Top Banner
CYBERCRIME Daniel Toresen Director Thompson & Toresen Investigations Ltd
13

Cybercrime

Jan 23, 2015

Download

Technology

Thompson & Toresen has a dedicated commitment to delivering results exceeding our clients expectations. We utilise modern technology, equipment and processes to ensure we stay ahead of our game and work constantly to anticipate our clients needs.

As the investigation service industry has grown over the past thirty years we have grown with it. We recognise the high level of sophistication and knowledge which clients now have in regards to their needs in this field.

We work in partnership with our clients to achieve cost effective results using the highest level of experience and commitment to achieve the results in a confidential way.

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybercrime

CYBERCRIME

Daniel ToresenDirector

Thompson & Toresen Investigations Ltd

Page 2: Cybercrime

What does a P.I. do??• Misconception that we

chase wayward spouses• Licensed by Govt. Law to

change soon• There are over 300 licensed

investigators in NZ• We specialise in theft and

company fraud• No powers – mostly ex

police• Work closely with police

Page 3: Cybercrime

Specialists• We specialise in employee

theft matters • Over 350 workers per year• Only 30% referred to police• Large unreported crime in

stats to be aware of• Over the last three weeks

responsible for 25 dismissals for theft and drugs in workplace

• Where are these employee's now?

Page 4: Cybercrime

What is Cybercrime• Cybercrime is a form of

crime where the Internet or computers are used to commit crime.

• Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography

Page 5: Cybercrime

Offences in NZ• Crimes involving

computers 248 • 249

Accessing computer system for dishonest purpose

• 250 Damaging or interfering with computer system

• 251 Making, selling, or distributing or possessing software for committing crime

• 252 Accessing computer system without authorisation

Page 6: Cybercrime

Recent Case Studies• Source code was developed

over many years worth millions– The developer fell out with the

company– Took source code and other

gear– Anton Pillar option too costly– Investigation Approach solved

problem

• Old friends case– False profile and send to

friends

Page 7: Cybercrime

Passwords• Passwords are

surprisingly easy to find• Many people write them

down as many are needed in day to day activities

• Many people keep the same password for multiple uses

• Reset passwords can be used by criminals

Page 8: Cybercrime

Update Passwords etc..• email that asks you to click

on a link to update your account info or to verify certain information

• don't click on that link. • If the email is from a

company that you have accounts with open up a new browser and type in the web address directly, never use a link in an email to go to the website.

Page 9: Cybercrime

Background Checks• Check out any

companies that you or your family are going to be doing business with, especially if nobody has ever heard of that company before

Page 10: Cybercrime

Cybercrime Trends• ATM hacks – make

machine spit out money • Mobile phone hacks • Compromised credit

card info harvested and sold offshore $$ - recent examples car park at viaduct

Page 11: Cybercrime

Common Internet Scams• Spam offers and

internet junk mail• Free offer scams• Online auction scams• Social networking sites• Domain name renewal

scams• Spyware and keystroke-

loggers

Page 12: Cybercrime

What to do?• If you are a victim talk

to the NZ Police• Consumer Affairs

“Scamwatch”• Netsafe.org.nz • Remember - If in doubt,

press delete!

Page 13: Cybercrime

www.theinvestigators.co.nz