Transcript ASIC - AIJA

Electronic Enforcement
Keith Inman
October 2000
ASIC
Australian Securities & Investments Commission
ASIC & Cyberspace
 Entry barriers to crime have dropped
–
–
–
–
ASIC
easy to use
cheap
access to a very large consumer base
anonymous
Trend?
Old economy scams
+ New economy scams
=
ASIC
Significant increase in volume
E-Scams
– Illegal Investment schemes
• IPOs without prospectus
• Free Stock offers
• High Yield Schemes
• Exotic Schemes
– Market Manipulation (Pump & Dump)
– Unlicensed advice (Financial Gurus)
– Non-Disclosure of interests
– Hawking Trading software
• Exaggerated claims
ASIC
• Unlicensed advice
Spam Email
ASIC
Bulletin Board Postings
Independent Relay Servers
ASIC
Bulletin Board Postings
Spam Email
ISPs
IP 1
#1
ASIC
IP 2
#2
Suspect 2
Suspect 1
The Challenge?
 Trace the source
– Postings on BBs
– SPAM emails
 Understand the technology
– Content Providers
– ISPs
– Telecommunication Carriers
 Gather & present evidence
ASIC
The Challenge?
Dog years !!!
– 1 day = 1 month
ASIC
What is ASIC doing?
ASIC
Leverage Web technologies
 Internal Learning & Development
 Consumer Education
 “Self Help” Resources
 Detection
ASIC
Electronic Enforcement Unit
(EEU)
 Small, national team
“Centre of expertise”
 Dedicated resources
Legal
Investigative
Technical
ASIC
 National volunteer network of 60
staff
 Specialized web tracing/forensic
computing training
 Linked through an intranet site
ASIC
EEU Intranet
ASIC
ASIC Scam Site?
ASIC
ASIC Scam Site - results?
 11,000 visitors between April 1 and April 30
 1200 asked for more information
 233 wished to invest
 $4.02 million pledged to scam
ASIC
‘Self Help’ Resources
 On-line consumer advice
 Due diligence searches
– “Look left and right before you click..”
ASIC
Detection
 ASIC’s “Web Hound” Project
 Automatically
– identify “high risk” web sites
– assess & aggregate the risk
– analyze risk associated to mentioned
entities
– identify and refer high risk matters
ASIC
Public
Search Engines
Internet
Content Gathering
Query
Collect
Public
Data Collection
Risk
Assessment
Analyse
ASIC
Corporate
DBs
Report
Secure
AIR GAP
Sought after tools
 Use of equipment for search
warrants
– Mirror Imaging
 Retention of ISP records
 Monitoring by ISP
 Removal of internet material
 Removal if ISP services
 New offence for SPAMMING
ASIC
Electronic Enforcement
Keith Inman
October 2000
ASIC