170 likes | 383 Views
High Tech Crime The Australian Scene. Brian Diplock Australian High Tech Crime Centre. Caveat. The materials and information contained in this presentation are intended to raise awareness within the RUXCON conference of High Tech Crime in Australia.
E N D
High Tech Crime The Australian Scene Brian Diplock Australian High Tech Crime Centre
Caveat The materials and information contained in this presentation are intended to raise awareness within the RUXCON conference of High Tech Crime in Australia. THEY ARE NOT TO BE CONSTRUED AS LEGAL ADVICE. For legal advice or interpretation on these matters or how they may affect you or your organisation, please consult a solicitor.
Overview • About the AHTCC • Role • Functions • Activities • Dealing with Law Enforcement • Different situations / Different requirements • Summary
Role of the AHTCC • Provide a national coordinated approach to combating serious, complex and multi-jurisdictional high tech crimes, especially those beyond the capability of single jurisdictions. • Assist in improving the capacity of all jurisdictions to deal with high tech crime. • Support efforts to protect the National Information Infrastructure.
Functions of the AHTCC • Coordination of high tech crime matters between Australian law enforcement agencies, Federal Government agencies and international agencies. • Investigation of matters either by the AHTCC or through cooperation or referral to a partner agency. • Intelligence services that contribute to a better understanding of the high tech crime environment for the AHTCC, partner agencies, and the wider community through alerts and advisories. • Liaison with Government agencies, industry groups, businesses and other organisations on high tech crime matters, including technical, investigative, business and policy. • Knowledge of high tech crime issues such as preventative measures, best practice investigative tools and techniques, expert advice, training and education.
High Tech Crime & the AHTCC • Education and advisories • Facilitating cooperation between law enforcement agencies • Involving Commonwealth, State, Territory & International agencies • Liaison with private sector and allied organisations • AHTCC investigation of appropriate matters, including: • Computer Intrusion • Denial of Service attacks / Maleficent Code • Online Child Abuse • Online / Telecommunications Fraud and Theft • Drug Dealing, Terrorism, Extortion, Theft, Threats / Menace / Harassment, etc
How are Incidents Reported to the AHTCC ? • Directly • Telephone (02) 6246 2101 (24 Hour contact number) • Fax (02) 6246 2121 • Online www.ahtcc.gov.au • State Police / State Police Computer Crime Units • G8 Contact list / Interpol • Crime Stoppers • Regulatory agencies • Partner agencies
Top Three Situations for dealing with Police: • You are the victim of an attack. • You hold some records in relation to an offence. • You are the offender.
1) When you are the victim of an attack • Have a plan • Be prepared • Respond appropriately
Responding Appropriately Respond in a “Forensically Sound” manner • Worthwhile regardless of law enforcement involvement • Increases confidence in results of incident analysis • Important for civil proceedings • The process • Identify, Preserve, Analyse, Present
Reporting your matter to Law Enforcement • Refer matters as soon as possible • Electronic evidence can be volatile • Electronic evidence can be easily destroyed, corrupted • Provide as much information as possible • When you report a matter, be prepared to support the investigation • Be patient – investigative process can be long and frustrating • Criminal matters have a high standard of proof
2) When you hold records relating to an offence • Sections 282 and 313 of the Telecommunications Act provide disclosure provisions for the investigation of a criminal offence by law enforcement agencies.
Carriage Service Provider Obligations • Provision of information or reasonable assistance • Interception capability • Prevent networks and facilities from being used in, or in relation to, the commission of criminal offences
3) If you are the Offender • Legislation & Law Enforcement methodologies are continuing to evolve in this area. • Cyber crimes are real crimes with real victims. • It is only a matter of time before you are caught.
Cybercrime Offences • 477.1 Unauthorised access, modification or impairment with intent to commit a serious offence • 477.2 Unauthorised modification of data to cause impairment • 477.3 Unauthorised impairment of electronic communication • 478.1 Unauthorised access to, or modification of, restricted data • 478.2 Unauthorised impairment of data held on a computer disk etc. • 478.3 Possession or control of data with intent to commit a computer offence • 478.4 Producing, supplying or obtaining data with intent to commit a computer offence