SlideShare a Scribd company logo
1 of 56
Investigating Cybercrime in the UK
Sex, Lies & Cybercrime- A pragmatic perspective.
DI Eamonn Keane.
Cybercrime Specialist Crime Division
Agenda
Scottish , UK & Global Perspective!
The current threat landscape!
Incident Planning & Response!.
Prevention.
Scotland’s future.
Signposting.
Key questions that all CEOs and CISOs should
be asking this week?
• "Are we vulnerable to SQL injection, ransomware or
DDoS based attacks?“
• "What assurance activity have we done to confirm that
we are not vulnerable?“
• "If we were compromised, would an attacker be able to
gain access to unencrypted sensitive data?“
• "What assurance activity have we done to confirm this
position?"
• “What is our company posture on security?”
Cybercrime Cost
Cyber Regional Organised Crime Units
Cybercrime!
Stalking
Bullying
Cyber Fraud
SOCG
Sexual Offenders
Indecent
images of
children
Cyber
dependent
crimes e.g.
hacking,
malware,
DDoS
Anti-socialbehaviour
CyberTerrorism
Your Title Here
1980’s Policing
“I can do more damage on my laptop
in my pyjamas, before my first cup of
Earl Grey, than you can do in a year
in the field.”
Q - Skyfall
Cyber Attacks are on the rise
Ransomware - Glasgow Hairdressers
ORGANISED CRIME
The skillsets
Five key cyber crime threats
• Malware targeting businesses & individual users for fraud.
APT’s, RATS,
• Network intrusion ('hacking') DDoS, XSS. Spear-phishing.
• Enablers of cyber dependent crime (e.g. money laundering /
digital currencies / anonymisation).
• Cyber crime 'as a service‘
• Targeted disruption of access to UK networked systems and
services (e.g. DDOS / Ransomware)
Old bugs come home to roost… SHELLSHOCK
– HEARTBLEED – DRIDEX – CRYPTOWALL -
POODLE… LOCKY
5 Stages of Crypto-Ransomware
Virtual Currencies
http://www.mcafee.com/uk/resources/white-papers/wp-
Cybercrime-as-a-Service
Darknet
Insider Threat
Cyber Resilience is thorough Preparation
Overarching Cyber Security Strategy!
Pre-planned Exercise.
Incident Management & Response Plan.
Communications Strategy.
Investigative Strategy.
Incident Manager & Team
Gold, Silver, Bronze.
Mitigation & Recovery Strategy.
Logistics - Contingency
Reporting of Cyber Incidents
• Incident evaluation and early reporting.
• Police Scotland 101 – Incident No. & Action Fraud.
• Business continuity and impact our prime consideration.
• ICT response and mitigation. Scene preservation?
• Where possible preserve original copies of emails, attachments,
device images and logs.
• Is there a mandatory obligation to report?
• Report to Cert UK / GovCert UK .
• Report to Scottish Government if appropriate.
• Identify point of contact for law enforcement to facilitate enquiries
and evidence gathering.
• Submit attack details to CISP platform if appropriate share.cisp.org.uk
(can assist with mitigation and fix)
Cyber Essentials &
Cyber Essential Plus
Cyber Essentials concentrates on five key controls.
These are:
1. Boundary firewalls and internet gateways
2. Secure configuration
3. Access control
4. Malware protection
5. Patch management
Cyber Essentials is not a silver bullet.
However, it will prevent 80% of cyber
attacks.
• Having effective anti-malware means using more than
“signature based” detection. The news reports all state this
ransomware variant was too new for AV signatures. This means
that they were not using heuristics….
• Most, if not all, ransomware relies on systems missing critical
patches.
• In a nutshell, Cyber Essentials would have saved the Council
here. The worst that ransomware should do is a few hours
downtime for one user while you restore from backups.
Everything else means you’ve made major mistakes.
Scotland’s Response
• Cyber Policing Structure – NCCU - Regional Hubs
• Police Scotland Cybercrime Strategy
• European & Global Co-operation EC3
• Safer Virtual Communities
• Education
– The Cyber Academy - DFET
– SQA National Progression Awards
– SBRC – Supporting SMEs.
Example – Tovar: Protect
• International operation targeting GameOverZeus and Cryptolocker
malware variants.
• These malware variants are estimated to have cost the UK £500
million in losses.
• Coordinated activity across 10 countries led to the botnet behind
the malware being taken offline for two weeks, allowing the public
to take steps to protect themselves (e.g. update anti-virus).
• Combined with extensive global media coverage
• 32% drop in GameOverZeus infections, estimated £100 million in
losses prevented
Example – Dermic: Pursue & Prevent
• UK investigation targeting the users of Blackshades, a Remote Access Tool
able to access users’ webcams.
• FBI intel - over 1100 UK-based purchases on Blackshades.
• NCCU coordinated a week of arrests, involving ROCUs, MPS & Police
Scotland, targeting 50+ individuals for Pursue action.
• 20 arrests across 10 Regions.
• Remaining individuals subject to Prevent activity – cease & desist letters,
visits by ROCU & NCA officers, media coverage
• Linked to a global day of action with over 100 arrests in the US, Australia,
Asia & Europe.
• An important test of coordination of UK law enforcement.
Operation Mouse - Police Scotland Website
Our priorities
WE
NEED
YOU
Thank you for listening
Any Questions?
Eamonn.keane2@scotland.pnn.police.uk

More Related Content

What's hot

2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 

What's hot (20)

Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 

Viewers also liked (6)

Industry Expectations - Qualified Vs Employable
Industry Expectations - Qualified Vs EmployableIndustry Expectations - Qualified Vs Employable
Industry Expectations - Qualified Vs Employable
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Investigating Cybercrime in the UK

Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
zayadeen2003
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 

Similar to Investigating Cybercrime in the UK (20)

Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber security best practices
Cyber security best practicesCyber security best practices
Cyber security best practices
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 

More from Napier University

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Investigating Cybercrime in the UK

  • 1. Investigating Cybercrime in the UK Sex, Lies & Cybercrime- A pragmatic perspective. DI Eamonn Keane. Cybercrime Specialist Crime Division
  • 2. Agenda Scottish , UK & Global Perspective! The current threat landscape! Incident Planning & Response!. Prevention. Scotland’s future. Signposting.
  • 3. Key questions that all CEOs and CISOs should be asking this week? • "Are we vulnerable to SQL injection, ransomware or DDoS based attacks?“ • "What assurance activity have we done to confirm that we are not vulnerable?“ • "If we were compromised, would an attacker be able to gain access to unencrypted sensitive data?“ • "What assurance activity have we done to confirm this position?" • “What is our company posture on security?”
  • 4.
  • 6.
  • 9. Stalking Bullying Cyber Fraud SOCG Sexual Offenders Indecent images of children Cyber dependent crimes e.g. hacking, malware, DDoS Anti-socialbehaviour CyberTerrorism
  • 10.
  • 12. “I can do more damage on my laptop in my pyjamas, before my first cup of Earl Grey, than you can do in a year in the field.” Q - Skyfall
  • 13.
  • 14. Cyber Attacks are on the rise
  • 15.
  • 16.
  • 17.
  • 18. Ransomware - Glasgow Hairdressers
  • 19.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Five key cyber crime threats • Malware targeting businesses & individual users for fraud. APT’s, RATS, • Network intrusion ('hacking') DDoS, XSS. Spear-phishing. • Enablers of cyber dependent crime (e.g. money laundering / digital currencies / anonymisation). • Cyber crime 'as a service‘ • Targeted disruption of access to UK networked systems and services (e.g. DDOS / Ransomware)
  • 27. Old bugs come home to roost… SHELLSHOCK – HEARTBLEED – DRIDEX – CRYPTOWALL - POODLE… LOCKY
  • 28.
  • 29. 5 Stages of Crypto-Ransomware
  • 32.
  • 35. Cyber Resilience is thorough Preparation Overarching Cyber Security Strategy! Pre-planned Exercise. Incident Management & Response Plan. Communications Strategy. Investigative Strategy. Incident Manager & Team Gold, Silver, Bronze. Mitigation & Recovery Strategy. Logistics - Contingency
  • 36.
  • 37. Reporting of Cyber Incidents • Incident evaluation and early reporting. • Police Scotland 101 – Incident No. & Action Fraud. • Business continuity and impact our prime consideration. • ICT response and mitigation. Scene preservation? • Where possible preserve original copies of emails, attachments, device images and logs. • Is there a mandatory obligation to report? • Report to Cert UK / GovCert UK . • Report to Scottish Government if appropriate. • Identify point of contact for law enforcement to facilitate enquiries and evidence gathering. • Submit attack details to CISP platform if appropriate share.cisp.org.uk (can assist with mitigation and fix)
  • 38.
  • 39. Cyber Essentials & Cyber Essential Plus Cyber Essentials concentrates on five key controls. These are: 1. Boundary firewalls and internet gateways 2. Secure configuration 3. Access control 4. Malware protection 5. Patch management
  • 40. Cyber Essentials is not a silver bullet. However, it will prevent 80% of cyber attacks. • Having effective anti-malware means using more than “signature based” detection. The news reports all state this ransomware variant was too new for AV signatures. This means that they were not using heuristics…. • Most, if not all, ransomware relies on systems missing critical patches. • In a nutshell, Cyber Essentials would have saved the Council here. The worst that ransomware should do is a few hours downtime for one user while you restore from backups. Everything else means you’ve made major mistakes.
  • 41.
  • 42.
  • 43. Scotland’s Response • Cyber Policing Structure – NCCU - Regional Hubs • Police Scotland Cybercrime Strategy • European & Global Co-operation EC3 • Safer Virtual Communities • Education – The Cyber Academy - DFET – SQA National Progression Awards – SBRC – Supporting SMEs.
  • 44.
  • 45. Example – Tovar: Protect • International operation targeting GameOverZeus and Cryptolocker malware variants. • These malware variants are estimated to have cost the UK £500 million in losses. • Coordinated activity across 10 countries led to the botnet behind the malware being taken offline for two weeks, allowing the public to take steps to protect themselves (e.g. update anti-virus). • Combined with extensive global media coverage • 32% drop in GameOverZeus infections, estimated £100 million in losses prevented
  • 46. Example – Dermic: Pursue & Prevent • UK investigation targeting the users of Blackshades, a Remote Access Tool able to access users’ webcams. • FBI intel - over 1100 UK-based purchases on Blackshades. • NCCU coordinated a week of arrests, involving ROCUs, MPS & Police Scotland, targeting 50+ individuals for Pursue action. • 20 arrests across 10 Regions. • Remaining individuals subject to Prevent activity – cease & desist letters, visits by ROCU & NCA officers, media coverage • Linked to a global day of action with over 100 arrests in the US, Australia, Asia & Europe. • An important test of coordination of UK law enforcement.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Operation Mouse - Police Scotland Website
  • 52.
  • 54.
  • 56. Thank you for listening Any Questions? Eamonn.keane2@scotland.pnn.police.uk

Editor's Notes

  1. An introduction to the 4th space, Revolutionised and transformed the way we communicate, the way we organise our social lives and conduct business. According to the Office of national statistics in the year 2012, 42 million people in the UK, that is 85% of our adult population used the internet, Of this total 33 million adults accessed the Internet every day which is more than double its use in 2006
  2. Is this the reality of where we are and there has ben a subtle migration of crime into areas we just don’t have the visibility of due to our “life on Mars” policing tactics?
  3. Police Scotland now have 14 divisions and national response to crime. I can well remember the difficulties we had trying to work collaboratively cross border between Scottish Forces. This was a challenge under different masters. However, how do we deal with crime when the borders are truly international and crime is being committed in cyber space? Keen to explore some of the challenges today.
  4. The Internet of things – a recent picture of common household items that are now internet controlled and as a consequence exploitable by cybercriminals, we have investigated fridges sending spam attacks. Personally I draw the line at an internet toilet…I think some things are better left analogue!
  5. Policing as I joined and how we tackled OCG’s as we knew it: The Krays, Godfathers and our versions of the Richardsons’, Daniels’ etc. Our response has become more sophisticated but still predicated upon the same model of organised crime.
  6. Excellent quote from Q in James Bond, truly reflects the impact that one person can have.
  7. Slide gives you a global picture of the extent of cyber attacks
  8. Organised crime as we knew it, local influence and impact. Position of strength reinforced by local control.
  9. Organised Crime Groups recruiting these skillsets Individuals often working internationally with different groups – skills for hire International law enforcement working together to identify core nominals Their share of the profit dependent on their skill and contribution UK strategy to break the chain by removing core parts - example
  10. Refer to slide
  11. Caliphate Cyber Army – worldwide Announced merger of capability April 2016 Ongoing online war with Anonymous Group Extensive use of social media to recruit from overseas 20,000 recruited from overseas last year - according to a US expert Massive change in methods used by AlQueda Imagine the online threat…ripple effect again
  12. Anonymous declared their fight with ISIS after the Charlie Hebdo attacks in Paris Offshoot known as ”Ghost Security Group” reportedly in league with the US Govt to provide ISIS related information for cash – criticised by the main group as this is a step towards the invasion of online privacy they hold dear.
  13. Most common reference to this is Bitcoin 1 Bitcoin = £300 Extensively used by criminals online to pay for goods and services Peer-2-peer network system used to move payments Online public transaction record but only identifies source and destination wallets Lose the digital wallet, lose the Bitcoins!
  14. Refer to slide
  15. Refer to slide
  16. Who are you employing – do we really know everyone Security vetting? Do you operate strict network security policies? Use of USB devices on networks.. Is there a way for your people to report any suspicious activity? Remote system access policy? Highly relevant in today’s world of increased terrorist threat
  17. An introduction to the 4th space, Revolutionised and transformed the way we communicate, the way we organise our social lives and conduct business. According to the Office of national statistics in the year 2012, 42 million people in the UK, that is 85% of our adult population used the internet, Of this total 33 million adults accessed the Internet every day which is more than double its use in 2006
  18. Refer to slide
  19. Over 100 companies/organisations registered in Scotland, including majority of local authorities and Police Scotland Re-invigoration of the Scottish node – will be championed by RBS and re-launched in July 2015
  20. ECHR and Privacy – Edward Snowden National legislation of cyberspace in individual countries – some more lenient than others Legal barriers in some countries to access user data – some countries won’t co-operate with LE outside their own countries and this can lead to a breeding ground fro criminality – can sometimes depend on the political relations between the UK and other countries. Some large online organisations can also be less than helpful with the provision of LE data. ILOR’s and time delays frequent – what activity happens between now and then? Are we too late? Effective use of Europol / Eurojust to streamline European requests
  21. Can anyone tell me where the place on the left is – Isle of Yell in Shetland – most remote place in British Isles. Male on right is Jake Davies, known as “Topiary” as part of hacking group known as Lulzsec. He attacked and took down websites operated by SOCA and the FBI while he stole hundreds of thousands of personal details online to finance activity. He was arrested at his croft in Yell – I believe this is the clearest example of the borderless nature of Cybercrime - it can come from anywhere and impact on anywhere.
  22. Partnerships – International and local (Interpol, Europol, UK Govt, Scottish Govt, academia, finance sector etc) Develop Capacity & Capability – need to develop our understanding of the threats and develop our infrastructure and people to prevent and detect Detect & Prosecute Offenders – develop intelligence capability nationally and internationally across all threat areas – work hand-in-hand with other law enforcement agencies to enhance reach and bring offenders to justice Education & Awareness – huge piece of work underpinned by SG Cyber Resilience Strategy and our own Police Scotland Cybercrime Strategy. Education of people of all ages but particularly children and the elderly – businesses and importantly, our own staff.
  23. UK Government announced £1.9 billion investment Active Defence Programme – working with Internet Service Providers within the UK to prevent access to restricted sites and content New National Cyber Centre at GCHQ Scotland in discussions about creating our own multi-agency Cyber Centre to offer advice and support ? The pace of change online is so fast that it is difficult to predict the future.
  24. Direct recruitment? Cyber specialist volunteers (already being done by MoD) Competing sectors – everyone looking to have the best people Retention of skills / cost of training Vetting essential