SlideShare a Scribd company logo
1 of 37
U.S. Department of State Bureau of Diplomatic Security Office of Antiterrorism Assistance Program Michael C. Alcorn – Cyber Training Program Manager
DS/ATA Office of Antiterrorism Assistance 3 Created by U.S. Congress in 1983 Provide antiterroism assistance to strengthen bilateral ties between U.S. and foreign allies. Provide training and equipment to deter terrorism. Trained over 57,000 people from 151 countries since 1984 Implemented by the Bureau of Diplomatic Security Operates through U.S. Embassies
Course Offerings Response Management Investigations Major Case Management Terrorist Crime Scene Investigations Fraudulent Travel Documents Intro to Digital Forensics and Investigations Investigative Information Management Border Control Management Critical Incident Management Senior Crisis Management Combatting Domestic and Transnational Terrorism Executive Seminar on Digital Investigations Explosive Incident Countermeasures Canine Explosive Detector Course Crisis Response Team Training Weapons of Mass Destruction Office of Antiterrorism Assistance 4
Office of Antiterrorism Assistance 5 Enter your own text here ATA Cyber Training Program
ATA Cyber Training Mission Provide skills-based investigative, policy, IT security training and equipment to partner nations that culminates in a tangible and long-term increase in their ability to mitigate cyber threats from terrorists and criminals. Office of Antiterrorism Assistance 6
Office of Antiterrorism Assistance 7 Jordan Thailand Kenya Turkey Kazakhstan Morocco Trinidad Colombia Senegal Uganda Egypt Indonesia Malaysia India Pakistan Georgia
ATA Cyber Training Timeline Office of Antiterrorism Assistance Equipment grants and capacity building became the norm. Regional information sharing and terrorist use of the internet conferences began. Program started with single cyber terrorism overview course. Cellular forensics, Internet and audio/video forensics courses developed. Program shifted to become more hands-on in nature. 8
Create and enhance awareness among top level government and law enforcement executives. Provide expertise in the prosecution of cyber crime. Promote regional and global information exchange and collaboration. Provide first responder and incident response training. Provide guidance on basic investigative skills and evidence preservation. Progress country from basic to advanced computer forensics. Establish professional networking among international peers. Assist with staffing, training, and operating procedures. Nexus between CERTS and law enforcement. Provide fundamental IT Administrative and network security training. IT Security Three Areas of Focus Office of Antiterrorism Assistance 9 Law Enforcement Executive and Policy Level
ATA Cyber Training Process Step 1 ,[object Object]
Establish senior level awareness and buy-in to broad training strategic plan.Step 2 ,[object Object]
Provide enabling equipment grant - operationalizeStep3 ,[object Object]
Cyber unit management training.Step4 ,[object Object]
Professional networking and regional integration.Office of Antiterrorism Assistance 10
Office of Antiterrorism Assistance 11
Office of Antiterrorism Assistance 12
Executive Seminar on Digital Investigations and Security Cyber Awareness Seminar for Prosecutors Regional Conference Terrorist Use of the Internet Cyber Unit Management Consultation – Washington D.C. Identification and Seizure of Digital Evidence Introduction to Digital Forensics and Investigations Proactive Internet Investigations Course Cellular Communication Forensic Consultation Digital Forensic Grant and Consultation Advanced Digital Forensic Consultation Cyber Unit Management Consultation Encase and FTK training and certification courses Audio/Video Forensics Consultation Fundamentals of Network Security Information Security Technology Consultation CERT and Law Enforcement Forum ATA Cyber Courses IT Security Office of Antiterrorism Assistance 13 Law Enforcement Executive and Policy Level
Regional Conference on Terrorist Use of the Internet Office of Antiterrorism Assistance 14 Three-Day Event – Senior Law Enforcement, Legislators, and Government Officials   Create and foster regional relationships among the participating countries. Emphasize the importance of regional and eventual global multilateral collaboration in combating terrorist use of the Internet. Suggest and discuss specific regional policies and strategies essential to disciplined information sharing, building of critical relationships, investigatory and prosecutorial cooperation and resource sharing.   Develop a useful, cost-effective model that can be replicated in other regions, and that can contribute to an eventual globally-connected network.
Sustainment Establish productive and trusting relationships at all levels. Provide channels of communication to key law enforcement and U.S. based corporations. Provide organizational advice and global perspective on cyber issues. 15
Questions & Answers Office of Antiterrorism Assistance 16
Thank you! Contact U.S. Department of State Bureau of Diplomatic Security Office of Antiterrorism Assistance Michael C. Alcorn Cyber Training Program Manager Phone: 1-571-236-3272 Email: alcornm@state.gov 2230 Gallows Road Dunn Loring, Virginia 22027 USA Office of Antiterrorism Assistance 17
Cybercrime A Global Overview of the Role of “Borderless Partnerships” in assisting Law Enforcement and Public Safety efforts.
Since we are dealing with human beings-LET’S NOT FORGET… The Seven Deadly sins of Anger, Greed, Envy, Sloth, Pride, Gluttony and Lust all exist in the ‘online’ world and have been automated and magnified……basically the GLOBALIZATION OF CRIME over the Internet has occurred….and is accelerating. There are almost no ‘new crimes’ under the sun….just new twists….like exploiting trust electronically…
Would YOU click on this email if it were sent to you from a “Trusted Source”-like your lawyer?
If you did, your bank account details, then your money, went on a world tour...all in 10 minutes. Ukraine Ghana Seychelles No Cyber crime law or extradition treaty for Cyber Crimes exists in many countries but GREAT Internet Connections and Electronic Funds Transfer networks are everywhere!
FBI Threat Focus Cell model used to leverage global co-operation Largest computer intrusion threat to US financial industry – past 21 months Financial Threat Focus Cell Pending cases:	390 Attempted losses:	$220 million Actual losses:		$70 million Trident BreACH – three prong approach 	- Virus/Malware creators 	- Malware exploiters / Core organizers 	- Money Mule organizations
Global Reach of ACH Fraud 390 $220M  $70M 300+ 3500+ Total FBI cases: Attempted loss: Actual loss: Victims: Mules:  mule organization malware coder/malware exploiters  victims Law Enforcement Response To Date: ,[object Object]
United Kingdom:  20 arrested and 8 search warrants
Ukraine:  5 detained and 8 search warrants
A classic case of Global Co-Operation.,[object Object]
The worlds Electronic Economy and communications networks have become fully borderless. ….Yet all criminal and civil laws of every nation state are defined by national borders…. High Speed-High Bandwidth Internet connectivity is expanding rapidly to all corners of the earth. Second and Third world nations have jumped past landlines and are installing 3G and 4G wireless networks-Africa is on the cusp of the Internet revolution….
Remember when Africa seemed really, really far away…. Don’t worry, Africa is coming to you and can instantly be in your ‘electronic’ back yard…or living in your computer at work or home.
African Undersea Cables Latest update: 17 Aug 2010                                                                                                                                                                                                                                                                            
African FBI Legal Attaches
How many FBI Agents do you think are posted on the entire African Continent?? On a good day…maybe 20.  Add to that maybe another 10 Other U.S. Government Law Enforcement Agency personnel….to cover 56 countries in Africa. Geography and mathematics alone dictate that ‘we’ must work closely with local law enforcement agencies and develop effective and efficient partnerships.
The Virtual Jihad: Terrorist Use of the Internet
Exploitation of Internet-Based Technologies Why terrorists use the Internet Fast Easy access Broad audience Little or no regulation or censorship Rich multimedia environment Inexpensive Anonymous Internet is a battlefield in the Global War on Terrorism Internet tools and services enhance terrorist capabilities Communication Command and control Propaganda and psychological warfare Radicalization and recruitment Training Operational planning Fundraising
Successful U.S. led Global Coordination efforts The established group of 8 (G8)- 24 hour/7 day a week network contact list links national police agencies or Justice ministry officials-currently 54 countries out of 187 countries represented by Interpol actively participate. DHS-USCERT has taken the lead in coordinating with over 20 national CERT’s globally to share actionable  intelligence, threat vectors and mitigation strategies. FBI has 62 Legal Attache offices worldwide, staffed with between 2 and 6 Agents. They are the liaisons for US and Interpol law enforcement requests.  USSS has 17 offices overseas.

More Related Content

What's hot

Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
 

What's hot (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Brooks18
Brooks18Brooks18
Brooks18
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 

Similar to Mike Alcorn presentation

Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportJames Fisher
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docxjessiehampson
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber DiplomacyPetar Radanliev
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 

Similar to Mike Alcorn presentation (20)

Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cybercrime Surveillance.docx
Cybercrime Surveillance.docxCybercrime Surveillance.docx
Cybercrime Surveillance.docx
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

More from svito

Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentationsvito
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentationsvito
 
David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentationsvito
 
Dr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on EgyptDr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on Egyptsvito
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com scoresvito
 
Evan Kohlmann Presentation
Evan Kohlmann PresentationEvan Kohlmann Presentation
Evan Kohlmann Presentationsvito
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1svito
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Programsvito
 
LTG. Michael Vane Presentation
LTG. Michael Vane PresentationLTG. Michael Vane Presentation
LTG. Michael Vane Presentationsvito
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentationsvito
 

More from svito (10)

Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentation
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentation
 
David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentation
 
Dr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on EgyptDr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on Egypt
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com score
 
Evan Kohlmann Presentation
Evan Kohlmann PresentationEvan Kohlmann Presentation
Evan Kohlmann Presentation
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Program
 
LTG. Michael Vane Presentation
LTG. Michael Vane PresentationLTG. Michael Vane Presentation
LTG. Michael Vane Presentation
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentation
 

Mike Alcorn presentation

  • 1. U.S. Department of State Bureau of Diplomatic Security Office of Antiterrorism Assistance Program Michael C. Alcorn – Cyber Training Program Manager
  • 2. DS/ATA Office of Antiterrorism Assistance 3 Created by U.S. Congress in 1983 Provide antiterroism assistance to strengthen bilateral ties between U.S. and foreign allies. Provide training and equipment to deter terrorism. Trained over 57,000 people from 151 countries since 1984 Implemented by the Bureau of Diplomatic Security Operates through U.S. Embassies
  • 3. Course Offerings Response Management Investigations Major Case Management Terrorist Crime Scene Investigations Fraudulent Travel Documents Intro to Digital Forensics and Investigations Investigative Information Management Border Control Management Critical Incident Management Senior Crisis Management Combatting Domestic and Transnational Terrorism Executive Seminar on Digital Investigations Explosive Incident Countermeasures Canine Explosive Detector Course Crisis Response Team Training Weapons of Mass Destruction Office of Antiterrorism Assistance 4
  • 4. Office of Antiterrorism Assistance 5 Enter your own text here ATA Cyber Training Program
  • 5. ATA Cyber Training Mission Provide skills-based investigative, policy, IT security training and equipment to partner nations that culminates in a tangible and long-term increase in their ability to mitigate cyber threats from terrorists and criminals. Office of Antiterrorism Assistance 6
  • 6. Office of Antiterrorism Assistance 7 Jordan Thailand Kenya Turkey Kazakhstan Morocco Trinidad Colombia Senegal Uganda Egypt Indonesia Malaysia India Pakistan Georgia
  • 7. ATA Cyber Training Timeline Office of Antiterrorism Assistance Equipment grants and capacity building became the norm. Regional information sharing and terrorist use of the internet conferences began. Program started with single cyber terrorism overview course. Cellular forensics, Internet and audio/video forensics courses developed. Program shifted to become more hands-on in nature. 8
  • 8. Create and enhance awareness among top level government and law enforcement executives. Provide expertise in the prosecution of cyber crime. Promote regional and global information exchange and collaboration. Provide first responder and incident response training. Provide guidance on basic investigative skills and evidence preservation. Progress country from basic to advanced computer forensics. Establish professional networking among international peers. Assist with staffing, training, and operating procedures. Nexus between CERTS and law enforcement. Provide fundamental IT Administrative and network security training. IT Security Three Areas of Focus Office of Antiterrorism Assistance 9 Law Enforcement Executive and Policy Level
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Professional networking and regional integration.Office of Antiterrorism Assistance 10
  • 14. Office of Antiterrorism Assistance 11
  • 15. Office of Antiterrorism Assistance 12
  • 16. Executive Seminar on Digital Investigations and Security Cyber Awareness Seminar for Prosecutors Regional Conference Terrorist Use of the Internet Cyber Unit Management Consultation – Washington D.C. Identification and Seizure of Digital Evidence Introduction to Digital Forensics and Investigations Proactive Internet Investigations Course Cellular Communication Forensic Consultation Digital Forensic Grant and Consultation Advanced Digital Forensic Consultation Cyber Unit Management Consultation Encase and FTK training and certification courses Audio/Video Forensics Consultation Fundamentals of Network Security Information Security Technology Consultation CERT and Law Enforcement Forum ATA Cyber Courses IT Security Office of Antiterrorism Assistance 13 Law Enforcement Executive and Policy Level
  • 17. Regional Conference on Terrorist Use of the Internet Office of Antiterrorism Assistance 14 Three-Day Event – Senior Law Enforcement, Legislators, and Government Officials Create and foster regional relationships among the participating countries. Emphasize the importance of regional and eventual global multilateral collaboration in combating terrorist use of the Internet. Suggest and discuss specific regional policies and strategies essential to disciplined information sharing, building of critical relationships, investigatory and prosecutorial cooperation and resource sharing.  Develop a useful, cost-effective model that can be replicated in other regions, and that can contribute to an eventual globally-connected network.
  • 18. Sustainment Establish productive and trusting relationships at all levels. Provide channels of communication to key law enforcement and U.S. based corporations. Provide organizational advice and global perspective on cyber issues. 15
  • 19. Questions & Answers Office of Antiterrorism Assistance 16
  • 20. Thank you! Contact U.S. Department of State Bureau of Diplomatic Security Office of Antiterrorism Assistance Michael C. Alcorn Cyber Training Program Manager Phone: 1-571-236-3272 Email: alcornm@state.gov 2230 Gallows Road Dunn Loring, Virginia 22027 USA Office of Antiterrorism Assistance 17
  • 21. Cybercrime A Global Overview of the Role of “Borderless Partnerships” in assisting Law Enforcement and Public Safety efforts.
  • 22. Since we are dealing with human beings-LET’S NOT FORGET… The Seven Deadly sins of Anger, Greed, Envy, Sloth, Pride, Gluttony and Lust all exist in the ‘online’ world and have been automated and magnified……basically the GLOBALIZATION OF CRIME over the Internet has occurred….and is accelerating. There are almost no ‘new crimes’ under the sun….just new twists….like exploiting trust electronically…
  • 23. Would YOU click on this email if it were sent to you from a “Trusted Source”-like your lawyer?
  • 24. If you did, your bank account details, then your money, went on a world tour...all in 10 minutes. Ukraine Ghana Seychelles No Cyber crime law or extradition treaty for Cyber Crimes exists in many countries but GREAT Internet Connections and Electronic Funds Transfer networks are everywhere!
  • 25. FBI Threat Focus Cell model used to leverage global co-operation Largest computer intrusion threat to US financial industry – past 21 months Financial Threat Focus Cell Pending cases: 390 Attempted losses: $220 million Actual losses: $70 million Trident BreACH – three prong approach - Virus/Malware creators - Malware exploiters / Core organizers - Money Mule organizations
  • 26.
  • 27. United Kingdom: 20 arrested and 8 search warrants
  • 28. Ukraine: 5 detained and 8 search warrants
  • 29.
  • 30. The worlds Electronic Economy and communications networks have become fully borderless. ….Yet all criminal and civil laws of every nation state are defined by national borders…. High Speed-High Bandwidth Internet connectivity is expanding rapidly to all corners of the earth. Second and Third world nations have jumped past landlines and are installing 3G and 4G wireless networks-Africa is on the cusp of the Internet revolution….
  • 31. Remember when Africa seemed really, really far away…. Don’t worry, Africa is coming to you and can instantly be in your ‘electronic’ back yard…or living in your computer at work or home.
  • 32. African Undersea Cables Latest update: 17 Aug 2010                                                                                                                                                                                                                                                                            
  • 33. African FBI Legal Attaches
  • 34. How many FBI Agents do you think are posted on the entire African Continent?? On a good day…maybe 20. Add to that maybe another 10 Other U.S. Government Law Enforcement Agency personnel….to cover 56 countries in Africa. Geography and mathematics alone dictate that ‘we’ must work closely with local law enforcement agencies and develop effective and efficient partnerships.
  • 35. The Virtual Jihad: Terrorist Use of the Internet
  • 36. Exploitation of Internet-Based Technologies Why terrorists use the Internet Fast Easy access Broad audience Little or no regulation or censorship Rich multimedia environment Inexpensive Anonymous Internet is a battlefield in the Global War on Terrorism Internet tools and services enhance terrorist capabilities Communication Command and control Propaganda and psychological warfare Radicalization and recruitment Training Operational planning Fundraising
  • 37. Successful U.S. led Global Coordination efforts The established group of 8 (G8)- 24 hour/7 day a week network contact list links national police agencies or Justice ministry officials-currently 54 countries out of 187 countries represented by Interpol actively participate. DHS-USCERT has taken the lead in coordinating with over 20 national CERT’s globally to share actionable intelligence, threat vectors and mitigation strategies. FBI has 62 Legal Attache offices worldwide, staffed with between 2 and 6 Agents. They are the liaisons for US and Interpol law enforcement requests. USSS has 17 offices overseas.
  • 39. Asia
  • 43. American Law Enforcement and Public Safety authorities cannot succeed without the active support, cooperation and technical assistance of other Law Enforcement Agencies around the world.