1 / 28

Practical Issues in dealing with different types of cybercrime

Practical Issues in dealing with different types of cybercrime. Overview. Society Crime Types Resources E-Crime (Electronic Crime) Training Offences Jurisdiction Case studies. Society. Society. Internet Usage

aelwen
Télécharger la présentation

Practical Issues in dealing with different types of cybercrime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Practical Issues in dealing with different types of cybercrime

  2. Overview • Society • Crime Types • Resources • E-Crime (Electronic Crime) Training • Offences • Jurisdiction • Case studies

  3. Society

  4. Society Internet Usage • 50% of Australian adults accessed the Internet in the 12 months to November 2000 • 37% of Australian households were connected to the Internet • 13% of Australian adults paid bills or transferred funds online • 10% of Australian adults purchased or ordered goods or services via the Internet • the value of Internet e-commerce in Australia at June 2000 was estimated to be $A5.1 billion

  5. Society • 10% of Australian adults purchased or ordered goods or services via the Internet • the value of Internet e-commerce in Australia at June 2000 was estimated to be $A5.1 billion • National Office for the Information Economy report entitled. The Current State of Play 2000

  6. Crime Types

  7. Crime Types • Crimes Reported to AFP 2005-2006 • 38% - Drug Importation cases • 34% - Defraud the commonwealth cases • 25% - Child Sex related cases • 3% - Counterfeit currency/documents cases

  8. Crime Types Electronic Crime Incident Type • 45% - E-Crime • 11% - Interpol • 2% - Counter terrorism • 42% - Others (Fraud, Credit Card, Money Laundering)

  9. Crime types • Breakdown of Computer Forensic Work 35% = Child Pornography 20% = Counter Terrorism 10% = Fraud (against the Commonwealth and private) (includes unauthorised access, hacking, unauthorised use of credit cards, make and use false instruments etc) 8% = Child Grooming (using the internet and mobile phones) 5% = Drug Offences 5% = Property Offences (possess stolen property, theft, burglary, armed robbery) 5% = Regional Assistance (referrals from IDG for Solomons, PNG, East Timor etc) 4% = Family Violence/Sexual Assaults etc 3% = Internal Investigations 2% = Homicides 3% = Other

  10. E-Crime Training

  11. E-Crime Training • Continuing cybercrime education from recruit level • E-Crime awareness training • Introduction to E-Crime • Investigate E-Crime • Specialist Crime type training

  12. E-Crime Training • Identify the offence • Identify the suspect • Identify witnesses • Identify the victim

  13. Resources

  14. Resources • Investigators access to resources • AFP’s IT Infrastructure • Access to computers • Covert internet access

  15. Resources • Development of specialist investigative tools eg. Boot cd’s / logicubes

  16. Resources • Support investigative personnel in increasing their technical and investigative skills • Development of specialised computer crime units • Computer Forensic support

  17. Offences

  18. Offences • Is the computer a target of the offence? • Is the computer being used to facilitate the offence?

  19. Jurisdiction

  20. Jurisdiction • The internet is transnational in nature • Who has jurisdiction?

  21. Case Studies

  22. Case Study 1 Problem of Jurisdiction

  23. Case Study 1 • Background Suspect initially resident in Australia then departed overseas. During his stay in Australia the suspect manages to transfer funds from a victims bank account via internet banking to his Australian bank account. The suspect continues with twenty similar offences targeting Australians from his new country.

  24. Case Study 2 Problem of identity theft

  25. Case Study 2 • In 2003 a disgruntled ex Optus employee hacks into a Optus website called “efulfillment.” This website is used by corporate customers of Optus for ordering mobile phones and telecommunication services.

  26. Case Study 3 Problem of identification

  27. Case Study 3 On the 3rd December 2003 an email, directed to David LOWE was received at the RTA Customer Service Centre. The sender wrote: "Unless all traffice infgringements for speeding incurred during the month of June are cancelled immediately, an explosive will be detonated in one of your major facilities. The cancellation of these infringement notices will be done quietly with no public notification. You have 48 hours. This threat is real".

  28. Questions?

More Related