Title: Northern Ohio Information
1 2Northern Ohio Information Technology Roundtable
- Was founded in June of 2000 as a forum to promote
- the exchange and sharing of ideas, tools and
- techniques to protect information assets of
- Northern Ohio Companies.
3MISSION STATEMENT The role of the Northern Ohio
Information Technology Roundtable is to provide a
forum for the exchange of information, potential
vulnerabilities, and recommended solutions to a
diverse cross section of critical infrastructure
industries, academic institutions, and
enforcement agencies within Northern Ohio. The
specific goal is the development of partnerships
whereby common issues pertaining to the security
and safeguarding of an industry's or
organization's intellectual property, financial
information/data, and proprietary information can
be discussed in an open forum with the intent of
leveraging the knowledge of a diverse group, and
developing "best practices" and potential
training opportunities.
4- Membership The Northern Ohio Information
Technology Roundtable is open to - Small business owners
- IT technology consulting firms
- Law firms
- Law enforcement
- Officers and management of major corporations
- Banking/financial institutions
- Colleges and universities
There is no cost to participate in NOITR!
5- Meetings The Northern Ohio Information
Technology Roundtable meets quarterly and
features subject matter experts and industry
professionals - from
- U.S. Secret Service
- CERT Carnegie Mellon University
- National Security Agency
- Microsoft, Infiniti Systems Group, SmartData,
TruSecure - City Of Cleveland
- Cuyahoga Community College
- Crain Tech
6Questions?
Norm Beznoska Director Enterprise
Security Infiniti Systems Group 440-668-5100 nbezn
oska_at_infinitisystems.com
7United States Secret ServiceSpecial Agent
Michael Dobeck
8United States Secret Service
www.NOITR.org
9Presentation Objectives
- Discuss the U.S. Secret Services historical role
in protecting financial payment systems. -
- Discuss the relationship between USSS electronic
crimes operations, critical infrastructure
protection, and cyber-terrorism. - Discuss the Electronic Crimes Task Force
Initiative.
10Why does cyber crime matter?
- Information Technology systems and the Internet
represent todays financial payment system. - Criminal activity that targets these systems has
a broad affect on public confidence in these
systems. - Our Nations reliance on these IT systems and the
Internet makes us vulnerable to cyber terrorism. - Discretion learned from USSS protective mission
11 USSS Jurisdiction
- 18 U.S.C. 1030 Fraud and Related Activity in
Connection with Computers - (USA Patriot Act of 2001 extended full and
concurrent authority) - 18 U.S.C 1028 Fraud and Related Activity in
Connection with Identification Documents and
Information - 18 U.S.C. 1029 Fraud and Related Activity in
Connection with Access Devices
12USA Patriot Act of 2001
Sec. 105. Expansion of national electronic crime
task force initiative. The Director of the
United States Secret Service shall take
appropriate actions to develop a national network
of electronic crime task forces, based on the New
York Electronic Crimes Task Force model,
throughout the United States, for the purpose of
preventing, detecting, and investigating various
forms of electronic crimes, including potential
terrorist attacks against critical infrastructure
and financial payment systems.
13Electronic Crimes Task Force Initiative
Boston, MA Chicago, IL Charlotte, NC Las Vegas,
NV Los Angeles, CA Miami, FL New York, NY San
Francisco, CA Washington, D.C. (more to
follow) Cleveland
www.NOITR.org
14Today...
17 permanent protectees 115 domestic offices 18
foreign offices 5,606 employees 2,900 Special
Agents 1,028 Uniformed Division Officers 1730
Technical and Administrative Support
15Trends in Technology Crimes
16Electronic Crimes Special Agent Program(ECSAP)
- Currently 180 agents trained in the area of
Computer Forensics - and electronic/technology crime
investigations. - Agents receive 7 weeks of training in their first
year and - additional training throughout their
career. - Agents required to complete a minimum of 25 exams
per year. - Agents required to pass Comptia A and Network
certifications. - Agents receive approximately 30,000.00 in
training and equipment. - 4 year commitment to participate in the program.
- Research and Development of special project,
Project Blackhorse
17Electronic Crimes Special Agent
Program(ECSAP)Cleveland Field Office
- 4 ECSAP agents assigned to the Cleveland Field
Office. - Approximately 100 forensic exams were completed
in the Cleveland Field Office - in 2002. Currently have 32 exams for this
year. - Storage server for data acquisition.
- Firebolt program integrating a Beowulf cluster.
(MPP) - Community impact cases and outreach to local
police department. - Independence Police Department partnership with
Detective Sergeant Chuck Wilson. - Commitments from Parma Police Dept. Lake County
Prosecutors, - Streetsboro Police Dept.
18Case Studies in Technology Crimes
19PaymenTech Investigation
- PaymenTech employee with knowledge of business
- Compromise of the Visanet Proprietary network
- Hypercom Point of Sale (POS) terminal
- Social Engineering
- Used POS terminal to credit personal accounts
20White House Hack
21Worcester, Massachusetts
- 15 year old hacker knocked out NYNEX telephone
switch - NYSE, 911 service, airport and telephone service
- ECSAP information to NYNEX
- Prosecution and press release held
22INCIDENT REPORTING
- If you believe you are the victim of a
Cyber-Attack, please call - the United States Secret Service Cleveland Field
Office. - 216-706-4365
- Electronic Crimes Information Technology Task
Force
23Questions? Special Agent Michael
Dobeckmdobeck_at_usss.treas.govwww.NOITR.org216.70
6.4365