SlideShare a Scribd company logo
1 of 27
1
Scene of the Cybercrime:Scene of the Cybercrime:
Assisting Law EnforcementAssisting Law Enforcement
In Tracking Down andIn Tracking Down and
Prosecuting CybercriminalsProsecuting Cybercriminals
2
Please allow mePlease allow me
to introduce myselfto introduce myself ……
• Debra Littlejohn Shinder, MCSEDebra Littlejohn Shinder, MCSE
– Former police sergeant/police academy
and college criminal justice instructor
– Technical trainer
• Networking, operating systems, IT security
– Author
• Cisco Press, Syngress Media, Que, New
Riders
• TechRepublic, CNET,
Cramsession/Brainbuzz
– Consultant
• Businesses and government agencies
3
What I’m going to talkWhat I’m going to talk
about todayabout today
• What is cybercrime and is it reallyWhat is cybercrime and is it really
a problem?a problem?
• Who are the cybercriminals?Who are the cybercriminals?
• Why should you want to help lawWhy should you want to help law
enforcement officers catch them?enforcement officers catch them?
• The Great Governmental DivideThe Great Governmental Divide
• How techies can build a bridgeHow techies can build a bridge
• Building the cybercrime caseBuilding the cybercrime case
4
Civil vs. Criminal LawCivil vs. Criminal Law
• Two separate systems of lawTwo separate systems of law
• What are the differences?What are the differences?
• Double jeopardy doesn’t applyDouble jeopardy doesn’t apply
• Constitutional protections – when doConstitutional protections – when do
they apply?they apply?
Breach of contract is not a crime –
except when it is.
5
Defining cybercrimeDefining cybercrime
Cybercrime is any illegal act committedCybercrime is any illegal act committed
using a computer network (especiallyusing a computer network (especially
the Internet).the Internet).
Cybercrime is a subset of computerCybercrime is a subset of computer
crime.crime.
What do we mean by “illegal?”
Bodies of law:
Criminal, civil and administrative
6
Who are theWho are the
cybercriminals?cybercriminals?
• It’s not just about hackersIt’s not just about hackers
• Using the ‘Net as a tool of the crimeUsing the ‘Net as a tool of the crime
– White collar crime
– Computer con artists
– Hackers, crackers and network attackers
• Incidental cybercriminalsIncidental cybercriminals
• Accidental cybercriminalsAccidental cybercriminals
• Situational cybercriminalsSituational cybercriminals
7
Who are theWho are the
cybervictims?cybervictims?
• CompaniesCompanies
– Security? What’s that?
– Bottom liners
• IndividualsIndividuals
– Naive/Newbies
– Desparados
– Pseudovictims
– In the wrong place at the wrong time
• SocietySociety
8
Who are theWho are the
cyberinvestigators?cyberinvestigators?
• IT professionalsIT professionals
• Corporate security personnelCorporate security personnel
• Private investigatorsPrivate investigators
• Law enforcementLaw enforcement
Ultimate destination
This is where the
authority lies
How can all
Work together?
When and why
the police should be
Called in
9
What’s in it for me?What’s in it for me?
• Why should IT personnel cooperateWhy should IT personnel cooperate
with police in catchingwith police in catching
cybercriminals?cybercriminals?
• What are the advantages?What are the advantages?
• What are the disadvantages?What are the disadvantages?
What are the legalities?
What happens if you don’t cooperate?
10
The GreatThe Great
(Governmental) Divide(Governmental) Divide
• Law enforcement cultureLaw enforcement culture
– Highly regulated
– Paramilitary (emphasis on “para”)
– “By the book”
The “Police Power” myth
Weight of law
agency policy
political factors
Public relations
11
Police SecretsPolice Secrets
• Most officers are not as confident asMost officers are not as confident as
they appearthey appear
– Command presence required
– The bluff is in
• Most cops feel pretty powerlessMost cops feel pretty powerless
– Cops don’t like feeling powerless
• Most cops don’t understandMost cops don’t understand
technologytechnology
– Cops don’t like not understanding
12
This leads to…This leads to…
• A touch of paranoiaA touch of paranoia
• ““Us vs. Them” attitudeUs vs. Them” attitude
– Cops against the world
• The truth about the thin blue lineThe truth about the thin blue line
• The blue wall of silenceThe blue wall of silence
Best kept secret:
Cops are human beings
13
Why cops and techiesWhy cops and techies
don’t mixdon’t mix
• Lifestyle differencesLifestyle differences
• Elitist mentality – on both sidesElitist mentality – on both sides
• Adversarial relationshipAdversarial relationship
– Many techies support or at least admire
talented hackers
– It’s human nature to protect “your own”
– Many cops don’t appreciate the
difference between white and black hat
– Bad laws
14
What cops and techiesWhat cops and techies
have in commonhave in common
• Long, odd hoursLong, odd hours
• Caffeine addictionCaffeine addiction
• Dedication to/love of jobDedication to/love of job
• Want things to “make sense”Want things to “make sense”
• Problem solvers by natureProblem solvers by nature
What can tech people do
to solve the problem
of how to work with law enforcement?
15
Building team spiritBuilding team spirit
• Ability to “think like the criminal”Ability to “think like the criminal”
– Important element of good crime detection
– Difficult for LE when they don’t know the
technology
• IT’s roleIT’s role
– You know the hacker mindset
– You know what can and can’t be done with
the technology
– You know where to look for the clues
Police know – or should know –
law, rules of evidence, case building,
court testimony
16
Bridging the GapBridging the Gap
• ““Talk the talk”Talk the talk”
– Technotalk vs police jargon
• Learn the conceptsLearn the concepts
– Legal
– Investigative procedure
• Understand the “protocols”Understand the “protocols”
– “Unwritten rules”
17
Building the CaseBuilding the Case
• Detection techniquesDetection techniques
• Collecting and preserving digitalCollecting and preserving digital
evidenceevidence
• Factors that complicate prosecutionFactors that complicate prosecution
• Overcoming the obstaclesOvercoming the obstacles
18
CybercrimeCybercrime
Detection TechniquesDetection Techniques
• Auditing/log filesAuditing/log files
• Firewall logs and reportsFirewall logs and reports
• Email headersEmail headers
• Tracing domain name/IP addressesTracing domain name/IP addresses
• IP spoofing/anti-detection techniquesIP spoofing/anti-detection techniques
19
Collecting and PreservingCollecting and Preserving
Digital EvidenceDigital Evidence
• File recoveryFile recovery
• Preservation of evidencePreservation of evidence
• Intercepting transmitted dataIntercepting transmitted data
• Documenting evidence recoveryDocumenting evidence recovery
• Legal issuesLegal issues
– Search and seizure laws
– Privacy rights
– Virtual “stings” (honeypots/honeynets)
Is it entrapment?
20
Factors that complicateFactors that complicate
prosecution of cybercrimeprosecution of cybercrime
• Difficulty in defining the crimeDifficulty in defining the crime
• Jurisdictional issuesJurisdictional issues
• Chain of custody issuesChain of custody issues
• Overcoming obstaclesOvercoming obstacles
Lack of understanding of technology
(by courts/juries)
Lack of understanding of law
(by IT industry)
21
Difficulty inDifficulty in
defining the crimedefining the crime
• CJ theoryCJ theory
– mala in se
– mala prohibita
• Elements of the offenseElements of the offense
• Defenses and exceptionsDefenses and exceptions
• Burden of proofBurden of proof
• Level of proofLevel of proof
Civil vs. criminal law
Statutory, Case and Common Law
22
Jurisdictional issuesJurisdictional issues
• Defining jurisdictionDefining jurisdiction
• Jurisdiction of law enforcementJurisdiction of law enforcement
agenciesagencies
• Jurisdiction of courtsJurisdiction of courts
• Types of jurisdictional authorityTypes of jurisdictional authority
• Level of jurisdictionLevel of jurisdiction
23
Chain of CustodyChain of Custody
• What is the chain of custody?What is the chain of custody?
• Why does it matter?Why does it matter?
• How is it documented?How is it documented?
• Where do IT people fit in?Where do IT people fit in?
24
Overcoming theOvercoming the
obstaclesobstacles
• Well defined roles andWell defined roles and
responsibilitiesresponsibilities
• The prosecution “team”The prosecution “team”
– Law enforcement officers
– Prosecutors
– Judges
– Witnesses
What can CEOs and IT managers do?
25
Testifying in aTestifying in a
cybercrimes casecybercrimes case
• Expert vs evidentiary witnessExpert vs evidentiary witness
• Qualification as an expertQualification as an expert
• Testifying as an evidentiary witnessTestifying as an evidentiary witness
• Cross examination tacticsCross examination tactics
Three types of evidence:
Physical evidence
Intangible evidence
Direct evidence
26
Summing it upSumming it up
• Cybercrime is a major problem – andCybercrime is a major problem – and
growinggrowing
• Cybercrime is about much more thanCybercrime is about much more than
hackershackers
• There is a natural adversarialThere is a natural adversarial
relationship between IT and policerelationship between IT and police
• Successful prosecution of cybercrimeSuccessful prosecution of cybercrime
must be a team effortmust be a team effort
• IT personnel must learn investigationIT personnel must learn investigation
and police must learn technologyand police must learn technology
27
The book:The book:
Defining and Categorizing CybercrimeDefining and Categorizing Cybercrime
A Brief History of the Rise of CybercrimeA Brief History of the Rise of Cybercrime
Understanding the People on the Scene of theUnderstanding the People on the Scene of the
CybercrimeCybercrime
Understanding Computer and NetworkingUnderstanding Computer and Networking
BasicsBasics
Understanding Network Intrusions and AttacksUnderstanding Network Intrusions and Attacks
Understanding Cybercrime PreventionUnderstanding Cybercrime Prevention
Implementing System SecurityImplementing System Security
Implementing Cybercrime Detection TechniquesImplementing Cybercrime Detection Techniques
Collecting and Preserving Digital EvidenceCollecting and Preserving Digital Evidence
Understanding Laws Pertaining to ComputerUnderstanding Laws Pertaining to Computer
CrimesCrimes
Building and Prosecuting the Cybercrime CaseBuilding and Prosecuting the Cybercrime Case
Training the Cybercrime Fighters of the FutureTraining the Cybercrime Fighters of the Future
Scene of the Cybercrime
by Debra Littlejohn Shinder

More Related Content

What's hot

How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...Cynthia Sharp
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Associationmurnan
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in CyberspaceMindaugas Kiskis
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Shawn Tuma
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondZeshan Sattar
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 

What's hot (18)

How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Pls 780 week_6
Pls 780 week_6Pls 780 week_6
Pls 780 week_6
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
How to Choose a Legal Technology Consultant
How to Choose a Legal Technology ConsultantHow to Choose a Legal Technology Consultant
How to Choose a Legal Technology Consultant
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 

Similar to Cyber crime Introduction

ILG CERT Presentation Final
ILG CERT Presentation FinalILG CERT Presentation Final
ILG CERT Presentation FinalJon Praed
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentJisc
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The CybercrimeAmjad Hussain
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The CybercrimeAmjad Hussain
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityantitree
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethicaldiwakar sharma
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theoriesTobore Oshobe
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propellaExo Futures
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspacezapp0
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz neweyavagal
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmartFrederick Lane
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018Ray Bugg
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 

Similar to Cyber crime Introduction (20)

ILG CERT Presentation Final
ILG CERT Presentation FinalILG CERT Presentation Final
ILG CERT Presentation Final
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environment
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The Cybercrime
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The Cybercrime
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz new
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmart
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 

More from Vinil Patel

Bank loan vs bond issue presentation
Bank loan vs bond issue presentationBank loan vs bond issue presentation
Bank loan vs bond issue presentationVinil Patel
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeVinil Patel
 
Alex nelson mandela
Alex nelson mandelaAlex nelson mandela
Alex nelson mandelaVinil Patel
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYVinil Patel
 
4.12 g burtenshaw certification issues
4.12 g burtenshaw certification issues4.12 g burtenshaw certification issues
4.12 g burtenshaw certification issuesVinil Patel
 
3D IC TECHNOLOGY
3D IC TECHNOLOGY3D IC TECHNOLOGY
3D IC TECHNOLOGYVinil Patel
 

More from Vinil Patel (14)

Dr trehan
Dr trehanDr trehan
Dr trehan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Corruption
CorruptionCorruption
Corruption
 
Computer crime
Computer crimeComputer crime
Computer crime
 
nelson mandela
nelson mandelanelson mandela
nelson mandela
 
Child labour
Child labourChild labour
Child labour
 
Bank loan vs bond issue presentation
Bank loan vs bond issue presentationBank loan vs bond issue presentation
Bank loan vs bond issue presentation
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Alex nelson mandela
Alex nelson mandelaAlex nelson mandela
Alex nelson mandela
 
Dynamic HTML
Dynamic HTMLDynamic HTML
Dynamic HTML
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
4.12 g burtenshaw certification issues
4.12 g burtenshaw certification issues4.12 g burtenshaw certification issues
4.12 g burtenshaw certification issues
 
3D IC TECHNOLOGY
3D IC TECHNOLOGY3D IC TECHNOLOGY
3D IC TECHNOLOGY
 
3D Technology
3D Technology3D Technology
3D Technology
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Cyber crime Introduction

  • 1. 1 Scene of the Cybercrime:Scene of the Cybercrime: Assisting Law EnforcementAssisting Law Enforcement In Tracking Down andIn Tracking Down and Prosecuting CybercriminalsProsecuting Cybercriminals
  • 2. 2 Please allow mePlease allow me to introduce myselfto introduce myself …… • Debra Littlejohn Shinder, MCSEDebra Littlejohn Shinder, MCSE – Former police sergeant/police academy and college criminal justice instructor – Technical trainer • Networking, operating systems, IT security – Author • Cisco Press, Syngress Media, Que, New Riders • TechRepublic, CNET, Cramsession/Brainbuzz – Consultant • Businesses and government agencies
  • 3. 3 What I’m going to talkWhat I’m going to talk about todayabout today • What is cybercrime and is it reallyWhat is cybercrime and is it really a problem?a problem? • Who are the cybercriminals?Who are the cybercriminals? • Why should you want to help lawWhy should you want to help law enforcement officers catch them?enforcement officers catch them? • The Great Governmental DivideThe Great Governmental Divide • How techies can build a bridgeHow techies can build a bridge • Building the cybercrime caseBuilding the cybercrime case
  • 4. 4 Civil vs. Criminal LawCivil vs. Criminal Law • Two separate systems of lawTwo separate systems of law • What are the differences?What are the differences? • Double jeopardy doesn’t applyDouble jeopardy doesn’t apply • Constitutional protections – when doConstitutional protections – when do they apply?they apply? Breach of contract is not a crime – except when it is.
  • 5. 5 Defining cybercrimeDefining cybercrime Cybercrime is any illegal act committedCybercrime is any illegal act committed using a computer network (especiallyusing a computer network (especially the Internet).the Internet). Cybercrime is a subset of computerCybercrime is a subset of computer crime.crime. What do we mean by “illegal?” Bodies of law: Criminal, civil and administrative
  • 6. 6 Who are theWho are the cybercriminals?cybercriminals? • It’s not just about hackersIt’s not just about hackers • Using the ‘Net as a tool of the crimeUsing the ‘Net as a tool of the crime – White collar crime – Computer con artists – Hackers, crackers and network attackers • Incidental cybercriminalsIncidental cybercriminals • Accidental cybercriminalsAccidental cybercriminals • Situational cybercriminalsSituational cybercriminals
  • 7. 7 Who are theWho are the cybervictims?cybervictims? • CompaniesCompanies – Security? What’s that? – Bottom liners • IndividualsIndividuals – Naive/Newbies – Desparados – Pseudovictims – In the wrong place at the wrong time • SocietySociety
  • 8. 8 Who are theWho are the cyberinvestigators?cyberinvestigators? • IT professionalsIT professionals • Corporate security personnelCorporate security personnel • Private investigatorsPrivate investigators • Law enforcementLaw enforcement Ultimate destination This is where the authority lies How can all Work together? When and why the police should be Called in
  • 9. 9 What’s in it for me?What’s in it for me? • Why should IT personnel cooperateWhy should IT personnel cooperate with police in catchingwith police in catching cybercriminals?cybercriminals? • What are the advantages?What are the advantages? • What are the disadvantages?What are the disadvantages? What are the legalities? What happens if you don’t cooperate?
  • 10. 10 The GreatThe Great (Governmental) Divide(Governmental) Divide • Law enforcement cultureLaw enforcement culture – Highly regulated – Paramilitary (emphasis on “para”) – “By the book” The “Police Power” myth Weight of law agency policy political factors Public relations
  • 11. 11 Police SecretsPolice Secrets • Most officers are not as confident asMost officers are not as confident as they appearthey appear – Command presence required – The bluff is in • Most cops feel pretty powerlessMost cops feel pretty powerless – Cops don’t like feeling powerless • Most cops don’t understandMost cops don’t understand technologytechnology – Cops don’t like not understanding
  • 12. 12 This leads to…This leads to… • A touch of paranoiaA touch of paranoia • ““Us vs. Them” attitudeUs vs. Them” attitude – Cops against the world • The truth about the thin blue lineThe truth about the thin blue line • The blue wall of silenceThe blue wall of silence Best kept secret: Cops are human beings
  • 13. 13 Why cops and techiesWhy cops and techies don’t mixdon’t mix • Lifestyle differencesLifestyle differences • Elitist mentality – on both sidesElitist mentality – on both sides • Adversarial relationshipAdversarial relationship – Many techies support or at least admire talented hackers – It’s human nature to protect “your own” – Many cops don’t appreciate the difference between white and black hat – Bad laws
  • 14. 14 What cops and techiesWhat cops and techies have in commonhave in common • Long, odd hoursLong, odd hours • Caffeine addictionCaffeine addiction • Dedication to/love of jobDedication to/love of job • Want things to “make sense”Want things to “make sense” • Problem solvers by natureProblem solvers by nature What can tech people do to solve the problem of how to work with law enforcement?
  • 15. 15 Building team spiritBuilding team spirit • Ability to “think like the criminal”Ability to “think like the criminal” – Important element of good crime detection – Difficult for LE when they don’t know the technology • IT’s roleIT’s role – You know the hacker mindset – You know what can and can’t be done with the technology – You know where to look for the clues Police know – or should know – law, rules of evidence, case building, court testimony
  • 16. 16 Bridging the GapBridging the Gap • ““Talk the talk”Talk the talk” – Technotalk vs police jargon • Learn the conceptsLearn the concepts – Legal – Investigative procedure • Understand the “protocols”Understand the “protocols” – “Unwritten rules”
  • 17. 17 Building the CaseBuilding the Case • Detection techniquesDetection techniques • Collecting and preserving digitalCollecting and preserving digital evidenceevidence • Factors that complicate prosecutionFactors that complicate prosecution • Overcoming the obstaclesOvercoming the obstacles
  • 18. 18 CybercrimeCybercrime Detection TechniquesDetection Techniques • Auditing/log filesAuditing/log files • Firewall logs and reportsFirewall logs and reports • Email headersEmail headers • Tracing domain name/IP addressesTracing domain name/IP addresses • IP spoofing/anti-detection techniquesIP spoofing/anti-detection techniques
  • 19. 19 Collecting and PreservingCollecting and Preserving Digital EvidenceDigital Evidence • File recoveryFile recovery • Preservation of evidencePreservation of evidence • Intercepting transmitted dataIntercepting transmitted data • Documenting evidence recoveryDocumenting evidence recovery • Legal issuesLegal issues – Search and seizure laws – Privacy rights – Virtual “stings” (honeypots/honeynets) Is it entrapment?
  • 20. 20 Factors that complicateFactors that complicate prosecution of cybercrimeprosecution of cybercrime • Difficulty in defining the crimeDifficulty in defining the crime • Jurisdictional issuesJurisdictional issues • Chain of custody issuesChain of custody issues • Overcoming obstaclesOvercoming obstacles Lack of understanding of technology (by courts/juries) Lack of understanding of law (by IT industry)
  • 21. 21 Difficulty inDifficulty in defining the crimedefining the crime • CJ theoryCJ theory – mala in se – mala prohibita • Elements of the offenseElements of the offense • Defenses and exceptionsDefenses and exceptions • Burden of proofBurden of proof • Level of proofLevel of proof Civil vs. criminal law Statutory, Case and Common Law
  • 22. 22 Jurisdictional issuesJurisdictional issues • Defining jurisdictionDefining jurisdiction • Jurisdiction of law enforcementJurisdiction of law enforcement agenciesagencies • Jurisdiction of courtsJurisdiction of courts • Types of jurisdictional authorityTypes of jurisdictional authority • Level of jurisdictionLevel of jurisdiction
  • 23. 23 Chain of CustodyChain of Custody • What is the chain of custody?What is the chain of custody? • Why does it matter?Why does it matter? • How is it documented?How is it documented? • Where do IT people fit in?Where do IT people fit in?
  • 24. 24 Overcoming theOvercoming the obstaclesobstacles • Well defined roles andWell defined roles and responsibilitiesresponsibilities • The prosecution “team”The prosecution “team” – Law enforcement officers – Prosecutors – Judges – Witnesses What can CEOs and IT managers do?
  • 25. 25 Testifying in aTestifying in a cybercrimes casecybercrimes case • Expert vs evidentiary witnessExpert vs evidentiary witness • Qualification as an expertQualification as an expert • Testifying as an evidentiary witnessTestifying as an evidentiary witness • Cross examination tacticsCross examination tactics Three types of evidence: Physical evidence Intangible evidence Direct evidence
  • 26. 26 Summing it upSumming it up • Cybercrime is a major problem – andCybercrime is a major problem – and growinggrowing • Cybercrime is about much more thanCybercrime is about much more than hackershackers • There is a natural adversarialThere is a natural adversarial relationship between IT and policerelationship between IT and police • Successful prosecution of cybercrimeSuccessful prosecution of cybercrime must be a team effortmust be a team effort • IT personnel must learn investigationIT personnel must learn investigation and police must learn technologyand police must learn technology
  • 27. 27 The book:The book: Defining and Categorizing CybercrimeDefining and Categorizing Cybercrime A Brief History of the Rise of CybercrimeA Brief History of the Rise of Cybercrime Understanding the People on the Scene of theUnderstanding the People on the Scene of the CybercrimeCybercrime Understanding Computer and NetworkingUnderstanding Computer and Networking BasicsBasics Understanding Network Intrusions and AttacksUnderstanding Network Intrusions and Attacks Understanding Cybercrime PreventionUnderstanding Cybercrime Prevention Implementing System SecurityImplementing System Security Implementing Cybercrime Detection TechniquesImplementing Cybercrime Detection Techniques Collecting and Preserving Digital EvidenceCollecting and Preserving Digital Evidence Understanding Laws Pertaining to ComputerUnderstanding Laws Pertaining to Computer CrimesCrimes Building and Prosecuting the Cybercrime CaseBuilding and Prosecuting the Cybercrime Case Training the Cybercrime Fighters of the FutureTraining the Cybercrime Fighters of the Future Scene of the Cybercrime by Debra Littlejohn Shinder