Information Technology Crime An overview

Similar documents
The FBI and the Internet

An Overview of Cybersecurity and Cybercrime in Taiwan

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Supply Chain Security Training Needs for Law Enforcement Agencies

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

Eurojust. The European Union s Judicial Cooperation Unit

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

ORGANIZATIONAL STRUCTURE, MANAGEMENT AND POLICIES OF QUEENSLAND POLICE INVOLVED WITH CHILD PROTECTION INVESTIGATIONS

U. S. Attorney Office Northern District of Texas March 2013

Establishing a State Cyber Crimes Unit White Paper

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

South Australia Police POSITION INFORMATION DOCUMENT

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE

INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS

Cybercrime: Improving international cooperation

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

To do Justice, as no one is above the Law nor beneath its protection.

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Information Security Law: Control of Digital Assets.

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

South Australia Police POSITION INFORMATION DOCUMENT

PART 50 BEHAVIOUR ORDERS

In an age where so many businesses and systems are reliant on computer systems,

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Service and anonymisation.

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

Cyber Crime and Data Retention

IP CRIME HIGHLIGHT REPORT 2013/14

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.

1. History In 2003, the Prosecutor-General created the National Anti-Corruption Unit (NACU).

22nd INTERPOL Americas Regional Conference

New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Migration/ Asylum. Co-operation in the field of drugs

The European Response to the rising Cyber Threat

Federal Bureau of Investigation

The EU approach to Cybersecurity and Cybercrime

Försäkringskassan. (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1

Linux and Law Enforcement

OUTCOME OF PROCEEDINGS Customs Cooperation Working Party (Experts meeting and Plenary meeting) on: December 2012 Subject: Summary of discussions

Cyber Crime and Digital Forensics in Japan

Microsoft Cloud Computing Research Centre

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

THE DEPARTMENT OF JUSTICE S EFFORTS TO COMBAT IDENTITY THEFT. U.S. Department of Justice Office of the Inspector General Audit Division

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

International cooperation between law enforcement authorities

ELECTRONIC CRIME STRATEGY

How do we Police Cyber Crime?

Directives and Legislation

FIGHTING INTELLECTUAL PROPERTY FRAUD

As part of their course on law and/or sociology in this module, participants will be able to:

Introduction. Corporate Investigation & Litigation Support

REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, June 2006)

Joint Audit Committee. Warwickshire and West Mercia Police and Crime Commissioner. Criminal Justice Boards

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Asset Tracing. PC.DEL/790/12/Rev.1 4 September Seminar Identifying, Restraining and Recovering Stolen Assets in the OSCE Region Session IV

CASES FORWARDED WITH REGARD TO CORRUPTION

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order /25/2014 9/25/2014

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

PART 3 The Basics 10

Actions and Recommendations (A/R) Summary

Deprivation in the Netherlands & Criminal Assets Deprivation Bureau of the Public Prosecution Service

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

SECTION 10 SUMMARY ORGANISED AND COMPLEX ABUSE

Payment Card Fraud in the European Union Perspective of Law Enforcement Agencies

Ordinary Legislative Procedure

Regulating forensic science in the UK. Andrew Rennison M.Sc.

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

Staffing Positions by Programmes / Sub-Programmes 123

Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,

Classification scheme Criminal law and criminology (STR)

Middle Class Economics: Cybersecurity Updated August 7, 2015

Chapter V of the UNCAC on asset recovery. Dimosthenis Chrysikos UNODC, Vienna

Allocation of Personnel: Investigations William Prummell

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE

STATEMENT OF BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ENTITLED

Republic of Latvia State Police Forensic Service Department

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

Regional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine.

Robert P. Bianchi 5502 Chestermill Court Fairfax, VA (571) FAX (703)

Royal Canadian Mounted Police Cybercrime Strategy

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Modern Slavery Act 2015

Commonwealth Organised Crime Strategic Framework: Overview

We pride ourselves on delivering a timely, professional and effective witness protection service

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

DISTRICT ATTORNEY Michael A. Ramos

The South African Constitution provides that every citizen has the right to choose his trade, occupation or profession freely

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Transcription:

Information Technology Crime An overview Superintendent Stefan Kronqvist National Criminal Investigation Department Information Technology Crime Squad 2002-01-24

Brief organisational overview National Commissioner Säkerhetspolis Security Service Rikskriminalpolis Nat. Criminal Investig. Department Rikspolisstyrelsen National Police Board, adm. part Investigative Branch Intelligence Branch Administrative Branch Foreign missions and the airborne police Information Technology Crime Squad Internet Unit (INSE)

Staff 1 Chief of Squad 2 Deputy Chief of Squad 10 investigators; 5 dealing with operational and forensic cases, 5 dealing with Internet cases 2 Technical advisors 1 clerk Attached personnel for various purposes

Some historical remarks of the Squad FBI-training 1985 and a specially designed domestic training 1986 Operational start 1986 as a part of the NCID Economic Crime Squad ) National Central Reference Point (Interpol NCRP) 1993 Independent NCID unit 1995 Squad 1998 G 8 24/7-service since 1999 Internet unit since 2000

Actions Operational support to local police departments International contacts Training Development of tools and techniques Some intelligence actions Internet surveillance Cooperation with the industry and governmental authorites Hub for a domestic point-of-contact police network

Case flow 1998: appr. 300 cases 1999: appr. 320 cases 2000: 333 cases; investigations, intelligence actions and support to foreign LE agencies Most frequent crime 1998: Aggravated purchasing of drugs, 1999: Serious crimes against life and health 2001: 349 cases

International work Interpol European Working Group On Information Technology and Crime - medverkan since 1993 IOCE - International Organisation On Computer Evidence (Forensics) Cooperation with FBI, CRI m.fl. NCRP - Interpol and G 8 Europol (High Tech Crimes linked to organised crimes) Nordic cooperation Swedish EU- Presidency 2001 The Commission s Action Plan against Cybercrime

The Cybercrime Convention Intitiative from Council of Europe Will hopefully- be adopted november 2001 Will give crossborder investigations more power Will impliment European standards

Training Regional meetings Seminars Basic and advanced training: 12 weeks basic training 3 weeks advanced training

Our way to do it House search and support to search teams Analysis of seized items and data storage media (Forensics) Tracing and identifying of suspected persons in Cyberspace Advises Technical support to various actions

INSE (Internet unit) Established dec 2000 Initial phase 2001: - Tasks, needs and limits - Legal study on some cybercrime issues - Technical project - Recruitment

Other Swedish IT-crime units Available at some local PD EBM (Serious Economic Crime Bureau) SKL (National Forensic Laboratory)

Crimes we deal with All traditional crimes but IT-specialized investigative skill is an absolute need for success Economic Crimes Internet fraud, e-commerce fraud Computer and system intrusions Espionage Violation of Intellectual Property Rights Illegal internet commerce; prostitution, drugs, restricted medicines etc Sexual abuse of minors

Examples of offences Software piracy; distribution via CD-ROM or the Internet, production centrals can be almost industrial Purchasing of various counterfeited items via the Internet Purchasing of parallell production; medicins etc via the Internet Illegal distribution of material protected by copyrights; novels, pictures, music etc, etc via the Internet Crossborder investigative problems

Basis of investigation Cooperation with the victim is important Only the victim knows all details of his/her/their rights Concerning software piracy, facilities from the victim could be necessary An investigative strategy should be considered by the prosecutor and the police investigators (What do we need, must all seized material be examined.?)

Manuals 1. Manuals are not a solution, only a support Manuals can not replace skill or experience Manuals are not law, only guidelines BUT.. Manuals are based on approved methods Manuals decreases international investigative problems Manuals match some irrelevant discussions in court

Manuals 2. Available international manuals on IT-related investigations: 1. Computers and Crime, Interpol. Available at every NCB. Currently updated. 2. Good practice for search and seizure in an ITenvironment. Police Cooperation Working Group, European Council. Not yet finally adopted, but available for interrested parties.

Good Practice Main Chapters of the Manual 3 alternative methods to secure digital evidence 1. There are plans to seize computers 2. There are no plans to seize the hardware, evidence are secured through mirroring on location 3. There are no plans to seize the hardware or to make total mirroring on location; evidence are secured through selective copying

Good Practice Main Chapters of the Manual Before the search During the search After the search

Pocket Guide Appendix to Good Practice Manual What all officers need to know

Trends Organised Crimegang useit-professionals Quick profit creates a new group of criminals Common use of encryption Illegal intelligence of individuals for criminal purposes

Statistics No particular statistics for IT-crime except computer intrusion and computer fraud. Report from National Audit Authority 1997 (95-96) Report from National Council for Crime Prevention 2000 (97-98)

Future The Broadband environment concentrates important system information on a local level= new points for attacks Traditional commerce and cash will be replaced by e-commerce and e-cash= less armed robberies but moreintrusions

Movie Time 1. House search in a Bulletin Board Systemenvironment 2. House search in an extremely complicated technical environment 3. Industrial piracy production of software