Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
Beyond Vehicle Crime: Impact of Technology
Hong-Eng Koh
Vice President (Corporate)
The Society for the Policing of Cybersp...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Safe Harbor Statement
The following is intended to out...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
1993…
3
Ang Mo Kio Division
Bedok Division
Airport
Div...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
1996…
4
To Malaysia
Woodlands
Checkpoint
VOIVOI
Automa...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
1998…
5
VOI
Electronic Road Pricing (ERP)
✗No access b...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
UK Surveillance Camera Commissioner
• Roles:
– encoura...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Meanwhile in China…
7
RFID
Tracking
(ITS)
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
European Union eCall: in all new cars from April 2018
8
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
UNODC: Global Motor Vehicle Theft
As at 10 Feb 2016
9
...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
London Metropolitan Police
February 2015
• In 2014, ov...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Recent Car Hacking News
• Hacker Disables More Than 10...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Why?
• Petty criminals, drug addicts
• Joyriders
• Org...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Big Technology Trends
13
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Digital Disruption & Sharing Economy
World’s largest t...
Why BlackBerry Messenger was rioters'
communication method of choice
7 Dec 2011
“Everyone in edmonton
enfield wood green
e...
The Independent 20 Apr 2015
• 8 counts of fraud
• Posed as staff from Barclays, Lloyds and
Santander
• Sometimes putting o...
Prison escape via mobile phone
highlights social engineering
vulnerability 30 Mar 2015
“Moore created a fake web domain th...
15 Aug 2015
18
There’s a Will,
There’s a Way!
Prisoners use Ministry of Justice laptops to
mastermind £30m drug smuggling ...
19
Man Attacks NYC Police With Hatchet;
Authorities Probe Possible Terror Ties
Terrorism in Digital Disruption
“Helicopter...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Challenges
•Silos by geography (USA has about 18,000 a...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved. 21
And Even More Challenges
Fragmented Incident, Inves...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
So what can we do?
•Public education, especially to co...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
• National Information
Exchange Model
(NIEM)
• US Depa...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Process Integration: Keeping More Officers Out in the ...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Finding common Suspects who are
involved in multiple l...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Big Data Analytics: Chicago Crime Analysis
26
Live
Demo
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Big Data Analytics: Chicago Crime Analysis
27
(%) Whol...
Dark Web
Internet / Social
28
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Dark Web, aka Dark Net, Deep Web
29
Intelligence Black...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Dark Web, aka Dark Net, Deep Web
30
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
Dark Web, aka Dark Net, Deep Web
31
Copyright © 2016 Oracle and/or its affiliates. All rights reserved.
More News Headlines
• Obama’s $4 Billion Plan for Self...
Copyright © 2016 Oracle and/or its affiliates. All rights reserved. 33
hong-eng.koh@oracle.com
@he_koh
linkedin.com/in/hek...
Prochain SlideShare
Chargement dans…5
×

Beyond Vehicle Crime: Impact of Technology

763 vues

Publié le

My keynote at INTERPOL 2nd Global Conference on Vehicle Crime (Bangkok) covers the opportunities and threats of technologies. Tracing the cat-and-mouse history of law enforcement and the bad guys in vehicle theft and crime/terrorism involving vehicle. Do you know there are more hacking/keyless theft cases of vehicle than traditional theft? There are also reported cases of remote hacking and taking over of vehicle while it is being driven! My presentation ends with couple of recommendations including live demo on the use of Big Data analytics.

Publié dans : Technologie

Beyond Vehicle Crime: Impact of Technology

  1. 1. Beyond Vehicle Crime: Impact of Technology Hong-Eng Koh Vice President (Corporate) The Society for the Policing of Cyberspace (POLCYB) Visiting Researcher China Public Security University Global Lead, Justice & Public Safety (JPS) Industry Solutions Group Graphic used with permission from the C3 Report
  2. 2. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2
  3. 3. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. 1993… 3 Ang Mo Kio Division Bedok Division Airport Division Central Division Tanglin Division Clementi Division Jurong Division To Malaysia Woodlands Checkpoint VOI INTERPOL’s 2014 Analytical Report on Motor Vehicle Crime: 69.4% driven to border Note: The map shows the current divisions of Singapore Police. Back in 1993 there was another division: Geylang.
  4. 4. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. 1996… 4 To Malaysia Woodlands Checkpoint VOIVOI Automated Vehicle Screening System* • Automatic Number Plate Recognition (ANPR) • In one year, detected more than 250,000 vehicles with outstanding traffic summons or parking fines • Over 150 vehicles wanted for investigation *source: https://www.ida.gov.sg/About-Us/Newsroom/Media-Releases/2002/20061116160211
  5. 5. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. 1998… 5 VOI Electronic Road Pricing (ERP) ✗No access because of privacy concerns
  6. 6. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. UK Surveillance Camera Commissioner • Roles: – encourage compliance with the surveillance camera code of practice – review how the code is working – provide advice to ministers on whether or not the code needs amending. • Responsibilities: – providing advice on the effective, appropriate, proportionate and transparent use of surveillance camera systems – reviewing how the code is working and if necessary add others to the list of authorities who must have due regard to the code – providing advice on operational and technical standards – encouraging voluntary compliance with the code 6
  7. 7. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Meanwhile in China… 7 RFID Tracking (ITS)
  8. 8. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. European Union eCall: in all new cars from April 2018 8
  9. 9. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. UNODC: Global Motor Vehicle Theft As at 10 Feb 2016 9 0 0.5 1 1.5 2 2.5 3 3.5 4 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 MillionofMotorVehicle Better security features, surveillance, tracking technologies and information sharing (INTERPOL INVEX)
  10. 10. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. London Metropolitan Police February 2015 • In 2014, over 6,000 cars and vans across London were stolen without the owners’ keys • That is an average of 17 vehicles a day • Represents 42% of all thefts of cars and vans • The majority of such thefts appear to be the result of organized criminals using key-programing devices to create duplicate keys for vehicles 10 *source: http://content.met.police.uk/News/Drivers-urged-to-protect-vehicles-against-keyless-theft/1400029791185/1257246745756 • Possible vulnerabilities: Keyless ignition, Bluetooth, GSM, Wi-Fi, etc. • Criminals learn how to circumvent modern immobilizer technology
  11. 11. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Recent Car Hacking News • Hacker Disables More Than 100 Cars Remotely • Wreaking havoc on a Toyota Prius • Vulnerability within the GM OnStar mobile app • Hacking of the Tesla Model S • Chrysler Recalls 1.4 Million Cars After Jeep Vulnerability Exposed 11 July 2015 https://youtu.be/MK0SrxBC1xs
  12. 12. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Why? • Petty criminals, drug addicts • Joyriders • Organized crime, drug syndicate • Trafficking, means of transport • As a weapon, terrorism 12 How? 2013 Tiananmen Square Attack • Five dead (including 3 terrorists) • 38 injured
  13. 13. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Big Technology Trends 13
  14. 14. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Digital Disruption & Sharing Economy World’s largest taxi company owns no taxi Largest accommodation provider owns no real estate Most popular media owner creates no content Largest phone companies own no telco infrastructure World’s largest movie house owns no cinema Largest software vendor don’t write the apps 14
  15. 15. Why BlackBerry Messenger was rioters' communication method of choice 7 Dec 2011 “Everyone in edmonton enfield wood green everywhere in north link up at enfield town station at 4 o clock sharp!!!!” “Ah, who wants to buy rioting kits? Gloves, masks, petrol bombs: £5” Crime-Sourcing 15
  16. 16. The Independent 20 Apr 2015 • 8 counts of fraud • Posed as staff from Barclays, Lloyds and Santander • Sometimes putting on a woman’s voice • Duped major organizations such as Thomas Exchange Global • Over £1,819,000 16 Trickery Neil Moore
  17. 17. Prison escape via mobile phone highlights social engineering vulnerability 30 Mar 2015 “Moore created a fake web domain that closely resembled Southwark Crown Court service's official address in order to send bail instruction via email to the prison's custody inbox. After executing what I would consider to be the simplest of all Social Engineering techniques, he was released.” 17 Trickery
  18. 18. 15 Aug 2015 18 There’s a Will, There’s a Way! Prisoners use Ministry of Justice laptops to mastermind £30m drug smuggling operation South London's Wandsworth Prison
  19. 19. 19 Man Attacks NYC Police With Hatchet; Authorities Probe Possible Terror Ties Terrorism in Digital Disruption “Helicopters, big military will be useless on their own soil. They will not be able to defeat our people if we use guerilla warfare. Attack their weak flanks…” Suspect’s posting: 23 Oct 2014
  20. 20. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Challenges •Silos by geography (USA has about 18,000 agencies) •Rise of technology/cyber-facilitated crime, including social engineering •Terrorism in digital disruption •Legacy IT doesn’t meet new trends and needs, e.g. mobility, integration with social channels 20
  21. 21. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. 21 And Even More Challenges Fragmented Incident, Investigation, Evidence, and Intelligence Information • How can we create a trusted environment for the sharing of critical information across departments and jurisdictions in an end-to-end policing process? Inability to Analyze & Act on Criminal and Emergency Information • How can we identify trends and patterns to anticipate and prevent incidents? Operational Excellence Impacted by Limited Resources • How can we reduce crime, enforce the law, develop our staff and protect the public with limited resources?
  22. 22. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. So what can we do? •Public education, especially to counter social engineering •Roles of vehicle manufacturers in enhancing security as recommended by Kevin Mahaffey*: –Set up an over-the-air update system –Isolate vehicle systems from infotainment systems –Secure each component independently •What else can we do? 22 *source: https://blog.lookout.com/blog/2015/08/06/tesla-research/
  23. 23. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. • National Information Exchange Model (NIEM) • US Department of Justice & Department of Homeland Security • Oracle SOA • Development Tools • LDAP • Database 23 US California San Joaquin County Information Sharing & Collaboration Integrated Judiciary Management
  24. 24. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Process Integration: Keeping More Officers Out in the Field Finnish Police 24 Business Rules Legislation Policy Procedures Service Rules Behavior Models Scheduling Internet Policing Operational Capabilities Phone eMail Mobile Face to Face PaperChannels Operations & Response Investigation Intelligence Property Management Suspect & Offender Records Management Coordination & Liaison Citizens Trusted 3rd parties Police StaffLegal RepresentativeInvolved parties Content Management Knowledge Base Business Intelligence Performance Management Intelligence Analysis Management Reporting Information Management Database Master Data Spatial Data Resilience & Availability Security Social Siebel Public Sector / Oracle Business Process Management Incident Mgt Alerts Case Mgt Prosecution Relationship Analysis Lost & Found Evidence Offender Custody Criminal Firearms Legal Instr. Warrants Services requiring configuration Integrated Policing Platform
  25. 25. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Finding common Suspects who are involved in multiple location event Identifying people sharing a handset or using multiple SIMs on one handset Comprehensive summary of Suspect’s activities Identifying groups who are working together Finding call patterns and people Suspect is calling and their linkages Big Data based Intelligence Fusion & Analysis UAE Dubai Police 25 Intelligence Hub & Alerts • Database • Oracle Database Appliance • Oracle Big Data Appliance • Endeca Informtation Discovery And many other functions…
  26. 26. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Big Data Analytics: Chicago Crime Analysis 26 Live Demo
  27. 27. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Big Data Analytics: Chicago Crime Analysis 27 (%) Whole of Chicago South Chicago Battery 18.2 19.9 Theft 20.7 17.3 Criminal Damage 11.5 11.7 Narcotics 11.3 10.4 Assault 6.1 7.2 Burglary 5.9 6.5 Robbery 3.7 4.6 Criminal Trespass 2.9 2.5 Weapon 1.0 1.3
  28. 28. Dark Web Internet / Social 28
  29. 29. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Dark Web, aka Dark Net, Deep Web 29 Intelligence Black Market AlphaBay Market
  30. 30. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Dark Web, aka Dark Net, Deep Web 30
  31. 31. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Dark Web, aka Dark Net, Deep Web 31
  32. 32. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. More News Headlines • Obama’s $4 Billion Plan for Self-Driving Cars Will Make Google Very Happy – http://recode.net/2016/01/14/obamas-4-billion-plan-for-self-driving-cars-will-make-google-very-happy/ • Toyota to accelerate big data to and from cars with satellite technology running 50Mbps – http://www.techrepublic.com/article/toyota-to-accelerate-big-data-to-and-from-cars-with-satellite-technology-running-50mbps/ • The big data of bad driving, and how insurers plan to track your every turn – https://www.washingtonpost.com/news/the-switch/wp/2016/01/04/the-big-data-of-bad-driving-and-how-insurers-plan-to-track-your-every-turn/ 32
  33. 33. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. 33 hong-eng.koh@oracle.com @he_koh linkedin.com/in/hekoh

×