime- based attacks relays. Let s take a look at them.
18 Reasons/1 1. There are new users, more and more every day: this means the total amount of potential victims and/or attack vectors is increasing. Thanks to broadband Making money, somehow and straight away. Worldwide economics falldown 3. Technical know-how public availability & 0-days, Internet distribution system / ready-to-go, even when talking about Black Markets average-high skills: that s what I named hacking g pret-à-porter po te
19 Darkness DDoS botnet
20 Reasons/2 4. It s extremely easy to recruit idiots and set up groups, molding those adepts upon the bad guy s needs (think about e-mules) Newbies, Script Kiddies 5. They will never bust me Psychology, Criminology 6. Lack of violent actions Psychology and Sociology
21 Hacking eras & Hackers generations
22 Things changed First generation (70 s) was inspired by the need for knowledge. Second generation ( ) was driven by curiosity plus the knowledge starving: the only way to learn OSs was to hack them; later ( ) hacking becomes a trend. The Third one (90 s) was simply pushed by the anger for hacking, meaning a mix of addiction, curiosity, learning new stuff, hacking IT systems and networks, exchanging info with the underground community. Here we saw new concepts coming, such as hacker s e-zines (Phrack, 2600 Magazine) along with BBS. Fourth generation (2000-today) is driven by angerness and money: often we can see subjects with a very low know-how, thinking that it s cool & bragging being hackers, while they are not interested in hacking & phreaking history, culture and, $ ethics. Here hacking meets with politics (cyber-hacktivism) or with the criminal world (cybercrime).
23 Welcome to HPP
24 WHAT IS (HPP V1.0) The biggest research ever made on the hacking world Started back in 2004, hackers interviewed 9 emerged profiles, among which: Industrial Spy Government Hacker Military Hacker Composed by 8 research phases, which encompass historical, psycological, behaviour, social and technological aspects, into a multidisciplinary approach Includes theorical and field analysis Final goal is to build a methodology that gets as input hacking actions evidences (web defacement, data breach, etc..) and gives back the profile of the attacker Final methodology will be available to everyone under FDL licence set
25 The Hackers Profiling Project (HPP) Project phases starting: September Theoretical collection: Questionnaire, Existing literature 2 Observation: Participation in IT underground security events 3 - Filing: Database for elaboration/classification of data (phase 1/phase 4) 4 - Live collection: Highly customized, new generation Honeynet systems 5 Gap analysis: data from: questionnaire, honey-net, existing literature 6 HPP live assessment of profiles and correlation of modus operandi through data from phase 4 7 Final profiling: Redefinition/fine-tuning of hackers profiles used as de-facto standard 8 Diffusion of the model: elaboration of results, publication of the methodology, raising awareness
26 The Hackers Profiling Project (HPP) Profiling Hackers the book
27 The Hackers Profiling Project (HPP) Evaluation and correlation standards Modus Operandi (MO) Lone hacker or as a member of a group Motivations Selected targets Relationship between motivations and targets Hacking career Principles of the hacker's ethics Crashed or damaged systems Perception of the illegality of their own activity Effect of laws, convictions and technical difficulties as a deterrent
28 The Hackers Profiling Project (HPP) Detailed analysis and correlation of profiles table #1
29 Hackers and Governments "In the very near future many conflicts will not take place on the open field of battle, but rather in spaces on the Internet, fought with the aid of information soldiers, that is hackers. This means that t a small force of hackers is stronger than the multi-thousand force of the current armed forces. Former Duma speaker Nikolai Kuryanovich, 2007
30
31
32 Hackers as a National Resource? In the last year I ve dig into a research from an Hungarian security researcher from HP His idea was weird! Should we consider hackers as the enemy / troubles Or, may they represent an opportunity for Governments?? Patriot s Hackers Think about bloggers and North Africa / GCC Area (Gulf Countries) Think about IRAN and Twitter See the potentialities?
33 Lesson to learn USA has billions of dollars for hacking and you? Officials said China and Russia also have many hackers and you? If you (officially) don t have cyber corps, use your youth movement! Fonte: Hackers in the national cyber security, Csaba Krasznay, HP: Hacktivity 2010, Ungheria.
34 Hackers as resource: a survey Coordination with hackers (from a Government Point of View): the big questions: Can we trust in hackers? Where can we find these experts? How can we gain their trust? How much money do we need for the cooperation? How can we cooperate with them? What can they really do?? How can we control them? Source: Hackers in the national cyber security, Csaba Krasznay, HP: Hacktivity 2010, Hungary.
35 The Hackers Profiling Project (HPP) Detailed analysis and correlation of profiles table #2 OFFENDER ID LONE / GROUP HACKER TARGET MOTIVATIONS / PURPOSES Wanna Be Lamer 9-16 years GROUP End-User For fashion, It s cool => to I would like to be a boast and brag hacker, but I can t Script Kiddie years The script boy GROUP: but they act alone SME / Specific security flaws To give vent of their anger / attract mass-media attention Cracker years The destructor, burned ground LONE Business company To demonstrate their powe / attract mass-media attention Ethical Hacker years The ethical hacker s world LONE / GROUP (only for fun) Vendor / Technology For curiosity (to learn) and altruistic purposes Quiet, Paranoid, Skilled Hacker years The very specialized and paranoid attacker LONE On necessity For curiosity (to learn) => egoistic purposes Cyber-Warrior years The soldier, hacking for money LONE Symbol business company / End-User For profit Industrial Spy years Industrial espionage LONE Business company / Corporation For profit Government Agent years CIA, Mossad, FBI, etc. LONE / GROUP Government / Suspected Terrorist/ Strategic company/ Individual Espionage/ Counter-espionage Vulnerability test Activity-monitoring Military Hacker years LONE / GROUP Government / Strategic Monitoring / company controlling / crashing systems
36 HPP-NG The HPP started in We ve been observing the hacker s ecosystem since nearly 7 years... In 2005 and 2007, we ve testimonied dramatic changes and cross-links, as well as new moods in the hacking underground, along with totally new actors including the raise of Organized Crime involvement. And, something else is on-going now: Information Warfare (and Cyberwar..?) YES: we did know the hacking world just follows up (or, it s steps ahead) to technology s evolution. NO: we didn t expect all of what has happened (but most of!)
37 HPP-NG Lesson learned: Technology impacts on: Social Life Digital Life Personal economy Company s Business National Security Much, much more The original HPP goals were consequently missing something : our 9 Hacker s Profiles didn t include them (but they d fit in existing categories). We had a stop for some time. We built HPP 2.0. And we re starting once again. Also, this is the very first time we re disclosing HPP 2.0 in public.
38 Next enhancements 1. Wannabe Lamer 2. Script kiddie: under development (Web Defacers, DDoS, links with distributed teams i.e. Anonymous.) 3. Cracker: under development (Hacking on-demand, outsourced ; links with Organized Crime) 4. Ethical hacker: under development (security researchers, ethical hacking groups) 5. Quiet, paranoid, skilled hacker (elite, unexplained hacks?) 6. Cyber-warrior: to be developed 7. Industrial spy: to be developed (links with Organized Crimes & Governments i.e. The Comodo and DigiNotar hacks?) 8. Government agent: to be developed ( N countries..) 9. Military hacker: to be developed (India, China, N./S. Korea, etc.)
39 Enhancements/2 Going after Cybercriminals: Kingpins & Master minds (the Man at the Top ) Organized Crime MO, Business Model, Kingpins How To Techies hired by the Organized Crime (i.e. Romania & skimming at the very beginning; Nigerian cons; Ukraine Rogue AV; Pharma ADV Campaigns; ESTDomains in Estonia; etc..) Structure, Infrastructures (links with Govs & Mils?) Money Laundering: Follow the money (E-mules & new ways to cash-out ) Outsourcing: malware factories (Stuxnet? DuQu??)
40 Understanding Hackers It s extremely important that we understand the so-called hacker s behaviours Don t limit yourself to analyse attacks and intrusion techniques: let s analyze their social behaviours. Try to identify those not-written rules of hacker s subculture. Explore hacker s social organization. Let s zoom on those existing links between hacking hacktivism Let s zoom on those existing links between hacking, hacktivism organized crime
41 HPP-NG ( ) Running R&D on these topics is pretty hard Even if, our research is a matter of study and analysis at FBI Academy and EUROPOL Finally, we had been able to jump out from the stucked Phases 1 & 2 Thanks to Unicredit Bank Group Possibly thanks to more, upcoming Donors We still need more Sponsors, Donors + People believing in what we are doing (Misha is helping us out on this ;) Sponsors may be stealth too (no public disclose). it/emerging crimes/cybercrime/initiatives/proposals php
42 Misha Glenny (Author of McMafia, Dark Market ) while speaking about HPP at TED 2011
43 The Dark Links
44 Human Organs trafficking September 2010, Asti (North-West of Italy) Police was eavesdropping on phone calls from and to the Capo dei Capi of a Nigerian gang, specialized in cloned credit cards and elite cars theft. In one of this calls, a guy said to the Boss: the Kidneys are ready. So what we have here? Organized Crime buying Human Organs from Nigeria So, what we have here? Organized Crime buying Human Organs from Nigeria using the money gathered from cybercrime then selling into EU (!).
45 Coke for cards? March/May 2010, Turin (North-West of Italy) Turin has got the biggest Romania s community of Italy. We also have a very big Nigeria s community. Historically, Romenian gangs g drive the business of ATM skimmers and Nigerian the Cocaine business. After a joined FBI/US Secret Service/Interpol/Italian Postal Police operation, the Romanians decided to sell the business to Nigerians. Cloned cards were paid with Cocaine. This happens because the Romenians also run the prostitutes business and, prostitute s customers want coke as well. Compared to these guys, Scarface was nearly a kid
46 Final toughts The hacking world has not always been linked to those true criminal actions. Those researches carried out until now, have not properly snapshot the hacking world and its tunings. At the same time, nowaday s hacking is moving (transforming?) towards (global) crime. And, different elements began working together (as we ve just stated on the two previous slides). Cybercrime and Underground Economy problem is not a tech-people issue : rather, it is an issue for ALL of us, representing an impact on the countries ecosystem that could reveal itself as devastating. Also, forget fighting cybercrime on your own: you just can t. That s why our last slides ( Extra Material section) are on cybercrime s answers That s why our last slides ( Extra Material section) are on cybercrime s answers and VTFs (Virtual Task Forces).
47 And...a gift for you all here! Get your own, FREE copy of F3 (Freedom from Fear, the United Nations magazine) issue #7, totally focused on Cybercrimes! DOWNLOAD: Or, me and I will send you the full PDF (10MB)
48 Books References
49 Must-read books / 1 During the different phases of bibliography research, the Authors have made reference (also) to the following publications and on-line resources: H.P.P. P Questionnaires Dark Market: Cyberthieves, Cybercops and YOU,, by Misha Glenny, The Bodely Head, 2011 Zero Day (A novel), by Mark Russunovich, Thomas Dunne Books, St. Martin s Press, 2011 The Kingpin, by Kevin Poulsen, 2011 CY83R Terror: the Hidden Crime, by Vaidehi Sachin & Amarjit Singh, NBC Mumbai (India), 2010 Fatal System Error: the Hunt for the new Crime Lords who are bringing down the Internet, Joseph Menn, Public Affairs, 2010 Stealing the Network: How to 0wn a Continent, (an Identity), (a Shadow) (V.A.), Syngress Publishing, 2004, 2006, 2007 Stealing the Network: How to 0wn the Box, (V.A.), Syngress Publishing, 2003 Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier, Suelette Dreyfus, Random House Australia, 1997 The Cuckoo s Egg: Tracking a Spy Through the Maze of Computer Espionage, Clifford Stoll, DoubleDay (1989), Pocket (2000) Masters of Deception: the Gang that Ruled Cyberspace, Michelle Stalalla & Joshua Quinttner, Harpercollins, 1995 Kevin Poulsen, Serial Hacker, Jonathan Littman, Little & Brown, 1997 Takedown, John Markoff and Tsutomu Shimomura, Sperling & Kupfler, (Hyperion Books), 1996 The Fugitive Game: online with Kevin Mitnick, Jonathan Littman, Little & Brown, 1997 The Art of Deception, Kevin D. Mitnick & William L. Simon, Wiley, 2002 The Art of Intrusion, Kevin D. Mitnick & William L. Simon, Wiley, 2004
50 Must-read books / Large: the Strange Case of the World s Biggest Internet Invasion, Charles Mann & David Freedman, Touchstone, 1998 The Estonia attack: Battling Botnets and online Mobs, Gadi Evron, 2008 (white paper) Who is n3td3v?, by Hacker Factor Solutions, 2006 (white paper) Mafiaboy: How I cracked the Internet and Why it s still broken, Michael Calce with Craig Silverman, 2008 The Hacker Diaries: Confessions of Teenage Hackers, Dan Verton, McGraw-Hill Osborne Media, 2002 Cyberpunk: Outlaws and Hackers on the Computer Frontier, Katie Hafner, Simon & Schuster, 1995 Cyber Adversary Characterization: auditing the hacker mind, Tom Parker, Syngress, 2004 Inside the SPAM Cartel: trade secrets from the Dark Side, by Spammer X, Syngress, 2004 Hacker Cracker, Ejovu Nuwere with David Chanoff, Harper Collins, 2002 Compendio di criminologia, Ponti G., Raffaello Cortina, 1991 Criminalità da computer, Tiedemann K., in Trattato di criminologia, medicina criminologica e psichiatria forense, vol.x, Il cambiamento delle forme di criminalità e devianza, Ferracuti F. (a cura di), Giuffrè, 1988 United Nations Manual on the Prevention and Control of Computer-related related Crime, in International Review of Criminal Policy Nos. 43 and 44 Criminal Profiling: dall analisi della scena del delitto al profilo psicologico del criminale, Massimo Picozzi, Angelo Zappalà, McGraw Hill, 2001 Deductive Criminal Profiling: Comparing Applied Methodologies Between Inductive and Deductive Criminal Profiling Techniques, Turvey B., Knowledge Solutions Library, January, 1998 Malicious Hackers: a framework for Analysis and Case Study, Laura J. Kleen, Captain, USAF, US Air Force Institute of Technology Criminal Profiling Research Site. Scientific Offender Profiling Resource in Switzerland. Criminology, Law, Psychology, Täterpro
51 Must-read books / 3 Profiling Hackers: the Science of Criminal Profiling as applied to the World of Hacking ISBN:
52 Questions? Contacts, Q&A Raoul Chiesa Thanks folks! UNICRI Cybercrime Home Page:
53 Extra Material
54 The hackpies
55 The Hackers Profiling Project (HPP) The HACKPIES :)
56 The Hackers Profiling Project (HPP) The HACKPIES :)
57 The Hackers Profiling Project (HPP) The HACKPIES :)
58 The Hackers Profiling Project (HPP) The HACKPIES :)
59 The Hackers Profiling Project (HPP) The HACKPIES :)
60 The Hackers Profiling Project (HPP) The HACKPIES :)
61 The Hackers Profiling Project (HPP) The HACKPIES :)
62 The Hackers Profiling Project (HPP) The HACKPIES :)
63 The Hackers Profiling Project (HPP) The HACKPIES :)
64 The response to Cybercrime
65 Cybercrime: the answers Cybercrime is typically a transnational crime, borderless, that includes so many actors and different roles. That s why you just can t think about a single answer. Instead, it is necessary to think and act in a distributed approach, creating Virtual Task Forces (VTFs). It is essential the collaboration among Law Enforcement, Internet community, Finance sector, ISPs and carriers (voice & data), vertical groups, in order to identify a specific group, malware or facilitator. From the investigative point of view, challenges are the following: Analyze the malware Map the infrastructure Eavesdrop/Intercept/Sniff the communication and/or the links Explore the executed attacks Identify the developers and its crime-rings.
66 Vertical Groups & VTFs That s why, along these years, Vertical Groups have been raised, among which we can list the following: Team Cymru APWG Anti Phishing Working Group IEEE-SA Shadow Server Foundation UNICRI Emerging Crimes Unit Host Exploit Cyberdefcon.. working along with : INTERPOL EUROPOL Hi-Tech Crimes groups into each National LEAs
Security Culture: to learn MORE
Security Culture: to learn MORE 1 Reading Room /1 Spam Nation: the inside story of Organized Cybercrime, from Global epidemic to your front door, Brian Krebs, 2014 Kingping: How One Hacker Took over The
More informationreal data, real experiences, wrong myths and the
Profiling Hackers: real data, real experiences, wrong myths and the Hackers Profiling Project (HPP) Presentation by Raoul Chiesa Senior Advisor, Strategic Alliances & Cybercrime Issues Human Traficking
More informationManaging Security of the Grid in the Cloud
Managing Security of the Grid in the Cloud Raoul Chiesa, Senior Advisor on Cybercrime ECU Emerging Crimes Unit, UNICRI United Nations Interregional Crime and Justice Research Institute (UNICRI) Disclaimer
More informationThe Hackers Profiling Project (HPP)
Presentation by Raoul Chiesa United Nations, Consultant on cybercrime Interregional Crime and Justice Research Institute (UNICRI) Counter Human Trafficking and Emerging Crimes Unit What is UNICRI? A United
More informationThe Underground Economy. (with a zoom on Bitcoins)
The Underground Economy Raoul «Nobody» Chiesa (with a zoom on Bitcoins) Partner, President, SECURITY BROKERS SCpA Permanent Stakeholders Group, ENISA (2010-2015) Founder, Board of Directors, Technical
More informationCybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
More informationData Breaches, Data Leaks, Web Defacements: why secure coding is important.
Data Breaches, Data Leaks, Web Defacements: why secure coding is important. Raoul «Nobody» Chiesa Founder, President, Security Brokers The speaker President, Founder, The Security Brokers Principal, CyberDefcon
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationstéphane koch internet & information strategy advisor online reputation management
stéphane koch internet & information strategy advisor online reputation management 2 P O L I T I C A L E N V I R O N M E N T Cybercrime ECONOMY INFRA- STRUCTURE MILITARY Innovation Info Ops / Information
More informationHow To Protect Yourself From Cyber Crime
The Global Polity Cybercrime, Cybersecurity and the Future of the Internet The Challenges Cybercrime is now the fastest growing sector of cross-border organized crime. In 2009, reported losses in the US
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationRunning head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1. Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics
Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1 Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics Robert Olson The College of St. Scholastica INFORMATION TECHNOLOGY,
More informationSecurity issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers
Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers Agenda Introductions The rise of machine-based identities
More informationVulnerability Assessment & Compliance
www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats
More informationTHE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual
More informationPacific Islands Telecommunications Association
Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION
More informationThe author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function
More informationCyber Terrorism: wrong assumptions & true facts + what I hope will never happen. Raoul «Nobody» Chiesa President, Security Brokers
Cyber Terrorism: wrong assumptions & true facts + what I hope will never happen. Raoul «Nobody» Chiesa President, Security Brokers Disclaimer The information contained within this presentation do not infringe
More informationEuropol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011
Europol Cybercrime Centre The perspective of Europol on Cybercrime Courmayeur Mont Blanc, Italy, 2-4 December 2011 The Threat The threat from cybercrime is multi-dimensional, targeting citizens, businesses,
More informationKeren Elazari Hackers: The Internet s Immune System
Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think
More informationDISCLAIMER AND NOTICES
DISCLAIMER AND NOTICES The opinions expressed in this presentation are those of the author and presenter alone. They do not represent the views of any other entity. Nothing in this presentation should
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationWhat legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
More informationNATO & Cyber Conflict: Background & Challenges
NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented
More informationChristos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
More informationWho s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
More informationNot-For-Profit Finance Forum Westpac New Zealand Limited
Not-For-Profit Finance Forum Westpac New Zealand Limited Managing Fraud insights from a consumer banking perspective Claire Smollett Investigations Manager - Financial Crime Management Hayley Muong Senior
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationFederal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationEthical Hacking Introduction
Ethical Hacking Introduction Table of Contents What Is "Ethical Hacking"?... 2 Why Perform "Ethical Hacking"?... 6 The Certified Ethical Hacker (CEH)... 9 Information Security Reports... 10 Internet Crime
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationCyber Crime Research. Presentation by the Australian Institute of Criminology. Dr Russell G Smith Principal Criminologist
Cyber Crime Research Presentation by the Australian Institute of Criminology Dr Russell G Smith Principal Criminologist The Australian Institute of Criminology Australia's national research and knowledge
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationHow Economics and Information Security Affects Cyber Crime and What This Means in the Context of a Global Recession. Turbo Talk BH 2009 Peter Guerra
How Economics and Information Security Affects Cyber Crime and What This Means in the Context of a Global Recession Turbo Talk BH 2009 Peter Guerra Full Disclosure My opinions only not of my University,
More informationSurviving the Ever Changing Threat Landscape
Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state
More informationGlobal Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors
Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market
More informationOVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
More informationHere are several tips to help you navigate Fairfax County s legal system.
Since 2004, I ve been a daily presence in the Fairfax County Courthouse and have handled hundreds of drug cases as both a Prosecutor and a Defense Attorney. I have spent the last decade analyzing the legal
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationCybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
More informationExecutive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
More informationCybercrimes NATIONAL CRIME PREVENTION COUNCIL
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
More informationTYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
More informationFBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
More informationIntro The Speaker. Raoul Chiesa
Cloud Security, from an Hacker s Perspective ( 从 专 业 视 角 看 云 安 全 ) Raoul Nobody Chiesa Founder, Partner, Security Brokers Principal, Cyberdefcon Ltd. Founder, Owner, @ Mediaservice.net Perugia, July 23,
More informationBUSINESS SURVEYS 2015
February 2016 BUSINESS SURVEYS 2015 The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers CONTENTS Executive summary............................
More informationAppendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
More informationCyber Security Threats: What s Next and How Do We Reduce the Risks?
Cyber Security Threats: What s Next and How Do We Reduce the Risks? Agenda Cyber Security: A necessity! What threats exist today? What does the future hold? How do we reduce the risks? Key for Risk Reduction
More informationThe FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
More informationMalware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
More informationCyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationEY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
More informationNetwork security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
More informationRETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
More informationInformation Security. CS526 Topic 1
Information Security CS 526 Topic 1 Overview of the Course 1 Today s Security News Today: 220 million records stolen, 16 arrested in massive South Korean data breach A number of online gaming & movie ticket
More informationWHITEPAPER: CYBER CRIMINALITY. Cyber Criminality. Is Your Worst Nightmare Coming True?
WHITEPAPER: CYBER CRIMINALITY Cyber Criminality Is Your Worst Nightmare Coming True? 010111010100010101010111101010110101 0 001101011101010001010101011110101 0011010111010100010101011 110101011110101 0011011000101010010101010111101010101110001010101011110101
More informationE-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
More informationAs a prereading activity, have students complete an anticipation guide structured in the following manner:
A Curriculum Guide for Evil Spy School By Stuart Gibbs About the Book During a spy school game of Capture the Flag, twelve-year-old Ben Ripley somehow accidentally shoots a live mortar into the principal
More informationFederal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
More informationInstitute of Southern Punjab, Multan
Institute of Southern Punjab, Multan Network Security Brief Introduction Lecture#1 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Blog https://mazharhussainatisp.wordpress.com/ Grading Policy Classification
More informationWhat happens when you swipe your card?
What happens when you swipe your card? As hacking of top retailers make headlines, Bill Whitaker discovers how insecure your credit card information is this holiday season The following is a script of
More informationCybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
More informationNational Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In
More information1 Hack-x-crypt UJJWAL SAHAY
1 Hack-x-crypt UJJWAL SAHAY 2 Hack-x-crypt By: - UJJWAL SAHAY {ETHICAL HACKER} 3 Hack-x-crypt LEGAL DISCLAIMER Any proceedings or activities regarding the material contained within this volume are exclusively
More informationHow do we Police Cyber Crime?
How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More informationOnline International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationInternet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
More informationTopic 1 Lesson 1: Importance of network security
Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationCOUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
More informationCybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.
Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information
More informationTestimony of. Steven R. Chabinsky. Jointly before the United States House of Representatives Committee on Science, Space, and Technology
Testimony of Steven R. Chabinsky Jointly before the United States House of Representatives Committee on Science, Space, and Technology Subcommittee on Oversight and Subcommittee on Research and Technology
More informationCombatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
More informationIT Security Community
IT Security Community Who are we? The CompTIA IT Security is a group focused on the changing security issues of today. Who should join? Anyone looking to stay current with the ever- changing security landscape.
More informationCollateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
More informationENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
More informationWhat s Hot and What s Not in the World of Cyber Security and Cyber Crime
Department of Technology, Management & Budget (DTMB) What s Hot and What s Not in the World of Cyber Security and Cyber Crime Dan Lohrmann, Chief Technology Officer Department of Technology, Management
More informationBehind of the Penetration testing. J@50n L33
Behind of the Penetration testing J@50n L33 AGENDA 1. WHO I AM!! 2. PENETRATION TESTING 3. WHY DO YOU NEED THE PENETRATION TESTING 4. HOW DO YOU PERFORM THE PENETRATION TESTING 5. WHAT ABOUT THIS, THERE
More informationCybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
More informationBest Practices: Reducing the Risks of Corporate Account Takeovers
Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States
More informationAnthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa
SECURING THE DIGITAL DIVIDE: COMBATING CYBERCRIME Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa INTRODUCTION q Given modern
More informationService and anonymisation.
THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2014 9 EXECUTIVE SUMMARY The Internet Organised Crime Threat Assessment (iocta) informs decision makers at strategic, policy and tactical levels about
More informationICT Barriers, High Tech Crime, and Police
ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College
More informationPresented by: Islanders Bank
Presented by: Islanders Bank Cybersecurity Awareness Cybersecurity Awareness Objectives: Define Cybersecurity & why it s important Provide information about Dept. Homeland Security Cybersecurity Campaigns:
More informationSTATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
More information1 Billion Individual records that were hacked in 2014 3.
783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just
More informationThe Third Rail: New Stakeholders Tackle Security Threats and Solutions
SESSION ID: CXO-R03 The Third Rail: New Stakeholders Tackle Security Threats and Solutions Ted Ross Director, Threat Intelligence HP Security Research @tedross Agenda My brief background An example of
More informationCybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical
Crime and Cybercrime An act committed or omitted in violation of a law forbidding or commanding it and for which punishment is imposed upon conviction http://www.thefreedictionary.com/crime Deviant behavior
More informationEthical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com
Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com About ethical hacking Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationCyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
More informationSecurity Threat Awareness How to protect yourself, your family, and your company. Dial-in Info: 1-888-634-4837 Conference ID 30366898
Security Threat Awareness How to protect yourself, your family, and your company Tuesday, January 21, at 3:00 PM EDT Dial-in Info: 1-888-634-4837 Conference ID 30366898 Thanks for joining us! The webinar
More information5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
More information