Follow the Money - Organized Crime and Money Laundering on the Internet presented at CounterMeasure 2012

by Robert Beggs,

Tags: Security

Summary : To date, most assessments of cybercrime by criminal organizations (more than 3 people working together) have focused on the technical aspects of detecting and responding to attacks such as phishing, theft of identity and intellectual property, and use of malicious software that is designed to stay for long periods on compromised systems. As a result, IT staff and investigators have focused on the technical means of prevention and response to attacks. This talk will take a different approach, focusing on the motive, and treating organized cybercrime as a business. Using a "value chain" perspective to identify the inputs and outputs required to enable crimes, we\'re going to follow the money.
Using case studies, especially ones involving Canadian organizations, we will answer the questions: What criminal organizations are involved in online crimes? How does an attack, or placement of an APT, generate revenue for organized crime? Finally, how is money laundered online? By understanding the answers to these questions, we can reduce or remove the financial motivation for attacks.'To date, most assessments of cybercrime by criminal organizations (more than 3 people working together) have focused on the technical aspects of detecting and responding to attacks such as phishing, theft of identity and intellectual property, and use of malicious software that is designed to stay for long periods on compromised systems. As a result, IT staff and investigators have focused on the technical means of prevention and response to attacks. This talk will take a different approach, focusing on the motive, and treating organized cybercrime as a business. Using a