Technology Crime Services



Similar documents
Standing Council on Police and Emergency Management

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Gender Bias in the Law Catherine Fletcher State Prosecutor, Office of the Director of Public Prosecutions, Western Australia

Cyber Security Awareness Workshop

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Recovering Your Identity. Advice for victims of identity crime

Introduction to Cyber Security

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne

FAQs Organised Crime and Anti-corruption Legislation Bill

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

CYBER SECURITY STRATEGY AN OVERVIEW

Model Spent Convictions Bill - Consultation paper

ICT Barriers, High Tech Crime, and Police

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Common Misconceptions Surrounding Background Checks. Presented By: Alicia Jones Vice President of Sales backgroundchecks.com

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Specific recommendations

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

Cyber Security Strategy

2012 CyberSecurity Watch Survey

2012 NORTON CYBERCRIME REPORT

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Making a Victim Personal Statement. You have a voice in the criminal justice system and have a right to explain how the crime has affected you

Drug Market Intervention Planning and Implementation Process

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM

In an age where so many businesses and systems are reliant on computer systems,

Delivery Plan

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department

U.S. Cyber Security Readiness

Appendix A DRAFT INFORMATION MANAGEMENT PLAN

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

Investigations Support

Review of.au domain name policy framework Submission to.auda

National Cyber Crime Unit

Cybersecurity in Nepal

Campus Security and Safety Report Madison Center September, 2015

Into the cybersecurity breach

Establishing a State Cyber Crimes Unit White Paper

Promoting a cyber security culture and demand compliance with minimum security standards;

Security Intelligence

5C R I M I N A L J U S T I C E R E S O U R C E S

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

Seamus Reilly Director EY Information Security Cyber Security

National Plan to Address Cybercrime

Legal Aid WA Panels and Lists Membership Criteria

Global Cybersecurity Index Good Practices

Violence against women: key statistics

International Chamber of Commerce The world business organization

Pacific Islands Telecommunications Association

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard

Commonwealth Organised Crime Strategic Framework: Overview

Module 5: Analytical Writing

Walking the talk. Marnix Dekker. about the EC as cloud customer. CISO team, European Commission

ID Theft Toolkit and Affidavit

St. George Police Department

Cyber Crime and Data Retention

COMPUTER MISUSE AND CYBERCRIME ACT

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

ESKISP Conduct security testing, under supervision

Department of Home Affairs

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Briefing on using Injunctions

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS. Harry S Truman College

Audit summary of Security of Infrastructure Control Systems for Water and Transport

The Police Beats in Brentwood County

WHISTLEBLOWERS LEGISLATION

2015 Information Security Awareness Catalogue

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

S. ll IN THE SENATE OF THE UNITED STATES

Cybercrime: risks, penalties and prevention

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia


Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Transcription:

Technology Crime Services

Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime

Traditional Policing Targeted Patrols Prolific and Priority Offenders (PPOs) (20% of offenders commit 80% of crime) Intelligence Lead Policing

Issues arising with the internet Resources Anonymity/Identification of PPOs

A possible solution Honeypots Reporting framework

Honeypots and their benefits Neighbourhood watch for the internet

Honeypots and their benefits Companies can report incidents without being a victim of a crime

Honeypots and their benefits Enhance security for a Company

Honeypots and their benefits Data value Reports & Statistics

Honeypots and their benefits Ties up the resources of attackers

Honeypots and their benefits Information shared: Police can follow up via Intelligence Criminal prosecution

Reporting activity

Considerations 440A Criminal Code (WA): Unlawful use of computers Max imprisonment for 10 years

Considerations restricted-access computer system (a) the use of a password is necessary (b) Knowledge of password (i) has withheld knowledge of the password, or the means of producing it, from all other persons; or (ii) has taken steps to restrict knowledge of the password,

Considerations Further considerations: Get in touch with us

Presentation Summary A police prospective on: Responding to a Technology Crime Event Making your company Technology Crime Resistant

Background ANZPAA (Australian New Zealand Policing Advisory Agency) is the body which represents all police agencies within Australia, these guides are the national police position. The thrust of the guidelines address the weaknesses police identify during contact with victims and undertaking investigations.

Our role Investigate serious and complex technology enabled crime matters and prosecute offenders. Manage Cyber Attacks and Critical infrastructure threats. Provide the Western Australia Police, community and victims with expert technical services and advice. National and International representation relating to Cybercrime investigation. Manage ACORN (Australian Cybercrime Online Reporting Network) for Western Australia.

Responding to a Tech Crime event These are the most significant issues Police encounter when responding to Cyber Crime Events. If implemented by business, the following cybercrime response practices will help protect business and support a Police investigation.

Responding to a Tech Crime event Develop and document cybercrime incident response, policies and procedures. Ensure the business areas responsible for responding to cybercrime events, use these policies and procedures. Identify the Technology Crime Police responsible for your jurisdiction.

Responding to a Tech Crime event KEY POINTS Corporate Position Incident Response Infrastructure Instructions to record events and actions as they occur Instructions to secure the evidence Instructions to notify Police of the event

Tech Crime resistant business This information guide describes what Police recommend a business should implement. It deals with the most significant vulnerabilities and issues Police encounter.

Tech Crime resistant business KEY POINTS Processes Identify and secure critical data, systems and rights Identify and manage social engineering vulnerabilities

Tech Crime resistant business

Tech Crime resistant business

Tech Crime resistant business Dan Blackman Technical Advisor Technology Crime Services Chris Boudewyns Detective Sergeant Team Leader Technology Crime Investigations technology.crime@police.wa.gov.au www.acorn.gov.au