09:00 – 09:30 REGISTRATION
09:30 – 09:40 INTRODUCTION
09:40 CONFERENCE START
09:40 – 10:25
“The presentation will attempt to dispel many of the myths associated with the phrase “Dark Web” and explain who and what exists within the “Dark Web”. There is no definitive description, but I’ll provide examples to illustrate the breadth of activity within the Dark Web and discuss the threat it poses to Businesses and Individuals. Finally, I’ll cover if there is anything we can do to minimise the risks and discuss how the “Dark Web” could develop. “
Adrian Flagg – CSIS
10:25 – 11:10
Fraud and darknet marketplaces: The technical and (legal) procedural challenges of crime in the darknet environment.
A “darknet” is an encrypted anonymised communication network (ACN) that can only be accessed by using specialist software. The network of sites, such as Tor, Freenet etc., provide the services and websites running on darknets which is also referred to as the Dark Web. A common feature of darknet environments is the existence of “marketplaces” through which illicit goods, including drugs and articles for use in fraud, can be bought and sold anonymously.
Adam Jackson and Philip Anderson will explore the operation of darknet marketplaces and consider the technical and procedural challenges of investigating and prosecuting criminal activity enabled by, and taking place within, darknet environments. Philip will draw on his extensive experience as a specialist in digital forensics and Adam will explore his involvement in an ongoing research project funded by Nordforsk, the UK ESRC and the Netherlands Organisation for Scientific Research entitled Police detectives on the TOR network: A study on tensions between crime fighting and privacy (PDTOR).
Philip Anderson, Senior Lecturer, Computer and Information Sciences, Northumbria University, Newcastle.
Adam Jackson, Associate Professor, Northumbria Law School, Northumbria University, Newcastle.
11:10 – 11:55
Cryptocurrencies and Blockchains
The past decade has seen the emergence of cryptocurrencies, starting with Bitcoin in 2008 and followed by a large variety of other coins. Cryptocurrencies, and the supporting blockchain software provide a host of new opportunities to do business and design trusted new services. At the same time, it may facilitate criminal activities, and pose risks to investors, citizens and governments. In this presentation we will look back at the past decade, reflect on the opportunities and challenges associated with cryptocurrencies and blockchains, and discuss what may lie ahead.
Prof Aad van Moorsel, School of Computing, Newcastle University
Tactical tinkering or radical re-imagining: fixing the flaws in the AML/TF regime.
In light of yet more revelations about money laundering by banks, most recently through the Cayman Islands, we encourage participants to think differently about the ML/TF compliance and reporting regime. The Law Commission is currently consulting on changing provisions within the Proceeds of Crime Act in relation to the SARs regime and to confiscation and this provides an opportunity to consider what alternative approaches might be available.
· The existing regime, where it started and how it has evolved
· The pressures on those making the reports
· The pressures on those using the intelligence
· The choices and suggestions
Dr. Jackie Harvey – Professor of Financial Management and Director of Business Research at Newcastle Business School.
12:00 – 13:00 LUNCH
13:05 – 13:50
We will look at:
How to protect your digital identity
How does a business identify / verify that they are in contact with the correct person and protect themselves from fraud
The use of biometrics to prove your identity
The use of mobile media to prove your identity
YOTI – Julie Dawson and Rico Hollas
13:50 – 14:35
Banking issues / protection / etc
Neil will speak about the current threat landscape that the banks face, and how it has evolved over the years to reach that state, as well as some of the future challenges and opportunities that regulation and new technologies present. He will also speak about what measures you can take to protect your own Digital Identity as well as provide an overview of the UK government’s Take Five for Fraud education campaign.’
Virgin Money – Neil Fleming
14:35 – 15:10
Representatives from the North East Regional Cyber Crime Unit, will discuss how they adopted a problem solving approach to reduce common cyber attacks on businesses in the region using specialist volunteers and software. Demoing a live hack showing how these attacks occur, then discussing how the volunteers have been trained and vetted to conduct vulnerability assessments for businesses. We will give you the latest findings, facts and figures from the project and give a successful case study of how one organisation has undertaken the assessment and is now in a much stronger position moving forward.
North East Regional Cyber Crime Unit.
15:15 Event Close
The NEFF reserves the right to make changes to the schedule if it is deemed applicable.