Technology Crime Services
|
|
|
- Geraldine Ellis
- 10 years ago
- Views:
Transcription
1 Technology Crime Services
2 Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime
3 Traditional Policing Targeted Patrols Prolific and Priority Offenders (PPOs) (20% of offenders commit 80% of crime) Intelligence Lead Policing
4 Issues arising with the internet Resources Anonymity/Identification of PPOs
5 A possible solution Honeypots Reporting framework
6 Honeypots and their benefits Neighbourhood watch for the internet
7 Honeypots and their benefits Companies can report incidents without being a victim of a crime
8 Honeypots and their benefits Enhance security for a Company
9 Honeypots and their benefits Data value Reports & Statistics
10 Honeypots and their benefits Ties up the resources of attackers
11 Honeypots and their benefits Information shared: Police can follow up via Intelligence Criminal prosecution
12 Reporting activity
13 Considerations 440A Criminal Code (WA): Unlawful use of computers Max imprisonment for 10 years
14 Considerations restricted-access computer system (a) the use of a password is necessary (b) Knowledge of password (i) has withheld knowledge of the password, or the means of producing it, from all other persons; or (ii) has taken steps to restrict knowledge of the password,
15 Considerations Further considerations: Get in touch with us
16 Presentation Summary A police prospective on: Responding to a Technology Crime Event Making your company Technology Crime Resistant
17 Background ANZPAA (Australian New Zealand Policing Advisory Agency) is the body which represents all police agencies within Australia, these guides are the national police position. The thrust of the guidelines address the weaknesses police identify during contact with victims and undertaking investigations.
18 Our role Investigate serious and complex technology enabled crime matters and prosecute offenders. Manage Cyber Attacks and Critical infrastructure threats. Provide the Western Australia Police, community and victims with expert technical services and advice. National and International representation relating to Cybercrime investigation. Manage ACORN (Australian Cybercrime Online Reporting Network) for Western Australia.
19 Responding to a Tech Crime event These are the most significant issues Police encounter when responding to Cyber Crime Events. If implemented by business, the following cybercrime response practices will help protect business and support a Police investigation.
20 Responding to a Tech Crime event Develop and document cybercrime incident response, policies and procedures. Ensure the business areas responsible for responding to cybercrime events, use these policies and procedures. Identify the Technology Crime Police responsible for your jurisdiction.
21 Responding to a Tech Crime event KEY POINTS Corporate Position Incident Response Infrastructure Instructions to record events and actions as they occur Instructions to secure the evidence Instructions to notify Police of the event
22 Tech Crime resistant business This information guide describes what Police recommend a business should implement. It deals with the most significant vulnerabilities and issues Police encounter.
23 Tech Crime resistant business KEY POINTS Processes Identify and secure critical data, systems and rights Identify and manage social engineering vulnerabilities
24 Tech Crime resistant business
25 Tech Crime resistant business
26 Tech Crime resistant business Dan Blackman Technical Advisor Technology Crime Services Chris Boudewyns Detective Sergeant Team Leader Technology Crime Investigations
Standing Council on Police and Emergency Management
Standing Council on Police and Emergency Management Communiqué 29 June 2012 The Standing Council on Police and Emergency Management (SCPEM) met in Melbourne today, chaired by the Hon Peter Ryan MLA, Deputy
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
Gender Bias in the Law Catherine Fletcher State Prosecutor, Office of the Director of Public Prosecutions, Western Australia
Australian Women Lawyers 5 th National Conference 3-5 October 2014, Adelaide South Australia Gender Bias in the Law Catherine Fletcher State Prosecutor, Office of the Director of Public Prosecutions, Western
Cyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
Recovering Your Identity. Advice for victims of identity crime
Recovering Your Identity Advice for victims of identity crime How will you know your identity has been stolen? Identity crime is unfortunately very common. Around 1 in 5 Australians have been a victim
Introduction to Cyber Security
Introduction to Cyber Security Hossein Sarrafzadeh HoD Computing Director Cyber Security Centre CS4HS Workshop You are sitting in New Zealand s first joint research centre for cyber security Centre of
The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne
The 2012/3 SA Cyber Threat Barometer Craig Rosewarne An improved cyber security framework for South Africa Research - Initiatives South Africa (Pty) Ltd Stakeholder Risk Management / Alignment to business
FAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police
Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission
CYBER SECURITY STRATEGY AN OVERVIEW
CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without
Model Spent Convictions Bill - Consultation paper
Model Spent Convictions Bill - Consultation paper Background The Standing Committee of Attorneys-General is working on a project to design a national model Bill for a spent-convictions scheme. A spentconvictions
ICT Barriers, High Tech Crime, and Police
ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
Common Misconceptions Surrounding Background Checks. Presented By: Alicia Jones Vice President of Sales backgroundchecks.com
Common Misconceptions Surrounding Background Checks Presented By: Alicia Jones Vice President of Sales backgroundchecks.com Why conduct background checks? Why conduct background checks? Thousands of youth
Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing
KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting
Specific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit
Tackling Cyber Crime in the UK Andy Archibald Deputy Director National Cyber Crime Unit Cybercrime Facts Cost of Cybercrime Reports of cyber crime to Action Fraud increase d by 30% 229 median number of
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
Breakout Session B: Cyber Security and Cybercrime Trends in Africa
Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop
Making a Victim Personal Statement. You have a voice in the criminal justice system and have a right to explain how the crime has affected you
Making a Victim Personal Statement You have a voice in the criminal justice system and have a right to explain how the crime has affected you CONTENTS About this leaflet What is a Victim Personal Statement
Drug Market Intervention Planning and Implementation Process
I. PLANNING PHASE FORMING THE DMI TEAM AND ASSESSING READINESS Who are the necessary team members? a. Police/Sheriff s Department b. Prosecutor s Office c. Influential community member d. Social services
BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM
About the programme Crime and security related matters have become a major concern in modern society. In view of this development, it has become increasingly necessary to enhance the capacity of institutions
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Delivery Plan 2014 15
Delivery Plan 2014 15 Foreword Recorded crime levels have fallen considerably over the last five years but we have also seen changes to the patterns of crime. The delivery plan demonstrates our commitment
Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department
Japan Computer Emergency Response Team Coordination Center 電子署名者 : Japan Computer Emergency Response Team Coordination Center DN : c=jp, st=tokyo, l=chiyoda-ku, [email protected], o=japan Computer
U.S. Cyber Security Readiness
U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National
Appendix A DRAFT INFORMATION MANAGEMENT PLAN
1 Appendix A DRAFT INFORMATION MANAGEMENT PLAN Pacific Region Identity Protection Project PRIPP April 2004 Forum Eyes Only 2 ABBREVIATIONS Throughout this report the following abbreviations will be utilised:
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
Investigations Support
Investigations Support for Fraud and Financial Crimes This document explains how CIFAS information can: support your investigations into any crime type - not just fraud disrupt Organised Criminal Groups
Review of.au domain name policy framework Submission to.auda
Review of.au domain name policy framework Submission to.auda 15 June 2007 Background AusCERT is the national Computer Emergency Response Team (CERT) for Australia and a leading CERT in the Asia/Pacific
National Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In
Cybersecurity in Nepal
Cybersecurity in Nepal Presenter: Ambika Shrestha Chitrakar PhD candidate at Gjøvik University College Representing Nepal Linkedin: https://no.linkedin.com/in/ambikash IFIP TC3 ISES (Information Security
Campus Security and Safety Report Madison Center September, 2015
Campus Security and Safety Report Madison Center September, 2015 This information is being provided to all students and employees as part of Upper Iowa University's - Madison Center commitment to safety
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Security Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
5C R I M I N A L J U S T I C E R E S O U R C E S
5C R I M I N A L J U S T I C E R E S O U R C E S Justice expenditure According to the Report on Government Services (1998), the total government expenditure on justice in 1996/97 was approximately $5.4
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
National Plan to Address Cybercrime
National Plan to Address Cybercrime 2015 Improving our ability to prevent, investigate and respond to cybercrime Contents INTRODUCTION 3 Purpose of the Plan 3 What is cybercrime? 4 The nature of the cybercrime
Legal Aid WA Panels and Lists Membership Criteria
Legal Aid WA Panels and Lists Membership Criteria This document contains the membership criteria for the following panels and lists. Please click on the panel or list you wish to view: Civil Law Panel
Global Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
Violence against women: key statistics
Violence against women: key statistics Research from the 2012 ABS Personal Safety Survey and Australian Institute of Criminology shows that both men and women in Australia experience substantial levels
International Chamber of Commerce The world business organization
International Chamber of Commerce The world business organization ICC Cyber Security Guide for Business World Bank Seminar on Cyber Preparedness Vienna. 18 19 May 2015 Gerard Hartsink Chair ICC Task Force
Pacific Islands Telecommunications Association
Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: [email protected] www.pita.org.fj INVITATION
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard
Challenges in Cybersecurity Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard Agenda National Perspectives & Background WA State Cyber Planning Steady State/Significant
Commonwealth Organised Crime Strategic Framework: Overview
Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart
Module 5: Analytical Writing
Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop
Walking the talk. Marnix Dekker. about the EC as cloud customer. CISO team, European Commission
Walking the talk about the EC as cloud customer Marnix Dekker CISO team, European Commission ENISA: "Security is a driver for cloud" Many technical security opportunities when "going cloud" 1. Geographic
ID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
St. George Police Department
St. George Police Department Fraud/Identity Theft Report Packet ATTENTION: If you are a victim of FRAUD to include the unlawful use or acquisition of your Debit/Credit card, Forgery or Identity Theft (Use
Cyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
COMPUTER MISUSE AND CYBERCRIME ACT
COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
ESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
Department of Home Affairs
GD 2015/0018 Department of Home Affairs POLICING PLAN 2015-2016 April 2015 Foreword by Minister for Home Affairs This is my fourth policing plan as Minister for Home Affairs. The economic backdrop has
2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012
2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit
Briefing on using Injunctions
Briefing on using Injunctions Contents Pros and cons of using injunctions 2 Injunctions for breach of the terms of the tenancy 3 Injunctions for anti-social behaviour or unlawful use of premises 3 Injunctions
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY
MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers
SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS. Harry S Truman College
SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS Harry S Truman College I. MESSAGE FROM THE PRESIDENT DR. REAGAN F. ROMALI Harry S Truman College enrolls more
Audit summary of Security of Infrastructure Control Systems for Water and Transport
V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the
The Police Beats in Brentwood County
Brentwood public meeting November 13 2014 District Profile Brentwood borough is part of the Epping Forest and Brentwood District Policing Area (DPA) which falls under the West Local Policing Area (LPA).
WHISTLEBLOWERS LEGISLATION
Northern Territory Law Reform Committee Report on WHISTLEBLOWERS LEGISLATION Report No. 26 December 2002 2. Recommendations 1. The Committee recommends that, if the Legislative Assembly of the Northern
2015 Information Security Awareness Catalogue
Contents 2015 Catalogue Wolfpack Engagement Model 4 Campaign Drivers 6 Offerings 8 Approach 9 Engaging Content 10 Stakeholder Change Management 12 Bundles 13 Content 14 Grey Wolf -Track compliance with
1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.
Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force
Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009
