1 / 17

High Tech Crime The Australian Scene

High Tech Crime The Australian Scene. Brian Diplock Australian High Tech Crime Centre. Caveat. The materials and information contained in this presentation are intended to raise awareness within the RUXCON conference of High Tech Crime in Australia.

mira-weeks
Télécharger la présentation

High Tech Crime The Australian Scene

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. High Tech Crime The Australian Scene Brian Diplock Australian High Tech Crime Centre

  2. Caveat The materials and information contained in this presentation are intended to raise awareness within the RUXCON conference of High Tech Crime in Australia. THEY ARE NOT TO BE CONSTRUED AS LEGAL ADVICE. For legal advice or interpretation on these matters or how they may affect you or your organisation, please consult a solicitor.

  3. Overview • About the AHTCC • Role • Functions • Activities • Dealing with Law Enforcement • Different situations / Different requirements • Summary

  4. Role of the AHTCC • Provide a national coordinated approach to combating serious, complex and multi-jurisdictional high tech crimes, especially those beyond the capability of single jurisdictions. • Assist in improving the capacity of all jurisdictions to deal with high tech crime. • Support efforts to protect the National Information Infrastructure.

  5. Functions of the AHTCC • Coordination of high tech crime matters between Australian law enforcement agencies, Federal Government agencies and international agencies. • Investigation of matters either by the AHTCC or through cooperation or referral to a partner agency. • Intelligence services that contribute to a better understanding of the high tech crime environment for the AHTCC, partner agencies, and the wider community through alerts and advisories. • Liaison with Government agencies, industry groups, businesses and other organisations on high tech crime matters, including technical, investigative, business and policy. • Knowledge of high tech crime issues such as preventative measures, best practice investigative tools and techniques, expert advice, training and education.

  6. High Tech Crime & the AHTCC • Education and advisories • Facilitating cooperation between law enforcement agencies • Involving Commonwealth, State, Territory & International agencies • Liaison with private sector and allied organisations • AHTCC investigation of appropriate matters, including: • Computer Intrusion • Denial of Service attacks / Maleficent Code • Online Child Abuse • Online / Telecommunications Fraud and Theft • Drug Dealing, Terrorism, Extortion, Theft, Threats / Menace / Harassment, etc

  7. How are Incidents Reported to the AHTCC ? • Directly • Telephone (02) 6246 2101 (24 Hour contact number) • Fax (02) 6246 2121 • Online www.ahtcc.gov.au • State Police / State Police Computer Crime Units • G8 Contact list / Interpol • Crime Stoppers • Regulatory agencies • Partner agencies

  8. Top Three Situations for dealing with Police: • You are the victim of an attack. • You hold some records in relation to an offence. • You are the offender.

  9. 1) When you are the victim of an attack • Have a plan • Be prepared • Respond appropriately

  10. Responding Appropriately Respond in a “Forensically Sound” manner • Worthwhile regardless of law enforcement involvement • Increases confidence in results of incident analysis • Important for civil proceedings • The process • Identify, Preserve, Analyse, Present

  11. Reporting your matter to Law Enforcement • Refer matters as soon as possible • Electronic evidence can be volatile • Electronic evidence can be easily destroyed, corrupted • Provide as much information as possible • When you report a matter, be prepared to support the investigation • Be patient – investigative process can be long and frustrating • Criminal matters have a high standard of proof

  12. 2) When you hold records relating to an offence • Sections 282 and 313 of the Telecommunications Act provide disclosure provisions for the investigation of a criminal offence by law enforcement agencies.

  13. Carriage Service Provider Obligations • Provision of information or reasonable assistance • Interception capability • Prevent networks and facilities from being used in, or in relation to, the commission of criminal offences

  14. 3) If you are the Offender • Legislation & Law Enforcement methodologies are continuing to evolve in this area. • Cyber crimes are real crimes with real victims. • It is only a matter of time before you are caught.

  15. Cybercrime Offences • 477.1 Unauthorised access, modification or impairment with intent to commit a serious offence • 477.2 Unauthorised modification of data to cause impairment • 477.3 Unauthorised impairment of electronic communication • 478.1 Unauthorised access to, or modification of, restricted data • 478.2 Unauthorised impairment of data held on a computer disk etc. • 478.3 Possession or control of data with intent to commit a computer offence • 478.4 Producing, supplying or obtaining data with intent to commit a computer offence

  16. Questions?

More Related