Auditing the Hacker s mind: the Hacker s Profiling Project 2.0. Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI

Size: px
Start display at page:

Download "Auditing the Hacker s mind: the Hacker s Profiling Project 2.0. Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI"

Transcription

1 Auditing the Hacker s mind: the Hacker s Profiling Project 2.0 Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI United Nations Interregional Crime and Justice Research Institute t (UNICRI)

2 Disclaimer The information contained in this presentation ti does not break any intellectual property, nor does it provide detailed information that may be in conflict with actual known laws. Registered brands and logos belong to their legitimate owners. Public release of this talk may eventually not include some pictures, graphs and images. The opinion here represented are our personal ones and do not necessary reflect the United Nations nor UNICRI views.

3 Agenda Part II Introduction and Key Concepts Yesterday s hacking VS today s crime + IEEE Hacking Matrix Cybercrime s drivers Hacking eras and Hacker s generations Profiling the enemy: the Hackers Profiling Project (HPP: ) The 9 emerged profiles Hackers as a National resource? (From Hacktivity 2010, HP Hungary) HPP-NG (HPP V2.0: ) Hacking & Cybercrime: the Dark Links Conclusions Books references Q&A, Contacts Extra Material

4 #whois

5 Raoul Nobody Chiesa Old-school Hacker from 1986 to 1995 Infosec Professional since Mediaservice.net Supporting UNICRI since 2004; Cybercrime Advisor since 2005 OSSTMM Key Contributor; HPP Project Manager; ISECOM International Trainer Member of CLUSIT, AIP/OPSI, TSTF.net (Telecom Security Task Force), oce), APWG, ICANN,, CyberDefcon, e, HostExploit, ot, WINS, etc; ec; ENISA PSG, Advisor; Italian MoD OSN/CASD CyberWorld WG: Group Leader. I work worldwide (so I don t get bored ;) My areas of interest: Pentesting, SCADA/DCS/PLC, National Critical Infrastructures, Security R&D+Exploiting weird stuff,, Security People, X.25, PSTN/ISDN, Hackers Profiling, Cybercrime, Information Warfare & CyberWar, Security methodologies, vertical hard-core Trainings.

6 UNICRI UNICRI was created in 1968 to assist intergovernmental, governmental and non-governmental organizations in formulating and implementing improved policies i in the field of crime prevention and criminal justice. WHQ is in Turin, Italy. In a rapidly changing world, UNICRI s major goals today are advancing security, serving justice and building peace. Our key areas of focus: Applied Research Capacity Building Technical Co-operation Emerging Crimes Unit: cyber crimes, counterfeiting, environmental crimes, trafficking in stolen works of art Fake Bvlgari &Rolex, but also Guess how they update each others? Water systems with sensors Viagra & Cialis (aka SPAM) , chat&im, Skype

7 (INTRO) A quick recap on Cybercrime

8 Traditional Crime

9 ..and Key business

10 The last 10 years (!)

11 a glance Cybercrime = Business = Services (and products ) : Phishing & co Malware (rogue AVs, driven-by attacks, fake mobile games, + standard stuff) Frauds & Scams DDoS Attacks Digital Paedophilia (minors and children pornography ) Generic Porn (who would bother for 10 bucks lost??) On-line casinos; App games

12 Cybercrime turnover? 2011 Cybercrime financial turnover apparently scored up more than Drugs dealing, Human Trafficking and Weapons Trafficking turnovers Various sources (UN, USDOJ, INTERPOL, 2011) Financial Turnover, estimation: 6-12 BLN USD$/year Source: Group IB Report 2011

13 Yesterday and today s Hacking

14 Crime -> Yesterday Every new technology, opens the door to new criminal approaches. The relationship between technologies and criminality has always been since the very beginning characterized by a kind of competition between the good and the bad guys, just like cats and mice. As an example, at the beginning of 1900, when cars appeared, the bad guys started stealing them (!).the police, in order to contrast the phenomenon, defined the mandatory use of car plates.and the thieves began stealing the car plates from the cars (and/or falsifying them).

15 Crime -> Today (Cybercrime) Cars have been substituted by information You got the information,,you got the power.. [at least, in politics, in the business world, in our personal relationships ] Very simply, the above happens because the information can be transformed at once into something else : Competitive advantage (Vodafone Greece; Israel s mobile attacks on Lebanon) Sensible/critical information (Comodo s hack, RSA s hack; DigiNotar hack; KPN hack;.) Money (RBS hack; Sony s hacks; ) Some examples? Telecom Italia Scandal Vodafone Greece Scandal Ferrari-McLaren industrial espionage case (very italian-style ones) : Calciopoli, Vallettopoli, Vittorio Emanuele di Savoia, Corona, The Monaco s mansion, Escorts Scandal, Bisignani, ) Recently, IEEE published a very interesting graph, from which all of us may eventually learn something

16 IEEE Hacking Matrix

17 Cybercrime: drivers QUESTION: May we state that cybercrime along with its many, many aspects and views can be ranked as #1 in rising trend and global diffusion? ANSWER(S): Given that all of you are attendees and speakers here, I would say that we already are on the right track in order to analyze the problem Nevertheless, some factors exist for which the spreading of e-crime- based attacks relays. Let s take a look at them.

18 Reasons/1 1. There are new users, more and more every day: this means the total amount of potential victims and/or attack vectors is increasing. Thanks to broadband Making money, somehow and straight away. Worldwide economics falldown 3. Technical know-how public availability & 0-days, Internet distribution system / ready-to-go, even when talking about Black Markets average-high skills: that s what I named hacking g pret-à-porter po te

19 Darkness DDoS botnet

20 Reasons/2 4. It s extremely easy to recruit idiots and set up groups, molding those adepts upon the bad guy s needs (think about e-mules) Newbies, Script Kiddies 5. They will never bust me Psychology, Criminology 6. Lack of violent actions Psychology and Sociology

21 Hacking eras & Hackers generations

22 Things changed First generation (70 s) was inspired by the need for knowledge. Second generation ( ) was driven by curiosity plus the knowledge starving: the only way to learn OSs was to hack them; later ( ) hacking becomes a trend. The Third one (90 s) was simply pushed by the anger for hacking, meaning a mix of addiction, curiosity, learning new stuff, hacking IT systems and networks, exchanging info with the underground community. Here we saw new concepts coming, such as hacker s e-zines (Phrack, 2600 Magazine) along with BBS. Fourth generation (2000-today) is driven by angerness and money: often we can see subjects with a very low know-how, thinking that it s cool & bragging being hackers, while they are not interested in hacking & phreaking history, culture and, $ ethics. Here hacking meets with politics (cyber-hacktivism) or with the criminal world (cybercrime).

23 Welcome to HPP

24 WHAT IS (HPP V1.0) The biggest research ever made on the hacking world Started back in 2004, hackers interviewed 9 emerged profiles, among which: Industrial Spy Government Hacker Military Hacker Composed by 8 research phases, which encompass historical, psycological, behaviour, social and technological aspects, into a multidisciplinary approach Includes theorical and field analysis Final goal is to build a methodology that gets as input hacking actions evidences (web defacement, data breach, etc..) and gives back the profile of the attacker Final methodology will be available to everyone under FDL licence set

25 The Hackers Profiling Project (HPP) Project phases starting: September Theoretical collection: Questionnaire, Existing literature 2 Observation: Participation in IT underground security events 3 - Filing: Database for elaboration/classification of data (phase 1/phase 4) 4 - Live collection: Highly customized, new generation Honeynet systems 5 Gap analysis: data from: questionnaire, honey-net, existing literature 6 HPP live assessment of profiles and correlation of modus operandi through data from phase 4 7 Final profiling: Redefinition/fine-tuning of hackers profiles used as de-facto standard 8 Diffusion of the model: elaboration of results, publication of the methodology, raising awareness

26 The Hackers Profiling Project (HPP) Profiling Hackers the book

27 The Hackers Profiling Project (HPP) Evaluation and correlation standards Modus Operandi (MO) Lone hacker or as a member of a group Motivations Selected targets Relationship between motivations and targets Hacking career Principles of the hacker's ethics Crashed or damaged systems Perception of the illegality of their own activity Effect of laws, convictions and technical difficulties as a deterrent

28 The Hackers Profiling Project (HPP) Detailed analysis and correlation of profiles table #1

29 Hackers and Governments "In the very near future many conflicts will not take place on the open field of battle, but rather in spaces on the Internet, fought with the aid of information soldiers, that is hackers. This means that t a small force of hackers is stronger than the multi-thousand force of the current armed forces. Former Duma speaker Nikolai Kuryanovich, 2007

30

31

32 Hackers as a National Resource? In the last year I ve dig into a research from an Hungarian security researcher from HP His idea was weird! Should we consider hackers as the enemy / troubles Or, may they represent an opportunity for Governments?? Patriot s Hackers Think about bloggers and North Africa / GCC Area (Gulf Countries) Think about IRAN and Twitter See the potentialities?

33 Lesson to learn USA has billions of dollars for hacking and you? Officials said China and Russia also have many hackers and you? If you (officially) don t have cyber corps, use your youth movement! Fonte: Hackers in the national cyber security, Csaba Krasznay, HP: Hacktivity 2010, Ungheria.

34 Hackers as resource: a survey Coordination with hackers (from a Government Point of View): the big questions: Can we trust in hackers? Where can we find these experts? How can we gain their trust? How much money do we need for the cooperation? How can we cooperate with them? What can they really do?? How can we control them? Source: Hackers in the national cyber security, Csaba Krasznay, HP: Hacktivity 2010, Hungary.

35 The Hackers Profiling Project (HPP) Detailed analysis and correlation of profiles table #2 OFFENDER ID LONE / GROUP HACKER TARGET MOTIVATIONS / PURPOSES Wanna Be Lamer 9-16 years GROUP End-User For fashion, It s cool => to I would like to be a boast and brag hacker, but I can t Script Kiddie years The script boy GROUP: but they act alone SME / Specific security flaws To give vent of their anger / attract mass-media attention Cracker years The destructor, burned ground LONE Business company To demonstrate their powe / attract mass-media attention Ethical Hacker years The ethical hacker s world LONE / GROUP (only for fun) Vendor / Technology For curiosity (to learn) and altruistic purposes Quiet, Paranoid, Skilled Hacker years The very specialized and paranoid attacker LONE On necessity For curiosity (to learn) => egoistic purposes Cyber-Warrior years The soldier, hacking for money LONE Symbol business company / End-User For profit Industrial Spy years Industrial espionage LONE Business company / Corporation For profit Government Agent years CIA, Mossad, FBI, etc. LONE / GROUP Government / Suspected Terrorist/ Strategic company/ Individual Espionage/ Counter-espionage Vulnerability test Activity-monitoring Military Hacker years LONE / GROUP Government / Strategic Monitoring / company controlling / crashing systems

36 HPP-NG The HPP started in We ve been observing the hacker s ecosystem since nearly 7 years... In 2005 and 2007, we ve testimonied dramatic changes and cross-links, as well as new moods in the hacking underground, along with totally new actors including the raise of Organized Crime involvement. And, something else is on-going now: Information Warfare (and Cyberwar..?) YES: we did know the hacking world just follows up (or, it s steps ahead) to technology s evolution. NO: we didn t expect all of what has happened (but most of!)

37 HPP-NG Lesson learned: Technology impacts on: Social Life Digital Life Personal economy Company s Business National Security Much, much more The original HPP goals were consequently missing something : our 9 Hacker s Profiles didn t include them (but they d fit in existing categories). We had a stop for some time. We built HPP 2.0. And we re starting once again. Also, this is the very first time we re disclosing HPP 2.0 in public.

38 Next enhancements 1. Wannabe Lamer 2. Script kiddie: under development (Web Defacers, DDoS, links with distributed teams i.e. Anonymous.) 3. Cracker: under development (Hacking on-demand, outsourced ; links with Organized Crime) 4. Ethical hacker: under development (security researchers, ethical hacking groups) 5. Quiet, paranoid, skilled hacker (elite, unexplained hacks?) 6. Cyber-warrior: to be developed 7. Industrial spy: to be developed (links with Organized Crimes & Governments i.e. The Comodo and DigiNotar hacks?) 8. Government agent: to be developed ( N countries..) 9. Military hacker: to be developed (India, China, N./S. Korea, etc.)

39 Enhancements/2 Going after Cybercriminals: Kingpins & Master minds (the Man at the Top ) Organized Crime MO, Business Model, Kingpins How To Techies hired by the Organized Crime (i.e. Romania & skimming at the very beginning; Nigerian cons; Ukraine Rogue AV; Pharma ADV Campaigns; ESTDomains in Estonia; etc..) Structure, Infrastructures (links with Govs & Mils?) Money Laundering: Follow the money (E-mules & new ways to cash-out ) Outsourcing: malware factories (Stuxnet? DuQu??)

40 Understanding Hackers It s extremely important that we understand the so-called hacker s behaviours Don t limit yourself to analyse attacks and intrusion techniques: let s analyze their social behaviours. Try to identify those not-written rules of hacker s subculture. Explore hacker s social organization. Let s zoom on those existing links between hacking hacktivism Let s zoom on those existing links between hacking, hacktivism organized crime

41 HPP-NG ( ) Running R&D on these topics is pretty hard Even if, our research is a matter of study and analysis at FBI Academy and EUROPOL Finally, we had been able to jump out from the stucked Phases 1 & 2 Thanks to Unicredit Bank Group Possibly thanks to more, upcoming Donors We still need more Sponsors, Donors + People believing in what we are doing (Misha is helping us out on this ;) Sponsors may be stealth too (no public disclose). it/emerging crimes/cybercrime/initiatives/proposals php

42 Misha Glenny (Author of McMafia, Dark Market ) while speaking about HPP at TED 2011

43 The Dark Links

44 Human Organs trafficking September 2010, Asti (North-West of Italy) Police was eavesdropping on phone calls from and to the Capo dei Capi of a Nigerian gang, specialized in cloned credit cards and elite cars theft. In one of this calls, a guy said to the Boss: the Kidneys are ready. So what we have here? Organized Crime buying Human Organs from Nigeria So, what we have here? Organized Crime buying Human Organs from Nigeria using the money gathered from cybercrime then selling into EU (!).

45 Coke for cards? March/May 2010, Turin (North-West of Italy) Turin has got the biggest Romania s community of Italy. We also have a very big Nigeria s community. Historically, Romenian gangs g drive the business of ATM skimmers and Nigerian the Cocaine business. After a joined FBI/US Secret Service/Interpol/Italian Postal Police operation, the Romanians decided to sell the business to Nigerians. Cloned cards were paid with Cocaine. This happens because the Romenians also run the prostitutes business and, prostitute s customers want coke as well. Compared to these guys, Scarface was nearly a kid

46 Final toughts The hacking world has not always been linked to those true criminal actions. Those researches carried out until now, have not properly snapshot the hacking world and its tunings. At the same time, nowaday s hacking is moving (transforming?) towards (global) crime. And, different elements began working together (as we ve just stated on the two previous slides). Cybercrime and Underground Economy problem is not a tech-people issue : rather, it is an issue for ALL of us, representing an impact on the countries ecosystem that could reveal itself as devastating. Also, forget fighting cybercrime on your own: you just can t. That s why our last slides ( Extra Material section) are on cybercrime s answers That s why our last slides ( Extra Material section) are on cybercrime s answers and VTFs (Virtual Task Forces).

47 And...a gift for you all here! Get your own, FREE copy of F3 (Freedom from Fear, the United Nations magazine) issue #7, totally focused on Cybercrimes! DOWNLOAD: Or, me and I will send you the full PDF (10MB)

48 Books References

49 Must-read books / 1 During the different phases of bibliography research, the Authors have made reference (also) to the following publications and on-line resources: H.P.P. P Questionnaires Dark Market: Cyberthieves, Cybercops and YOU,, by Misha Glenny, The Bodely Head, 2011 Zero Day (A novel), by Mark Russunovich, Thomas Dunne Books, St. Martin s Press, 2011 The Kingpin, by Kevin Poulsen, 2011 CY83R Terror: the Hidden Crime, by Vaidehi Sachin & Amarjit Singh, NBC Mumbai (India), 2010 Fatal System Error: the Hunt for the new Crime Lords who are bringing down the Internet, Joseph Menn, Public Affairs, 2010 Stealing the Network: How to 0wn a Continent, (an Identity), (a Shadow) (V.A.), Syngress Publishing, 2004, 2006, 2007 Stealing the Network: How to 0wn the Box, (V.A.), Syngress Publishing, 2003 Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier, Suelette Dreyfus, Random House Australia, 1997 The Cuckoo s Egg: Tracking a Spy Through the Maze of Computer Espionage, Clifford Stoll, DoubleDay (1989), Pocket (2000) Masters of Deception: the Gang that Ruled Cyberspace, Michelle Stalalla & Joshua Quinttner, Harpercollins, 1995 Kevin Poulsen, Serial Hacker, Jonathan Littman, Little & Brown, 1997 Takedown, John Markoff and Tsutomu Shimomura, Sperling & Kupfler, (Hyperion Books), 1996 The Fugitive Game: online with Kevin Mitnick, Jonathan Littman, Little & Brown, 1997 The Art of Deception, Kevin D. Mitnick & William L. Simon, Wiley, 2002 The Art of Intrusion, Kevin D. Mitnick & William L. Simon, Wiley, 2004

50 Must-read books / Large: the Strange Case of the World s Biggest Internet Invasion, Charles Mann & David Freedman, Touchstone, 1998 The Estonia attack: Battling Botnets and online Mobs, Gadi Evron, 2008 (white paper) Who is n3td3v?, by Hacker Factor Solutions, 2006 (white paper) Mafiaboy: How I cracked the Internet and Why it s still broken, Michael Calce with Craig Silverman, 2008 The Hacker Diaries: Confessions of Teenage Hackers, Dan Verton, McGraw-Hill Osborne Media, 2002 Cyberpunk: Outlaws and Hackers on the Computer Frontier, Katie Hafner, Simon & Schuster, 1995 Cyber Adversary Characterization: auditing the hacker mind, Tom Parker, Syngress, 2004 Inside the SPAM Cartel: trade secrets from the Dark Side, by Spammer X, Syngress, 2004 Hacker Cracker, Ejovu Nuwere with David Chanoff, Harper Collins, 2002 Compendio di criminologia, Ponti G., Raffaello Cortina, 1991 Criminalità da computer, Tiedemann K., in Trattato di criminologia, medicina criminologica e psichiatria forense, vol.x, Il cambiamento delle forme di criminalità e devianza, Ferracuti F. (a cura di), Giuffrè, 1988 United Nations Manual on the Prevention and Control of Computer-related related Crime, in International Review of Criminal Policy Nos. 43 and 44 Criminal Profiling: dall analisi della scena del delitto al profilo psicologico del criminale, Massimo Picozzi, Angelo Zappalà, McGraw Hill, 2001 Deductive Criminal Profiling: Comparing Applied Methodologies Between Inductive and Deductive Criminal Profiling Techniques, Turvey B., Knowledge Solutions Library, January, 1998 Malicious Hackers: a framework for Analysis and Case Study, Laura J. Kleen, Captain, USAF, US Air Force Institute of Technology Criminal Profiling Research Site. Scientific Offender Profiling Resource in Switzerland. Criminology, Law, Psychology, Täterpro

51 Must-read books / 3 Profiling Hackers: the Science of Criminal Profiling as applied to the World of Hacking ISBN:

52 Questions? Contacts, Q&A Raoul Chiesa Thanks folks! UNICRI Cybercrime Home Page:

53 Extra Material

54 The hackpies

55 The Hackers Profiling Project (HPP) The HACKPIES :)

56 The Hackers Profiling Project (HPP) The HACKPIES :)

57 The Hackers Profiling Project (HPP) The HACKPIES :)

58 The Hackers Profiling Project (HPP) The HACKPIES :)

59 The Hackers Profiling Project (HPP) The HACKPIES :)

60 The Hackers Profiling Project (HPP) The HACKPIES :)

61 The Hackers Profiling Project (HPP) The HACKPIES :)

62 The Hackers Profiling Project (HPP) The HACKPIES :)

63 The Hackers Profiling Project (HPP) The HACKPIES :)

64 The response to Cybercrime

65 Cybercrime: the answers Cybercrime is typically a transnational crime, borderless, that includes so many actors and different roles. That s why you just can t think about a single answer. Instead, it is necessary to think and act in a distributed approach, creating Virtual Task Forces (VTFs). It is essential the collaboration among Law Enforcement, Internet community, Finance sector, ISPs and carriers (voice & data), vertical groups, in order to identify a specific group, malware or facilitator. From the investigative point of view, challenges are the following: Analyze the malware Map the infrastructure Eavesdrop/Intercept/Sniff the communication and/or the links Explore the executed attacks Identify the developers and its crime-rings.

66 Vertical Groups & VTFs That s why, along these years, Vertical Groups have been raised, among which we can list the following: Team Cymru APWG Anti Phishing Working Group IEEE-SA Shadow Server Foundation UNICRI Emerging Crimes Unit Host Exploit Cyberdefcon.. working along with : INTERPOL EUROPOL Hi-Tech Crimes groups into each National LEAs

Security Culture: to learn MORE

Security Culture: to learn MORE Security Culture: to learn MORE 1 Reading Room /1 Spam Nation: the inside story of Organized Cybercrime, from Global epidemic to your front door, Brian Krebs, 2014 Kingping: How One Hacker Took over The

More information

real data, real experiences, wrong myths and the

real data, real experiences, wrong myths and the Profiling Hackers: real data, real experiences, wrong myths and the Hackers Profiling Project (HPP) Presentation by Raoul Chiesa Senior Advisor, Strategic Alliances & Cybercrime Issues Human Traficking

More information

Managing Security of the Grid in the Cloud

Managing Security of the Grid in the Cloud Managing Security of the Grid in the Cloud Raoul Chiesa, Senior Advisor on Cybercrime ECU Emerging Crimes Unit, UNICRI United Nations Interregional Crime and Justice Research Institute (UNICRI) Disclaimer

More information

The Hackers Profiling Project (HPP)

The Hackers Profiling Project (HPP) Presentation by Raoul Chiesa United Nations, Consultant on cybercrime Interregional Crime and Justice Research Institute (UNICRI) Counter Human Trafficking and Emerging Crimes Unit What is UNICRI? A United

More information

The Underground Economy. (with a zoom on Bitcoins)

The Underground Economy. (with a zoom on Bitcoins) The Underground Economy Raoul «Nobody» Chiesa (with a zoom on Bitcoins) Partner, President, SECURITY BROKERS SCpA Permanent Stakeholders Group, ENISA (2010-2015) Founder, Board of Directors, Technical

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

Data Breaches, Data Leaks, Web Defacements: why secure coding is important.

Data Breaches, Data Leaks, Web Defacements: why secure coding is important. Data Breaches, Data Leaks, Web Defacements: why secure coding is important. Raoul «Nobody» Chiesa Founder, President, Security Brokers The speaker President, Founder, The Security Brokers Principal, CyberDefcon

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

stéphane koch internet & information strategy advisor online reputation management

stéphane koch internet & information strategy advisor online reputation management stéphane koch internet & information strategy advisor online reputation management 2 P O L I T I C A L E N V I R O N M E N T Cybercrime ECONOMY INFRA- STRUCTURE MILITARY Innovation Info Ops / Information

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime The Global Polity Cybercrime, Cybersecurity and the Future of the Internet The Challenges Cybercrime is now the fastest growing sector of cross-border organized crime. In 2009, reported losses in the US

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1. Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics

Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1. Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1 Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics Robert Olson The College of St. Scholastica INFORMATION TECHNOLOGY,

More information

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers Agenda Introductions The rise of machine-based identities

More information

Vulnerability Assessment & Compliance

Vulnerability Assessment & Compliance www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats

More information

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION

More information

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function

More information

Cyber Terrorism: wrong assumptions & true facts + what I hope will never happen. Raoul «Nobody» Chiesa President, Security Brokers

Cyber Terrorism: wrong assumptions & true facts + what I hope will never happen. Raoul «Nobody» Chiesa President, Security Brokers Cyber Terrorism: wrong assumptions & true facts + what I hope will never happen. Raoul «Nobody» Chiesa President, Security Brokers Disclaimer The information contained within this presentation do not infringe

More information

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011 Europol Cybercrime Centre The perspective of Europol on Cybercrime Courmayeur Mont Blanc, Italy, 2-4 December 2011 The Threat The threat from cybercrime is multi-dimensional, targeting citizens, businesses,

More information

Keren Elazari Hackers: The Internet s Immune System

Keren Elazari Hackers: The Internet s Immune System Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think

More information

DISCLAIMER AND NOTICES

DISCLAIMER AND NOTICES DISCLAIMER AND NOTICES The opinions expressed in this presentation are those of the author and presenter alone. They do not represent the views of any other entity. Nothing in this presentation should

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

Not-For-Profit Finance Forum Westpac New Zealand Limited

Not-For-Profit Finance Forum Westpac New Zealand Limited Not-For-Profit Finance Forum Westpac New Zealand Limited Managing Fraud insights from a consumer banking perspective Claire Smollett Investigations Manager - Financial Crime Management Hayley Muong Senior

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Ethical Hacking Introduction

Ethical Hacking Introduction Ethical Hacking Introduction Table of Contents What Is "Ethical Hacking"?... 2 Why Perform "Ethical Hacking"?... 6 The Certified Ethical Hacker (CEH)... 9 Information Security Reports... 10 Internet Crime

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Cyber Crime Research. Presentation by the Australian Institute of Criminology. Dr Russell G Smith Principal Criminologist

Cyber Crime Research. Presentation by the Australian Institute of Criminology. Dr Russell G Smith Principal Criminologist Cyber Crime Research Presentation by the Australian Institute of Criminology Dr Russell G Smith Principal Criminologist The Australian Institute of Criminology Australia's national research and knowledge

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

How Economics and Information Security Affects Cyber Crime and What This Means in the Context of a Global Recession. Turbo Talk BH 2009 Peter Guerra

How Economics and Information Security Affects Cyber Crime and What This Means in the Context of a Global Recession. Turbo Talk BH 2009 Peter Guerra How Economics and Information Security Affects Cyber Crime and What This Means in the Context of a Global Recession Turbo Talk BH 2009 Peter Guerra Full Disclosure My opinions only not of my University,

More information

Surviving the Ever Changing Threat Landscape

Surviving the Ever Changing Threat Landscape Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state

More information

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

Here are several tips to help you navigate Fairfax County s legal system.

Here are several tips to help you navigate Fairfax County s legal system. Since 2004, I ve been a daily presence in the Fairfax County Courthouse and have handled hundreds of drug cases as both a Prosecutor and a Defense Attorney. I have spent the last decade analyzing the legal

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Cybercrime Security Risks and Challenges Facing Business

Cybercrime Security Risks and Challenges Facing Business Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range

More information

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510 TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated

More information

FBI CHALLENGES IN A CYBER-BASED WORLD

FBI CHALLENGES IN A CYBER-BASED WORLD FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top

More information

Intro The Speaker. Raoul Chiesa

Intro The Speaker. Raoul Chiesa Cloud Security, from an Hacker s Perspective ( 从 专 业 视 角 看 云 安 全 ) Raoul Nobody Chiesa Founder, Partner, Security Brokers Principal, Cyberdefcon Ltd. Founder, Owner, @ Mediaservice.net Perugia, July 23,

More information

BUSINESS SURVEYS 2015

BUSINESS SURVEYS 2015 February 2016 BUSINESS SURVEYS 2015 The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers CONTENTS Executive summary............................

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Cyber Security Threats: What s Next and How Do We Reduce the Risks?

Cyber Security Threats: What s Next and How Do We Reduce the Risks? Cyber Security Threats: What s Next and How Do We Reduce the Risks? Agenda Cyber Security: A necessity! What threats exist today? What does the future hold? How do we reduce the risks? Key for Risk Reduction

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

EY Cyber Security Hacktics Center of Excellence

EY Cyber Security Hacktics Center of Excellence EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

Information Security. CS526 Topic 1

Information Security. CS526 Topic 1 Information Security CS 526 Topic 1 Overview of the Course 1 Today s Security News Today: 220 million records stolen, 16 arrested in massive South Korean data breach A number of online gaming & movie ticket

More information

WHITEPAPER: CYBER CRIMINALITY. Cyber Criminality. Is Your Worst Nightmare Coming True?

WHITEPAPER: CYBER CRIMINALITY. Cyber Criminality. Is Your Worst Nightmare Coming True? WHITEPAPER: CYBER CRIMINALITY Cyber Criminality Is Your Worst Nightmare Coming True? 010111010100010101010111101010110101 0 001101011101010001010101011110101 0011010111010100010101011 110101011110101 0011011000101010010101010111101010101110001010101011110101

More information

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc. Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter

More information

As a prereading activity, have students complete an anticipation guide structured in the following manner:

As a prereading activity, have students complete an anticipation guide structured in the following manner: A Curriculum Guide for Evil Spy School By Stuart Gibbs About the Book During a spy school game of Capture the Flag, twelve-year-old Ben Ripley somehow accidentally shoots a live mortar into the principal

More information

Federal Bureau of Investigation

Federal Bureau of Investigation Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Brief Introduction Lecture#1 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Blog https://mazharhussainatisp.wordpress.com/ Grading Policy Classification

More information

What happens when you swipe your card?

What happens when you swipe your card? What happens when you swipe your card? As hacking of top retailers make headlines, Bill Whitaker discovers how insecure your credit card information is this holiday season The following is a script of

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

1 Hack-x-crypt UJJWAL SAHAY

1 Hack-x-crypt UJJWAL SAHAY 1 Hack-x-crypt UJJWAL SAHAY 2 Hack-x-crypt By: - UJJWAL SAHAY {ETHICAL HACKER} 3 Hack-x-crypt LEGAL DISCLAIMER Any proceedings or activities regarding the material contained within this volume are exclusively

More information

How do we Police Cyber Crime?

How do we Police Cyber Crime? How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

Topic 1 Lesson 1: Importance of network security

Topic 1 Lesson 1: Importance of network security Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

Testimony of. Steven R. Chabinsky. Jointly before the United States House of Representatives Committee on Science, Space, and Technology

Testimony of. Steven R. Chabinsky. Jointly before the United States House of Representatives Committee on Science, Space, and Technology Testimony of Steven R. Chabinsky Jointly before the United States House of Representatives Committee on Science, Space, and Technology Subcommittee on Oversight and Subcommittee on Research and Technology

More information

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting

More information

IT Security Community

IT Security Community IT Security Community Who are we? The CompTIA IT Security is a group focused on the changing security issues of today. Who should join? Anyone looking to stay current with the ever- changing security landscape.

More information

Collateral Effects of Cyberwar

Collateral Effects of Cyberwar Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

What s Hot and What s Not in the World of Cyber Security and Cyber Crime

What s Hot and What s Not in the World of Cyber Security and Cyber Crime Department of Technology, Management & Budget (DTMB) What s Hot and What s Not in the World of Cyber Security and Cyber Crime Dan Lohrmann, Chief Technology Officer Department of Technology, Management

More information

Behind of the Penetration testing. J@50n L33

Behind of the Penetration testing. J@50n L33 Behind of the Penetration testing J@50n L33 AGENDA 1. WHO I AM!! 2. PENETRATION TESTING 3. WHY DO YOU NEED THE PENETRATION TESTING 4. HOW DO YOU PERFORM THE PENETRATION TESTING 5. WHAT ABOUT THIS, THERE

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Best Practices: Reducing the Risks of Corporate Account Takeovers

Best Practices: Reducing the Risks of Corporate Account Takeovers Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States

More information

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa SECURING THE DIGITAL DIVIDE: COMBATING CYBERCRIME Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa INTRODUCTION q Given modern

More information

Service and anonymisation.

Service and anonymisation. THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2014 9 EXECUTIVE SUMMARY The Internet Organised Crime Threat Assessment (iocta) informs decision makers at strategic, policy and tactical levels about

More information

ICT Barriers, High Tech Crime, and Police

ICT Barriers, High Tech Crime, and Police ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College

More information

Presented by: Islanders Bank

Presented by: Islanders Bank Presented by: Islanders Bank Cybersecurity Awareness Cybersecurity Awareness Objectives: Define Cybersecurity & why it s important Provide information about Dept. Homeland Security Cybersecurity Campaigns:

More information

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:

More information

1 Billion Individual records that were hacked in 2014 3.

1 Billion Individual records that were hacked in 2014 3. 783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just

More information

The Third Rail: New Stakeholders Tackle Security Threats and Solutions

The Third Rail: New Stakeholders Tackle Security Threats and Solutions SESSION ID: CXO-R03 The Third Rail: New Stakeholders Tackle Security Threats and Solutions Ted Ross Director, Threat Intelligence HP Security Research @tedross Agenda My brief background An example of

More information

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical Crime and Cybercrime An act committed or omitted in violation of a law forbidding or commanding it and for which punishment is imposed upon conviction http://www.thefreedictionary.com/crime Deviant behavior

More information

Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com

Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com About ethical hacking Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information

More information

Security Threat Awareness How to protect yourself, your family, and your company. Dial-in Info: 1-888-634-4837 Conference ID 30366898

Security Threat Awareness How to protect yourself, your family, and your company. Dial-in Info: 1-888-634-4837 Conference ID 30366898 Security Threat Awareness How to protect yourself, your family, and your company Tuesday, January 21, at 3:00 PM EDT Dial-in Info: 1-888-634-4837 Conference ID 30366898 Thanks for joining us! The webinar

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information