SlideShare une entreprise Scribd logo
1  sur  28
CYBER CRIME
WITHIN GOVERNMENT

 5TH ANNUAL WHITE COLLAR
        CRIME SUMMIT
      26 NOVEMBER 2008
       JOHANNESBURG
   ADV JACQUELINE FICK
INTRODUCTION
 Cyber crime in the private sector
   Stringent security measures
 Route of least resistance
   Government has a big bank account too!
 DSO investigations
 Types of cyber crime in Government
   Identity theft
   Interception of data
   Spy/malware
   Fraud/theft by means of computers
   Hacking
DANGER OF ORGANISED CRIME

    “The scale of the challenge should not be
    underestimated. Over the long term the growth of
    criminal networks in the region may have the capacity to
    undermine both democratic governance and
    economic prosperity. The threat is diffuse and its
    boundaries difficult to identify, but the impact of such
    activities will be detrimental to all Southern Africa’s
    citizens. Now is a critical time to act”.

Regional Integration In Southern Africa: Comparative International Perspectives
“Organised Crime and State Responses in Southern Africa” p 115 at p 120
Mark Shaw
IDENTITY THEFT

Identity theft has been described as the
fastest growing financial crime in the U.S.
and the “crime of the new millennium”.

(See HK Towle, “Identity Theft: Myths, Methods and new Law”,
Rutgers Computer and Technology Law Journal,
Rutgers University School of Law- Newark
, p 237 at p 238.)
A VEHICLE FOR CRIME
Corporate identities are often stolen or forged, to create for the
criminal, a vehicle for crime that appears to provide an air of
authority or legitimacy. In the same way as in non-networked
fraud, where a letter on headed notepaper can be more
effective in fooling a victim, the corporate online forgery
provides a similar vehicle. These false, stolen or facsimile
corporate identities can also be used to play a role in further
identity theft, by a means commonly known as phishing…..

These corporate names may have established branding and
other positive attributes that may be useful in the conduct of
some other further crime, such as the sale of forged products
or some elaborate fraud or scam”.
  (SEE:   A Marshall and Tompsett, “Identity theft in an online world” Computer Law & Security Report (2005) 21, p128 at 131.
NEW APPROACH TO COMBATING
       SYNDICATES NECESSARY


Fighting the scourge of organised crime cannot be
based solely on the traditional enforcement approach.
Only the use of a targeted and coordinated twin-track
strategy based on repressive and preventive
measures will reach the goal considering the potential
of prevention techniques to impact on the proliferation
of organised crime, especially on its infiltration in legal
society and economy.




 António Vitorino Commissioner for Justice and Home Affairs Strategies of the EU
COOL FROG CYBER PROJECT
                    Project authorised September 2001

                                                        Statistics and accomplishments
                 Threat analysis

            Mandate: Target, destroy,             1.    Arrest of various suspects.
            disrupt activities of international
            crime syndicates, who hijack          2.    Money laundering convictions
            the identities of commercial banks,   .
            corporations and individuals          3.    Development of innovative methods
            in furtherance of their                     of prosecution e.g Hurkes case.
            criminal objectives.
                                                  4.    Coordinated law enforcement
                                                        and private sector in a united front.

                                                  5.    Turnaround time reduced by 75%.
Profile crime areas & Targets
                                                  6.    Various spoofed websites closed
• 4 Linked syndicates.                                  on behalf of banking industry.
• Banking Industry.
• Corruption in banks.                            13.   DSO first to identify the problem
• Money Laundering.                                     of identIty hijacking and to declare
                                                        special project.
.                                                 14.   Phishing – Sophisticated onslaught
• Racketeering.                                         on banking industry.
• Crimes perpetrated
  from Europe & N America.
BACKGROUND TO PROJECT PC
   Authorised in terms of section 28(1)

       Identifying, determining any linkages and
        ultimately disrupting and prosecuting identified
        syndicates and other role-players including
        entities and members of the public committing
        crimes within the Government Cyber/Computer
        Systems. The focus is on, but not limited to the
        following crimes:
         Fraud.
         Theft.
         Forgery and Uttering.
         Contraventions of the Corruption Act, Act 12
            of 2004.
         Contraventions of the POCA Act, Act 121 of
            1998.
         Contraventions of the Electronic Commu-
            nications and Transactions Act, Act 25 of
            2002.
INVESTIGATIVE PROCESS



The man of virtue makes the difficulty to
overcome his first business, and success only
a subsequent consideration.

                 Confucius (551BC – 479 BC)
ROLE PLAYERS
            SAPS                        AFU
       Aligning our strategies
          Joint prosecution
                                        AND
    Shared information/database         SCCU

                                       SIU
Government Departments                 Resources
                                  Shared investigations

       SITA
     Resources
     Searches                           FORENSIC
                       BANKS            AUDITORS
WORKING RELATIONSHIP WITH
        ROLE PLAYERS


Joint prosecution of syndicate in KZN, that
 operates across borders and across
 Government Departments
Need for stronger cooperation in other
 provinces
Linked databases
Sharing of information
INVESTIGATIVE METHODOLOGY
Re-active Methods
   Surprise searches, sting operations.
Pro-active Methods
  Extensive use of money laundering provisions.
  Close cooperation with government
   departments.
  Extensive use of POCA offences.
   Continuous information exchange with
   stakeholders.
   Disruptive operations via sec 252A.
   127 operations, surveillance, monitoring.
   Arrests, searches, bail & asset forfeiture
   applications.
SEARCHES

Government Departments searched
  Ulundi
  Department of Education (PMB and DBN)
  Department of Works (PMB and DBN)
  Premier’s Office (PMB)
  Department of Social Development (PMB
    and DBN)
  Searches in other provinces
 Computers searched
 Infected computers
OPERATIONAL CHECKLIST

Development of checklist
Rationale behind development
Application of checklist
MD5/checksum
Partial v Full mirroring (privilege)
The Law and the Investigators
WEAPON OF CHOICE
Use of hardware key loggers
Use of spy software
 Win-spy Software 9.1 Pro
DSO ARRESTS

Several arrests made on the various
 investigative legs.
Value of section 204 witnesses.
Going after the big fish.
Always keeping the game plan in mind:
  Racketeering prosecutions
Think big – look at the things that you do not
 see.
DSO ARRESTS (cont.)
Ulundi CAS 282/05/2006
 Three suspects arrested on 25 May 2006 on
   charges of Fraud and Contraventions of the
   Electronic Communications and Transactions
   Act 25 of 2002.
 Arrests were the direct result of information
   received from an informer.
 The IT Specialist arrested pleaded guilty to
   Contraventions of sections 86(1), 86(3) and
   86(4) and indicated that he is willing to give
   evidence against syndicate.
 First conviction in RSA on spy software
 “Beginning of bigger things.”
PROSECUTION STRATEGY



“When the going gets tough, the tough
             get going…”
GETTING TO GRIPS

 Putting the puzzle together
  Data analysis (CAD, Forensic Auditors)
  Covert information
 One central repository for information
 Trust, trust, trust …
RACKETEERING PROSECUTION


 Identify transactions that show the money-trial
 from top of syndicate through to where money
 was laundered through accounts.
Show relevance and importance of computer
 evidence.
Show cross-pollination between Government
 Departments.
CHAPTER XIII: ECT ACT

DEFINITION

 'access' includes the actions of a person who,
 after taking note of any data, becomes aware of
 the fact that he or she is not authorised to
 access that data and still continues to access
 that data.
CHAPTER XIII: ECT ACT

86       Unauthorised access to, interception of or
         interference with data

     (1) Subject to the Interception and Monitoring
         Prohibition Act, 1992, (Act 129 of 1992) a person
         who intentionally accesses or intercepts any data
         without authority or permission to do so, is guilty of
         an offence.

     (2) A person who intentionally and without authority to
         do so, interferes with data in a way which causes
         such data to be modified, destroyed or otherwise
         rendered ineffective, is guilty of an offence.
CHAPTER XIII: ECT ACT


(3)A person who unlawfully produces, sells, offers to
   sell, procures for use, designs, adapts for use,
   distributes or possesses any device, including a
   computer program or a component, which is
   designed primarily to overcome security measures
   for the protection of data, or performs any of those
   acts with regard to a password, access code or
   any other similar kind of data with the intent to
   unlawfully utilise such item to contravene this
   section, is guilty of an offence.
CHAPTER XIII:ECT ACT

(4)A person who utilises any device or computer
   program mentioned in subsection (3) in order to
   unlawfully    overcome        security measures
   designed to protect such data or access
   thereto, is guilty of an offence.

(5) A person who commits any act described in
   this section with the intent to interfere with
   access to an information system so as to
   constitute a denial, including a partial denial, of
   service to legitimate users is guilty of an
   offence.
CHAPTER XIII: ECT ACT

87 Computer-related extortion, fraud and forgery

   (1)A person who performs or threatens to perform any
      of the acts described in section 86, for the purpose
      of obtaining any unlawful proprietary advantage by
      undertaking to cease or desist from such action, or
      by undertaking to restore any damage caused as a
      result of those actions, is guilty of an offence.

   (2) A person who performs any of the acts described in
      section 86 for the purpose of obtaining any unlawful
      advantage by causing fake data to be produced with
      the intent that it be considered or acted upon as if it
      were authentic, is guilty of an offence.
NATIONAL IMPORTANCE

Joint co-operation with stakeholders.
Evidence gathering and establishment of
 database.
Crime prevention.
Training and transfer of skills.
Image of law enforcement agencies in South
 Africa.
RECOMMENDATIONS

The human factor
Vetting
Security measures on systems
  Biometrics
THANK YOU



Success is not the result of spontaneous
combustion. You must set yourself on fire.
                                Reggie Leach

Contenu connexe

Tendances

Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeMarcelo Gomes Freire
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudGoutama Bachtiar
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 

Tendances (20)

Computer crime
 Computer crime Computer crime
Computer crime
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat Cybercrime
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Information technology act
Information technology actInformation technology act
Information technology act
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
Phish phry operation
Phish phry operationPhish phry operation
Phish phry operation
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 

En vedette

Pgloader
PgloaderPgloader
Pgloadertapoueh
 
Presentation1
Presentation1Presentation1
Presentation1dancinq29
 
AbundantlifeU/Merge Handout
AbundantlifeU/Merge HandoutAbundantlifeU/Merge Handout
AbundantlifeU/Merge Handoutdickerke
 
A Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber SyndicateA Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber SyndicateJacqueline Fick
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile LawJacqueline Fick
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 

En vedette (7)

Pgloader
PgloaderPgloader
Pgloader
 
Presentation1
Presentation1Presentation1
Presentation1
 
AbundantlifeU/Merge Handout
AbundantlifeU/Merge HandoutAbundantlifeU/Merge Handout
AbundantlifeU/Merge Handout
 
Carteles
CartelesCarteles
Carteles
 
A Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber SyndicateA Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber Syndicate
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 

Similaire à Cyber Crime in Government

Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsJacqueline Fick
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Robert Bromwich
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...USAID CEED II Project Moldova
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 

Similaire à Cyber Crime in Government (20)

Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnerships
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Cyber Crime in Government

  • 1. CYBER CRIME WITHIN GOVERNMENT 5TH ANNUAL WHITE COLLAR CRIME SUMMIT 26 NOVEMBER 2008 JOHANNESBURG ADV JACQUELINE FICK
  • 2. INTRODUCTION  Cyber crime in the private sector Stringent security measures  Route of least resistance Government has a big bank account too!  DSO investigations  Types of cyber crime in Government Identity theft Interception of data Spy/malware Fraud/theft by means of computers Hacking
  • 3. DANGER OF ORGANISED CRIME “The scale of the challenge should not be underestimated. Over the long term the growth of criminal networks in the region may have the capacity to undermine both democratic governance and economic prosperity. The threat is diffuse and its boundaries difficult to identify, but the impact of such activities will be detrimental to all Southern Africa’s citizens. Now is a critical time to act”. Regional Integration In Southern Africa: Comparative International Perspectives “Organised Crime and State Responses in Southern Africa” p 115 at p 120 Mark Shaw
  • 4. IDENTITY THEFT Identity theft has been described as the fastest growing financial crime in the U.S. and the “crime of the new millennium”. (See HK Towle, “Identity Theft: Myths, Methods and new Law”, Rutgers Computer and Technology Law Journal, Rutgers University School of Law- Newark , p 237 at p 238.)
  • 5. A VEHICLE FOR CRIME Corporate identities are often stolen or forged, to create for the criminal, a vehicle for crime that appears to provide an air of authority or legitimacy. In the same way as in non-networked fraud, where a letter on headed notepaper can be more effective in fooling a victim, the corporate online forgery provides a similar vehicle. These false, stolen or facsimile corporate identities can also be used to play a role in further identity theft, by a means commonly known as phishing….. These corporate names may have established branding and other positive attributes that may be useful in the conduct of some other further crime, such as the sale of forged products or some elaborate fraud or scam”. (SEE: A Marshall and Tompsett, “Identity theft in an online world” Computer Law & Security Report (2005) 21, p128 at 131.
  • 6. NEW APPROACH TO COMBATING SYNDICATES NECESSARY Fighting the scourge of organised crime cannot be based solely on the traditional enforcement approach. Only the use of a targeted and coordinated twin-track strategy based on repressive and preventive measures will reach the goal considering the potential of prevention techniques to impact on the proliferation of organised crime, especially on its infiltration in legal society and economy. António Vitorino Commissioner for Justice and Home Affairs Strategies of the EU
  • 7. COOL FROG CYBER PROJECT Project authorised September 2001 Statistics and accomplishments Threat analysis Mandate: Target, destroy, 1. Arrest of various suspects. disrupt activities of international crime syndicates, who hijack 2. Money laundering convictions the identities of commercial banks, . corporations and individuals 3. Development of innovative methods in furtherance of their of prosecution e.g Hurkes case. criminal objectives. 4. Coordinated law enforcement and private sector in a united front. 5. Turnaround time reduced by 75%. Profile crime areas & Targets 6. Various spoofed websites closed • 4 Linked syndicates. on behalf of banking industry. • Banking Industry. • Corruption in banks. 13. DSO first to identify the problem • Money Laundering. of identIty hijacking and to declare special project. . 14. Phishing – Sophisticated onslaught • Racketeering. on banking industry. • Crimes perpetrated from Europe & N America.
  • 8. BACKGROUND TO PROJECT PC  Authorised in terms of section 28(1)  Identifying, determining any linkages and ultimately disrupting and prosecuting identified syndicates and other role-players including entities and members of the public committing crimes within the Government Cyber/Computer Systems. The focus is on, but not limited to the following crimes:  Fraud.  Theft.  Forgery and Uttering.  Contraventions of the Corruption Act, Act 12 of 2004.  Contraventions of the POCA Act, Act 121 of 1998.  Contraventions of the Electronic Commu- nications and Transactions Act, Act 25 of 2002.
  • 9. INVESTIGATIVE PROCESS The man of virtue makes the difficulty to overcome his first business, and success only a subsequent consideration. Confucius (551BC – 479 BC)
  • 10. ROLE PLAYERS SAPS AFU Aligning our strategies Joint prosecution AND Shared information/database SCCU SIU Government Departments Resources Shared investigations SITA Resources Searches FORENSIC BANKS AUDITORS
  • 11. WORKING RELATIONSHIP WITH ROLE PLAYERS Joint prosecution of syndicate in KZN, that operates across borders and across Government Departments Need for stronger cooperation in other provinces Linked databases Sharing of information
  • 12. INVESTIGATIVE METHODOLOGY Re-active Methods  Surprise searches, sting operations. Pro-active Methods Extensive use of money laundering provisions. Close cooperation with government departments. Extensive use of POCA offences.  Continuous information exchange with stakeholders.  Disruptive operations via sec 252A.  127 operations, surveillance, monitoring.  Arrests, searches, bail & asset forfeiture applications.
  • 13. SEARCHES Government Departments searched Ulundi Department of Education (PMB and DBN) Department of Works (PMB and DBN) Premier’s Office (PMB) Department of Social Development (PMB and DBN) Searches in other provinces  Computers searched  Infected computers
  • 14. OPERATIONAL CHECKLIST Development of checklist Rationale behind development Application of checklist MD5/checksum Partial v Full mirroring (privilege) The Law and the Investigators
  • 15. WEAPON OF CHOICE Use of hardware key loggers Use of spy software Win-spy Software 9.1 Pro
  • 16. DSO ARRESTS Several arrests made on the various investigative legs. Value of section 204 witnesses. Going after the big fish. Always keeping the game plan in mind: Racketeering prosecutions Think big – look at the things that you do not see.
  • 17. DSO ARRESTS (cont.) Ulundi CAS 282/05/2006 Three suspects arrested on 25 May 2006 on charges of Fraud and Contraventions of the Electronic Communications and Transactions Act 25 of 2002. Arrests were the direct result of information received from an informer. The IT Specialist arrested pleaded guilty to Contraventions of sections 86(1), 86(3) and 86(4) and indicated that he is willing to give evidence against syndicate. First conviction in RSA on spy software “Beginning of bigger things.”
  • 18. PROSECUTION STRATEGY “When the going gets tough, the tough get going…”
  • 19. GETTING TO GRIPS  Putting the puzzle together Data analysis (CAD, Forensic Auditors) Covert information  One central repository for information  Trust, trust, trust …
  • 20. RACKETEERING PROSECUTION  Identify transactions that show the money-trial from top of syndicate through to where money was laundered through accounts. Show relevance and importance of computer evidence. Show cross-pollination between Government Departments.
  • 21. CHAPTER XIII: ECT ACT DEFINITION 'access' includes the actions of a person who, after taking note of any data, becomes aware of the fact that he or she is not authorised to access that data and still continues to access that data.
  • 22. CHAPTER XIII: ECT ACT 86 Unauthorised access to, interception of or interference with data (1) Subject to the Interception and Monitoring Prohibition Act, 1992, (Act 129 of 1992) a person who intentionally accesses or intercepts any data without authority or permission to do so, is guilty of an offence. (2) A person who intentionally and without authority to do so, interferes with data in a way which causes such data to be modified, destroyed or otherwise rendered ineffective, is guilty of an offence.
  • 23. CHAPTER XIII: ECT ACT (3)A person who unlawfully produces, sells, offers to sell, procures for use, designs, adapts for use, distributes or possesses any device, including a computer program or a component, which is designed primarily to overcome security measures for the protection of data, or performs any of those acts with regard to a password, access code or any other similar kind of data with the intent to unlawfully utilise such item to contravene this section, is guilty of an offence.
  • 24. CHAPTER XIII:ECT ACT (4)A person who utilises any device or computer program mentioned in subsection (3) in order to unlawfully overcome security measures designed to protect such data or access thereto, is guilty of an offence. (5) A person who commits any act described in this section with the intent to interfere with access to an information system so as to constitute a denial, including a partial denial, of service to legitimate users is guilty of an offence.
  • 25. CHAPTER XIII: ECT ACT 87 Computer-related extortion, fraud and forgery (1)A person who performs or threatens to perform any of the acts described in section 86, for the purpose of obtaining any unlawful proprietary advantage by undertaking to cease or desist from such action, or by undertaking to restore any damage caused as a result of those actions, is guilty of an offence. (2) A person who performs any of the acts described in section 86 for the purpose of obtaining any unlawful advantage by causing fake data to be produced with the intent that it be considered or acted upon as if it were authentic, is guilty of an offence.
  • 26. NATIONAL IMPORTANCE Joint co-operation with stakeholders. Evidence gathering and establishment of database. Crime prevention. Training and transfer of skills. Image of law enforcement agencies in South Africa.
  • 28. THANK YOU Success is not the result of spontaneous combustion. You must set yourself on fire. Reggie Leach