Top Banner
Interpol's tools fighting cybercrime Santiago Tellado González [email protected] Financial and High-Tech Crime Sub-directorate
13

Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

Jun 24, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

Interpol's tools fighting cybercrime

Santiago Tellado Gonzá[email protected]

Financial and High-Tech Crime Sub-directorate

Page 2: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

FOUR PILLARS

(1)Exchange of Information

(2)Training

(3)Regional Working Parties

(4)Analytical Support

Page 3: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

EXCHANGE OF INFORMATIONI 24 / 7

I-24/7

Country ANational NCB

Country BNational NCB

IPSG

DATABASES

Country Binvestigator,Prosecutor, etcCountry A

investigator

Page 4: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

EXCHANGE OF INFORMATIONNCRPs

Red: (24/7) 67 countriesGreen: (No 24/7 service) 43 countriesWhite: No Information185 connected to the “I-24/7” system

Page 5: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

EXCAHNGE OF INFORMATIONPersonal Contacts

Page 6: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGIT Manual

Page 7: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGVideo

(1)An Overview on the Internet(2)Types of Internet Crime(3)The World Wide Web(4)Newsgroups(5)Chatrooms(6)E-Mail(7)E-Groups(8)Digital Evidence(9)Seizing Computer Equipment(10)Seizing Other Digital Evidence(11)Examining & Storing Digital Evidence(12)Obtaining Information from ISPs(13)Tracing an Internet Suspect

Page 8: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGTraining Courses

• Currently 9 Courses

– 7 (AGIS Programme)

– 2 (Cooperation with other Agencies)

Page 9: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

TRAININGMobile Classroom

Page 10: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

REGIONAL WORKING PARTIES

(a)Europe

(b)Asia – South Pacific

(c)North Africa – Middle East

(d)Latin America

Page 11: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

ANALYTICAL SUPPORT

Funds inaccountsheld at

Total amounts transferred fromvictims' accounts per attack

range from €25,000 to £1 million (€1.5 million)

most sent funds abroad& in all cases examinedvia Western Union to

sometimes revealed that muleswere recruited via ads on forums

& by e-mail with offer of 5-10% commissions # Mules range from

unspecified to 20# beneficiaries

who received cashrange from not specified to 5& are principally located in

Russia & Ukraine

Phishing: use of E-mail & spoof sites.Keylogger: use of Trojan Horse

In only one case was the hacker identified.

Phishing which appears to be evolvingmore to keylogger & malicious software use

Various banks1 to 3 targeted

in each case

# victims ranging fromnot specified to 27

Some recruitment sites named &some lodged on servers in USA

Page 12: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

FUTURE

Page 13: Interpol's tools fighting cybercrime - coe.int › t › dg1 › legalcooperation... · TRAINING Video (1)An Overview on the Internet (2)Types of Internet Crime (3)The World Wide

QUESTIONS?