32nd canadian congress on criminal justice the face(s) of cybercrime in 2009 james whiting: oct. 30,...

25
32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress QuickTime™ and a decompressor are needed to see this pict QuickTime™ and a decompressor are needed to see this picture. QuickTime™ and a decompressor are needed to see this picture.

Upload: trenton-dowling

Post on 15-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

32nd Canadian Congress on Criminal Justice

The face(s) of cybercrimein 2009

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

QuickTime™ and a decompressor

are needed to see this picture.QuickTime™ and a

decompressorare needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

Page 2: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

The views expressed are those of the presenter and do not represent the position of the Public Prosecution Service of Canada or that of any other organization

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 3: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

OVERVIEW

i) What is cyber-crime in 2009?ii) cyber-criminals: from fame to fortuneiii) State responsesiv) Developing Issues

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 4: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

Cyber-crime is one of the fastest growing areas of crime, as more and more criminals exploit the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of crimes.

Interpol Fact Sheet, accessed 11/01/09

In view of the highly adaptive strategies of organized crime groups, the possibility of expanding cybercrime could be great, since this is the most important and emerging area of opportunity in the 21st century.

RCMP “The Changing Structure of Organized

Crime Groups” 2005

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 5: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

what is a ‘computer’ and what is ‘cyber-crime?’

The 3 roles played by a computer

New crimes vs. old crimes committed in a new way

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 6: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

Examples of traditional crimes often committed as cyber-crimes:

-Fraud-Uttering threats-Extortion-Theft-Unauthorized use of credit card data-Money laundering-Possession of child pornography-Copyright infringement (quasi-criminal)

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 7: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?Examples of ‘new’ cyber-crimes:

-Accessing child pornography: CC s. 163.1(4.1)

-Internet luring of a child: CC s. 172.1

-Mischief to data: CC s. 430(1.1)

-Unauthorized use of a computer: CC s. 342.1

-Possession of a device to obtain computer service: CC s. 342.2

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 8: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

‘virtual crimes:’ avatar identity theft at Habbo.com

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 9: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?Tools commonly used by criminals to facilitate or commit cyber-crimes (often in combination):

-Virus-Worm-Trojan-Keylogger-Phishing/pharming/spoofing web sites-drive-by downloads from web sites-botnets-Distributed denial of service attacks-Social engineering

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 10: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Phishing sample

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 11: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Phishing sample

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

QuickTime™ and a decompressor

are needed to see this picture.

Page 12: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

Tools commonly used by criminals to avoid detection or slow down investigations:

remailing and disposable emails encryption secure/hidden vaults on-line/remote memory self-destructing memory digital currencies and internet banks Internet access through identity theft and weakly enforced/multiple jurisdictions

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 13: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

What is the extent of cyber-crime?

- the ‘dark figure’ of crime applies“….more than two out of three organizations victimized by serious cyber attacks did not report

them to law enforcement”

FBI, “Just Say No…To Cyber Extortion,” 23/01/04

- poor availability of statistics

- many ‘cyber-crimes’ fall under traditional crime categories (e.g. uttering threats and fraud)

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 14: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

PSEPC: in 2003, the worldwide annual costs of hacking, internet fraud, DoS attacks and viruses was over $1 trillion USD

McAfee: in 2005, the worldwide annual costs of fraud, identity theft, money laundering and extortion over the internet was $400 billion USD

IBM: in 2006, 60% of companies across a variety of sectors reported cyber-crime costing them more than traditional crime

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 15: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009? Corel in 2009 estimated 40% of application software being used

in Canada was counterfeit

Microsoft estimates that 36% of software being used is counterfeit

Business Software Alliance’s 2006 study found that 35% of software on personal computers worldwide was counterfeit

Transnational criminal orgs are active in counterfeiting of intellectual property

1999 Ministry of Fisheries & Oceans issues a warning re counterfeit navigation software

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 16: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

What is cyber-crime in 2009?

Research centres and collaborations may develop helpful insights into cyber-crime:

Simon Fraser University announced in 2008 it would host the International Centre for Cyber-crime Research

University of Ontario Institute of Technology announced in 2008 plans for a Centre for Cybercrime Research

Ryerson University’s Privacy and Cyber-crime Institute, U of Ottawa’s Cdn. Internet Policy and Public Interest Clinic, Harvard’s Berkman Center for Internet & Society

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 17: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Cyber-criminals: from fame to fortune“the visible problem of viruses shutting down whole computer systems simply for the notoriety of the hacker has given way to more sophisticated, but less visible, targeted attacks motivated by financial gain”

PSEPC, Reports on Plans and Priorities 2007-2008, Sec. II

“…Symantec discussed a significant shift in attackers motivated from fame to fortune….hackers are taking this trend to the next level by making cybercrime their actual profession.”

Arthur Wood, Senior V.P. Symantec Security Response and Managed Services

“In general, cyber attacks are becoming more sophisticated and profit-driven. Given the complexity of some cyber schemes, potential profits and anonymity, involvement of organized crime in New Brunswick is recognized.”

CISNB 2006 Public Report

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 18: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Cyber-criminals: from fame to fortune

Professionalization & commercialization:

recruitment of IT graduates directly into criminal orgsMcAfee 2006 Virtual Criminology Report

large-scale conventions (Defcon), on-line gatherings (Hacker’s Quarterly) and introduction of titles such as ‘hacktivists’ and ‘ethical hackers’

Increasingly employing business-like practicesSymantec News Release, 2007

Use of secure websites and chatrooms as auction sites for stolen data such as credit and personal information

Availabilty of phishing/hacking tools (e.g. MPAck, Pinch, Hacker’s Toolkit) Botnets for hire

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 19: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

State responses: International

Statutory- new criminal offences- procedural and investigative

New state entities and expanded mandates for existing entities

Public/private collaborations

Training and specialization

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 20: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

State responses: International

Council of Europe’s Convention on Cybercrime

Council of Europe opened for signing on Nov. 23, 2001 (CETS No. 185)

Canada signed as non-member state but as of October 19, 2009, has yet to ratify (23 nations have)

Canada has also signed (but not ratified) the additional Protocol on criminalization of racist and xenophobic acts on the internet (CETS No. 189)

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 21: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

State responses: InternationalAreas of harmonization required under the Convention

Enactment of specific cyber-crimes to avoid offence-free zones

Enactment of effective procedural mechanisms Commitments to international cooperation and extradition

Commitment to operating a 24/7 point of contact to assist investigations

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 22: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

State responses: International

Interpol G8 High Tech Crime sub-group Cyber-storm Joint Exercises

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 23: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

State responses: statutory new criminal offences

- enacted- proposed (e.g. ‘identity theft’)

Procedural and investigative provisions- enacted: Canada Evidence Act provisions for

electronic evidence- proposed: i)Modernization of Investigative

Techniques Act (Bill C-285)ii) Investigative Powers for the 21st Century Act (Bill C-46)iii) Technical Assistance for Law Enforcement in the 21st Century Act (Bill C-47)

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 24: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

State responses New state entities and expanded mandates for existing

entities- CCIRC- NCECC- CSE- RECOL.ca

Public/private collaborations- associations: HTCIA, POLCYB- programs: Cybertip.ca; Project Cleanfeed

Training and specialization

James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Page 25: 32nd Canadian Congress on Criminal Justice The face(s) of cybercrime in 2009 James Whiting: Oct. 30, 2009 CCJA 32nd Congress

Developing issues

i) search ‘incident to arrest’ii) ‘plain view’ doctrineiii) breach notification lawsiv) compelling passwords

James Whiting: Oct. 30, 2009 CCJA 32nd Congress