110 likes | 132 Views
Explore the evolution of cybercrime and traditional criminal techniques, highlighting the challenges and efforts of high-tech crime operations. Learn about critical sectors protected, investigative timelines, live streaming, eCourt workshops, surveillance operations, and technological challenges faced.
E N D
Federal Crime and Sentencing Conference 11 February 2012 CYBERCRIME Assistant Commissioner Neil Gaughan National Manager High Tech Crime Operations Australian Federal Police
Information services Critical government services Telecommunications Banking & finance What We Protect Logistic Systems Shipping Freight Transport & distribution Power Gas Water Internet Online Systems Utilities Police Security Services Government Mobile Systems PSTN Systems Stock Market Banking Systems High Tech Crime Operations
Comparison Between Traditional Criminal Techniques and Cybercrime High Tech Crime Operations
OPERATION RESCUE TIMELINE • January 2010 – UK and Europol with the assistance of the AFP receive a copy of the server Working with Dutch Police, Europol interrogate for further information AFP work with EUROPOL to disseminate referrals across the globe High Tech Crime Operations
LIVE STREAMING High Tech Crime Operations
The digital crime scene High Tech Crime Operations
HTCO eCourt • Workshops for the judiciary and legal fraternity • Court support - animations of tech evidence • Online technical training in electronic evidence High Tech Crime Operations
Operation Neath - Surveillance • 200 Telephone Interception warrants requested between 2 April 2009 and 31 July 2009 • During the same period, 39 Surveillance Device warrants were sought – with 99 activations • 24-hour live monitoring from 2 April 2009 to 18 August 2009 (Telephone Interception Division) • 142,347 calls and 29,117 SMS messages intercepted • 500+ evidentiary calls • 7,500 hours of recorded material from listening devices • 69,632 hours of physical surveillance High Tech Crime Operations
Technological Challenges Encryption Data preservation Peer to Peer file sharing Cloud computing Proxy computers and Botnets Obfuscation techniques – TOR nodes High Tech Crime Operations