About Us - KIC | Korean Institute of Criminology
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
of Contents Table About Us …………………………………………………………………………………………………… 01 Conferences and Events ………………………………………………………………………… 02 News & Trends ………………………………………………………………………………………… 06 Recent Publications ………………………………………………………………………………… 14 Article: Regulations on Transmission of Commercial Advertisement Information ……………………………………………………… 20 Virtual Forum Against Cybercrime Article: Analysis on Cybercrime Trends in the Republic of Korea … 24 About Us The Virtual Forum Against Cybercrime (VFAC) is a non-profit international project that aims at reducing the impact of cybercrime by building a truly international and interdisciplinary network May / June 2016 Issue.11 of cybercrime researchers. This allows for advancements that are global in perspective and better address the transnational threat of cybercrime. Furthermore, we are working to increase the knowledge and capacity of judicial officials, law enforcement officers, and policy makers in the developing world by providing free training and access to resources. By this approach, we hope for a world in the near future where every nation possesses the skills and tools, both legal and technical, to effectively combat crime online. The Virtual Forum against Cybercrime (VFAC) came into being in 2005 when the Korean Institute of www.cybercrimeforum.org Criminology (KIC) held a workshop on ‘Measures to Combat Computer-Related Crime’ at the 11th UN Congress on Crime Prevention and Criminal Justice. Editor Seong-Jin Yeon, Director of the International Strategic Research Centre Co-Editor Jeahyen Soung, Deputy Director of the International Strategic Research Centre Claire Sujung An, Researcher at the International Strategic Research Centre Hayun Yu, Researcher at the International Strategic Research Centre For further information or questions, please contact us via email at claire.sjan@kic.re.kr.
Events Conferences and CSA APAC Summit 2016 3rd Europol-Interpol Cybercrime Conference Cloud technology has evolved from an exciting technology novelty into a white hot This Conference was hosted at Europol with the aim of further strengthening the cooperation between EU law resource. Yet, adoption is far from optimal, and technological innovation within enforcement and the financial sector. The event will provide several proposed initiatives aimed at enhancing the 31 May – 1 June the field continues unabated. Never before has technology been so entwined with sharing of intelligence to further improve and better target international law enforcement cooperation. 2016, organisational optimisation as with the advent of cloud. Charting viable directions from • Agendas include: The Hague, the myriad technology permutations for both users and their technology providers - Pertinent Threats Affecting Banks and Payment Systems Netherlands can be a daunting proposition. Therefore, this summit aims to provide a platform for 3 May 2016, - New Financial Sector and Law Enforcement Cooperation Structures discussing the future of Cloud and Cybersecurity. Singapore - Internet Security Industry • Agendas include: - Cybersecurity Treat and Operating in a Trusted Cloud Environment - Treats to Cloud Computing The 2016 SecurityWeek CISO Forum - Application Security Fast Screening and Classification - The Future of Cloud and IoT security - Cloud Adoptions with Security and Trust The forum was specifically designed to bring together senior level security executives in an intimate environment for the ultimate exchange of knowledge and insights. This event invites only approach ensures an ideal mix of enterprise security leaders who can learn from each other and gain knowledge of strategies, tools and techniques to better The International Conference “Preventing and Combating defend their enterprises Cybercrime” • Agendas include: 1–2 -The State of Endpoint Security June 2016, Virtual Forum Against Cybercrime Cybercrime has evolved significantly in sophistication and prevalence in recent years, - Investigating SWIFT Attacks against the Global Banking System California, USA - Eliminating the Attack Surface Inside Data Centres & Clouds representing a major threat, with significant implications for the national security, - Maximising the Value of Threat Intelligence economic development, and public safety. This Conference aims to discuss essential - Playing Cyberwar Games to Win aspects of the effective fight against cybercrime. In a comprehensive approach, the event - Blockchain as an Enterprise Security and Compliance Tool will feature specialists from several domains or countries, with expertise in key areas. - Using Machine Learning for Next Generation Cyber Defence • Agendas include: - Cybercrime Legal Issues, Cybercrime Case Studies 20 – 21 - Intellectual Property Crimes, Online Frauds and Identity Theft May 2016, The 4th International Conference on Cybercrime and Computer Forensics - Online Abuse and Exploitation of Children Cluj-Napoca, - Models for Cybercrime Deterrence Romania - Secure Online Authentication and Identification The event is composed of 2-day conference that focuses on increasing technological developments in both - Protecting Privacy and Public Safety Online personal computing and in smart-phone and wireless devices that have had an impact on how technology-enabled - Trade Secret Protection crimes have been committed in the Asia Pacific region and beyond. One of the key approaches to understanding - Protection against "Petty" Cybercrimes such crime is through research and incorporating the outcome of research into policy and practice. The 4th Annual May / June 2016 Issue.11 - Evidence Gathering and the Chain-of-Custody in Digital Investigations - Digital Forensics Analysis and Validation ICCCF 2016 Vancouver, BC, Canada therefore focuses its discussion on ‘Cybercrime: Linking Research, Policy, and 12 - 14 - Ways to Strengthening the Capacities of the Judiciary and Law Enforcement Institutions Practice.’ June, - International Cooperation in Fighting Cybercrime. • Agendas include: Vancouver, - Security and Digital Forensics Canada - Cyberbullying and Online Defamation th 18 International Conference on Cyber Crime and - Cyberstalking - Identifying Key Players in the Online Distributing of Child Sexual Exploitation Material Information Security - Technical Approaches to Cybercrime and Cybersecurity - Combating Online Fraud Victimisation through the Use of Financial Intelligence This Conference aims to bring together leading academic scientists, researchers - Responding to Technology Facilitated Violence against Women and research scholars to exchange and share their experiences and research results www.cybercrimeforum.org on all aspects of Cyber Crime and Information Security. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical 23 – 24 May challenges encountered and solutions adopted in the fields of Cyber Crime and 2016, London, Information Security. United Kingdom • Agendas include: - Cybercrime related investigations - Digital forensics tools and applications - Political and business issues related to digital forensics and anti-forensic techniques - Information Privacy and Information Assurance 02 03
Events Conferences and International Symposium on Cybercrime Response 2016 The 6th Annual Security Summit In the current climate, a sophisticated cyber security strategy is imperative in all areas of Military operation. Increasingly The International Symposium on Cybercrime Response (ISCR) is an annual conference complex and unforgiving cyber threats do not allow for complacency or ill-preparation; with the power to impede hosted by the Korean National Police Agency. It provides a venue for specialists of cyber the functioning of aircraft, vessels, submarines and infrastructure; and expose highly sensitive data, information, and issues to discuss and share best practices of cybercrime investigation and prevention intellectual property. This summit is deigned to hear the very latest cyber security strategies and to explore Cyber strategies, advanced policies and up-to-date forensic trends. The symposium this year warfare prevention across 3 core themes; Policy, Intelligence and Compliance is held in collaboration with INTERPOL Regional Working Group on Cybercrime that • Agendas include: 21 – 22 carries out a variety of activities to support member countries in the fight against - Policy implications from White Paper June 2016, cybercrime. It offers support to cybercrime investigations, works to develop innovative - Public-private partnerships Canberra, new technologies, assists countries in exploiting digital evidence, conducts training - High impact Cybercrime Australia sessions and assists countries in reviewing their cybercrime fighting capacities. - Cyber Security in Government • Agendas include: - Defending critical infrastructure 1) Cyber terrorism and other threats - Innovation in the R&D agenda for future Cyber capability - Cyber Terrorism in Korea and Future Endeavor - Building Australia's next generation of Cyber soldiers - Tackling Terrorist Use of the Internet: the European Counter Terrorism Centre - Intergovernmental agreements on Cyber Warfare - Promote Consensus, Strengthen Cooperation, Jointly Combat Cybercrime and - Shaping the Cyber Arms race of the future Cyberterrorism 2) New trends and approaches - Addressing IoT Threats: New Opportunity and New Challenges Cifas Annual Conference 2016: Future Crimes Virtual Forum Against Cybercrime - Law Enforcement Agencies’ Role in National Cyber Security Structures - Recent Cyber Security Issues and Response Strategies It is an annual conference organised by Cifas which organises and conducts information security events across the 3) Financially oriented cybercrime globe in order to protect business, charities, public bodies and individuals from financial crime. The theme for this - Why Does My Account Disappear: Phishing and Pharming year’s conference is future crimes. Over the course of the day, national and international experts will discuss the new 15 - 17 June, - A Success Story: Massive Crackdown on Multinational Business Email Compromise Seoul, Korea threats to organisations which are predicted to emerge over the next few years. The event will also examine how Cell - INTERPOL Coordinated Actions against Business Email Compromise organisations and the law will need to adapt in the face of changing public attitudes towards identity, privacy and the 23 June 2016, use of personal data. London, 4) Cyber attacks against critical infrastructure - National Critical Information Infrastructure Protection Strategy and Approach in India • Agendas include: United Kingdom - The Cybercrime Challenge – an Australian Law Enforcement Perspective - Crime Prevention - Future Crime 5) Crimeware as a service - History of Crime and Modern-day Bribery and Corruption - New ways in analyzing bad guys data - Cyber Attack - DD4BC & Operation Venus (DD4BC, DDoS - for Bitcoin) - Economic Crime 6) Collective responses against cyber threats and INTERPOL digital crime center May / June 2016 Issue.11 - INTERPOL Digital Crime Centre – 24/7 Contact Points - Breakthrough in Tackling Cybercrime: Financial Sector Taskforce - Supporting LEAs in Cybercrime Investigation and sharing of threat intelligence Rethinking Cybercrime 2015: UCLAN Cybercrime Research Unit Focusing on Ransomware - European Cybercrime Centre - Update on operational and strategic activities, J-CAT The theme of the conference is to critically examine the current ‘state of play’ in global Cybercrime in relation to a diverse and approach to private parties cooperation range of issues including terrorism, online sexual predation, property/identity theft, cyber-bullying, virtual criminology, cyber- 7) Harmonization, cooperation, research and capacity building security and trolling, in tandem with attempts to ‘rethink’ ways in which we might conceptualise theoretical developments, - Plenary Discussion: Data Sharing in a Digital World Focusing on Mutual Legal Assistance inform social and educational policy, respond to threats and prevent and combat online criminal behaviour. - INTERPOL Digital Forensics Laboratory Capabilities • Agendas include: - "Intuition and Expertise": Way to a New Capacity Building Approach on Needs and - The emergence of ‘Virtual Criminology’ Expertise - The growth of cyber-space as a major site for crime and moral transgression www.cybercrimeforum.org - Research on the Dark Market and Training Initiatives - Cyber-terrorism and role of the internet in radicalisation 27 – 28 June - Cybercrime Situation and Challenges - Identity theft and online fraud 2016, Preston, - Intellectual Property Crime United Kingdom - Online sexual predation & grooming - Surveillance, monitoring and privacy - Effectiveness of law and order agencies to control cybercrime - Security services [private and government] - Hate Crime and hate speak - Trolling and anti-social behaviour - False accusation and defamation - Social networking and deviance 04 05
and Trends News The nine men and three women are wanted for questioning over transactions totalling $1.5 million and attempted transactions of $700,000 at Cisco launches $10 million global Cybersecurity Scholarship Program, banks across Sydney, Newcastle and the Southern Highlands between November 2014 and July last year. improves certifications The syndicate attracted University and foreign students by saying that they can earn money easily by just opening bank accounts, and they used those accounts for the fraud. When victim’s bank account is successfully hacked, personal details are disclosed and victim’s mobile phone account is moved by the offender to a new carrier with a new number without the victim’s consent. 15 June 2016 by Sara Barker, Securitybrief AU Changing the account ¬holder’s contact number ¬allows fraudsters to open new online accounts in the victim’s name to transfer money. It has been reported that Cisco, a multinational corporation for networking hardware and security services will be Those who made bank accounts as the criminals said found themselves have thousands of dollars debt as police crack down on the scam. addressing cybersecurity skills shortage by operating $10 million Global Cybersecurity Scholarship Program to the Two students prosecuted last year for helping steal $541,000 from one victim, were ordered to repay $178,000 and $163,000 ¬respectively despite security certification program. not making any money themselves. Students who wanted to make ‘easy money’ were scammed and being used in the organised fraud. Police warned The company mentioned that we will be lack of cybersecurity experts by 2019 despite the fact that cybersecurity that people should be careful when being approached by those advertisements saying they can earn money just by opening bank accounts. protection is a highly needed area. To fill the gap, Cisco is encouraging up to 10,000 cybersecurity candidates to William Kim, 19, allegedly a mid-level player in the syndicate, was charged last month over the theft of $450,000. Dinh Anh Khoa Trinh was step forward. charged last year in relation to the theft of more $4 million. He allegedly controlled 60 mules flown in from Asia to withdraw funds to avoid law Jeanne Beliveau-Dunn, vice president and general manager at Cisco Services said, "Cybersecurity is essential to enforcement attention. digital success. Many CEOs across the globe tell us their ability to innovate is hampered by their security concerns in the digital world. This creates a big future demand for skill sets that don't exist at scale today. We developed
and Trends News In related news, the Securities and Exchange Commission (SEC) in the US said that cybercrime is the biggest threat facing the financial industry. Exclusive: In Ecuador cyber heist, thieves moved $9 million to 23 Hong Speaking at the Reuters Financial Regulation Summit in Washington D.C., Mary Jo White, chair of the SEC, explained that the commission’s Kong firms analysis has shown that counter policies that deal with cybercrimes are not enough. “What we found, as a general matter so far, is a lot of preparedness, a lot of awareness but also their policies and procedures are not tailored to their particular risks,” she was quoted by Reuters as saying. 25 May 2016 by Clare Baldwin and Nathan Layne, Reuters $12 million stolen from an Ecuadorian bank by cyber criminals in 2015 was found to be transferred to 23 companies based in Hong Kong, some of which show no clear business activity, according to previously unreported court filings and judicial rulings. The court papers offer a first glimpse into where some of the money was moved after it reached accounts in Hong Kong. The lawsuit was filed by Ecuador's Banco del Austro (BDA) in Hong Kong against the web of companies that received or handled more than $9 million in stolen funds, bank records submitted to the UK cybercrime prosecutions rise 34% in 1 year territory's Court of First Instance show. A separate court filing indicated that $3 million went to companies in Dubai and other places, which is not the subject of litigation in Hong Kong. It has been reported that SWIFT global messaging system was used to move the funds, which is bridging bank 23 May 2016 by RT (Autonomous Nonprofit Organisation) money transfers worldwide. There was another case in Bangladesh when $81 million has been stolen via this It was found that the number of cyber criminals prosecuted in Britain rose by almost 34 percent in 2015 while prosecutions for white collar network in February. A search for cyber thieves behind the February attack which ranks one of the largest ever criminals also increased slightly. According to the data provided by a law firm Pinsent Masons, the number of perpetrators prosecuted for has been conducted by the U.S. Federal Bureau of Investigation and Bangladesh authorities. cybercrime jumped from 45 to 61 in a year (2014-2015). In the Ecuadorian heist, the money was transferred by Wells Fargo (WFC.N) based on authenticated SWIFT Head of Global Corporate Crime at Pinsent Masons, Barry Vitou, welcomed the increase. He told the Financial Times that the increase in messages, and both BDA and the U.S. bank now believe those funds were stolen by unidentified hackers, prosecutions is a positive sign in that it indicates authorities are tackling complex crime cases better. according to documents in a BDA lawsuit filed against Wells Fargo in New York this year. Pinsent Masons’ data also reveals an increase in prosecutions for white-collar criminals; the number of prosecutions in this area rose by 59 since Virtual Forum Against Cybercrime The existence of an investigation by Hong Kong Police has not been confirmed and the Ecuador attorney 2014. general’s office did not respond to a request for comment. The FBI and BDA also declined comment. High profile white collar crime cases filed by Britain’s Serious Fraud Office (SFO) include that of ex-UBS derivatives trader Tom Hayes, who was Initially, cyber thieves moved $9.139 million of the more than $12 million they stole from BDA into the Hong convicted of Libor rigging and the case of Magnus Peterson, who used his hedge fund Weavering Capital to commit financial fraud. Kong accounts of four companies at HSBC (HSBA.L) and Hang Seng Bank (0011.HK). At least $3.1 million of the funds were then routed from those four companies to 19 "second layer" bank accounts, meaning the funds Cybercrime made a second hop to another set of Hong-Kong registered companies, the papers show. A National Security Strategy, published by Downing Street in 2010, pointed out cyber-security a top priority for Britain, along with global Hang Seng Bank and HSBC refused to comment on the details but they mentioned that they are in full terrorism, international conflict and natural disasters. cooperation with the law enforcement authority and endeavor to deter repetition of crime. As the use of e-commerce, online banking and digital device has been mobilised, criminals have been taking advantages of vulnerabilities The second layer accounts where money were transferred to do not seem to have any business transactions, technology has. While technology has reduced some criminal opportunities, it has inevitably facilitated others such as digital fraud and a BDA lawyer said in the filings. Hong Kong Deputy High Court Judge Conrad Seagroatt said in a December disruption of critical state infrastructure via advanced technologies. ruling that the four initial recipients showed no prior history of business activity. "They all appear to be otherwise The authority responsible for dealing with cybercrime in Britain is The National Cyber Crime Unit (NCCU), a division of Britain’s National Crime inactive corporate vehicles controlled by citizens of the People's Republic of China," Seagroatt wrote. Agency (NCA). It works closely with a number of partners, including Regional Organized Crime Units (ROCUs), the Metropolitan Police Cyber Crime Unit (MPCCU) and a range of cross-border actors. The government plans to spend more than £40 million on a new cyber security center designed to protect Ministry of Defense (MoD) networks May / June 2016 Issue.11 and systems from so-called “malicious actors”. Cyber security in Britain Data theft is one of the most common cybercrimes for the purpose of financial gain. Also, political protesters and national spies use hacking Financial industry ‘needs to come together to fight cybercrime’ to steal classified information and state secrets. It was found in a survey conducted by SecureData that companies are positive in considering hiring ex-hackers to work for them to deal with cyberattacks. 97% of those who participated in the survey polled that data security is key to 25 May 2016 by Narinder Purba, WeLiveSecurity countermeasures against cybercrime. The case over Lauri Love, a British security expert who allegedly hacked into multiple US government agencies and is waiting for extradition Financial industry has been voices over growing worries of threat of cybercrime and experts have emphasised hearing has been provoking controversy as the NCA has been criticised for the treatment of the hacker. The law enforcement body had tried that the industry should cooperate to better understand and deal with the threats. to use a civil suit launched by cyber-security expert, Lauri Love, to force him to hand over his encryption keys. Love was seeking the return of a Gottfried Leibbrandt, CEO of SWIFT, described cybersecurity as a “critical issue” and pointed out that www.cybercrimeforum.org number of his encrypted devices, currently held by the NCA. countermeasures against it should be improved. At the 14th annual European Financial Services Conference The authority’s plan was blocked by Judge Nina Tempia who ruled that Love was not obliged to hand over passwords. Love's extradition hearing held in Brussels, he pointed out that fighting cybercrime will be a major and ongoing battle. He mentioned that is scheduled for the 28th and 29th June. His US lawyer, Tor Ekeland, said the cyber security expert's skills should be nurtured by the British even if the number of cyberattack will increase and the technology used in the attack will advance, we are not government. “Talented thinkers like him are an asset in identifying security flaws in computer systems,” Ekeland told RT in April. "If the U.S. supposed to be giving in. “Rather, it means that we must work even harder at our collective defensive efforts.” had been prosecuting computer crimes in the 1970’s like they are now, Steve Jobs, Steve Wozniak and Bill Gates all would have gone to jail and The cyber heist at Bangladesh bank in which criminals leaped $81 million profits in February was described as a you would have no Apple or Microsoft because both those companies were started by hackers." “watershed” moment that changed the industry forever. The attack could have been worse, as a spelling mistake prevented the perpetrators from netting close to $1 billion. Mr. Leibbrandt reminded that the security is core for banks and cyberattacks should be taken into account seriously. 08 09
and Trends News to hide and unhide Exel sheets to escape suspicion. Botswana: Cybercrime Threatens Developing Economies Another technique found in the malware was the use of DNS queries as a data exfiltration channel. As DNS is required for normal network operations, it is unlikely to be blocked, allowing free communications out of the network, and its use is unlikely to raise suspicion among network defenders. “Although this attack did not leverage any zero-days or other advanced techniques, it was interesting to see how attackers used different 23 May 2016 by The Patriot, Distributed by AllAfrica Global Media components to perform reconnaissance activities on a specific target,” the researchers said. The Patriot, Botswana’s news media reported on the first international conference on the Internet, Cybersecurity Users can protect themselves from such attacks by disabling Office macros in their settings and also by being more vigilant when enabling and Information Systems held in Gaborone. It was organised by University of Botswana in collaboration with macros in documents, even if such documents are from seemingly trusted sources. the University of Johannesburg, focusing on challenges caused by cybercrime. The conference was in line with the country’s efforts to build effective strategies against cybercrime that is derived from technological evolution and was attended by delegates from African and European countries. Participants shared ideas on cybersecurity which has become a significant issue around the world. Academics, practitioners and the government (Ministry of Transport and communication) will cooperate on the strong strategy and implementation. The Permanent Secretary in the Ministry of Transport and Communication Neil Fitt commented that the conference will contribute to helping African countries where internet development US Navy to Train Up a Hacking Team has been slow. Since the installation of internet network has been undergoing in the country, the government realises the need to prepare safe cyberspace in order for users to use it in stable environment by curbing 20 May 2016, by Tara Seals, Infosecurity disruptions or intrusions. In the environment where internet is involved in everyday activities, cybersecurity is key The US Navy said it is planning to create its own team of “ethical” sailor-hackers. to maintain and protect the system. The authority announced that it will be recruiting 34 individuals to participate in the program called ‘Ethical Hacker Program’ which will be held "We are trying to make cyberspace safe for everyone and stop all illegal activities on the internet," said Fitt. 6-10th June 2016 in San Diego. Participants will undertake training organised by the International Council of Electronic Commerce Consultants He pointed out the importance of cybersecurity and the country’s efforts to establish effective cybersecurity or an authorised partner. The course consists of lectures, team activities and case studies followed by beyond-site certification testing. strategies. Also, the Director of Public Prosecution Advocate Abraham Keetshabe reminded that legal and Virtual Forum Against Cybercrime The Navy stated that a certified ethical hacker “is a skilled professional who understands and knows how to look for the weaknesses and regulatory frameworks for ICT need to be founded and effective national ICT policy will help the country’s social, vulnerabilities in networks and/or computer systems and uses the same knowledge and tools as a malicious hacker upon request from an economic, cultural and political transformation in days to come. organisation. The certification is for individuals who are responsible for securing (or testing the security of) computer networks.” In this context, Keetsahbe welcomed the introduction of Electronic Communications and Transactions Act and The military has expedited cyber-plans; government contractors and a former Pentagon official noted that the government will be developing Electronic Records (Evidence) Act that came into effect in 1st April 2016. He said that Botswana has been putting computer code and cyber weapons that are able to kill adversaries under a new half-billion-dollar military contract. an emphasis on ensuring personal data protection regionally. There has been a concern that these cyber weapons will allow US troops to launch “logic bombs,” instead of traditional weapons, which The conference aimed to help all the African countries with growing online economies by providing a venue for essentially would force an enemy’s critical infrastructure to self-destruct—likely with the loss of human life. exchanging ideas and sharing good practices. There is a high chance that the conference would be an annual According to Infosecurity, sources told Nextgov that the contract is the main part of an upcoming $460 million U.S. Cyber Command project, event in order for the countries to share technology, practices and challenges in cybersecurity. which will outsource “cyber fires" planning, as well as "cyberspace joint munitions" assessments to contractors. Raytheon, Northrop Grumman and Lockheed Martin are among the major defense firms expected to compete. The Pentagon has launched a program called "the first cyber bug bounty program in the history of the federal government”, earlier this year and the Department of Defense is inviting hackers to test the department’s cybersecurity profile. A pilot program initiated by the Pentagon, “The Hack” uses crowdsourcing from commercial sectors to identify vulnerabilities and deficiencies of department’s public webpages. May / June 2016 Issue.11 Hackers Target Multiple Middle East Banks 23 May 2016 by Tara Seals, Infosecurity Infosecurity, an online cybersecurity news and blog reported that hackers have been keeping close tabs on Middle East banks, in preparation for a major attack. Singapore banks' group invites SWIFT to discuss cyber attacks Researchers at FireEye found out that emails with malicious attachments have been sent to a number of banks in the Middle East region. The purpose of the attack was to collect information on logged on user, network 19 May 2016, Reporting by Saeed Azhar, Editing by Christopher Cushing, Reuters configuration data, user and group accounts, local and domain administrator accounts, running processes and Reuters reported that The Association of Banks in Singapore (ABS) will hold a meeting to discuss major cyberattack cases in Bangladesh and personal data. When obtaining these information, hackers would be able to conduct a large scale campaign. Vietnam with Society for Worldwide Interbank Financial Telecommunication (SWIFT), which involved SWIFT’s financial messaging service in June. The emails sent to employees contained Excel file, with a message related to IT infrastructure, pretending it www.cybercrimeforum.org It has been known that members of ABS have engaged SWIFT individually when the attacks happened. "ABS, for its part, has invited SWIFT to is a normal and work-related task. But the system used in this attack operated only on Windows Vista and a meeting in early June to share its experience in managing the incidents in Bangladesh and Vietnam," it said in an email to Reuters. subsequent versions of the operating system. Singaporean banks have been alerted to keep a high level security for critical IT systems, so has other central banks including Bank of England. “In one case, the content of the email appeared to be a legitimate email conversation between several An investigation has been conducted by the FBI and private forensic experts for the cyber heist in Bangladesh in February in which $81 million employees, even containing contact details of employees from several banks,” FireEye noted. “This email was was stolen from a central bank account kept at the Federal Reserve Bank of New York. Hackers installed malware at Bangladesh Bank's Dhaka then forwarded to several people, with the malicious Excel file attached.” headquarters that hid traces of their attack to delay discovery so they could access the funds, according to police and private security firms. Office documents containing malicious software are used as a common method used in cyberattack. Since office Following the attack, Vietanm’s Tien Phong Bank said it had interrupted an attempted cyberattack which was similar to the heist in Bangladesh, settings typically require user action in order for macros to run, hackers deceive victims that they need to enable containing deceitful SWIF messages the code in order to view “protected content”. When victims agree to follow it, the content of file displays as if it is legitimate. Researchers said that the scripts attackers used are unique one in a sense that they took extra step 10 11
and Trends News Identity theft victims need more assistance as cyber crime skyrockets, Government Spends Big on Cyber Security support services say 9 May 2016 by Sydney Criminal Lawyers 16 May 2016 by Matt Wordsworth, ABC News The Australian government recently announced that it will upgrade defence against cyberattacks. $230 million cyber security strategy has been ABC News Australia reported that the number of identity theft victims has been surged and the demand for introduced to reduce costs caused by costly cybercrime. support services has been increasing. It is estimated more than 1 million Australians fall victims of identity fraud The strategy is to frustrate malicious cyberattacks such as data theft and intellectual property theft. The Australian Crime Commission (ACC) each year at a cost of about $1 billion. and Australian Federal Police (AFP) will receive an additional $16 million and $20.4 million in funding respectively to assist with threat detection, Currently IDCARE is the only free national support service for Australian and New Zealand victims of the fraud; technical analysis and forensic assessment, and an extra 101 cyber security experts will be brought-in to provide advice and assistance. the organisation has about 20 staff and gets funding from the industry and the Federal Government. Information-sharing is also a part of the strategy. It has been reported that $39 million will be spent to move the Australian Cyber Security Managing director Dr David Lacey, who spent 20 years at the Department of Defence and the Australian Crime Centre from Canberra, and $47 million to establish threat sharing centres in capital cities. An online portal will be introduced to improve Commission, said the number of calls for help has been doubling every three months. He mentioned that cooperation between private sectors and government agencies, and $15 million is allocated for grants to enable small businesses to upgrade investments on the weapons for cyberwarfare have been active whereas the first aid response and support security systems. Also, to nurture experts in cyber security, the government has suggested expanding training courses in TAFEs and developing services are lack of resources. "If we're at cyber war there's a lot of investment going into bullets and rifles at new programs. the moment but in terms of the stretcher bearers and the first aid post and those to provide the triage and the The Attorney-General’s Department estimates the direct costs of cyber-crime in Australia to be $2 billion per year. The cost is increasing. In emergency support, we're it," he said. 2011, 313 attacks triggered a response by the Australian Signals Directorate, the relevant agency within the Department of Defence. The A report on IDCARE's first year of operation found 8 per cent of clients were referred to mental health number nearly quadrupled to 1131 in 2014. professionals for face-to-face support. CISCO chief security and trust officer, John Stewart, says that it is also important to realise that the sectors that are not usually considered as Paul McDonald, a victim of identity fraud had $28,500 stolen from his retirement savings in April. The thieves IT industries also need to be viewed as IT-enable businesses today. “Australia must embrace cyber security as a key differentiator and business hacked his email and advised his financial advisers to transfer cash and liquidate shares and a term deposit, worth advantage to be globally competitive and prosperous.” Mr. Stewart said. Virtual Forum Against Cybercrime more than $200,000. By chance, Mr McDonald and his wife realised when they contacted their financial advisers Cyber espionage is also a significant concern, posing a threat to national interests and security. The Bureau of Meteorology said China has from a separate email account and were able to stop the trade, but they lost the cash. allegedly been engaged in a major cyberattack in 2015, aiming to compromise data of federal agencies. The authority possesses one of the When Mr McDonald reported the theft at his local police station, the officer guided him to contact the Australian biggest supercomputers in the country, providing classified information to a number of agencies including the Department of Defence. It said Cybercrime Online Reporting Network (ACORN) but it was not very helpful. "There doesn't seem to be a lot that if the attack was successful it could have costed billions of dollars. of help out there. So I went looking for resources to help with this and I guess the only thing I found online In its first unclassified threat report in 2015, the Australian Cyber Security Centre described the threat to Australia as “undeniable” and anywhere in Australia is this mob called IDCARE," he said. “unrelenting”, and said it “continues to grow”. The Centre “sees daily cyber espionage activity targeting Australian Government networks”, Mr McDonald reminded people that we all need to check computers for viruses and email settings on a regular which seek to gain a strategic advantage in business activities and foreign policy negotiations. basis in order to prevent malicious attacks. "If you've got webmail, find the settings, get into the filters and have IT security company Symantec wrote in its annual Internet Security Threat Report that Australian citizens and corporations are often being a look and see if there are any filters in there because if there are, you've been hacked," he said. "I know it's targeted by cyber criminals and the country ranked top for ransomware attacks in the Southern Hemisphere. Not only large companies and scary. If you've been hacked have a look at the email addresses that are sitting in that filter and you'll see who government bodies, but individual citizens have become a common target. About 60% of Australians fell victims of cybercrime during their you should be talking to very quickly." lifetime and nearly 47% of this groups have been targeted in the past 12 months. Symantec reports that “Australia is seen as a great target There was another case hackers took a victim’s mobile number and used it to transfer $80,000 via online by cybercriminals because we are a sophisticated economy, with high disposable incomes, good connectivity and a high concentration of banking. Her bank required a password, delivered by text message, before processing transfers. The victim, connected devices.” named Sue said "I was in Airlie Beach and I tried to ring my son and he didn't return my call so I went back to It is generally agreed that the government’s plan on investment is on the right track and continuous knowledge sharing among agencies against May / June 2016 Issue.11 my hotel and noticed my phone had 'SOS only' on it." cyber threat is important. Since criminals and technologies used in cyberattack are evolving and developing at a fast pace, responses should When she opened her email via iPad there were nearly hundred online banking notifications indicating purchases keep up the speed. were made. "In that week I got 176 emails of people purchasing stuff — $4,000 at Apple in Perth, JB Hifi in Brisbane.” When she contacted her mobile carrier Telstra, the company said her contract with Telstra has been cancelled and transferred to another carrier, Optus. "We don't know how it happened — we presume the driver's licence. When they opened the Optus account they had my driver's licence number. I haven't lost my bag, I haven't lost anything. All I can think of is that I never got my (licence) renewal in the mail." Dr Lacey people should try to protect themselves from hackers by taking simple security measures such as changing passwords and installing anti-virus software. www.cybercrimeforum.org 12 13
Publications Recent presents a three phased-research to identify the suitable regulatory approach for the critical infrastructures of Turkey. First of Cybercrime and Business: Strategies for Global Corporate Security all, the data of the critical infrastructures of Turkey are qualitatively analysed, by using grounded theory method, to extract the Sanford Moskowitz, Published by Butterworth-Heinemann (June 2016) vulnerabilities associated with the critical infrastructures. Secondly, a Delphi survey is conducted with six experts to extract the required regulations to mitigate the vulnerabilities. Finally, a focus group interview is conducted with the employees of the critical The author examines the three most prevalent cybercrimes afflicting today’s corporate security infrastructures to specify the suitable regulatory approaches for the critical infrastructures of Turkey. The results of the research professionals: piracy, espionage, and computer hacking. Showing how each of these threats evolved show that the critical infrastructure operators of Turkey, including privately held operators, are mainly in favour of regulations. separately then converged to form an ultra-dangerous composite threat, the book discusses the impact the threats pose and how the very technologies that created the problem can help solve it. It then offers viable strategies for how different types of businesses—from large multinationals to small start- ups—can respond to these threats to both minimize their losses and gain a competitive advantage. The book concludes with identifying future technological threats and how the models presented in Computer Forensics: Investigating Network Intrusions and Cybercrime the book can be applied to handling them. The book describes how to effectively handle corporate cyber security issues using case studies from a wide range of companies around the globe, highlights the International Council of E-Commerce Consultants, Published by EC Council (May 2016) the regulatory, economic, cultural, and demographic trends business encounter when facing security issues and profiles corporate security issues in major industrialized, developing, and emerging countries The book provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. This book is covering a broad throughout North America, Europe, Asia, Latin America, Africa, and the Middle East. base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Author explains advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this book provides preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive Virtual Forum Against Cybercrime hacker's path through a client system. Comprehension of cyber threats and their consequences in Slovenia Blaz Markelj and Sabina Zgaga, Pubished at Computer & Security Review, Volume 32, Pages 513- 525 (June 2016) Students in Slovenia use their private mobile devices to access various information systems and Combating Violent Extremism and Radicalization in the Digital Era (Advances in Religious corporate data that can be classified, or marked as trade secrets, personal data or professional and Cultural Studies) secrecy. Individuals who are granted authorized access to these types of data are obliged to protect them from unauthorized access and cyber threats. The results of survey and criminal law analysis Majeed Khader, Neo Loo Seng, Gabriel Ong and Eunice Tan Mingyi, Published by IGI Global (May 2016) have shown us that the student population is not well aware of security threats and security The book provides a reference for the latest research on the utilization of online tools by terrorist organizations to communicate with May / June 2016 Issue.11 measures. Because the user of a mobile device can be held criminally responsible for the loss of and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against data that he or she had accessed by using the mobile device, even though he or she is not aware such threats. Focusing on perspectives from the social and behavioural sciences, this book suggests researchers, analysts, intelligence of security threats and protective measures against them. This paper provides recommendations for officers, and policy makers preventive methods for online terrorist activities. It examines how violent extremists exploit the Internet to implementing internal regulations and continuously educate mobile device users about their safe achieve their goals, online radicalisation, the ways in which violent extremist ideology in the digital space can be combated, emerging usage in accordance with organizational standards. trends in cyberterrorism (Internet as a weapon of destruction), issues of hacking and phishing and countermeasures. www.cybercrimeforum.org Regulatory approaches for cyber security of critical infrastructures: The Computer Crimes and Digital Investigations case of Turkey Ian Walden, 2nd Edition, Published by Oxford University Press (May 2016) Bilge Karabacak, Sevgi Ozkan Yildirim and Zazife Baykal, Published at Computer Law & Security Review, Volume 32 (June 2016) Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to Cyber systems are extensively used to control and monitor critical infrastructures. A considerable be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more amount of the infrastructures are connected to the Internet over corporate networks. Therefore, important than ever for practitioners working in this area to stay up to date. cyber security is an important item for the national security agendas of several countries. This paper 14 15
Publications Recent The book provides essential guidance on the substantive and procedural aspects of cybercrimes for increasing the penalties are not very effective. Authors discovered that better control of dark markets to prevent the trading of stolen both experienced practitioners and for those new to the field. It includes new material on topics such data has a much higher impact. In general, results of our simulation can be used to analyse the perpetrator's economic motives and to as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception establish a basis for effective countermeasures. as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organizations such as the United Nations, places cybercrime in its international context. Digital Forensics with the AccessData Forensic Toolkit (FTK) The book provides a comprehensive review of essential digital forensics concepts and builds on this information to teach the readers on how to conduct digital investigations with AccessData’s FTK (the industry-standard and court-accepted digital investigations platform). It covers the technology that all digital forensics investigators need to understand especially data, storage media, file systems and registry files. Also it explains the best ways to use FTK 5 tools, including FTK imager, FTK registry Combatting Cybercrime and Cyber terrorism; Challenges, Trends and viewer, and the Password Recovery Toolkit (PRTK) to conduct legally defensible investigations. Priorities Babak Akhgar, Ben Brewster, Published by Springer (May 2016) Virtual Forum Against Cybercrime This book provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism issues. This book helps to consolidate Cybersecurity Investments: Decision Support Under Economic Aspects (Progress in IS) the increasing role and responsibility of society as a whole, including law enforcement agencies, the Stefan Beissel, Published by Springer (March 2016) private sector and academia, to tackle cybercrime and cyberterrorism This new contribution to cybercrime and cyberterrorism knowledge follows a multi-disciplinary This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance philosophy supported by leading experts across academia, private industry and government agencies. between financial expenditures and risk mitigation. This is achieved by pursuing a multi-disciplinary approach that combines well- This volume goes well beyond the guidance of law enforcement agencies, academia and private sector founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk- policy documents and doctrine manuals by considering cybercrime and cyberterrorism challenges in through for the complete lifecycle of cybersecurity investments. Insights into the economic aspect of the costs and benefits of a wider practical and operational context. It juxtaposes practical experience and, where appropriate, cybersecurity are supplemented by established and innovative economic indicators. Readers will find practical tools and techniques policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber to support reasonable decision making in cybersecurity investments. Further, they will be equipped to encourage a common May / June 2016 Issue.11 ecosystem ensuring that all security practitioners are better informed and prepared to carry out their understanding using economic aspects, and to provide cost transparency for the senior management. cybercrime and cyberterrorism responsibilities to protect the citizens they serve. Cybercrime Among Companies: Research Into Cybercrime Victimisation Among Small and Phishing: An economic analysis of cybercrime perpetrators, Computer & Medium-Sized Enterprises and One-Man Businesses in the Netherlands Security, Volume 58, Pages 39-46 Sander Veenstra, Wouter Stol and Renske Zuurveen, Published by Eleven International Publishing (March 2016) Christian Konradt, Andreas Schilling, Brigitte Werners (May 2016) www.cybercrimeforum.org In 2013, a Dutch newspaper reported that 'online theft kills one-man businesses'. The digitisation of society offers businesses Cybercrime, one of the most important security topics, will continue to emerge as a more critical security opportunities, but also poses risks. However, scientific evidence on the extent to which businesses actually fall victim to cybercrime threat within the next years. Among the different attacks, phishing is of special interest because of its is scarce. This book contains the findings of a study into cybercrime victimisation among Small and Medium-sized Enterprises negative impact for the economy. This paper develops a simulation study based on the work of Fultz and (SME's) and One-Man Businesses (OMB's) in the Netherlands that was conducted from 2013 until 2015. Over 1200 SME's and Grossklags. To extend their analysis of cybercrime by an economic view, authors customized their model more than 1,600 OMB's were surveyed. The report presents unique figures on the extent and impact of cybercrime amongst and used it as basis for the analysis. Based on the data from recent literature, this paper gives insights businesses and the results indicate that more than a quarter of Dutch businesses are confronted with cybercrime. Victims are self- into the perpetrator's behaviour and allows us to quantify the effectiveness of countermeasures. Due to reliant: they seldom contact law enforcement, but instead take action to prevent and solve cybercrime problems themselves. As a the fact that mainly risk-seeking persons are responsible for these attacks, countermeasures aiming at consequence, police lack insight into the nature and extent of cybercrime amongst SME's and OMB's, which hampers the ability 16 17
Publications Recent of law enforcement to contribute effectively to the fight against cybercrime. This book appeals to various attempts at network intrusion and the steps typically taken in the implementation of cyber-thefts. The paper will provide anyone interested in the digitisation of society and its implications for crime and law enforcement. the rationale behind the justification of why humans are considered to be the weakest link in these attacks. The study will also explain the reasons for the rise in cybercrimes and their impact on Organizations. In closing, the paper will put forward some recommendations to serve as preventative measures and solutions to the threats and vulnerabilities posed by cyber-attacks. Finally, measures, such as conducting regular, thorough, and relevant awareness training, frequent drills and realistic tests will be addressed with a view to maintaining a steady focus on the overall discipline of the organization thereby hardening that component of the network that is the softest by nature—the human vulnerability factor. Keywords of this book include social Introduction to Cybercrime: Computer Crimes, Laws and Policing in the engineering, cybercrime, cyber theft, network intrusions and preventive measures. 21st Century Joshua B. Hill and Nancy E. Marion, Published by Praeger (February 2016) The book elaborates on cybercrime and cybercrime related issues such as law enforcement, privacy, cyberwar and policing. It provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government— international, national, state, and local. The chapters consist of history of cybercrime, types The Cyber Threat to Nuclear Stability and frequency of cybercrime, amount of cybercrime, law enforcement, organised cybercrime, Paul Bracken, Published by Elsevier Inc. (February 2016) cyberterrorism and terrorists online, cyberwar, domestic response and international response. Abstract Virtual Forum Against Cybercrime will transform deterrence and arms race stability and lead to other significant changes. The driver behind this is a combination of long standing problems with mobile missiles along with new technologies not usually factored into strategic assessments: big data analytics, computer vision, and related information systems. When combined with drones and precision strike, the hunt for mobile missiles is becoming faster, cheaper, and better. The implications of this finding vary by country, but will shape major Developing Norms for Cyber Conflict power nuclear modernization, crisis stability among secondary powers, and conventional attack of nuclear deterrents. William Banks, Published by Social Science Research Network (February 2016) Abstract: The prospect of cyber war has evolved from science fiction and doomsday depictions on television, films, and novels to reality and front page news. As early as 1982, a little-noticed but massive explosion of the trans-Siberian pipeline was caused by malware apparently inserted into Canadian software Future Crimes: Inside the Digital Underground and the Battle for Our Connected World Reprint Edition May / June 2016 Issue.11 by the CIA. The CIA and Canadians knew that the software would be illegally acquired by Soviet agents. Although the incident greatly embarrassed the KGB, the Soviets never disclosed the incident or Marc Goodman, Published by Anchor (January 2016) accused the United States of causing it. If a U.S. missile had struck the pipeline, the Soviets would have expressed their outrage publicly and almost surely would have retaliated. Keywords of this book include Although the development of technology has benefited human society in various ways, it also involves an ominous flip side. A cyber war, cyber conflict, cyberespionage, cybersecurity and international law. tidal wave of scientific progress has been made that will leave our heads spinning—from implantable medical devices to drones and 3-D printers, all of which can be hacked, with disastrous consequences. The author Marc Goodman, leading authority on global security leads readers to a vivid journey through the darkest recesses of the Internet with explosive insights based on his career in law enforcement and counterterrorism. He explores how bad actors are primed to hijack the future technologies. Provocative, thrilling, and ultimately empowering, Future Crimes will urge to take action that shows how people take back www.cybercrimeforum.org control of our own devices and harness technology’s tremendous power for improving humanity before it’s too late. The Rise in Cybercrime and the Dynamics of Exploiting the Human Vulnerability Factor by Dr. Nabie Y. Conteh and Malcolm D. Royer, Published International Journal of Computer (February 2016) Abstract This paper is primarily intended to firstly define and review the literature in cybersecurity and vividly shed light on the mechanisms involved in the social engineering phenomenon. It will discuss the 18 19
You can also read