how do ‘we’ police cyber crime - the · pdf filehow do we police the uk ? the...
TRANSCRIPT
![Page 1: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/1.jpg)
How do ‘we’ Police Cyber Crime ?
Thursday 4th June 2015
Craig Jones, SEROCU
OFFICIAL
![Page 2: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/2.jpg)
![Page 3: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/3.jpg)
Presentation Content
• UK policing cyber crime programme
• Cyber threat landscape and impact
• Cyber business resilience
• Future Challenges & Opportunities
OFFICIAL
![Page 4: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/4.jpg)
How do we police the UK ?
The civil force of a state, responsible for the
prevention and detection of crime and the
maintenance of public order.
(Oxford dictionaries)
OFFICIAL
![Page 5: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/5.jpg)
![Page 6: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/6.jpg)
![Page 7: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/7.jpg)
![Page 8: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/8.jpg)
![Page 9: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/9.jpg)
What is Cyber Crime ?
The Home Office, NCA Strategic Governance Group and the Serious
Organised Crime Strategy and now ACPO use a three-fold categorisation
dividing cyber crime into:
- ‘pure’ online crimes where a digital system is the target as well as
the means of attack. These include attacks on computer systems to
disrupt IT infrastructure, exfiltration of data, compromise the integrity of
data or make data unavailable.
- ‘existing crime that have been transformed in scale or form by their
use of the internet. The growth of the internet has allowed these
crimes to be carried out on an industrial scale
- use of the internet to facilitate drug dealing, people smuggling and
other traditional crime types.
Definition used in House of Commons Home Affairs Committee, E-Crime, 2013/14
OFFICIAL
![Page 10: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/10.jpg)
Cyber Crime – The Legislation
Computer Misuse Act 1990
Section 1 - contains the basic 'hacking' offence of gaining unauthorised access to any
program or data held in a computer.
Section 2 - makes it an offence to 'hacking' with a view to commit, or facilitate the
commission of, a further offence i.e. fraud
Section 3 - contains the offence of doing any unauthorised act in relation to a
computer with intent to impair / alter data
Section 3A – making, supplying or obtaining articles for use in S1 or 3
Telecommunications Act
Public Order Act
OFFICIAL
![Page 11: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/11.jpg)
What is Cyber all about ?
• UK Cyber Security Strategy - Protecting and promoting the UK
in a digital world (2011)
• The cost to the UK economy of cyber crime is £27 Billion
(Cabinet Office 2011)
• The cost to the US economy estimated $300 Billion (MacAfee
2013)
• The cost to the worldwide economy estimated at one trillion
dollars (MacAfee 2013)
• Funding via the National Cyber Security Programme - £650
million (not estimated)
OFFICIAL
![Page 12: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/12.jpg)
Strategic Drivers for Cyber
OFFICIAL
![Page 13: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/13.jpg)
UK Cyber Security Strategy
![Page 14: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/14.jpg)
Our good friends...the 4 p’s
Serious and Organised Crime Strategy
Pursue
Criminal investigations and disruption
activity targeting the top tier cyber
threats
Prevent
Stopping individuals becoming involved in
cyber crime
OFFICIAL
Prepare
Responding effectively to major cyber
attacks and mitigating their impact
Protect
Helping businesses and the public to
avoid victims of cyber crime
![Page 15: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/15.jpg)
• Nature of the threat
- Complex, global and constantly changing
- Perpetrated remotely
- Difficult to trace
- Significant impact in the longer term
• Threat Actors in Cyber Space
- Hacktivists – to cause disruption
- Criminals – financial impact
- States, conduction cyber espionage or disruptive attacks on critical infrastructure
- Terrorist, physical attacks remain
The Threat
![Page 16: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/16.jpg)
• Cyber Crime “As-A-Service”
• Forums
• Malware
• Exploit Kits
• Intrusion (“Hacking” or unauthorised access to systems)
• DDOS
• CAV
• AVC
• APT
• Bulletproof Hosting
• E-Currencies
The Threat
![Page 17: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/17.jpg)
National Crime Agency
OFFICIAL
![Page 18: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/18.jpg)
Regional Organised Crime Units
OFFICIAL
ROCU Core Capabilities
Confidential Unit
Prison Intelligence
Technical Surveillance
Regional Fraud Teams
eForensics
Operational Teams
Operational Security
Covert Unit
Protected Person
RART
Cyber Crime
Gain
![Page 19: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/19.jpg)
Regional Cyber Crime Units
OFFICIAL
![Page 20: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/20.jpg)
Present Capabilities
• Estates
• Staffing
• Training
• Equipment
OFFICIAL
![Page 21: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/21.jpg)
I’ve been a victim of Cyber Crime
![Page 22: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/22.jpg)
![Page 23: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/23.jpg)
Reporting Cyber Crime ?
OFFICIAL
![Page 24: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/24.jpg)
Cyber Crime Workflow Process
NCCU
Action Fraud
SEROCU Cyber
Crime Unit
5 South East
Forces
OFFICIAL
Copied In
![Page 25: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/25.jpg)
Campaign Dermic
FBI took executive action on the owners of “Blackshades” which is a remote access tool.
Functions include:
- Remote Desktop Control
- Keylogging
- Webcam control
- Credit card capture
- Distributed denial of service (DDOS), and more…
OFFICIAL
![Page 26: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/26.jpg)
DDOS
• Victim in Hampshire
• Suspect in Cornwall
• Servers based in the UK
• Further victims identified World Wide
OFFICIAL
![Page 27: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/27.jpg)
Network Intrusion
Hacker stealing data from a private medical company.
• Suspect stole confidential client data
• Website defacement as proof
• Blackmail attempt via Email, and Social Media
Possible link to Russia
OFFICIAL
![Page 28: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/28.jpg)
Network Intrusion
• Former employee
• Sent a “Wipe Command” to hundreds
of employees devices – BYOD
• Further access and alterations made
into companies system.
• Impact, loss of contract and
reputation
.
OFFICIAL
![Page 29: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/29.jpg)
OP ASPEN
OFFICIAL
![Page 30: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/30.jpg)
Answers on a………..
![Page 31: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/31.jpg)
New (‘joint’) ways of working
• Law Enforcement Agencies
• Government
• Industry
• Business
• Academia
OFFICIAL
![Page 32: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/32.jpg)
Law Enforcement Partnerships
• NCCU – SAM / Embeds
• Regional Forces – CRUG, HTCU User Group
• FBI, Secret Service, Homeland Security, Europol
OFFICIAL
![Page 33: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/33.jpg)
Government
• Cert UK
• CisP
• BiS
• Cabinet Office
• Home Office
• Other Offices……… OFFICIAL
![Page 34: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/34.jpg)
Government Initiatives
‘The Ten Steps’
Key Government Cyber Guidance
Cyber Essentials Scheme
Innovation Vouchers (£5,000)
OFFICIAL
![Page 35: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/35.jpg)
![Page 36: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/36.jpg)
Industry
• Chamber of commerce
• FSB
• TechUK
• Tech Companies……………………………
OFFICIAL
![Page 37: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/37.jpg)
……………..And a few others
![Page 38: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/38.jpg)
Potential Opportunities and
Implications for Insurance
Companies
![Page 39: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/39.jpg)
![Page 40: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/40.jpg)
![Page 41: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/41.jpg)
![Page 42: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/42.jpg)
![Page 43: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/43.jpg)
![Page 44: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/44.jpg)
SUMMARY
• Helping firms to get to
grips with cyber risk
• Helping the insurance
industry to establish cyber
insurance as part of firms
cyber tool-kits
• Helping London to be a
global centre for cyber risk
management
![Page 45: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/45.jpg)
Cyber Insurance ?
• Generally policies will/can cover the following:
• First party damage to data
• Business interruption
• Privacy and security liability, including notification and credit monitoring
costs
• Brand reputation
• Cyber extortion
• Technology professional liability
• Multimedia liability
• Payment Card Industry Data Security Standard (PCI DSS) compliance
• Cyber terrorism
OFFICIAL
![Page 46: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/46.jpg)
![Page 47: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/47.jpg)
![Page 48: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/48.jpg)
Insurance Considerations
• Within the sector, the cyber threat is not well defined, confusion over
definitions
• Incomplete data in respect of the scale of cyber crime
• Risk management for cyber insurance
• Cyber insurance is a business opportunity
• Individuals/businesses unable to understand the risks in protecting
their data/information
OFFICIAL
![Page 49: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/49.jpg)
Policing Summary
• Incomplete data in respect of the scale of cyber crime
• NOT a local or regional type investigation – International reach
• Cyber crime can be committed remotely, therefore difficult to identify
offender/s.
• Victims unwilling or unable to report crimes
• Staff, knowledge, training gap, retention
• Knowledge of Law Enforcement Agencies/Courts
• Data protection and storage
OFFICIAL
![Page 50: How do ‘we’ Police Cyber Crime - the · PDF fileHow do we police the UK ? The civil force of a state, responsible for the prevention and detection of crime and the maintenance](https://reader033.vdocuments.us/reader033/viewer/2022052709/5a7a6aa37f8b9a5a588ddc0b/html5/thumbnails/50.jpg)