Computer Crime

S
Steve BishopLecturer at Further education
Tackling Computer Crime,[object Object]
Hey mate, that’s your problem not mine!,[object Object],Police in the UK have no direct power to intervene against criminal material found on computers in another country or against criminals operating in another country.,[object Object],UK police can only take direct action where material falls into their jurisdiction or where ,,[object Object],People who created the material are in the UK.,[object Object],The material has been published from or downloaded onto computers in the UK.,[object Object],If the material might be evidence of offences committed in the UK.,[object Object],If the material might be evidence of crimes committed by UK citizens travelling abroad.,[object Object]
Internet Watch Foundation (IWF),[object Object],Established in 1996, the foundation includes major internet firms from the UK who work with the police & alongside Government departments to remove illegal material from the internet, specifically child sexual abuse images hosted anywhere in the world, criminally obscene & incitement to racial hatred content hosted in the UK.,[object Object],The foundation provides a hotline service which allows internet users to report material they believe may be illegal. The IWF then assess the material & notifies the service provider & police. ,[object Object],As a result of the work carried out by the IWF, only 1% of illegal content is apparently hosted in the UK, compared to that of 18% in 1997.,[object Object],The IWF is funded by the EU & online industries such as service providers, telecommunications, the financial sector & other organisation who support them for Corporate Social Responsibility reasons.,[object Object]
Computer Crime Unit,[object Object],The computer Crime Unit is a specialist unit who deal with crimes committed under the Computer  Misuse Act 1990.,[object Object],The unit provides a computer forensic duty officer & offers computer evidence retrieval advice to officers.,[object Object],The units mainly concentrates its resources on such computer crimes as hacking, maliciously creating & spreading viruses & counterfeit software.,[object Object],Watch out, we’re comin’ to getcha!,[object Object]
Police Central e-crime Unit (PCeU),[object Object],The PCeU is a police unit that co-ordinates the law enforcement of online offences nationwide & leads investigations into the UK’s most serious E-crime incidents.,[object Object],The unit supports the 43 police forces in England & Wales. This includes helping to set up regional cybercrime units which provide tools & expertise to local investigators.,[object Object],The level of funding has been criticised by the Conservatives & business leaders who say that 7million over 3 years is not enough to tackle the criminal treat worth billions of pounds.,[object Object]
Who else helps out?,[object Object],National Fraud Reporting Centre (NFRC). Will provide a central phone line & web portal for members of the public & businesses to report all fraud, including e-crime.,[object Object],Office of Cyber Security (OCS). They protect Britain's IT infrastructure.,[object Object],City of London Police Force (No posh abbreviation). They battle online crime as part of their role as the national lead police force for fraud.,[object Object],Serious Organised Crime Agency (SOCA). Has a dedicated e-crime team who have helped convict 21 people in the past year.,[object Object],Dedicated Cheque & Plastic Crime Unit (No posh abbreviation either). They investigate credit & debit card fraud using Met & C of London Police officers.,[object Object]
Where does the buck actually stop?,[object Object],The government have ordered an ‘urgent review’ which is due to be published at the end of the year which will outline who is responcible for what.,[object Object],The Home Office  report released recently stated that the review will see a ‘refreshed crime strategy’ that will ‘provide clarity over the roles & responsibilities of all the departments & bodies responsible for tackling crime’.,[object Object],The plans will include:,[object Object], the set up of a public-sector taskforce to increase information sharing on cybercrime.,[object Object],The offering of training to key business sectors by the C of London Police on tackling e-fraud.,[object Object]
1 of 7

Recommended

2015 Internet Crime Report by
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report Rob Wilson
123 views236 slides
Threat Update - Covid-19 Related Malicious Cyber Activity by
Threat Update - Covid-19 Related Malicious Cyber ActivityThreat Update - Covid-19 Related Malicious Cyber Activity
Threat Update - Covid-19 Related Malicious Cyber ActivityJack Martin
262 views5 slides
SESTA Backgrounder Pt 2 by
SESTA Backgrounder Pt 2SESTA Backgrounder Pt 2
SESTA Backgrounder Pt 2Internet Law Center
161 views26 slides
Red Flag Rules by
Red Flag RulesRed Flag Rules
Red Flag Rules- Mark - Fullbright
759 views59 slides
Alsalem_Int Pres by
Alsalem_Int PresAlsalem_Int Pres
Alsalem_Int PresAbdullah AlSalem MSc, MBA
234 views3 slides
Fraud Reporting, Catherine Hayes, National Fraud Authority by
Fraud Reporting, Catherine Hayes, National Fraud AuthorityFraud Reporting, Catherine Hayes, National Fraud Authority
Fraud Reporting, Catherine Hayes, National Fraud AuthorityCFG
612 views21 slides

More Related Content

What's hot

Canada's anti spam legislation by
Canada's anti spam legislationCanada's anti spam legislation
Canada's anti spam legislationJohn Lepore
480 views11 slides
Matthew Hough Clewes | Cyber Crime and its Impacts by
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsPro Mrkt
186 views10 slides
Chris Miller Presentation - DL Conference 2014 by
Chris Miller Presentation - DL Conference 2014Chris Miller Presentation - DL Conference 2014
Chris Miller Presentation - DL Conference 2014Digital Leaders
401 views14 slides
Your Right To Know Heather Brooke by
Your Right To Know   Heather BrookeYour Right To Know   Heather Brooke
Your Right To Know Heather Brooketcij
750 views23 slides
Cyber law media law & ethic by
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethicSyed Ali Hassan
79 views27 slides
05S-30-cell phone summary by
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summaryBridget Butler
22 views2 slides

What's hot(19)

Canada's anti spam legislation by John Lepore
Canada's anti spam legislationCanada's anti spam legislation
Canada's anti spam legislation
John Lepore480 views
Matthew Hough Clewes | Cyber Crime and its Impacts by Pro Mrkt
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its Impacts
Pro Mrkt186 views
Chris Miller Presentation - DL Conference 2014 by Digital Leaders
Chris Miller Presentation - DL Conference 2014Chris Miller Presentation - DL Conference 2014
Chris Miller Presentation - DL Conference 2014
Digital Leaders401 views
Your Right To Know Heather Brooke by tcij
Your Right To Know   Heather BrookeYour Right To Know   Heather Brooke
Your Right To Know Heather Brooke
tcij750 views
Why can’t police catch cyber criminals by Chip Thornsburg
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
Chip Thornsburg153 views
AMLMaps Highlights Report jan2017 by Abhishek Bali
AMLMaps Highlights Report jan2017AMLMaps Highlights Report jan2017
AMLMaps Highlights Report jan2017
Abhishek Bali620 views
The bribery act the changing face of corporate liability by White & Case
The bribery act  the changing face of corporate liabilityThe bribery act  the changing face of corporate liability
The bribery act the changing face of corporate liability
White & Case510 views
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice by Loeb Smith Attorneys
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Crime and terrorism of indian model by M S Siddiqui
Crime and terrorism of indian modelCrime and terrorism of indian model
Crime and terrorism of indian model
M S Siddiqui160 views
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION by Qudsiyah Munir
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNIONENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION
Qudsiyah Munir108 views

Viewers also liked

Computer crime by
Computer crimeComputer crime
Computer crimeVishesh Dalal
883 views18 slides
COB4 Computer Crime by
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crimeangbeelee
1.1K views33 slides
How to stop computer crime by
How to stop computer crimeHow to stop computer crime
How to stop computer crimeuniversity of education,Lahore
803 views17 slides
Types Of Computer Crime by
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer CrimeAlexander Zhuravlev
78.1K views11 slides
Computer Crime and Safety Measure by
Computer Crime and Safety MeasureComputer Crime and Safety Measure
Computer Crime and Safety MeasurePurushottam Dahal
520 views12 slides

Similar to Computer Crime

Modern trends in police force by
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
872 views7 slides
Fbi sec inform by
Fbi sec informFbi sec inform
Fbi sec informFernando Murillo
1.1K views44 slides
Crime Fighting Computer Systems And Databases by
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databasesafraidferry231
153 views2 slides
Crime Fighting Computer Systems And Databases by
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databasesafraidferry231
501 views2 slides
Assignment 1 by
Assignment 1Assignment 1
Assignment 1Jeewanthi Fernando
15 views3 slides
Policing a vision for 2025 by
Policing   a vision for 2025Policing   a vision for 2025
Policing a vision for 2025Benjamin Cheatham
136 views20 slides

Similar to Computer Crime(20)

Modern trends in police force by K J Singh
Modern trends in police forceModern trends in police force
Modern trends in police force
K J Singh872 views
Crime Fighting Computer Systems And Databases by afraidferry231
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databases
afraidferry231153 views
Crime Fighting Computer Systems And Databases by afraidferry231
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databases
afraidferry231501 views
Car Prowl Patterns by Maria Lack
Car Prowl PatternsCar Prowl Patterns
Car Prowl Patterns
Maria Lack2 views
Internet Crime Report 2019 by IC3.pdf by Thrist
Internet Crime Report 2019 by IC3.pdfInternet Crime Report 2019 by IC3.pdf
Internet Crime Report 2019 by IC3.pdf
Thrist54 views
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV... by Vishni Ganepola
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
Vishni Ganepola912 views
EP_Newsletter_FeaturedArticle_January16 by Tuuli Siiskonen
EP_Newsletter_FeaturedArticle_January16EP_Newsletter_FeaturedArticle_January16
EP_Newsletter_FeaturedArticle_January16
Tuuli Siiskonen273 views
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report by James Fisher
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
James Fisher263 views
Internet Governance, Surveillance, And Social Controls by Gener Luis Morada
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
Gener Luis Morada891 views
Law enforcement agencies grappling with spike in multi-million-dollar cyber s... by Bigger Price
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Bigger Price755 views
Cyber law & information technology by Talwant Singh
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh5.3K views
Internet Crime And Moral Responsibility by Tracy Clark
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
Tracy Clark2 views
Mobile Alliance flyer by Mercy Ndegwa
Mobile Alliance flyerMobile Alliance flyer
Mobile Alliance flyer
Mercy Ndegwa126 views

More from Steve Bishop

Cognitive load theory by
Cognitive load theoryCognitive load theory
Cognitive load theorySteve Bishop
2.8K views38 slides
Blockbusters #soccd by
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccdSteve Bishop
1.6K views1 slide
Blockbusters template by
Blockbusters templateBlockbusters template
Blockbusters templateSteve Bishop
487 views1 slide
Blockbusters #socfam by
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfamSteve Bishop
252 views1 slide
2.6 acids bases and salts by
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and saltsSteve Bishop
3.3K views45 slides
C2.5 exothermic and endothermic reactions by
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsSteve Bishop
9K views21 slides

More from Steve Bishop(20)

Cognitive load theory by Steve Bishop
Cognitive load theoryCognitive load theory
Cognitive load theory
Steve Bishop2.8K views
Blockbusters #soccd by Steve Bishop
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccd
Steve Bishop1.6K views
Blockbusters template by Steve Bishop
Blockbusters templateBlockbusters template
Blockbusters template
Steve Bishop487 views
Blockbusters #socfam by Steve Bishop
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfam
Steve Bishop252 views
2.6 acids bases and salts by Steve Bishop
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and salts
Steve Bishop3.3K views
C2.5 exothermic and endothermic reactions by Steve Bishop
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactions
Steve Bishop9K views
C2.3.3 quantitative chemistry by Steve Bishop
C2.3.3 quantitative chemistryC2.3.3 quantitative chemistry
C2.3.3 quantitative chemistry
Steve Bishop5K views
C2.2 how structure influences by Steve Bishop
C2.2 how structure influencesC2.2 how structure influences
C2.2 how structure influences
Steve Bishop2.6K views
C2.1 structure and bonding by Steve Bishop
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
Steve Bishop3.4K views
C2.1 structure and bonding by Steve Bishop
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
Steve Bishop5.2K views
B2.7 meiosis and mitosis by Steve Bishop
B2.7 meiosis and mitosisB2.7 meiosis and mitosis
B2.7 meiosis and mitosis
Steve Bishop4.4K views
B2.7 genetic disorders by Steve Bishop
B2.7 genetic disordersB2.7 genetic disorders
B2.7 genetic disorders
Steve Bishop2.4K views
B2.7 cell division and inheritance by Steve Bishop
B2.7 cell division and inheritanceB2.7 cell division and inheritance
B2.7 cell division and inheritance
Steve Bishop2.2K views
B2.5 proteins enzymes by Steve Bishop
B2.5 proteins enzymesB2.5 proteins enzymes
B2.5 proteins enzymes
Steve Bishop5.9K views
Aerobic & anaerobic respiration by Steve Bishop
Aerobic & anaerobic respirationAerobic & anaerobic respiration
Aerobic & anaerobic respiration
Steve Bishop46.6K views
B1.4 pollution detectors by Steve Bishop
B1.4 pollution detectorsB1.4 pollution detectors
B1.4 pollution detectors
Steve Bishop1.8K views
B1.4 plants adaptation by Steve Bishop
B1.4 plants adaptationB1.4 plants adaptation
B1.4 plants adaptation
Steve Bishop4.5K views
B1.4 animals adaptations by Steve Bishop
B1.4 animals adaptationsB1.4 animals adaptations
B1.4 animals adaptations
Steve Bishop3.9K views

Computer Crime

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.