Technology Crime Services
Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime
Traditional Policing Targeted Patrols Prolific and Priority Offenders (PPOs) (20% of offenders commit 80% of crime) Intelligence Lead Policing
Issues arising with the internet Resources Anonymity/Identification of PPOs
A possible solution Honeypots Reporting framework
Honeypots and their benefits Neighbourhood watch for the internet
Honeypots and their benefits Companies can report incidents without being a victim of a crime
Honeypots and their benefits Enhance security for a Company
Honeypots and their benefits Data value Reports & Statistics
Honeypots and their benefits Ties up the resources of attackers
Honeypots and their benefits Information shared: Police can follow up via Intelligence Criminal prosecution
Reporting activity
Considerations 440A Criminal Code (WA): Unlawful use of computers Max imprisonment for 10 years
Considerations restricted-access computer system (a) the use of a password is necessary (b) Knowledge of password (i) has withheld knowledge of the password, or the means of producing it, from all other persons; or (ii) has taken steps to restrict knowledge of the password,
Considerations Further considerations: Get in touch with us
Presentation Summary A police prospective on: Responding to a Technology Crime Event Making your company Technology Crime Resistant
Background ANZPAA (Australian New Zealand Policing Advisory Agency) is the body which represents all police agencies within Australia, these guides are the national police position. The thrust of the guidelines address the weaknesses police identify during contact with victims and undertaking investigations.
Our role Investigate serious and complex technology enabled crime matters and prosecute offenders. Manage Cyber Attacks and Critical infrastructure threats. Provide the Western Australia Police, community and victims with expert technical services and advice. National and International representation relating to Cybercrime investigation. Manage ACORN (Australian Cybercrime Online Reporting Network) for Western Australia.
Responding to a Tech Crime event These are the most significant issues Police encounter when responding to Cyber Crime Events. If implemented by business, the following cybercrime response practices will help protect business and support a Police investigation.
Responding to a Tech Crime event Develop and document cybercrime incident response, policies and procedures. Ensure the business areas responsible for responding to cybercrime events, use these policies and procedures. Identify the Technology Crime Police responsible for your jurisdiction.
Responding to a Tech Crime event KEY POINTS Corporate Position Incident Response Infrastructure Instructions to record events and actions as they occur Instructions to secure the evidence Instructions to notify Police of the event
Tech Crime resistant business This information guide describes what Police recommend a business should implement. It deals with the most significant vulnerabilities and issues Police encounter.
Tech Crime resistant business KEY POINTS Processes Identify and secure critical data, systems and rights Identify and manage social engineering vulnerabilities
Tech Crime resistant business
Tech Crime resistant business
Tech Crime resistant business Dan Blackman Technical Advisor Technology Crime Services Chris Boudewyns Detective Sergeant Team Leader Technology Crime Investigations technology.crime@police.wa.gov.au www.acorn.gov.au