January 2014- Numbers claiming JSA January 2010- Numbers claiming JSA.
Cyber Crimes - asapcebu.comasapcebu.com/ · 01-%345&4++,&45! Users continue to be fooled online...
Transcript of Cyber Crimes - asapcebu.comasapcebu.com/ · 01-%345&4++,&45! Users continue to be fooled online...
Social Networking Site
Cyber Crimes
P/SSUPT GILBERT C SOSAChief, Anti Transnational and Cyber Crime Division
Criminal Investigation and Detection Group
Saturday, September 10, 2011
Cyber CrimesWHY ARE CYBER CRIMES SUCH A
PREVALENT ISSUE IN MODERN SOCIETY?
•Although computers are very useful and advantageous in many ways, they are potentially dangerous.
•With new technology comes new opportunities and unfortunately cyber crimes are one of them.
Saturday, September 10, 2011
CYBERCRIME!"#$%&'%()*+,-,&.+/
!"#$%&'&()%*(+*,*-%&)*.+%/*$&0,/1#*-0*/%+'&($%*'&()(2,1*,'34(-#*(2*
56('6*'0)7.-%&+*0&*2%-50&8+*,&%*,*-0019*,*-,&:%-9*0&*,*71,'%*0;*
'&()(2,1*,'34(-#<=•!"#$%&'
•()"**%&'
•+,*"%-.()//0&'
•11/(.2.1%345%67489.18&%"-./:.(85;%#8.<
•=3%&'.#/)>5%'?489.48@4
•A%&"&#%"-.A5"79
•B?%3?%&'
•C&-%&8.!"5"33*8&4
•B%5"D&'.3/EF"58
•=3%&'.%*"'83.F%4?/74.)85*%33%/&
•(?"5%&'.%--8'"-.3/EF"58
•(#5")%&'
•G98&D4>.4?8E......84#
Saturday, September 10, 2011
Topics…
• H?"4.#5%*%&"-."#D;%4>.%3./##755%&'./&.(/#%"-.I84F/5$%&'.(%483J
• H?"4.-"F.8&:/5#8*8&4."'8&#%83."58.9/%&'.4/.7D-%K8.37#?.3%483.4/.0&9.#5%*%&"-3L."-854.#/**7&%D83L.#/--8#4.8;%98L."&9.)58;8&4.#5%*8.:5/*.?"))8&%&'.F%--."-3/.68.8@"*%&89M
Saturday, September 10, 2011
Introduction
N%--%/&3./:.%&9%;%97"-3."5/7&9.
4?8.F/5-9."58.-/''%&'./&.4/.
(/#%"-.I84F/5$%&'.(%483.
8;85>9">M
O;85"'8./:.PP.*%&7483.)85.9">.
/&.37#?.3%483M
A"#86//$.?"3.&/F."##7*7-"489.
*/58.4?"&.QPR.*%--%/&."#D;8.
73853M
Saturday, September 10, 2011
Introduction
• B?%-%))%&83.?"3.
STLSUVLQWR.
58'%348589.AX.
73853M.2Q4?.%&.4?8.
F/5-9<
• SRY."58.*%&/53.
Saturday, September 10, 2011
WALK-IN COMPLAINANT INVOLVING SOCIAL NETWORKING WEBSITES
(January 1 – August 31, 2011)
Saturday, September 10, 2011
01-%345&4++,&45
! Users continue to be fooled online by persons claiming to be somebody else.
! Unlike the physical world, individuals can misrepresent everything about themselves while they communicate online,
! Years ago, we called these types of people confidence or “con” men.
! Con artists are now referred to as being engaged in social engineering.
! Other con artists are able to conduct identity theft .
! In addition to identity theft crimes, child predators routinely use social networking sites to locate and communicate with future victims and other pedophiles.
Saturday, September 10, 2011
Problem: Identity Theft
• “ I d e n t i t y t h e f t a n d identity fraud as terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain”. !
Saturday, September 10, 2011
Problem: 6,#78%0-"+.+'
• O.58#8&4.:5"79.3#?8*8.%&;/-;83.".#>685.
#5%*%&"-.'"%&%&'."##833.4/."&.7&373)8#D&'.
7385Z3.8,*"%-."##/7&4./5.3/#%"-.&84F/5$%&'.
3%48M
• [?8.:5"793485L.F?/.#-"%*3.4/.68.4?8."##/7&4.
?/-985L.4?8&.38&93.*833"'83.4/.4?8.7385Z3.
:5%8&93M.
• G&.4?8.*833"'8L.4?8.:5"793485.34"483.4?"4.
?8.%3./&.45";8-."&9.?"3.688&.5/6689./:.?%3.#589%4.#"593L.)"33)/54L.*/&8>L."&9.#8--.
)?/&8\."&9.%3.%&.&889./:.*/&8>.
%**89%"48->M.
• H%4?/74.58"-%K%&'.4?"4.4?8.*833"'8.%3.
:5/*.".#5%*%&"-L.4?8.:5%8&93.F%58.*/&8>.4/."&./;8538"3."##/7&4.F%4?/74.;"-%9"D&'.
4?8.#-"%*M
Saturday, September 10, 2011
Problem: Cyber-bullying
! Cyber-bullying is the use of electronic means to support deliberate, repeated, and hostile behavior by an individual or group, to harm others.
! Use the Internet, cell phones, or other devices to send or post text or images intended to hurt or embarrass another person.
•
Saturday, September 10, 2011
Problem: Cyberstalking/Harassment
• Cyberstalking and harassment by computer is the use of the Internet or other electronic means to stalk or harass
• an individual,
• a group of individuals, or
• an organization.
• It may include false accusations, monitoring, making threats, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.
Saturday, September 10, 2011
Problem: Phishing
13
Trying to trick people intorevealing sensitive information
Saturday, September 10, 2011
Social Media Phishing
14
Trawling the web, trying to hook unwitting victims
Click the link and where do you go?
Saturday, September 10, 2011
Social Media Phishing
15
To: T V V I T T E R.com
Now they will have your username and password
Saturday, September 10, 2011
Social Media Phishing
16
Another fake site
Saturday, September 10, 2011
Social Media Phishing
17
You followed the link, but no immediate fun follows. Instead, you first had to follow what has become a usual procedure for this kind of scam: "like" the page, share the link, complete a survey.
You just earned some money for the scammers, since they are paid for every filled out questionnaire. You have also practically recommended it to your friends, some of which will go on to perpetuate the
scam circle.
Saturday, September 10, 2011
of social media users
report phishing attacks
via these sites
30%
42.9%That’s an increase of
from a year ago
Social Media Phishing
18
Saturday, September 10, 2011
Problem: 9#$#%:&4&45
[/.8@45"#4.38&3%D;8.%&:/5*"D/&."6/74.4?8%5.;%#D*3M
Saturday, September 10, 2011
20
THE MOTIVE AND THREATS
DATA HAS BECOME A VALUABLE COMMODITY.
THE CASE CAN BE MADE THAT CYBER-CROOKS NOW VALUE YOUR DATA MORE THAN YOU AND THE ORGANIZATIONS THAT HAVE YOUR INFORMATION.
$
Saturday, September 10, 2011
Data = Money
• Steal your money directly
• Sell your data
• Trick your friends and family into supplying personal
data
• Sell your identity
• Use your accounts to spread spam, malware and more
data theft scams
• Sell your organization's data or sensitive
information
• Blackmail individuals and organizations
21
Saturday, September 10, 2011
Cyber Underground
• Substantial impact on individual and commerce.
• Pervasive market.
• Communicate ion website forums.
• Buy and sell login credentials, phishing kits, malware, access to botnets, etc..
• Professionally organized and have unique or specialized skills.
• Transnational in nature.
Saturday, September 10, 2011
Social Networking sites and Law Enforcement
• [?%3.]3/#%"-.*89%"^.%3.68%&'.7D-%K89."4."&.%:"3%&'.5"48.6>.-"F.8&:/5#8*8&4."'8&#%83M
• _+O.#"&./64"%&.9"4".:5/*.4?838.3%483`.
• 7&985#/;85./)85"D/&3L.
• 3/*8.%&:/5*"D/&.%3.)76-%#."&9.
• 738.";"%-"6-8.-"F.4/.'84.%&:/5*"D/&.:5/*.
)5/;%9853M
• +34"6-%3?.*/D;83."&9.)853/&"-.%&:/5*"D/&L.
• 58;8"-.)853/&"-.#/**7&%#"D/&3L.834"6-%3?.
#5%*8./5.#5%*%&"-.8&485)5%38L
• )5/;8."&9.9%3)5/;8."-%6%3L.
• )5/;%98.-/#"D/&.%&:/5*"D/&L."&9.
%&3457*8&4"-%D83./5.:57%43./:.#5%*8.M
• O--/F%&'.4?8.#/**7&%4>.4/.68.%&;/-;89.%&.
3/-;%&'.4?8.#5%*8M..
Saturday, September 10, 2011
Social Networking sites and Law Enforcement
• A%;8."99%D/&"-.*84?/93.%&.F?%#?.-"F.8&:/5#8*8&4.)853/&&8-.7D-%K8.3/#%"-.&84F/5$%&'.3%483.4/.4?F"54.#5%*%&"-."#D;%4>.?"3.688&.%98&D089`.
. . a<.9%'%4"-.F"&489.)/34853L
. . S<.)/-%#8.6-/b85.6-/'3.
. . c<.45"#$%&'.%&:/5*"D/&.F%4?.[F%b85L.
. . U<."&/&>*/73.+,D)34853
. . P<.3/#%"-.*89%".34"$8/743
Saturday, September 10, 2011
PNP CIDG
Regional Digital Forensic Laboratories in Mindanao
ATCCD – CIDG Digital Forensic Laboratory in HCIDG
Anti Transnational and Cybercrime Division
Saturday, September 10, 2011
CIDG Internet Child Protection Program
CIDG spearhead the campaign for safe and smart use of the Internet by children.
CIDG Internet Child Protection Program
A shared responsibility between the
Community- Parents, Schools, NGOs,
Technology Industry ( Telcos, ISPs and Internet cafes, software companies, and others)
Government- Law Enforcement & Public Policy and legislation, DSWD, LGUs
Saturday, September 10, 2011
Purpose
To address Internet-based abusive behavioral activities.
To identify the perpetrators of these abuses.
To identify the victims.
To provide on-line and physical venues for victims and
their guardians.
To coordinate and collaborate with other law
enforcement agencies.
Saturday, September 10, 2011
POLICE
INTERVENTION
Community-Media
AWARENESS
C A PA CITY
BUILDING
CAPABILITY
BUILDING
INTERNET DANGERS
PARTNERSHIP
C
O
O
P
E
R
A
T
I
O
N
Saturday, September 10, 2011
Action Plans:
Public Awareness
Advocacy plays an important factor in carrying out
this undertaking.
Capacity and Capability Building
As technology evolves, new modus operandi and techniques are adapted by cyber criminals
Saturday, September 10, 2011
Action Plans:Police Interventions
Creation and activation of Complaint Desk (WCPD) and RCIDUs and
Cyber Operation Center – Cyber Tip line www.cidgangelnet.ph (ATCCD)
Partnership and Cooperation with Stakeholders
Saturday, September 10, 2011
31
What WE can do..
• Partnering for success.
• Child protection is everyone’s business
Together
we will safeguard our children and young people from abuse,
we will arrest cyber offenders,
we will educate our children and young people and
We will train over child protection professionals.
• We cannot combat it alone..
Saturday, September 10, 2011
Education is the Key
QUOTABLE
"I think this level of awareness and communication needs to
start in elementary school, because I'd like to say everyone is
armed today. Everyone you see has a cell phone and a cell
phone has an IP address, and every device with an IP address is
a point of entry or intrusion into our network because we are
so well-connected and we communicate so well to each other so
therefore we need to start this education as early as possible."
Zal Azmi, former FBI Chief Information Officer
Saturday, September 10, 2011
Summary
• The risks from social media are real - for you
and for your organization
• Financially-motivated criminals are
increasingly using social media sites to steal
identities, spread malware and send spam
• Social networks are getting better at
protecting users against these threats –
but there’s a long way to go
• The onus is on YOU to use social media
sites safely
• Don’t stop using social media …
just make sure you use it safely!
Saturday, September 10, 2011