Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
|
|
|
- Noreen Parks
- 10 years ago
- Views:
Transcription
1 Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad
2 Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do
3 Infrastructure Protection: Traditional Threat Paradigm Classic Military Threat Foreign Military Antagonist United States Armed Forces
4 The New Cyberspace: Critical Infrastructures Infrastructure Protection: A New Threat Paradigm The New Threats: Anybody
5 FBI Cyber History National Computer Crime Squad» Washington D.C.» Later: New York and San Francisco, then others» Computer Analysis Response Team (CART) Computer Investigations and Infrastructure Protection Center Regional CITA Squads created. National Infrastructure Protection Center (NIPC) created.» Supporting the PCCIP
6 National Infrastructure Protection Center Mission Manage FBI computer intrusion investigations program Detect, deter, assess, warn of, investigate, and respond to attacks on critical infrastructures Fully support the FBI s law enforcement, counterterrorism, and foreign counterintelligence missions Support other agencies and state & local governments involved in infrastructure protection
7 Additional NIPC Roles Share, analyze, and disseminate information Provide training for federal, state and local cyber investigators, and private sector entities involved in the infrastructure protection Clearinghouse for technological developments 24/7 watch and warning capability Support National Security Authorities in acts of terrorism or foreign attacks on U.S. interests
8 Who are today s Cyber Bandits? Hackers (recreational & professional) Cyber Terrorists Intelligence Officers Information Brokers Competitors Insiders
9 Likely Sources of Attack Foreign Government Foreign Corporation Independent Hackers U.S. Competitors Disgruntled Employees
10 Source: Information Week magazine annual security survey, July 12, 1999 Computer Crime Surveys
11 Source: Information Week magazine annual security survey, July 12, 1999 Computer Crime Surveys
12 1999 CSI / FBI Computer Crime Survey 30% reported intrusions from outsiders 55% reported unauthorized access by insiders Total losses exceeded $100 million Dramatic increase in respondents reporting serious incidents to law enforcement (32% from 17% in 1998) Increased use of digital IDs and intrusion detection systems
13 Cases Citibank hack by Vladimir Levin Cyber Terrorism by Mafiaboy Kevin Mitnick The Analyzer Web Page Hacks
14 FBI Case Briefing Vladimir Levin/Citibank Group of Russian hackers led by Vladimir Levin, a 24-year year-old computer expert Targeted Citibank s cash management system by compromising passwords to impersonate account holders Attempted 40 transfers to offshore accounts totaling $10 million, with actual losses of $400,000 2 arrested in U.S., 1 in Israel, and 1 in the Netherlands Levin sentenced to 36 months and ordered to pay restitution
15 FBI Case Briefing MAFIABOY - Feb 2000 DDOS On Feb. 8, 2000, EBAY, ETRADE, CNN.COM, YAHOO!, BUY.COM were subjected to a DDOS Highest Profile DDOS resulting in lost ad sales & interruption costs of several million dollars DDOS conducted from several business, individual & universities computer networks on the Internet FBI Los Angeles identified Michael Calce and provided info to RCMP who obtained voice & data intercepts
16 FBI Case Briefing Tamil Tigers In June, 1997 Tamil Tigers terrorist group hacked into Sheffield University, UK computer network Aim was to spread propaganda and conduct an illegal fund raising scheme via the Internet Terrorists spoofed authorized accounts to carry out the fraudulent fund raising scheme Also launched denial of service attacks against Sri Lanka government systems
17 FBI Case Briefing Kevin Mitnick - Pled guilty March Sentenced to 54 months, 5 years probation, fined $4,125 - $1.5 Million loss to Nokia, Novell, Motorola, Fujitsu, Sun, et. al. - Social engineering - Cult following to Free Kevin - Will be released 1/21/00
18 FBI Case Briefing Handle: Analyzer Name: Hack: Ehud Tenebaum Series of intrusions to U.S. Department of Defense computers from multiple locations.
19 CIA Web Page Hacks
20 DOJ Web Page Hacks
21 Web Page Hacks New York Times plus many more
22 Cyber Law Federal Criminal Statutes Specific Federal Cyber Laws California Penal Code Section 502
23 Possible Federal Violations 18 USC 641 Embezzlement and Theft of Public Money, Property or Records 18 USC 659 Interstate or Foreign Shipments by Carriers 18 USC 793 Gathering, Transmitting, or Losing Defense Information 18 USC 794 Gathering/delivering Defense info to Aid Foreign Government 18 USC 1001 False Statements 18 USC 1029 Fraud and related activity in connection with access devices 18 USC 1030 Computer Fraud and Abuse Act of USC 1366 Destruction of an Energy Facility 18 USC 1343 Fraud by wire, radio, or television 18 USC 1361 Malicious Mischief 18 USC 1831 Economic Espionage Act of USC 2071 Records and Reports: Concealment, removal, or mutilation 18 USC 2155 Sabotage: Destruction of national defense material, national defense premises, or national defense utilities 18 USC 2314 Interstate Transportation of Stolen Property 18 USC 2511 Interception and Disclosure of Wire, Oral, or Electronic Communications
24 Specific Federal Cyber Laws 18 U.S.C Computer Fraud and Abuse 18 U.S.C Economic Espionage 18 U.S.C Industrial Espionage (Theft of Trade Secrets) 18 U.S.C Access Device 18 U.S.C Fraud By Wire No Electronic Theft (NET) Act (strengthening 17 USC 506 and 18 USC 2319)
25 On-Line Resources Federal Bureau of Investigation U.S. Department of Justice Computer Crime and Intellectual Property Section
26 You ve just been hacked. What should you do? What should you NOT do?
27 What You Should Do If Attacked? Notify corporate security, legal counsel, and law enforcement. Activate your incident management team. Created PRIOR to any incident One person in charge One person responsible for evidence. Keep a chronological log of events - record everything your team does.
28 What To Do (continued) Activate all available audit trails & logging. Begin keystroke monitoring (if acceptable). Identify and recover available evidence. System log files, system images, altered/damaged files, intruders files, network logs (routers, SNMP, etc.), traditional evidence. Secure evidence and maintain simple chain-ofcustody records.
29 What To Do (continued) Identify source(s) of the attack. Record specific damages and losses. Prepare for repeat attacks. Theorize - nobody knows your system better than you. Determine how the intrusion happened. Identify possible subjects and motives. Be patient with law enforcement.
30 What NOT To Do Do NOT use the compromised systems before preserving any evidence. Do not make assumptions as to Federal jurisdiction or prosecutorial merit. Do not assume that by ignoring the incident, or damage to your files, that it will go away. Do not correspond via on a compromised network regarding the incident or the investigation.
31 What to Expect if you call the FBI Interview staff and obtain evidence Obtain prosecutive opinion Trace the attack (subpoenas, 2703(d) orders, sources) Identify the subject(s) Obtain/execute search warrants, interview subjects Examine evidence, identify more victims, develop more leads Obtain Federal Grand Jury Indictment Arrest
32 What to Expect if you call the FBI Possible plea bargaining Possible trial Sentencing (if convicted) These steps do NOT occur quickly!
33 Questions? Special Agent Ken McGuire Contact Information: Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad (Squad WCC-3) Wilshire Blvd., Suite 1700 Los Angeles, California Main telephone number: (310)
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY
CSI/FBI 00 COMPUTER CRIME AND SECURITY SURVEY Statement of intent This survey was conducted by the Computer Security Institute (CSI) in association with the San Francisco Computer Crime Squad of the Federal
A Working Definition of Identity Theft
Identity Theft: A Prosecutor s Perspective Jonathan J. Rusch Jonathan J. Rusch Special Counsel for Fraud Prevention Criminal Division, Fraud Section United States Department of Justice Washington, DC 20530
You ve Been Served: What Does the Company Do When a Federal Grand Jury Subpoena Arrives at the Door?
Thursday, April 18, 2013 You ve Been Served: What Does the Company Do When a Federal Grand Jury Subpoena Arrives at the Door? Craig Denney Counsel, Snell & Wilmer L.L.P. ERAI Executive Conference - Orlando,
Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Chad Cutting
Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Chad Cutting Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating
FINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
WHITE-COLLAR CRIMES IN CALIFORNIA DOMENIC J. LOMBARDO
WHITE-COLLAR CRIMES IN CALIFORNIA Although White-Collar Crimes are Non-Violent Offenses They are Criminal Offenses Nonetheless and Can be Punished Just as Harshly as Other, More Well-Known, Crimes; a Basic
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
Case5:09-cr-00928-JF Document64 Filed05/13/10 Page1 of 6
Case:0-cr-00-JF Document Filed0//0 Page of 0 JOSEPH P. RUSSONIELLO (CSBN United States Attorney BRIAN J. STRETCH (CSBN Chief, Criminal Division JEFFREY B. SCHENK (CSBN Assistant United States Attorney
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
White Collar Criminal Defense, Internal Investigations & Corporate Compliance
Butzel Long :: Practice :: Practice Teams :: White Collar Criminal Defense, Internal Investigations & Corporate Compliance Team Contacts David F. DuMouchel Related Lawyers George B. Donnini Damien DuMouchel
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
U.S. Department of Justice. Becoming A. Special Agent. U.S. Department of Justice Office of the Inspector General INVESTIGATIONS DIVISION
U.S. Department of Justice Office of the Inspector General Becoming A Special Agent INVESTIGATIONS DIVISION OFFICE OF THE INSPECTOR GENERAL U.S. Department of Justice The OIG plays an integral role in
Information for Crime Victims and Witnesses
Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy
An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims
Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc.
Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc. Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the House Committee on
ATTACHMENT A AFFIDAVIT. A. Introduction 1. I am a Special Agent of the Federal Bureau of Investigation (FBI) and
ATTACHMENT A AFFIDAVIT I, Kenneth Carl Heitkamp, being duly sworn, depose and state as follows: A. Introduction 1. I am a Special Agent of the Federal Bureau of Investigation (FBI) and have been so employed
Chapter 15 Criminal Law and Procedures
Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures
Federal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
OFFICE OF THE UNITED STATES ATTORNEY SOUTHERN DISTRICT OF CALIFORNIA San Diego, California. United States Attorney Laura E. Duffy
NEWS RELEASE OFFICE OF THE UNITED STATES ATTORNEY SOUTHERN DISTRICT OF CALIFORNIA San Diego, California United States Attorney Laura E. Duffy For Further Information, Contact: For Immediate Release Assistant
OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
IRS Criminal Investigation. Special Agent Christine Shanley Supervisory Special Agent Michael Rivera
IRS Criminal Investigation Special Agent Christine Shanley Supervisory Special Agent Michael Rivera Criminal Investigation Mission CI Services the American public by investigating criminal violations of
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Computer Crime. University of Victoria Department of Computer Science. SENG 401: Social and Professional Issues Computer Crime: Slide 1
Computer Crime Computer Crime: Slide 1 Topics Hacking Online scams Fraud, embezzlement, sabotage, information theft, and forgery Crime fighting vs. Privacy and Civil Liberties Computer Crime: Slide 2 Challenges
From 1984 to 1990, Congress established
U.S. Sentencing Commission One Columbus Circle, N.E. Suite 2-500 Washington, DC 20002-8002 REPORT SUMMARY Summary of Findings Computer Fraud Working Group From 984 to 990, Congress established six new
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Identity Theft Victim Guide
Becoming the victim of identity theft is an emotionally distressing event in anyone s life. This guide is intended to provide some help by suggesting steps you can take to stop the fraudulent use of your
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Preventing Corporate Account Takeover Fraud
Preventing Corporate Account Takeover Fraud Joe Potuzak Senior Vice President Payment Solutions Risk Manager Member FDIC 1 About Our Speaker Joe Potuzak is the Risk Manager for BB&T s Payment Solutions
Pursuit of Liability on Bank Resolution
Pursuit of Liability on Bank Resolution Presentation to the Deposit Insurance Corporation of Japan 8 th Roundtable: Legal Issues on Bank Resolution Fred W. Gibson, Acting Inspector General FDIC March 26,
ACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
OKLAHOMA LAWS RELATING TO IDENTITY THEFT
OKLAHOMA LAWS RELATING TO IDENTITY THEFT Prepared for VICARS by Legal Aid Services of Oklahoma Introduction: OKLAHOMA LAWS RELATING TO IDENTITY THEFT Identity theft takes place when someone uses your personal
INCREASED PENALTIES FOR CYBER SECURITY OFFENSES
Report to the Congress: INCREASED PENALTIES FOR CYBER SECURITY OFFENSES (As required by section 225(c) of the Homeland Security Act of 2002, Public Law 107-296) UNITED STATES SENTENCING COMMISSION May
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
FBI AND CYBER SECURITY
FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.
Tax Refund Fraud and Identity Theft. Jason Bell Supervisory Special Agent
Tax Refund Fraud and Identity Theft Jason Bell Supervisory Special Agent Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating potential criminal
GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.
GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected
As part of their course on law and/or sociology in this module, participants will be able to:
Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart
MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998
INTERNAL REVENUE SERVICE UIL: 9999.92-00 Number: 199911041 Release Date: 3/19/1999 CTMonica January 22, 1999 MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) FROM: Barry J. Finkelstein Assistant
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
FACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Environmental Protection Agency Criminal Investigation Division. Special Agent Benjamin Carr Special Agent Christopher Anderson
Environmental Protection Agency Criminal Investigation Division Special Agent Benjamin Carr Special Agent Christopher Anderson Title 18 Federal Criminal Code Criminal Enforcement Title 18 Federal Criminal
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
CYBERCRIME LAWS OF THE UNITED STATES
CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications
Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group
Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation
Best Practices: Reducing the Risks of Corporate Account Takeovers
Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States
Edward Lowery III. Special Agent in Charge Criminal Investigative Division, U.S. Secret Service. Prepared Testimony
Edward Lowery III Special Agent in Charge Criminal Investigative Division, U.S. Secret Service Prepared Testimony Before the United States Senate Committee on Homeland Security and Governmental Affairs
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
Cybercrime: Challenges for Law Enforcement. Susan Brenner NCR Distinguished Professor of Law & Technology University of Dayton
Cybercrime: Challenges for Law Enforcement Susan Brenner NCR Distinguished Professor of Law & Technology University of Dayton Real-world & cybercrime Current approaches evolved to deal with real-world
BIOTERRORISM RISK ASSESSMENT GROUP (BRAG) FEDERAL BUREAU OF INVESTIGATION CRIMINAL JUSTICE INFORMATION SERVICES DIVISION CLARKSBURG, WEST VIRGINIA
BIOTERRORISM RISK ASSESSMENT GROUP (BRAG) FEDERAL BUREAU OF INVESTIGATION CRIMINAL JUSTICE INFORMATION SERVICES DIVISION CLARKSBURG, WEST VIRGINIA MISSION To enhance national security and public safety
STATEMENT OF JOSEPH S. CAMPBELL ASSISTANT DIRECTOR CRIMINAL INVESTIGATIVE DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE
STATEMENT OF JOSEPH S. CAMPBELL ASSISTANT DIRECTOR CRIMINAL INVESTIGATIVE DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM U.S. HOUSE OF REPRESENTATIVES
Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police
Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
United States Attorney s Office for the District of Oregon. Criminal Discovery Policy
United States Attorney s Office for the District of Oregon Criminal Discovery Policy The discovery obligations of federal prosecutors are generally established by Federal Rules of Criminal Procedure 16
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
UNITED STATES of America, Plaintiff-Appellee, Michael H. TARKOFF, Defendant-Appellant. No. 99-13223. United States Court of Appeals, Eleventh Circuit.
UNITED STATES of America, Plaintiff-Appellee, v. Michael H. TARKOFF, Defendant-Appellant. No. 99-13223. United States Court of Appeals, Eleventh Circuit. Feb. 20, 2001. Appeal from the United States District
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks Dawn M. Cappelli Andrew P. Moore CERT Program Software Engineering Institute Carnegie Mellon University 04/09/08 Session Code:DEF-203
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK
THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK SECURITY AND THEFT OF DATA COVERAGE APPLICATION Name of Insurance Company to which application is made NOTICE: THIS POLICY PROVIDES CLAIMS MADE COVERAGE.
State of New York Office of the Workers Compensation Fraud Inspector General
State of New York Office of the Workers Compensation Fraud Inspector General 2014 Annual Report Andrew M. Cuomo Governor Catherine Leahy Scott Inspector General EXECUTIVE SUMMARY On February 4, 2015, New
Law, Investigations, and Ethics. Ed Crowley 09
Law, Investigations, and Ethics Ed Crowley 09 Topics Computer Laws HIPAA GLB SOX DCMA Computer Ethics Computer Crime Investigations Crime determination Incident response and computer forensics Evidence
WHITE-COLLAR CRIME. Expert Analysis A Brave New World of Electronic Surveillance in White-Collar Investigations?
Westlaw Journal Formerly Andrews Litigation Reporter WHITE-COLLAR CRIME Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 25, ISSUE 9 / JUNE 2011 Expert Analysis A Brave New
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual
GAO INFORMATION SECURITY. FBI Needs to Address Weaknesses in Critical Network
GAO United States Government Accountability Office Report to the Honorable F. James Sensenbrenner Jr., House of Representatives April 2007 INFORMATION SECURITY FBI Needs to Address Weaknesses in Critical
James R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500
INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
Computer Crime & Security Survey
3 rd Japan & US Computer Crime & Security Survey Katsuya Uchida Associate Professor Institute of Information Security [email protected] Graduate School of Information Security Intentionally blank Respondents
