Security Challenges Against E-crime In México
|
|
|
- Lilian Ball
- 10 years ago
- Views:
Transcription
1 Security Challenges Against E-crime In México Juan Carlos Guel López March
2 AGENDA Introduction E-Crime Unit at Secretariat of Public Security E-crime in Mexico Technological Challenges Conclusion 2 2
3 Introduction 3 3
4 According to the Mexican Internet Association (AMIPCI), Mexican users profile is as follows: 32 million users; Internet is already accesible to all socioeconomic levels; 93% of 6.9 million accounts set up for Internet access are broadband; Connections in Mexico (in millions) : PC s PC s with Internet Cellphones % of PC s installed in Mexico are connected to the Internet ; Internet Access: 48% - Home 34% - Internet Cafe 19% - Work 11% - Study 4% - Relative s home 1% - Other Fuente: 4 4
5 SOCIAL ACTIVITIES Send and receive - 70% Send / receive instant messages - 58% Enter a 'chat room' - 41% Share videos or photos - 34% LEISURE ACTIVITIES Download Music - 49% Adult Entertainment - 10% Fuente: 5 5
6 INTRODUCTION Recent investigations in Mexico have shown advanced use of technologies like cloud computing, cryptography, etc. on typical crimes like drug traffic, kidnapping, robbery, money laundring, fraud, children pornography among others. E-crime in Mexico has been steadily growing over the last years as shown on the following graph. 6 6
7 INTRODUCTION Denouncements 7 7
8 INTRODUCTION 2011 Denouncement Trends 8 8
9 INTRODUCTION Some of the typical technics and tools to fight E-crime have been surpassed by those used by criminals. Nowadays we face big challenges in public security matter in Mexico in order to fight E-Crime. As criminals make use of some state-ofthe-art technologies, law enforcement agencies must do so. 9 9
10 E-CRIME UNIT SECRETARIAT OF PUBLIC SECURITY 10 10
11 The E-Crimes Coordination, of the Scientific Division, of Mexican Federal Police, arises from the Official Journal of the Federation Diary, on May 17th,
12 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY CYBERCRIME UNIT 12 12
13 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES 13 13
14 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES It is possible to recover information from unplugged RAM (volatile) memory. Partial Information can be retained even after 10 minutes of disconnection if memory is frozen
15 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES 78L05 10µF µF + 470µF + 10µF + 10µF + 10µF MAX
16 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES Possible scenario of analized devices. C Canal 2 R 2 A D R 1 R 3 Canal 1 Estación Base/ Repetidores Radios móviles B Alcance de transmisión 16 16
17 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY NATIONAL CENTER FOR CRIMES AGAINST CHILDREN 1. National Database of missing children 2. National Database of sexual offenders 3. National Database for children offenders Legal support Investigation of crimes against children Psychological support 17 17
18 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY COMPUTER EMERGENCY RESPONSE TEAM 18 18
19 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY Facilities - Headquarters 19 19
20 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY 20 20
21 E-Crime in Mexico 21 21
22 E-CRIME IN MEXICO Operation Tequila Operation Tequila was a DoS attack lead by #Anonymous hackers group on February 9th & 11th 2011 against local news website. This group called internet users for a new DoS operation against government websites (Secretariat of Communications and Transport website & Presidency of the Republic website) on February 17th
23 E-CRIME IN MEXICO Operation Tequila 23 23
24 E-CRIME IN MEXICO Ciber Protesta Mexicana Ciber Protesta Mexicana (CPM) launched a simultaneous hacking operation against many Mexican Government websites on September 15th 2010, regarding the Bicentennial Celebration of Independence. This group is still attacking websites in Mexico nowadays, though some of the members have been identified
25 E-CRIME IN MEXICO Ciber Protesta Mexicana 25 25
26 E-CRIME IN MEXICO Organized Crime 41 cellphones 3 netbooks Phone contacts Hard disk Results SMS & calls Multi media Image Processing Analysis 26 26
27 ARTHUR LELAND SAYLER CASE Arthur Leland Sayler, Canadian that used to operate from Tijuana, Baja California. He was arrested in possession of 4 million images and videos of child pornography, stored in different mass storage devices. A. P. PGR/FEVIMTRA-C/VCM/010/ Hard drives 29 DVD s Gb 133 Gb Analysis results 2 Flash memories 9 floppys 96 CD-ROMs 80 Mb 12.6 Mb 67.2 Gb 4.40 Tb 27 27
28 ARTHUR LELAND SAYLER CASE Analysis results 3 Websites, broadcasting live 6 Websites in Mexico (disabled) 30 Websites in USA, (research) Catalogs of images of child pornography, from babies to children under 17 years of age. Subscription service to export and import images into the network Internet Service Provider Teléfonos del Noroeste Webserver: Fedora Core 6 O. S. IP
29 GARY MICHAEL FEROGLIA CASE Gary Michael Feroglia, American citizen who was arrested for his responsibility in the commission of crimes of child pornography, against health and possession of weapons used exclusively by the military. A. P. PGR/SIEDO/UEITMIO/ Operation: Ice Gatekeeper IP address Analysis results 40,000 images of child pornography Manzanillo, Colima 29 29
30 GARY MICHAEL FEROGLIA CASE Analysis results Hard drive 400 Gb More than 4 million digital files, related to child pornography 1 firearm 1 magazine 8 rounds of ammunition 1 smoking pipe A bag with white powder Hard drive 80 Gb 30 30
31 Actions taken against E- Crime by Mexican Government 31 31
32 Actions taken against E-Crime by Mexican Govt. Gabinete de Seguridad Nacional National Security Committee has established the need for the creation of a National Security Strategy against cybercrime in Mexico
33 Actions taken against E-Crime by Mexican Govt. Define an Information Security General Policy for the Mexican Federal Government. To create and operate a Computer Security Incident Response Team (CSIRT) at Mexican Government level
34 Actions taken against E-Crime by Mexican Govt. Cybersecurity Roadmap E-Crime Unit Governm ent Militar CERT -PRESIDENCY -SEGOB -SEDENA -SEMAR - -PGR -SCT -SRE -SFP -CISEN -SHCP -ENERGY Privately held co. -CARRIERS -ISP -TELEPHONE COMPANIES Academic CERT Financial CERT CERT-MX -LABORATORIES -CYBERCRIME -CENADEM -SEDENA -UNAM-CERT -ABM 34 34
35 Technological Challenges 35 35
36 Technological Challenges Strong cryptography used by criminals makes hard to investigate on electronic evidence. Forensic tools for hard disk cloning and indexing are not fast enough to fullfill the time Law Enforcement Agencies have in Mexico to deliver evidence to Public Ministery before releasing a suspect from custody
37 Technological Challenges Need to correlate all of the information collected in order to provide intelligence to Mexican Federal Police. Need to automatically identify individuals found in pictures as evidence. Need to trace IPs addresses to Geographical location accurately. Need to monitor criminals on social networks with automated tools
38 CONCLUSION Work to do To have better cooperation with national and International Entities (Government, Privately held companies, Law Enforcement Agencies, Universities, ISPs). To promote changes to Mexican Legislation according to the challenges we face day to day. To identify and to acquire new Technology that enables the E-Crime Unit to fight the organized crime in Mexico
39 CONTACT Comisario Jefe Juan Carlos Guel López HEAD OF MEXICAN FEDERAL POLICE E-CRIME COORDINATION
Crime Statistics in. Crime Statistics in British Columbia, 2014. Table of Contents. Ministry of Justice Police Services Division
Ministry of Justice Police Services Division Crime Statistics in British Columbia, 2014 Table of Contents Highlights... 1 Table 1: Police-Reported Criminal Code and Drug Offences in BC... 2 Table 2: Crime
Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010
Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop
Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty
Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
CYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
British Columbia, 2013. Crime Statistics in. Crime Statistics in British Columbia, 2013. Table of Contents
Ministry of Justice Police Services Division Crime Statistics in British Columbia, 2013 Table of Contents Highlights... 1 Table 1: Police-Reported Criminal Code and Drug Offences in BC... 2 Table 2: Crime
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
INTRODUCTION DEVELOPMENT AND PHENOMENA
INTRODUCTION DEVELOPMENT AND PHENOMENA ITU, ICB4PAC 02.03.2011, Vanuatu Prof. Dr. Marco Gercke, Director Cybercrime Research Institute Cybercrime Page: 1 GENERAL INTRODUCTION Cybercrime Seite: 2 CYBERCRIME
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Years 3-7 Acceptable Use Policy & Agreement
Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require
Battling Current Technological Trends
Law Enforcement Incident Response to Cybercrimes & Battling Current Technological Trends Corey J. Bourgeois, Computer Forensic Examiner & David Ferris, Investigator Louisiana Department of Justice HTCU
MEXICO S CRIMINAL JUSTICE SYSTEM A GUIDE FOR U.S. CITIZENS ARRESTED IN MEXICO
MEXICO S CRIMINAL JUSTICE SYSTEM A GUIDE FOR U.S. CITIZENS ARRESTED IN MEXICO (Please Note-The information provided herein is meant as general guidance only and may not apply fully to your particular situation.
Forensic Challenge V2.0 UNAM-CERT RedIRIS
UNAM-CERT RedIRIS * Forensic Challenge V1.0 * Forensic Challenge V2.0 * Conclusions Why this forensic Challenge? * To promote and impulse the Forensic Analysis in our Region -- Hispanoamerica-- * To know
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Table 252-0082 Incident-based crime statistics, by detailed violations and police services, Territories annual (number unless otherwise noted)
CANSIM - 252-0082 - Incident-based crime statistics, by detailed and police se... Page 1 of 5 Statistics Canada Home > CANSIM 1, 2, 29 Table 252-0082 Incident-based crime statistics, by detailed and police
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
An Introduction to Cyber Crime and Terrorism: Problems and the Challenges
An Introduction to Cyber Crime and Terrorism: Problems and the Challenges Marc Goodman Director of International Cooperation International Multilateral Partnership Against Cyber Threats (IMPACT) What is
CYBERCRIMES CERTIFICATIONS COURSE
CYBERCRIMES CERTIFICATIONS COURSE TCLEOSE Course #3210 Sponsored by The Harris County Constables Office, Pct 4, 6831 Cypresswood Drive, Spring Texas 77379 WARNING This presentation is being given a rating
Cyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
Virginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
110 Explain locard's principle of transference of trace materials at a crime scene. Unit/Standard Number
1 Secondary Task List 100 CRIME SCENE MANAGEMENT 101 Collect hair, blood and bullet fragments for evidence. 102 Collect, preserve and catalog physical evidence while maintaining a chain of custody. 103
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.
The purpose of FIIP The FIIP Project is a partnership of European law enforcements child protection teams and university academics with expertise in this field. The partnership is working together, developing
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
National Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
Mexican Efforts Towards Building a Design Basis Threat for Radiological and Nuclear Environment.
Mexican Efforts Towards Building a Design Basis Threat for Radiological and Nuclear Environment. Juan Eibenschutz H./ José Luis Delgado/ Carina Martínez International Regulators Conference on Nuclear Security.
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a
Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.1
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.1 Issued Date: 05-01-15 Effective Date: 05-01-15 Updated Date: 08-10-15 SUBJECT: RESPONSIBILITIES AT CRIME SCENES PLEAC 1.2.3 1. POLICY A. It is the responsibility
now as a Distribution Partner
W e l c o m e t o t h e b r o a d b a n d e r a Would you like to extend your current offering to the market, reduce churn amongst your customer base, increase customer loyalty by offering value-added
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.
IRC Forensic Basics. by: James Guess. Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first
IRC Forensic Basics by: James Guess Origins of IRC Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first globally accessible chat network. The designers originally intended
Cyber Security in Japan (v.2)
Cyber Security in Japan (v.2) Ryusuke Masuoka ([email protected]) and Tsutomu Ishino ([email protected]) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
How To Solve A Violent Home Invasion With A United Force
Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Large Scale Cloud Forensics
Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam
24/7 High Tech Crime Network
24/7 High Tech Crime Network Albert Rees Computer Crime & Intellectual Property Section Criminal Division, U.S. Department of Justice 24/7 Network The G-8 24/7 Network for Data Preservation Points of contact
THE WORLD IS MOVING FAST, SECURITY FASTER.
THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS
Computer Facilitated Crimes Against Children International Law Enforcement Training
Computer Facilitated Crimes Against Children International Law Enforcement Training The Computer Facilitated Crimes Against Children training seminar was designed to provide law enforcement around the
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL
AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL Dr. Allan Charles Watt, PhD, CFCE, CFE Macquarie University, Sydney, Australia Session ID: CLE W02 Session Classification:
Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
BEST PRACTICES IN CYBERCRIME INVESTIGATION IN THE REPUBLIC OF KOREA
139TH INTERNATIONAL TRAINING COURSE BEST PRACTICES IN CYBERCRIME INVESTIGATION IN THE REPUBLIC OF KOREA Junsik Jang * I. INTRODUCTION The Internet and the rapid deployment of information and communication
Best Practices. For Seizing Electronic Evidence. v.3 A Pocket Guide for First Responders. United States Secret Service
Best Practices For Seizing Electronic Evidence v.3 A Pocket Guide for First Responders U.S. Department of Homeland Security United States Secret Service BEST PRACTICES FOR SEIZING ELECTRONIC EVIDENCE This
Trends and Tactics in Cyber- Terrorism
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT
ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT 2 The Importance of Crime Scene One of the main goals in an investigation is to attribute the crime to its
CRIMINAL JUSTICE PROGRAM
CRIMINAL JUSTICE PROGRAM University Plaza, Building D (435) 652-7815 http://dixie.edu/criminal_justice/index.php To find faculty & staff phone numbers and email addresses, please consult the University
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
The European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
LODI POLICE DEPARTMENT David J. Main, Chief of Police
Release Date and Time: 090309 Subject: Avoid the 10 DUI Grant Details: On 08/28/09 the Lodi Police Department conducted a DUI Check Point in the 500 block of E Lockeford. During this check point, LPD arrested
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
New Horizons Regional Education Centers (C&T) Pacing Guide
New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003 Introducing
Criminal Law. We re on your side. Petherbridge Bassra. Your Local Solicitors
Criminal Law We re on your side is a Bradford firm helping clients with cases close to home, nationally and internationally. These pages will tell you what we do and how we do it and naturally we will
New Horizons Regional Education Centers (C&T) Pacing Guide
New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Handout & Lecture Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003
User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)
1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: [email protected] Laplink Software, Inc. 600 108th Ave.
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 8 (Gatto) As Introduced December 1, 2014
Page 1 Date of Hearing: April 28, 2015 Chief Counsel: Gregory Pagan ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair AB 8 (Gatto) As Introduced December 1, 2014 SUMMARY: Authorizes a law enforcement
Cybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
McGraw-Hill Technology Education McGraw-Hill Technology Education
McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Digital Forensics for IaaS Cloud Computing
Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or
Irene Barath Ontario Police College Criminal Investigations Training Unit (519) 773-4458 [email protected].
Ontario Police College: Present Responsibilities- Irene Barath Ontario Police College Criminal Investigations Training Unit (519) 773-4458 [email protected] Curriculum Vitae Full-time Instructor,
