+ All Categories
Home > Documents > Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING...

Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING...

Date post: 24-Jun-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
13
Interpol's tools fighting cybercrime Santiago Tellado González [email protected] Financial and High-Tech Crime Sub-directorate
Transcript
Page 1: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

Interpol's tools fighting cybercrime

Santiago Tellado Gonzá[email protected]

Financial and High-Tech Crime Sub-directorate

Page 2: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

FOUR PILLARS

(1)Exchange of Information

(2)Training

(3)Regional Working Parties

(4)Analytical Support

Page 3: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

EXCHANGE OF INFORMATIONI 24 / 7

I-24/7

Country ANational NCB

Country BNational NCB

IPSG

DATABASES

Country Binvestigator,Prosecutor, etcCountry A

investigator

Page 4: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

EXCHANGE OF INFORMATIONNCRPs

Red: (24/7) 67 countriesGreen: (No 24/7 service) 43 countriesWhite: No Information185 connected to the “I-24/7” system

Page 5: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

EXCAHNGE OF INFORMATIONPersonal Contacts

Page 6: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGIT Manual

Page 7: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGVideo

(1)An Overview on the Internet(2)Types of Internet Crime(3)The World Wide Web(4)Newsgroups(5)Chatrooms(6)E-Mail(7)E-Groups(8)Digital Evidence(9)Seizing Computer Equipment(10)Seizing Other Digital Evidence(11)Examining & Storing Digital Evidence(12)Obtaining Information from ISPs(13)Tracing an Internet Suspect

Page 8: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGTraining Courses

• Currently 9 Courses

– 7 (AGIS Programme)

– 2 (Cooperation with other Agencies)

Page 9: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGMobile Classroom

Page 10: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

REGIONAL WORKING PARTIES

(a)Europe

(b)Asia – South Pacific

(c)North Africa – Middle East

(d)Latin America

Page 11: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

ANALYTICAL SUPPORT

Funds inaccountsheld at

Total amounts transferred fromvictims' accounts per attack

range from €25,000 to £1 million (€1.5 million)

most sent funds abroad& in all cases examinedvia Western Union to

sometimes revealed that muleswere recruited via ads on forums

& by e-mail with offer of 5-10% commissions # Mules range from

unspecified to 20# beneficiaries

who received cashrange from not specified to 5& are principally located in

Russia & Ukraine

Phishing: use of E-mail & spoof sites.Keylogger: use of Trojan Horse

In only one case was the hacker identified.

Phishing which appears to be evolvingmore to keylogger & malicious software use

Various banks1 to 3 targeted

in each case

# victims ranging fromnot specified to 27

Some recruitment sites named &some lodged on servers in USA

Page 12: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

FUTURE

Page 13: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

QUESTIONS?


Recommended