About Us - KIC | Korean Institute of Criminology

Page created by Teresa Fischer
 
CONTINUE READING
About Us - KIC | Korean Institute of Criminology
of Contents
                                                                                                        Table
About Us …………………………………………………………………………………………………… 01
Conferences and Events ………………………………………………………………………… 02
News & Trends ………………………………………………………………………………………… 06
Recent Publications ………………………………………………………………………………… 14
Article: Regulations on Transmission of Commercial
         Advertisement Information ……………………………………………………… 20

                                                                                                          Virtual Forum Against Cybercrime
Article: Analysis on Cybercrime Trends in the Republic of Korea … 24

About Us
The Virtual Forum Against Cybercrime (VFAC) is a non-profit international project that aims at
reducing the impact of cybercrime by building a truly international and interdisciplinary network          May / June 2016 Issue.11
of cybercrime researchers. This allows for advancements that are global in perspective and better
address the transnational threat of cybercrime. Furthermore, we are working to increase the
knowledge and capacity of judicial officials, law enforcement officers, and policy makers in the
developing world by providing free training and access to resources. By this approach, we hope for a
world in the near future where every nation possesses the skills and tools, both legal and technical,
to effectively combat crime online.

The Virtual Forum against Cybercrime (VFAC) came into being in 2005 when the Korean Institute of
                                                                                                            www.cybercrimeforum.org

Criminology (KIC) held a workshop on ‘Measures to Combat Computer-Related Crime’ at the 11th
UN Congress on Crime Prevention and Criminal Justice.

Editor     Seong-Jin Yeon,    Director of the International Strategic Research Centre
Co-Editor Jeahyen Soung,      Deputy Director of the International Strategic Research Centre
           Claire Sujung An, Researcher at the International Strategic Research Centre
           Hayun Yu,          Researcher at the International Strategic Research Centre

For further information or questions, please contact us via email at claire.sjan@kic.re.kr.
About Us - KIC | Korean Institute of Criminology
Events
Conferences and
                                      CSA APAC Summit 2016                                                                                           3rd Europol-Interpol Cybercrime Conference

                                      Cloud technology has evolved from an exciting technology novelty into a white hot                              This Conference was hosted at Europol with the aim of further strengthening the cooperation between EU law
                                      resource. Yet, adoption is far from optimal, and technological innovation within                               enforcement and the financial sector. The event will provide several proposed initiatives aimed at enhancing the
                                                                                                                                                                                                                                                                             31 May – 1 June
                                      the field continues unabated. Never before has technology been so entwined with                                sharing of intelligence to further improve and better target international law enforcement cooperation.
                                                                                                                                                                                                                                                                                 2016,
                                      organisational optimisation as with the advent of cloud. Charting viable directions from
                                                                                                                                                     • Agendas include:                                                                                                        The Hague,
                                      the myriad technology permutations for both users and their technology providers
                                                                                                                                                      - Pertinent Threats Affecting Banks and Payment Systems                                                                  Netherlands
                                      can be a daunting proposition. Therefore, this summit aims to provide a platform for           3 May 2016,      - New Financial Sector and Law Enforcement Cooperation Structures
                                      discussing the future of Cloud and Cybersecurity.                                               Singapore       - Internet Security Industry
                                      • Agendas include:
                                       - Cybersecurity Treat and Operating in a Trusted Cloud Environment
                                       - Treats to Cloud Computing                                                                                   The 2016 SecurityWeek CISO Forum
                                       - Application Security Fast Screening and Classification
                                       - The Future of Cloud and IoT security
                                       - Cloud Adoptions with Security and Trust                                                                     The forum was specifically designed to bring together senior level security executives in an intimate environment for
                                                                                                                                                     the ultimate exchange of knowledge and insights. This event invites only approach ensures an ideal mix of enterprise
                                                                                                                                                     security leaders who can learn from each other and gain knowledge of strategies, tools and techniques to better
                                      The International Conference “Preventing and Combating                                                         defend their enterprises
                                      Cybercrime”                                                                                                    • Agendas include:                                                                                                           1–2
                                                                                                                                                      -The State of Endpoint Security                                                                                          June 2016,
   Virtual Forum Against Cybercrime

                                      Cybercrime has evolved significantly in sophistication and prevalence in recent years,                          - Investigating SWIFT Attacks against the Global Banking System                                                        California, USA
                                                                                                                                                      - Eliminating the Attack Surface Inside Data Centres & Clouds
                                      representing a major threat, with significant implications for the national security,
                                                                                                                                                      - Maximising the Value of Threat Intelligence
                                      economic development, and public safety. This Conference aims to discuss essential
                                                                                                                                                      - Playing Cyberwar Games to Win
                                      aspects of the effective fight against cybercrime. In a comprehensive approach, the event                       - Blockchain as an Enterprise Security and Compliance Tool
                                      will feature specialists from several domains or countries, with expertise in key areas.                        - Using Machine Learning for Next Generation Cyber Defence
                                      • Agendas include:
                                       - Cybercrime Legal Issues, Cybercrime Case Studies                                              20 – 21
                                       - Intellectual Property Crimes, Online Frauds and Identity Theft                              May 2016,       The 4th International Conference on Cybercrime and Computer Forensics
                                       - Online Abuse and Exploitation of Children
                                                                                                                                     Cluj-Napoca,
                                       - Models for Cybercrime Deterrence
                                                                                                                                      Romania
                                       - Secure Online Authentication and Identification                                                             The event is composed of 2-day conference that focuses on increasing technological developments in both
                                       - Protecting Privacy and Public Safety Online                                                                 personal computing and in smart-phone and wireless devices that have had an impact on how technology-enabled
                                       - Trade Secret Protection                                                                                     crimes have been committed in the Asia Pacific region and beyond. One of the key approaches to understanding
                                       - Protection against "Petty" Cybercrimes
                                                                                                                                                     such crime is through research and incorporating the outcome of research into policy and practice. The 4th Annual
    May / June 2016 Issue.11

                                       - Evidence Gathering and the Chain-of-Custody in Digital Investigations
                                       - Digital Forensics Analysis and Validation                                                                   ICCCF 2016 Vancouver, BC, Canada therefore focuses its discussion on ‘Cybercrime: Linking Research, Policy, and
                                                                                                                                                                                                                                                                                 12 - 14
                                       - ‌Ways to Strengthening the Capacities of the Judiciary and Law Enforcement Institutions                    Practice.’
                                                                                                                                                                                                                                                                                  June,
                                       - International Cooperation in Fighting Cybercrime.                                                           • Agendas include:
                                                                                                                                                                                                                                                                               Vancouver,
                                                                                                                                                       - Security and Digital Forensics
                                                                                                                                                                                                                                                                                Canada
                                                                                                                                                       - Cyberbullying and Online Defamation
                                          th
                                      18 International Conference on Cyber Crime and                                                                   - Cyberstalking
                                                                                                                                                       - Identifying Key Players in the Online Distributing of Child Sexual Exploitation Material
                                      Information Security                                                                                             - Technical Approaches to Cybercrime and Cybersecurity
                                                                                                                                                       - Combating Online Fraud Victimisation through the Use of Financial Intelligence
                                      This Conference aims to bring together leading academic scientists, researchers                                  - Responding to Technology Facilitated Violence against Women
                                      and research scholars to exchange and share their experiences and research results
     www.cybercrimeforum.org

                                      on all aspects of Cyber Crime and Information Security. It also provides a premier
                                      interdisciplinary platform for researchers, practitioners and educators to present
                                      and discuss the most recent innovations, trends, and concerns as well as practical
                                                                                                                                     23 – 24 May
                                      challenges encountered and solutions adopted in the fields of Cyber Crime and
                                                                                                                                    2016, London,
                                      Information Security.
                                                                                                                                    United Kingdom
                                      • Agendas include:
                                       - Cybercrime related investigations
                                       - Digital forensics tools and applications
                                       - Political and business issues related to digital forensics and anti-forensic techniques
                                       - Information Privacy and Information Assurance
   02
   03
Events
Conferences and
                                      International Symposium on Cybercrime Response 2016                                                            The 6th Annual Security Summit

                                                                                                                                                     In the current climate, a sophisticated cyber security strategy is imperative in all areas of Military operation. Increasingly
                                      The International Symposium on Cybercrime Response (ISCR) is an annual conference
                                                                                                                                                     complex and unforgiving cyber threats do not allow for complacency or ill-preparation; with the power to impede
                                      hosted by the Korean National Police Agency. It provides a venue for specialists of cyber
                                                                                                                                                     the functioning of aircraft, vessels, submarines and infrastructure; and expose highly sensitive data, information, and
                                      issues to discuss and share best practices of cybercrime investigation and prevention
                                                                                                                                                     intellectual property. This summit is deigned to hear the very latest cyber security strategies and to explore Cyber
                                      strategies, advanced policies and up-to-date forensic trends. The symposium this year
                                                                                                                                                     warfare prevention across 3 core themes; Policy, Intelligence and Compliance
                                      is held in collaboration with INTERPOL Regional Working Group on Cybercrime that
                                                                                                                                                     • Agendas include:                                                                                                                      21 – 22
                                      carries out a variety of activities to support member countries in the fight against
                                                                                                                                                       - Policy implications from White Paper                                                                                              June 2016,
                                      cybercrime. It offers support to cybercrime investigations, works to develop innovative
                                                                                                                                                       - Public-private partnerships                                                                                                        Canberra,
                                      new technologies, assists countries in exploiting digital evidence, conducts training                            - High impact Cybercrime                                                                                                             Australia
                                      sessions and assists countries in reviewing their cybercrime fighting capacities.                                - Cyber Security in Government
                                      • Agendas include:                                                                                               - Defending critical infrastructure
                                        1) Cyber terrorism and other threats                                                                           - Innovation in the R&D agenda for future Cyber capability
                                           - Cyber Terrorism in Korea and Future Endeavor                                                              - Building Australia's next generation of Cyber soldiers
                                           - Tackling Terrorist Use of the Internet: the European Counter Terrorism Centre                             - Intergovernmental agreements on Cyber Warfare
                                           - ‌Promote Consensus, Strengthen Cooperation, Jointly Combat Cybercrime and                                - Shaping the Cyber Arms race of the future
                                             Cyberterrorism

                                       2) New trends and approaches
                                          - Addressing IoT Threats: New Opportunity and New Challenges
                                                                                                                                                     Cifas Annual Conference 2016: Future Crimes
   Virtual Forum Against Cybercrime

                                          - Law Enforcement Agencies’ Role in National Cyber Security Structures
                                          - Recent Cyber Security Issues and Response Strategies
                                                                                                                                                     It is an annual conference organised by Cifas which organises and conducts information security events across the
                                       3) Financially oriented cybercrime                                                                            globe in order to protect business, charities, public bodies and individuals from financial crime. The theme for this
                                          - Why Does My Account Disappear: Phishing and Pharming                                                     year’s conference is future crimes. Over the course of the day, national and international experts will discuss the new
                                                                                                                                     15 - 17 June,
                                          - ‌A Success Story: Massive Crackdown on Multinational Business Email Compromise
                                                                                                                                     Seoul, Korea    threats to organisations which are predicted to emerge over the next few years. The event will also examine how
                                            Cell
                                          - INTERPOL Coordinated Actions against Business Email Compromise                                           organisations and the law will need to adapt in the face of changing public attitudes towards identity, privacy and the              23 June 2016,
                                                                                                                                                     use of personal data.                                                                                                                   London,
                                       4) Cyber attacks against critical infrastructure
                                          - National Critical Information Infrastructure Protection Strategy and Approach in India                   • Agendas include:                                                                                                                   United Kingdom
                                          - The Cybercrime Challenge – an Australian Law Enforcement Perspective                                       - Crime Prevention
                                                                                                                                                       - Future Crime
                                       5) Crimeware as a service
                                                                                                                                                       - History of Crime and Modern-day Bribery and Corruption
                                          - New ways in analyzing bad guys data
                                                                                                                                                       - Cyber Attack
                                          - DD4BC & Operation Venus (DD4BC, DDoS - for Bitcoin)
                                                                                                                                                       - Economic Crime
                                       6) Collective responses against cyber threats and INTERPOL digital crime center
    May / June 2016 Issue.11

                                          - INTERPOL Digital Crime Centre – 24/7 Contact Points
                                          - Breakthrough in Tackling Cybercrime: Financial Sector Taskforce
                                          - ‌Supporting LEAs in Cybercrime Investigation and sharing of threat intelligence                         Rethinking Cybercrime 2015: UCLAN Cybercrime Research Unit
                                            Focusing on Ransomware
                                          - ‌European Cybercrime Centre - Update on operational and strategic activities, J-CAT
                                                                                                                                                     The theme of the conference is to critically examine the current ‘state of play’ in global Cybercrime in relation to a diverse
                                            and approach to private parties cooperation
                                                                                                                                                     range of issues including terrorism, online sexual predation, property/identity theft, cyber-bullying, virtual criminology, cyber-
                                       7) Harmonization, cooperation, research and capacity building
                                                                                                                                                     security and trolling, in tandem with attempts to ‘rethink’ ways in which we might conceptualise theoretical developments,
                                          - ‌Plenary Discussion: Data Sharing in a Digital World Focusing on Mutual Legal
                                            Assistance                                                                                               inform social and educational policy, respond to threats and prevent and combat online criminal behaviour.
                                          - INTERPOL Digital Forensics Laboratory Capabilities                                                       • Agendas include:
                                          - ‌"Intuition and Expertise": Way to a New Capacity Building Approach on Needs and                          - The emergence of ‘Virtual Criminology’
                                            Expertise                                                                                                  - The growth of cyber-space as a major site for crime and moral transgression
     www.cybercrimeforum.org

                                          - Research on the Dark Market and Training Initiatives                                                       - Cyber-terrorism and role of the internet in radicalisation                                                                        27 – 28 June
                                          - Cybercrime Situation and Challenges                                                                        - Identity theft and online fraud                                                                                                  2016, Preston,
                                                                                                                                                       - Intellectual Property Crime                                                                                                      United Kingdom
                                                                                                                                                       - Online sexual predation & grooming
                                                                                                                                                       - Surveillance, monitoring and privacy
                                                                                                                                                       - Effectiveness of law and order agencies to control cybercrime
                                                                                                                                                       - Security services [private and government]
                                                                                                                                                       - Hate Crime and hate speak
                                                                                                                                                       - Trolling and anti-social behaviour
                                                                                                                                                       - False accusation and defamation
                                                                                                                                                       - Social networking and deviance
   04
   05
and Trends
News
                                                                                                                                                             The nine men and three women are wanted for questioning over transactions totalling $1.5 million and attempted transactions of $700,000 at
                                     Cisco launches $10 million global Cybersecurity Scholarship Program,                                                    banks across Sydney, Newcastle and the Southern Highlands between November 2014 and July last year.
                                     improves certifications                                                                                                 The syndicate attracted University and foreign students by saying that they can earn money easily by just opening bank accounts, and they
                                                                                                                                                             used those accounts for the fraud. When victim’s bank account is successfully hacked, personal details are disclosed and victim’s mobile phone
                                                                                                                                                             account is moved by the offender to a new carrier with a new number without the victim’s consent.
                                     15 June 2016 by Sara Barker, Securitybrief AU
                                                                                                                                                             Changing the account ¬holder’s contact number ¬allows fraudsters to open new online accounts in the victim’s name to transfer money.
                                     It has been reported that Cisco, a multinational corporation for networking hardware and security services will be      Those who made bank accounts as the criminals said found themselves have thousands of dollars debt as police crack down on the scam.
                                     addressing cybersecurity skills shortage by operating $10 million Global Cybersecurity Scholarship Program to the       Two students prosecuted last year for helping steal $541,000 from one victim, were ordered to repay $178,000 and $163,000 ¬respectively despite
                                     security certification program.                                                                                         not making any money themselves. Students who wanted to make ‘easy money’ were scammed and being used in the organised fraud. Police warned
                                     The company mentioned that we will be lack of cybersecurity experts by 2019 despite the fact that cybersecurity         that people should be careful when being approached by those advertisements saying they can earn money just by opening bank accounts.
                                     protection is a highly needed area. To fill the gap, Cisco is encouraging up to 10,000 cybersecurity candidates to      William Kim, 19, allegedly a mid-level player in the syndicate, was charged last month over the theft of $450,000. Dinh Anh Khoa Trinh was
                                     step forward.                                                                                                           charged last year in relation to the theft of more $4 million. He allegedly controlled 60 mules flown in from Asia to withdraw funds to avoid law
                                     Jeanne Beliveau-Dunn, vice president and general manager at Cisco Services said, "Cybersecurity is essential to         enforcement attention.
                                     digital success. Many CEOs across the globe tell us their ability to innovate is hampered by their security concerns
                                     in the digital world. This creates a big future demand for skill sets that don't exist at scale today. We developed
and Trends
News
                                                                                                                                                              In related news, the Securities and Exchange Commission (SEC) in the US said that cybercrime is the biggest threat facing the financial industry.
                                     Exclusive: In Ecuador cyber heist, thieves moved $9 million to 23 Hong                                                   Speaking at the Reuters Financial Regulation Summit in Washington D.C., Mary Jo White, chair of the SEC, explained that the commission’s
                                     Kong firms                                                                                                               analysis has shown that counter policies that deal with cybercrimes are not enough. “What we found, as a general matter so far, is a lot of
                                                                                                                                                              preparedness, a lot of awareness but also their policies and procedures are not tailored to their particular risks,” she was quoted by Reuters as
                                                                                                                                                              saying.
                                     25 May 2016 by Clare Baldwin and Nathan Layne, Reuters
                                     $12 million stolen from an Ecuadorian bank by cyber criminals in 2015 was found to be transferred to 23
                                                                                                                                                              
                                     companies based in Hong Kong, some of which show no clear business activity, according to previously
                                     unreported court filings and judicial rulings.
                                     The court papers offer a first glimpse into where some of the money was moved after it reached accounts
                                     in Hong Kong. The lawsuit was filed by Ecuador's Banco del Austro (BDA) in Hong Kong against the web
                                     of companies that received or handled more than $9 million in stolen funds, bank records submitted to the
                                                                                                                                                              UK cybercrime prosecutions rise 34% in 1 year
                                     territory's Court of First Instance show. A separate court filing indicated that $3 million went to companies in
                                     Dubai and other places, which is not the subject of litigation in Hong Kong.
                                     It has been reported that SWIFT global messaging system was used to move the funds, which is bridging bank               23 May 2016 by RT (Autonomous Nonprofit Organisation)
                                     money transfers worldwide. There was another case in Bangladesh when $81 million has been stolen via this                It was found that the number of cyber criminals prosecuted in Britain rose by almost 34 percent in 2015 while prosecutions for white collar
                                     network in February. A search for cyber thieves behind the February attack which ranks one of the largest ever           criminals also increased slightly. According to the data provided by a law firm Pinsent Masons, the number of perpetrators prosecuted for
                                     has been conducted by the U.S. Federal Bureau of Investigation and Bangladesh authorities.                               cybercrime jumped from 45 to 61 in a year (2014-2015).
                                     In the Ecuadorian heist, the money was transferred by Wells Fargo (WFC.N) based on authenticated SWIFT                   Head of Global Corporate Crime at Pinsent Masons, Barry Vitou, welcomed the increase. He told the Financial Times that the increase in
                                     messages, and both BDA and the U.S. bank now believe those funds were stolen by unidentified hackers,                    prosecutions is a positive sign in that it indicates authorities are tackling complex crime cases better.
                                     according to documents in a BDA lawsuit filed against Wells Fargo in New York this year.                                 Pinsent Masons’ data also reveals an increase in prosecutions for white-collar criminals; the number of prosecutions in this area rose by 59 since
  Virtual Forum Against Cybercrime

                                     The existence of an investigation by Hong Kong Police has not been confirmed and the Ecuador attorney                    2014.
                                     general’s office did not respond to a request for comment. The FBI and BDA also declined comment.                        High profile white collar crime cases filed by Britain’s Serious Fraud Office (SFO) include that of ex-UBS derivatives trader Tom Hayes, who was
                                     Initially, cyber thieves moved $9.139 million of the more than $12 million they stole from BDA into the Hong             convicted of Libor rigging and the case of Magnus Peterson, who used his hedge fund Weavering Capital to commit financial fraud.
                                     Kong accounts of four companies at HSBC (HSBA.L) and Hang Seng Bank (0011.HK). At least $3.1 million of
                                     the funds were then routed from those four companies to 19 "second layer" bank accounts, meaning the funds               Cybercrime
                                     made a second hop to another set of Hong-Kong registered companies, the papers show.                                     A National Security Strategy, published by Downing Street in 2010, pointed out cyber-security a top priority for Britain, along with global
                                     Hang Seng Bank and HSBC refused to comment on the details but they mentioned that they are in full                       terrorism, international conflict and natural disasters.
                                     cooperation with the law enforcement authority and endeavor to deter repetition of crime.                                As the use of e-commerce, online banking and digital device has been mobilised, criminals have been taking advantages of vulnerabilities
                                     The second layer accounts where money were transferred to do not seem to have any business transactions,                 technology has. While technology has reduced some criminal opportunities, it has inevitably facilitated others such as digital fraud and
                                     a BDA lawyer said in the filings. Hong Kong Deputy High Court Judge Conrad Seagroatt said in a December                  disruption of critical state infrastructure via advanced technologies.
                                     ruling that the four initial recipients showed no prior history of business activity. "They all appear to be otherwise   The authority responsible for dealing with cybercrime in Britain is The National Cyber Crime Unit (NCCU), a division of Britain’s National Crime
                                     inactive corporate vehicles controlled by citizens of the People's Republic of China," Seagroatt wrote.                  Agency (NCA). It works closely with a number of partners, including Regional Organized Crime Units (ROCUs), the Metropolitan Police Cyber
                                                                                                                                                              Crime Unit (MPCCU) and a range of cross-border actors.
                                                                                        The government plans to spend more than £40 million on a new cyber security center designed to protect Ministry of Defense (MoD) networks
   May / June 2016 Issue.11

                                                                                                                                                              and systems from so-called “malicious actors”.

                                                                                                                                                              Cyber security in Britain
                                                                                                                                                              Data theft is one of the most common cybercrimes for the purpose of financial gain. Also, political protesters and national spies use hacking
                                     Financial industry ‘needs to come together to fight cybercrime’                                                          to steal classified information and state secrets. It was found in a survey conducted by SecureData that companies are positive in considering
                                                                                                                                                              hiring ex-hackers to work for them to deal with cyberattacks. 97% of those who participated in the survey polled that data security is key to
                                     25 May 2016 by Narinder Purba, WeLiveSecurity                                                                            countermeasures against cybercrime.
                                                                                                                                                              The case over Lauri Love, a British security expert who allegedly hacked into multiple US government agencies and is waiting for extradition
                                     Financial industry has been voices over growing worries of threat of cybercrime and experts have emphasised
                                                                                                                                                              hearing has been provoking controversy as the NCA has been criticised for the treatment of the hacker. The law enforcement body had tried
                                     that the industry should cooperate to better understand and deal with the threats.
                                                                                                                                                              to use a civil suit launched by cyber-security expert, Lauri Love, to force him to hand over his encryption keys. Love was seeking the return of a
                                     Gottfried Leibbrandt, CEO of SWIFT, described cybersecurity as a “critical issue” and pointed out that
    www.cybercrimeforum.org

                                                                                                                                                              number of his encrypted devices, currently held by the NCA.
                                     countermeasures against it should be improved. At the 14th annual European Financial Services Conference
                                                                                                                                                              The authority’s plan was blocked by Judge Nina Tempia who ruled that Love was not obliged to hand over passwords. Love's extradition hearing
                                     held in Brussels, he pointed out that fighting cybercrime will be a major and ongoing battle. He mentioned that
                                                                                                                                                              is scheduled for the 28th and 29th June. His US lawyer, Tor Ekeland, said the cyber security expert's skills should be nurtured by the British
                                     even if the number of cyberattack will increase and the technology used in the attack will advance, we are not
                                                                                                                                                              government. “Talented thinkers like him are an asset in identifying security flaws in computer systems,” Ekeland told RT in April. "If the U.S.
                                     supposed to be giving in. “Rather, it means that we must work even harder at our collective defensive efforts.”
                                                                                                                                                              had been prosecuting computer crimes in the 1970’s like they are now, Steve Jobs, Steve Wozniak and Bill Gates all would have gone to jail and
                                     The cyber heist at Bangladesh bank in which criminals leaped $81 million profits in February was described as a
                                                                                                                                                              you would have no Apple or Microsoft because both those companies were started by hackers."
                                     “watershed” moment that changed the industry forever.
                                     The attack could have been worse, as a spelling mistake prevented the perpetrators from netting close to $1
                                                                                                                                                              
                                     billion. Mr. Leibbrandt reminded that the security is core for banks and cyberattacks should be taken into account
                                     seriously.
  08
  09
and Trends
News
                                                                                                                                                             to hide and unhide Exel sheets to escape suspicion.
                                     Botswana: Cybercrime Threatens Developing Economies                                                                     Another technique found in the malware was the use of DNS queries as a data exfiltration channel. As DNS is required for normal network operations,
                                                                                                                                                             it is unlikely to be blocked, allowing free communications out of the network, and its use is unlikely to raise suspicion among network defenders.
                                                                                                                                                             “Although this attack did not leverage any zero-days or other advanced techniques, it was interesting to see how attackers used different
                                     23 May 2016 by The Patriot, Distributed by AllAfrica Global Media
                                                                                                                                                             components to perform reconnaissance activities on a specific target,” the researchers said.
                                     The Patriot, Botswana’s news media reported on the first international conference on the Internet, Cybersecurity
                                                                                                                                                             Users can protect themselves from such attacks by disabling Office macros in their settings and also by being more vigilant when enabling
                                     and Information Systems held in Gaborone. It was organised by University of Botswana in collaboration with
                                                                                                                                                             macros in documents, even if such documents are from seemingly trusted sources.
                                     the University of Johannesburg, focusing on challenges caused by cybercrime. The conference was in line with
                                     the country’s efforts to build effective strategies against cybercrime that is derived from technological evolution
                                                                                                                                                             
                                     and was attended by delegates from African and European countries. Participants shared ideas on cybersecurity
                                     which has become a significant issue around the world.
                                     Academics, practitioners and the government (Ministry of Transport and communication) will cooperate on the
                                     strong strategy and implementation. The Permanent Secretary in the Ministry of Transport and Communication
                                     Neil Fitt commented that the conference will contribute to helping African countries where internet development         US Navy to Train Up a Hacking Team
                                     has been slow. Since the installation of internet network has been undergoing in the country, the government
                                     realises the need to prepare safe cyberspace in order for users to use it in stable environment by curbing
                                                                                                                                                             20 May 2016, by Tara Seals, Infosecurity
                                     disruptions or intrusions. In the environment where internet is involved in everyday activities, cybersecurity is key
                                                                                                                                                             The US Navy said it is planning to create its own team of “ethical” sailor-hackers.
                                     to maintain and protect the system.
                                                                                                                                                             The authority announced that it will be recruiting 34 individuals to participate in the program called ‘Ethical Hacker Program’ which will be held
                                     "We are trying to make cyberspace safe for everyone and stop all illegal activities on the internet," said Fitt.
                                                                                                                                                             6-10th June 2016 in San Diego. Participants will undertake training organised by the International Council of Electronic Commerce Consultants
                                     He pointed out the importance of cybersecurity and the country’s efforts to establish effective cybersecurity
                                                                                                                                                             or an authorised partner. The course consists of lectures, team activities and case studies followed by beyond-site certification testing.
                                     strategies. Also, the Director of Public Prosecution Advocate Abraham Keetshabe reminded that legal and
  Virtual Forum Against Cybercrime

                                                                                                                                                             The Navy stated that a certified ethical hacker “is a skilled professional who understands and knows how to look for the weaknesses and
                                     regulatory frameworks for ICT need to be founded and effective national ICT policy will help the country’s social,
                                                                                                                                                             vulnerabilities in networks and/or computer systems and uses the same knowledge and tools as a malicious hacker upon request from an
                                     economic, cultural and political transformation in days to come.
                                                                                                                                                             organisation. The certification is for individuals who are responsible for securing (or testing the security of) computer networks.”
                                     In this context, Keetsahbe welcomed the introduction of Electronic Communications and Transactions Act and
                                                                                                                                                             The military has expedited cyber-plans; government contractors and a former Pentagon official noted that the government will be developing
                                     Electronic Records (Evidence) Act that came into effect in 1st April 2016. He said that Botswana has been putting
                                                                                                                                                             computer code and cyber weapons that are able to kill adversaries under a new half-billion-dollar military contract.
                                     an emphasis on ensuring personal data protection regionally.
                                                                                                                                                             There has been a concern that these cyber weapons will allow US troops to launch “logic bombs,” instead of traditional weapons, which
                                     The conference aimed to help all the African countries with growing online economies by providing a venue for
                                                                                                                                                             essentially would force an enemy’s critical infrastructure to self-destruct—likely with the loss of human life.
                                     exchanging ideas and sharing good practices. There is a high chance that the conference would be an annual
                                                                                                                                                             According to Infosecurity, sources told Nextgov that the contract is the main part of an upcoming $460 million U.S. Cyber Command project,
                                     event in order for the countries to share technology, practices and challenges in cybersecurity.
                                                                                                                                                             which will outsource “cyber fires" planning, as well as "cyberspace joint munitions" assessments to contractors. Raytheon, Northrop Grumman

                                                                                                     and Lockheed Martin are among the major defense firms expected to compete.
                                                                                                                                                             The Pentagon has launched a program called "the first cyber bug bounty program in the history of the federal government”, earlier this year
                                                                                                                                                             and the Department of Defense is inviting hackers to test the department’s cybersecurity profile. A pilot program initiated by the Pentagon, “The
                                                                                                                                                             Hack” uses crowdsourcing from commercial sectors to identify vulnerabilities and deficiencies of department’s public webpages.
   May / June 2016 Issue.11

                                     Hackers Target Multiple Middle East Banks                                                                               

                                     23 May 2016 by Tara Seals, Infosecurity
                                     Infosecurity, an online cybersecurity news and blog reported that hackers have been keeping close tabs on
                                     Middle East banks, in preparation for a major attack.                                                                   Singapore banks' group invites SWIFT to discuss cyber attacks
                                     Researchers at FireEye found out that emails with malicious attachments have been sent to a number of banks
                                     in the Middle East region. The purpose of the attack was to collect information on logged on user, network
                                                                                                                                                             19 May 2016, Reporting by Saeed Azhar, Editing by Christopher Cushing, Reuters
                                     configuration data, user and group accounts, local and domain administrator accounts, running processes and
                                                                                                                                                             Reuters reported that The Association of Banks in Singapore (ABS) will hold a meeting to discuss major cyberattack cases in Bangladesh and
                                     personal data. When obtaining these information, hackers would be able to conduct a large scale campaign.
                                                                                                                                                             Vietnam with Society for Worldwide Interbank Financial Telecommunication (SWIFT), which involved SWIFT’s financial messaging service in June.
                                     The emails sent to employees contained Excel file, with a message related to IT infrastructure, pretending it
    www.cybercrimeforum.org

                                                                                                                                                             It has been known that members of ABS have engaged SWIFT individually when the attacks happened. "ABS, for its part, has invited SWIFT to
                                     is a normal and work-related task. But the system used in this attack operated only on Windows Vista and
                                                                                                                                                             a meeting in early June to share its experience in managing the incidents in Bangladesh and Vietnam," it said in an email to Reuters.
                                     subsequent versions of the operating system.
                                                                                                                                                             Singaporean banks have been alerted to keep a high level security for critical IT systems, so has other central banks including Bank of England.
                                     “In one case, the content of the email appeared to be a legitimate email conversation between several
                                                                                                                                                             An investigation has been conducted by the FBI and private forensic experts for the cyber heist in Bangladesh in February in which $81 million
                                     employees, even containing contact details of employees from several banks,” FireEye noted. “This email was
                                                                                                                                                             was stolen from a central bank account kept at the Federal Reserve Bank of New York. Hackers installed malware at Bangladesh Bank's Dhaka
                                     then forwarded to several people, with the malicious Excel file attached.”
                                                                                                                                                             headquarters that hid traces of their attack to delay discovery so they could access the funds, according to police and private security firms.
                                     Office documents containing malicious software are used as a common method used in cyberattack. Since office
                                                                                                                                                             Following the attack, Vietanm’s Tien Phong Bank said it had interrupted an attempted cyberattack which was similar to the heist in Bangladesh,
                                     settings typically require user action in order for macros to run, hackers deceive victims that they need to enable
                                                                                                                                                             containing deceitful SWIF messages
                                     the code in order to view “protected content”. When victims agree to follow it, the content of file displays as if it
                                     is legitimate. Researchers said that the scripts attackers used are unique one in a sense that they took extra step
                                                                                                                                                             
  10
  11
and Trends
News
                                     Identity theft victims need more assistance as cyber crime skyrockets,                                                    Government Spends Big on Cyber Security
                                     support services say
                                                                                                                                                               9 May 2016 by Sydney Criminal Lawyers
                                     16 May 2016 by Matt Wordsworth, ABC News                                                                                  The Australian government recently announced that it will upgrade defence against cyberattacks. $230 million cyber security strategy has been
                                     ABC News Australia reported that the number of identity theft victims has been surged and the demand for                  introduced to reduce costs caused by costly cybercrime.
                                     support services has been increasing. It is estimated more than 1 million Australians fall victims of identity fraud      The strategy is to frustrate malicious cyberattacks such as data theft and intellectual property theft. The Australian Crime Commission (ACC)
                                     each year at a cost of about $1 billion.                                                                                  and Australian Federal Police (AFP) will receive an additional $16 million and $20.4 million in funding respectively to assist with threat detection,
                                     Currently IDCARE is the only free national support service for Australian and New Zealand victims of the fraud;           technical analysis and forensic assessment, and an extra 101 cyber security experts will be brought-in to provide advice and assistance.
                                     the organisation has about 20 staff and gets funding from the industry and the Federal Government.                        Information-sharing is also a part of the strategy. It has been reported that $39 million will be spent to move the Australian Cyber Security
                                     Managing director Dr David Lacey, who spent 20 years at the Department of Defence and the Australian Crime                Centre from Canberra, and $47 million to establish threat sharing centres in capital cities. An online portal will be introduced to improve
                                     Commission, said the number of calls for help has been doubling every three months. He mentioned that                     cooperation between private sectors and government agencies, and $15 million is allocated for grants to enable small businesses to upgrade
                                     investments on the weapons for cyberwarfare have been active whereas the first aid response and support                   security systems. Also, to nurture experts in cyber security, the government has suggested expanding training courses in TAFEs and developing
                                     services are lack of resources. "If we're at cyber war there's a lot of investment going into bullets and rifles at       new programs.
                                     the moment but in terms of the stretcher bearers and the first aid post and those to provide the triage and the           The Attorney-General’s Department estimates the direct costs of cyber-crime in Australia to be $2 billion per year. The cost is increasing. In
                                     emergency support, we're it," he said.                                                                                    2011, 313 attacks triggered a response by the Australian Signals Directorate, the relevant agency within the Department of Defence. The
                                     A report on IDCARE's first year of operation found 8 per cent of clients were referred to mental health                   number nearly quadrupled to 1131 in 2014.
                                     professionals for face-to-face support.                                                                                   CISCO chief security and trust officer, John Stewart, says that it is also important to realise that the sectors that are not usually considered as
                                     Paul McDonald, a victim of identity fraud had $28,500 stolen from his retirement savings in April. The thieves            IT industries also need to be viewed as IT-enable businesses today. “Australia must embrace cyber security as a key differentiator and business
                                     hacked his email and advised his financial advisers to transfer cash and liquidate shares and a term deposit, worth       advantage to be globally competitive and prosperous.” Mr. Stewart said.
  Virtual Forum Against Cybercrime

                                     more than $200,000. By chance, Mr McDonald and his wife realised when they contacted their financial advisers             Cyber espionage is also a significant concern, posing a threat to national interests and security. The Bureau of Meteorology said China has
                                     from a separate email account and were able to stop the trade, but they lost the cash.                                    allegedly been engaged in a major cyberattack in 2015, aiming to compromise data of federal agencies. The authority possesses one of the
                                     When Mr McDonald reported the theft at his local police station, the officer guided him to contact the Australian         biggest supercomputers in the country, providing classified information to a number of agencies including the Department of Defence. It said
                                     Cybercrime Online Reporting Network (ACORN) but it was not very helpful. "There doesn't seem to be a lot                  that if the attack was successful it could have costed billions of dollars.
                                     of help out there. So I went looking for resources to help with this and I guess the only thing I found online            In its first unclassified threat report in 2015, the Australian Cyber Security Centre described the threat to Australia as “undeniable” and
                                     anywhere in Australia is this mob called IDCARE," he said.                                                                “unrelenting”, and said it “continues to grow”. The Centre “sees daily cyber espionage activity targeting Australian Government networks”,
                                     Mr McDonald reminded people that we all need to check computers for viruses and email settings on a regular               which seek to gain a strategic advantage in business activities and foreign policy negotiations.
                                     basis in order to prevent malicious attacks. "If you've got webmail, find the settings, get into the filters and have     IT security company Symantec wrote in its annual Internet Security Threat Report that Australian citizens and corporations are often being
                                     a look and see if there are any filters in there because if there are, you've been hacked," he said. "I know it's         targeted by cyber criminals and the country ranked top for ransomware attacks in the Southern Hemisphere. Not only large companies and
                                     scary. If you've been hacked have a look at the email addresses that are sitting in that filter and you'll see who        government bodies, but individual citizens have become a common target. About 60% of Australians fell victims of cybercrime during their
                                     you should be talking to very quickly."                                                                                   lifetime and nearly 47% of this groups have been targeted in the past 12 months. Symantec reports that “Australia is seen as a great target
                                     There was another case hackers took a victim’s mobile number and used it to transfer $80,000 via online                   by cybercriminals because we are a sophisticated economy, with high disposable incomes, good connectivity and a high concentration of
                                     banking. Her bank required a password, delivered by text message, before processing transfers. The victim,                connected devices.”
                                     named Sue said "I was in Airlie Beach and I tried to ring my son and he didn't return my call so I went back to           It is generally agreed that the government’s plan on investment is on the right track and continuous knowledge sharing among agencies against
   May / June 2016 Issue.11

                                     my hotel and noticed my phone had 'SOS only' on it."                                                                      cyber threat is important. Since criminals and technologies used in cyberattack are evolving and developing at a fast pace, responses should
                                     When she opened her email via iPad there were nearly hundred online banking notifications indicating purchases            keep up the speed.
                                     were made. "In that week I got 176 emails of people purchasing stuff — $4,000 at Apple in Perth, JB Hifi in
                                     Brisbane.” When she contacted her mobile carrier Telstra, the company said her contract with Telstra has been             

                                     cancelled and transferred to another carrier, Optus.
                                     "We don't know how it happened — we presume the driver's licence. When they opened the Optus account
                                     they had my driver's licence number. I haven't lost my bag, I haven't lost anything. All I can think of is that I never
                                     got my (licence) renewal in the mail."
                                     Dr Lacey people should try to protect themselves from hackers by taking simple security measures such as
                                     changing passwords and installing anti-virus software.
    www.cybercrimeforum.org

  12
  13
Publications
Recent
                                                                                                                                                 presents a three phased-research to identify the suitable regulatory approach for the critical infrastructures of Turkey. First of
                                     Cybercrime and Business: Strategies for Global Corporate Security                                           all, the data of the critical infrastructures of Turkey are qualitatively analysed, by using grounded theory method, to extract the

                                     Sanford Moskowitz, Published by Butterworth-Heinemann (June 2016)                                           vulnerabilities associated with the critical infrastructures. Secondly, a Delphi survey is conducted with six experts to extract the
                                                                                                                                                 required regulations to mitigate the vulnerabilities. Finally, a focus group interview is conducted with the employees of the critical
                                     The author examines the three most prevalent cybercrimes afflicting today’s corporate security              infrastructures to specify the suitable regulatory approaches for the critical infrastructures of Turkey. The results of the research
                                     professionals: piracy, espionage, and computer hacking. Showing how each of these threats evolved           show that the critical infrastructure operators of Turkey, including privately held operators, are mainly in favour of regulations.
                                     separately then converged to form an ultra-dangerous composite threat, the book discusses the impact
                                     the threats pose and how the very technologies that created the problem can help solve it. It then          

                                     offers viable strategies for how different types of businesses—from large multinationals to small start-
                                     ups—can respond to these threats to both minimize their losses and gain a competitive advantage.
                                     The book concludes with identifying future technological threats and how the models presented in
                                                                                                                                                 Computer Forensics: Investigating Network Intrusions and Cybercrime
                                     the book can be applied to handling them. The book describes how to effectively handle corporate
                                     cyber security issues using case studies from a wide range of companies around the globe, highlights        the International Council of E-Commerce Consultants, Published by EC Council (May 2016)
                                     the regulatory, economic, cultural, and demographic trends business encounter when facing security
                                     issues and profiles corporate security issues in major industrialized, developing, and emerging countries   The book provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. This book is covering a broad

                                     throughout North America, Europe, Asia, Latin America, Africa, and the Middle East.                         base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks
                                                                                                                                                 and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Author
                                                 explains advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In
                                                                                                                                                 full, this book provides preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive
  Virtual Forum Against Cybercrime

                                                                                                                                                 hacker's path through a client system.

                                     Comprehension of cyber threats and their consequences in Slovenia                                           
                                     Blaz Markelj and Sabina Zgaga, Pubished at Computer & Security Review, Volume 32, Pages 513-
                                     525 (June 2016)

                                     Students in Slovenia use their private mobile devices to access various information systems and
                                                                                                                                                 Combating Violent Extremism and Radicalization in the Digital Era (Advances in Religious
                                     corporate data that can be classified, or marked as trade secrets, personal data or professional
                                                                                                                                                 and Cultural Studies)
                                     secrecy. Individuals who are granted authorized access to these types of data are obliged to protect
                                     them from unauthorized access and cyber threats. The results of survey and criminal law analysis            Majeed Khader, Neo Loo Seng, Gabriel Ong and Eunice Tan Mingyi, Published by IGI Global (May 2016)

                                     have shown us that the student population is not well aware of security threats and security
                                                                                                                                                 The book provides a reference for the latest research on the utilization of online tools by terrorist organizations to communicate with
   May / June 2016 Issue.11

                                     measures. Because the user of a mobile device can be held criminally responsible for the loss of
                                                                                                                                                 and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against
                                     data that he or she had accessed by using the mobile device, even though he or she is not aware
                                                                                                                                                 such threats. Focusing on perspectives from the social and behavioural sciences, this book suggests researchers, analysts, intelligence
                                     of security threats and protective measures against them. This paper provides recommendations for
                                                                                                                                                 officers, and policy makers preventive methods for online terrorist activities. It examines how violent extremists exploit the Internet to
                                     implementing internal regulations and continuously educate mobile device users about their safe
                                                                                                                                                 achieve their goals, online radicalisation, the ways in which violent extremist ideology in the digital space can be combated, emerging
                                     usage in accordance with organizational standards.
                                                                                                                                                 trends in cyberterrorism (Internet as a weapon of destruction), issues of hacking and phishing and countermeasures.

    www.cybercrimeforum.org

                                     Regulatory approaches for cyber security of critical infrastructures: The
                                                                                                                                                 Computer Crimes and Digital Investigations
                                     case of Turkey
                                                                                                                                                 Ian Walden, 2nd Edition, Published by Oxford University Press (May 2016)
                                     Bilge Karabacak, Sevgi Ozkan Yildirim and Zazife Baykal, Published at Computer Law & Security
                                     Review, Volume 32 (June 2016)
                                                                                                                                                 Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal
                                                                                                                                                 professionals and the general public. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to
                                     Cyber systems are extensively used to control and monitor critical infrastructures. A considerable
                                                                                                                                                 be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more
                                     amount of the infrastructures are connected to the Internet over corporate networks. Therefore,
                                                                                                                                                 important than ever for practitioners working in this area to stay up to date.
                                     cyber security is an important item for the national security agendas of several countries. This paper
  14
  15
Publications
Recent
                                     The book provides essential guidance on the substantive and procedural aspects of cybercrimes for            increasing the penalties are not very effective. Authors discovered that better control of dark markets to prevent the trading of stolen
                                     both experienced practitioners and for those new to the field. It includes new material on topics such       data has a much higher impact. In general, results of our simulation can be used to analyse the perpetrator's economic motives and to
                                     as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception        establish a basis for effective countermeasures.
                                     as well as expanded discussions of cyber security policy and laws, intermediary liability, developments
                                     in policing activities and prosecution policies, and developments in cross-border search and seizure         

                                     and mutual legal assistance and extradition. An expanded comparative discussion of law and policy
                                     within the EU and under the Budapest Convention, as well as other international organizations such
                                     as the United Nations, places cybercrime in its international context.
                                                                                                                                                  Digital Forensics with the AccessData Forensic Toolkit (FTK)
                                     
                                                                                                                                                  The book provides a comprehensive review of essential digital forensics concepts and builds on this information to teach the
                                                                                                                                                  readers on how to conduct digital investigations with AccessData’s FTK (the industry-standard and court-accepted digital
                                                                                                                                                  investigations platform). It covers the technology that all digital forensics investigators need to understand especially data,
                                                                                                                                                  storage media, file systems and registry files. Also it explains the best ways to use FTK 5 tools, including FTK imager, FTK registry
                                     Combatting Cybercrime and Cyber terrorism; Challenges, Trends and
                                                                                                                                                  viewer, and the Password Recovery Toolkit (PRTK) to conduct legally defensible investigations.
                                     Priorities
                                     Babak Akhgar, Ben Brewster, Published by Springer (May 2016)                                                 
  Virtual Forum Against Cybercrime

                                     This book provides security practitioners with a trusted reference and resource designed to guide
                                     them through the complexities and operational challenges associated with the management of
                                     contemporary and emerging cybercrime and cyberterrorism issues. This book helps to consolidate               Cybersecurity Investments: Decision Support Under Economic Aspects (Progress in IS)
                                     the increasing role and responsibility of society as a whole, including law enforcement agencies, the
                                                                                                                                                  Stefan Beissel, Published by Springer (March 2016)
                                     private sector and academia, to tackle cybercrime and cyberterrorism
                                     This new contribution to cybercrime and cyberterrorism knowledge follows a multi-disciplinary                This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance
                                     philosophy supported by leading experts across academia, private industry and government agencies.           between financial expenditures and risk mitigation. This is achieved by pursuing a multi-disciplinary approach that combines well-
                                     This volume goes well beyond the guidance of law enforcement agencies, academia and private sector           founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk-
                                     policy documents and doctrine manuals by considering cybercrime and cyberterrorism challenges in             through for the complete lifecycle of cybersecurity investments. Insights into the economic aspect of the costs and benefits of
                                     a wider practical and operational context. It juxtaposes practical experience and, where appropriate,        cybersecurity are supplemented by established and innovative economic indicators. Readers will find practical tools and techniques
                                     policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber           to support reasonable decision making in cybersecurity investments. Further, they will be equipped to encourage a common
   May / June 2016 Issue.11

                                     ecosystem ensuring that all security practitioners are better informed and prepared to carry out their       understanding using economic aspects, and to provide cost transparency for the senior management.
                                     cybercrime and cyberterrorism responsibilities to protect the citizens they serve.
                                                                                                                                                  
                                                                                                                                                  Cybercrime Among Companies: Research Into Cybercrime Victimisation Among Small and
                                     Phishing: An economic analysis of cybercrime perpetrators, Computer &                                        Medium-Sized Enterprises and One-Man Businesses in the Netherlands
                                     Security, Volume 58, Pages 39-46
                                                                                                                                                  Sander Veenstra, Wouter Stol and Renske Zuurveen, Published by Eleven International Publishing (March 2016)
                                     Christian Konradt, Andreas Schilling, Brigitte Werners (May 2016)
    www.cybercrimeforum.org

                                                                                                                                                  In 2013, a Dutch newspaper reported that 'online theft kills one-man businesses'. The digitisation of society offers businesses
                                     Cybercrime, one of the most important security topics, will continue to emerge as a more critical security   opportunities, but also poses risks. However, scientific evidence on the extent to which businesses actually fall victim to cybercrime
                                     threat within the next years. Among the different attacks, phishing is of special interest because of its    is scarce. This book contains the findings of a study into cybercrime victimisation among Small and Medium-sized Enterprises
                                     negative impact for the economy. This paper develops a simulation study based on the work of Fultz and       (SME's) and One-Man Businesses (OMB's) in the Netherlands that was conducted from 2013 until 2015. Over 1200 SME's and
                                     Grossklags. To extend their analysis of cybercrime by an economic view, authors customized their model       more than 1,600 OMB's were surveyed. The report presents unique figures on the extent and impact of cybercrime amongst
                                     and used it as basis for the analysis. Based on the data from recent literature, this paper gives insights   businesses and the results indicate that more than a quarter of Dutch businesses are confronted with cybercrime. Victims are self-
                                     into the perpetrator's behaviour and allows us to quantify the effectiveness of countermeasures. Due to      reliant: they seldom contact law enforcement, but instead take action to prevent and solve cybercrime problems themselves. As a
                                     the fact that mainly risk-seeking persons are responsible for these attacks, countermeasures aiming at       consequence, police lack insight into the nature and extent of cybercrime amongst SME's and OMB's, which hampers the ability
  16
  17
Publications
Recent
                                     of law enforcement to contribute effectively to the fight against cybercrime. This book appeals to           various attempts at network intrusion and the steps typically taken in the implementation of cyber-thefts. The paper will provide
                                     anyone interested in the digitisation of society and its implications for crime and law enforcement.         the rationale behind the justification of why humans are considered to be the weakest link in these attacks. The study will also
                                                                                                                                                  explain the reasons for the rise in cybercrimes and their impact on Organizations. In closing, the paper will put forward some
                                              recommendations to serve as preventative measures and solutions to the threats and vulnerabilities posed by cyber-attacks.
                                                                                                                                                  Finally, measures, such as conducting regular, thorough, and relevant awareness training, frequent drills and realistic tests will
                                                                                                                                                  be addressed with a view to maintaining a steady focus on the overall discipline of the organization thereby hardening that
                                                                                                                                                  component of the network that is the softest by nature—the human vulnerability factor. Keywords of this book include social
                                     Introduction to Cybercrime: Computer Crimes, Laws and Policing in the                                        engineering, cybercrime, cyber theft, network intrusions and preventive measures.
                                     21st Century
                                     Joshua B. Hill and Nancy E. Marion, Published by Praeger (February 2016)                                     

                                     The book elaborates on cybercrime and cybercrime related issues such as law enforcement, privacy,
                                     cyberwar and policing. It provides a comprehensive yet accessible summary of the history, modern
                                     developments, and efforts to combat cybercrime in various forms at all levels of government—
                                     international, national, state, and local. The chapters consist of history of cybercrime, types              The Cyber Threat to Nuclear Stability
                                     and frequency of cybercrime, amount of cybercrime, law enforcement, organised cybercrime,                    Paul Bracken, Published by Elsevier Inc. (February 2016)
                                     cyberterrorism and terrorists online, cyberwar, domestic response and international response.
                                                                                                                                                  Abstract
  Virtual Forum Against Cybercrime

                                                                                                                                                  will transform deterrence and arms race stability and lead to other significant changes. The driver behind this is a combination
                                                                                                                                                  of long standing problems with mobile missiles along with new technologies not usually factored into strategic assessments: big
                                                                                                                                                  data analytics, computer vision, and related information systems. When combined with drones and precision strike, the hunt
                                                                                                                                                  for mobile missiles is becoming faster, cheaper, and better. The implications of this finding vary by country, but will shape major
                                     Developing Norms for Cyber Conflict
                                                                                                                                                  power nuclear modernization, crisis stability among secondary powers, and conventional attack of nuclear deterrents.
                                     William Banks, Published by Social Science Research Network (February 2016)
                                                                                                                                                  
                                     Abstract:
                                     The prospect of cyber war has evolved from science fiction and doomsday depictions on television,
                                     films, and novels to reality and front page news. As early as 1982, a little-noticed but massive explosion
                                     of the trans-Siberian pipeline was caused by malware apparently inserted into Canadian software              Future Crimes: Inside the Digital Underground and the Battle for Our Connected World
                                                                                                                                                  Reprint Edition
   May / June 2016 Issue.11

                                     by the CIA. The CIA and Canadians knew that the software would be illegally acquired by Soviet
                                     agents. Although the incident greatly embarrassed the KGB, the Soviets never disclosed the incident or
                                                                                                                                                  Marc Goodman, Published by Anchor (January 2016)
                                     accused the United States of causing it. If a U.S. missile had struck the pipeline, the Soviets would have
                                     expressed their outrage publicly and almost surely would have retaliated. Keywords of this book include      Although the development of technology has benefited human society in various ways, it also involves an ominous flip side. A
                                     cyber war, cyber conflict, cyberespionage, cybersecurity and international law.                              tidal wave of scientific progress has been made that will leave our heads spinning—from implantable medical devices to drones
                                                                                                                                                  and 3-D printers, all of which can be hacked, with disastrous consequences. The author Marc Goodman, leading authority on
                                     
                                                                                                                                                  global security leads readers to a vivid journey through the darkest recesses of the Internet with explosive insights based on
                                                                                                                                                  his career in law enforcement and counterterrorism. He explores how bad actors are primed to hijack the future technologies.
                                                                                                                                                  Provocative, thrilling, and ultimately empowering, Future Crimes will urge to take action that shows how people take back
    www.cybercrimeforum.org

                                                                                                                                                  control of our own devices and harness technology’s tremendous power for improving humanity before it’s too late.
                                     The Rise in Cybercrime and the Dynamics of Exploiting the Human
                                     Vulnerability Factor by Dr. Nabie Y. Conteh and Malcolm D. Royer,
                                                                                                                                                  
                                     Published
                                     International Journal of Computer (February 2016)

                                     Abstract
                                     This paper is primarily intended to firstly define and review the literature in cybersecurity and vividly
                                     shed light on the mechanisms involved in the social engineering phenomenon. It will discuss the
  18
  19
You can also read