Security Challenges Against E-crime In México

Size: px
Start display at page:

Download "Security Challenges Against E-crime In México"

Transcription

1 Security Challenges Against E-crime In México Juan Carlos Guel López March

2 AGENDA Introduction E-Crime Unit at Secretariat of Public Security E-crime in Mexico Technological Challenges Conclusion 2 2

3 Introduction 3 3

4 According to the Mexican Internet Association (AMIPCI), Mexican users profile is as follows: 32 million users; Internet is already accesible to all socioeconomic levels; 93% of 6.9 million accounts set up for Internet access are broadband; Connections in Mexico (in millions) : PC s PC s with Internet Cellphones % of PC s installed in Mexico are connected to the Internet ; Internet Access: 48% - Home 34% - Internet Cafe 19% - Work 11% - Study 4% - Relative s home 1% - Other Fuente: 4 4

5 SOCIAL ACTIVITIES Send and receive - 70% Send / receive instant messages - 58% Enter a 'chat room' - 41% Share videos or photos - 34% LEISURE ACTIVITIES Download Music - 49% Adult Entertainment - 10% Fuente: 5 5

6 INTRODUCTION Recent investigations in Mexico have shown advanced use of technologies like cloud computing, cryptography, etc. on typical crimes like drug traffic, kidnapping, robbery, money laundring, fraud, children pornography among others. E-crime in Mexico has been steadily growing over the last years as shown on the following graph. 6 6

7 INTRODUCTION Denouncements 7 7

8 INTRODUCTION 2011 Denouncement Trends 8 8

9 INTRODUCTION Some of the typical technics and tools to fight E-crime have been surpassed by those used by criminals. Nowadays we face big challenges in public security matter in Mexico in order to fight E-Crime. As criminals make use of some state-ofthe-art technologies, law enforcement agencies must do so. 9 9

10 E-CRIME UNIT SECRETARIAT OF PUBLIC SECURITY 10 10

11 The E-Crimes Coordination, of the Scientific Division, of Mexican Federal Police, arises from the Official Journal of the Federation Diary, on May 17th,

12 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY CYBERCRIME UNIT 12 12

13 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES 13 13

14 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES It is possible to recover information from unplugged RAM (volatile) memory. Partial Information can be retained even after 10 minutes of disconnection if memory is frozen

15 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES 78L05 10µF µF + 470µF + 10µF + 10µF + 10µF MAX

16 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY ELECTRONIC INVESTIGATION LABORATORIES Possible scenario of analized devices. C Canal 2 R 2 A D R 1 R 3 Canal 1 Estación Base/ Repetidores Radios móviles B Alcance de transmisión 16 16

17 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY NATIONAL CENTER FOR CRIMES AGAINST CHILDREN 1. National Database of missing children 2. National Database of sexual offenders 3. National Database for children offenders Legal support Investigation of crimes against children Psychological support 17 17

18 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY COMPUTER EMERGENCY RESPONSE TEAM 18 18

19 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY Facilities - Headquarters 19 19

20 E-CRIME UNIT - SECRETARIAT OF PUBLIC SECURITY 20 20

21 E-Crime in Mexico 21 21

22 E-CRIME IN MEXICO Operation Tequila Operation Tequila was a DoS attack lead by #Anonymous hackers group on February 9th & 11th 2011 against local news website. This group called internet users for a new DoS operation against government websites (Secretariat of Communications and Transport website & Presidency of the Republic website) on February 17th

23 E-CRIME IN MEXICO Operation Tequila 23 23

24 E-CRIME IN MEXICO Ciber Protesta Mexicana Ciber Protesta Mexicana (CPM) launched a simultaneous hacking operation against many Mexican Government websites on September 15th 2010, regarding the Bicentennial Celebration of Independence. This group is still attacking websites in Mexico nowadays, though some of the members have been identified

25 E-CRIME IN MEXICO Ciber Protesta Mexicana 25 25

26 E-CRIME IN MEXICO Organized Crime 41 cellphones 3 netbooks Phone contacts Hard disk Results SMS & calls Multi media Image Processing Analysis 26 26

27 ARTHUR LELAND SAYLER CASE Arthur Leland Sayler, Canadian that used to operate from Tijuana, Baja California. He was arrested in possession of 4 million images and videos of child pornography, stored in different mass storage devices. A. P. PGR/FEVIMTRA-C/VCM/010/ Hard drives 29 DVD s Gb 133 Gb Analysis results 2 Flash memories 9 floppys 96 CD-ROMs 80 Mb 12.6 Mb 67.2 Gb 4.40 Tb 27 27

28 ARTHUR LELAND SAYLER CASE Analysis results 3 Websites, broadcasting live 6 Websites in Mexico (disabled) 30 Websites in USA, (research) Catalogs of images of child pornography, from babies to children under 17 years of age. Subscription service to export and import images into the network Internet Service Provider Teléfonos del Noroeste Webserver: Fedora Core 6 O. S. IP

29 GARY MICHAEL FEROGLIA CASE Gary Michael Feroglia, American citizen who was arrested for his responsibility in the commission of crimes of child pornography, against health and possession of weapons used exclusively by the military. A. P. PGR/SIEDO/UEITMIO/ Operation: Ice Gatekeeper IP address Analysis results 40,000 images of child pornography Manzanillo, Colima 29 29

30 GARY MICHAEL FEROGLIA CASE Analysis results Hard drive 400 Gb More than 4 million digital files, related to child pornography 1 firearm 1 magazine 8 rounds of ammunition 1 smoking pipe A bag with white powder Hard drive 80 Gb 30 30

31 Actions taken against E- Crime by Mexican Government 31 31

32 Actions taken against E-Crime by Mexican Govt. Gabinete de Seguridad Nacional National Security Committee has established the need for the creation of a National Security Strategy against cybercrime in Mexico

33 Actions taken against E-Crime by Mexican Govt. Define an Information Security General Policy for the Mexican Federal Government. To create and operate a Computer Security Incident Response Team (CSIRT) at Mexican Government level

34 Actions taken against E-Crime by Mexican Govt. Cybersecurity Roadmap E-Crime Unit Governm ent Militar CERT -PRESIDENCY -SEGOB -SEDENA -SEMAR - -PGR -SCT -SRE -SFP -CISEN -SHCP -ENERGY Privately held co. -CARRIERS -ISP -TELEPHONE COMPANIES Academic CERT Financial CERT CERT-MX -LABORATORIES -CYBERCRIME -CENADEM -SEDENA -UNAM-CERT -ABM 34 34

35 Technological Challenges 35 35

36 Technological Challenges Strong cryptography used by criminals makes hard to investigate on electronic evidence. Forensic tools for hard disk cloning and indexing are not fast enough to fullfill the time Law Enforcement Agencies have in Mexico to deliver evidence to Public Ministery before releasing a suspect from custody

37 Technological Challenges Need to correlate all of the information collected in order to provide intelligence to Mexican Federal Police. Need to automatically identify individuals found in pictures as evidence. Need to trace IPs addresses to Geographical location accurately. Need to monitor criminals on social networks with automated tools

38 CONCLUSION Work to do To have better cooperation with national and International Entities (Government, Privately held companies, Law Enforcement Agencies, Universities, ISPs). To promote changes to Mexican Legislation according to the challenges we face day to day. To identify and to acquire new Technology that enables the E-Crime Unit to fight the organized crime in Mexico

39 CONTACT Comisario Jefe Juan Carlos Guel López HEAD OF MEXICAN FEDERAL POLICE E-CRIME COORDINATION

Crime Statistics in. Crime Statistics in British Columbia, 2014. Table of Contents. Ministry of Justice Police Services Division

Crime Statistics in. Crime Statistics in British Columbia, 2014. Table of Contents. Ministry of Justice Police Services Division Ministry of Justice Police Services Division Crime Statistics in British Columbia, 2014 Table of Contents Highlights... 1 Table 1: Police-Reported Criminal Code and Drug Offences in BC... 2 Table 2: Crime

More information

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop

More information

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community. Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes

More information

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,

More information

Getting Physical with the Digital Investigation Process

Getting Physical with the Digital Investigation Process Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this

More information

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

POLICIES TO MITIGATE CYBER RISK

POLICIES TO MITIGATE CYBER RISK POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various

More information

British Columbia, 2013. Crime Statistics in. Crime Statistics in British Columbia, 2013. Table of Contents

British Columbia, 2013. Crime Statistics in. Crime Statistics in British Columbia, 2013. Table of Contents Ministry of Justice Police Services Division Crime Statistics in British Columbia, 2013 Table of Contents Highlights... 1 Table 1: Police-Reported Criminal Code and Drug Offences in BC... 2 Table 2: Crime

More information

Digital Forensics. Larry Daniel

Digital Forensics. Larry Daniel Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters

More information

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

INTRODUCTION DEVELOPMENT AND PHENOMENA

INTRODUCTION DEVELOPMENT AND PHENOMENA INTRODUCTION DEVELOPMENT AND PHENOMENA ITU, ICB4PAC 02.03.2011, Vanuatu Prof. Dr. Marco Gercke, Director Cybercrime Research Institute Cybercrime Page: 1 GENERAL INTRODUCTION Cybercrime Seite: 2 CYBERCRIME

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

Years 3-7 Acceptable Use Policy & Agreement

Years 3-7 Acceptable Use Policy & Agreement Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require

More information

Battling Current Technological Trends

Battling Current Technological Trends Law Enforcement Incident Response to Cybercrimes & Battling Current Technological Trends Corey J. Bourgeois, Computer Forensic Examiner & David Ferris, Investigator Louisiana Department of Justice HTCU

More information

MEXICO S CRIMINAL JUSTICE SYSTEM A GUIDE FOR U.S. CITIZENS ARRESTED IN MEXICO

MEXICO S CRIMINAL JUSTICE SYSTEM A GUIDE FOR U.S. CITIZENS ARRESTED IN MEXICO MEXICO S CRIMINAL JUSTICE SYSTEM A GUIDE FOR U.S. CITIZENS ARRESTED IN MEXICO (Please Note-The information provided herein is meant as general guidance only and may not apply fully to your particular situation.

More information

Forensic Challenge V2.0 UNAM-CERT RedIRIS

Forensic Challenge V2.0 UNAM-CERT RedIRIS UNAM-CERT RedIRIS * Forensic Challenge V1.0 * Forensic Challenge V2.0 * Conclusions Why this forensic Challenge? * To promote and impulse the Forensic Analysis in our Region -- Hispanoamerica-- * To know

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Table 252-0082 Incident-based crime statistics, by detailed violations and police services, Territories annual (number unless otherwise noted)

Table 252-0082 Incident-based crime statistics, by detailed violations and police services, Territories annual (number unless otherwise noted) CANSIM - 252-0082 - Incident-based crime statistics, by detailed and police se... Page 1 of 5 Statistics Canada Home > CANSIM 1, 2, 29 Table 252-0082 Incident-based crime statistics, by detailed and police

More information

Establishing a State Cyber Crimes Unit White Paper

Establishing a State Cyber Crimes Unit White Paper Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center

More information

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges An Introduction to Cyber Crime and Terrorism: Problems and the Challenges Marc Goodman Director of International Cooperation International Multilateral Partnership Against Cyber Threats (IMPACT) What is

More information

CYBERCRIMES CERTIFICATIONS COURSE

CYBERCRIMES CERTIFICATIONS COURSE CYBERCRIMES CERTIFICATIONS COURSE TCLEOSE Course #3210 Sponsored by The Harris County Constables Office, Pct 4, 6831 Cypresswood Drive, Spring Texas 77379 WARNING This presentation is being given a rating

More information

Cyber Crime and Data Retention

Cyber Crime and Data Retention COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

More information

Virginia Primary School Learning Together, Learning for our Future

Virginia Primary School Learning Together, Learning for our Future Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Incident Response and Computer Forensics

Incident Response and Computer Forensics Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident

More information

110 Explain locard's principle of transference of trace materials at a crime scene. Unit/Standard Number

110 Explain locard's principle of transference of trace materials at a crime scene. Unit/Standard Number 1 Secondary Task List 100 CRIME SCENE MANAGEMENT 101 Collect hair, blood and bullet fragments for evidence. 102 Collect, preserve and catalog physical evidence while maintaining a chain of custody. 103

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation. The purpose of FIIP The FIIP Project is a partnership of European law enforcements child protection teams and university academics with expertise in this field. The partnership is working together, developing

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in 1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

More information

WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

Mexican Efforts Towards Building a Design Basis Threat for Radiological and Nuclear Environment.

Mexican Efforts Towards Building a Design Basis Threat for Radiological and Nuclear Environment. Mexican Efforts Towards Building a Design Basis Threat for Radiological and Nuclear Environment. Juan Eibenschutz H./ José Luis Delgado/ Carina Martínez International Regulators Conference on Nuclear Security.

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.1

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.1 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.1 Issued Date: 05-01-15 Effective Date: 05-01-15 Updated Date: 08-10-15 SUBJECT: RESPONSIBILITIES AT CRIME SCENES PLEAC 1.2.3 1. POLICY A. It is the responsibility

More information

now as a Distribution Partner

now as a Distribution Partner W e l c o m e t o t h e b r o a d b a n d e r a Would you like to extend your current offering to the market, reduce churn amongst your customer base, increase customer loyalty by offering value-added

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

IRC Forensic Basics. by: James Guess. Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first

IRC Forensic Basics. by: James Guess. Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first IRC Forensic Basics by: James Guess Origins of IRC Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first globally accessible chat network. The designers originally intended

More information

Cyber Security in Japan (v.2)

Cyber Security in Japan (v.2) Cyber Security in Japan (v.2) Ryusuke Masuoka ([email protected]) and Tsutomu Ishino ([email protected]) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

How To Solve A Violent Home Invasion With A United Force

How To Solve A Violent Home Invasion With A United Force Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Large Scale Cloud Forensics

Large Scale Cloud Forensics Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam

More information

24/7 High Tech Crime Network

24/7 High Tech Crime Network 24/7 High Tech Crime Network Albert Rees Computer Crime & Intellectual Property Section Criminal Division, U.S. Department of Justice 24/7 Network The G-8 24/7 Network for Data Preservation Points of contact

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

Computer Facilitated Crimes Against Children International Law Enforcement Training

Computer Facilitated Crimes Against Children International Law Enforcement Training Computer Facilitated Crimes Against Children International Law Enforcement Training The Computer Facilitated Crimes Against Children training seminar was designed to provide law enforcement around the

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

Design and Implementation of a Live-analysis Digital Forensic System

Design and Implementation of a Live-analysis Digital Forensic System Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:

More information

AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL

AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL Dr. Allan Charles Watt, PhD, CFCE, CFE Macquarie University, Sydney, Australia Session ID: CLE W02 Session Classification:

More information

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1) Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)

More information

BEST PRACTICES IN CYBERCRIME INVESTIGATION IN THE REPUBLIC OF KOREA

BEST PRACTICES IN CYBERCRIME INVESTIGATION IN THE REPUBLIC OF KOREA 139TH INTERNATIONAL TRAINING COURSE BEST PRACTICES IN CYBERCRIME INVESTIGATION IN THE REPUBLIC OF KOREA Junsik Jang * I. INTRODUCTION The Internet and the rapid deployment of information and communication

More information

Best Practices. For Seizing Electronic Evidence. v.3 A Pocket Guide for First Responders. United States Secret Service

Best Practices. For Seizing Electronic Evidence. v.3 A Pocket Guide for First Responders. United States Secret Service Best Practices For Seizing Electronic Evidence v.3 A Pocket Guide for First Responders U.S. Department of Homeland Security United States Secret Service BEST PRACTICES FOR SEIZING ELECTRONIC EVIDENCE This

More information

Trends and Tactics in Cyber- Terrorism

Trends and Tactics in Cyber- Terrorism Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends

More information

ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT

ITU Session Two: Conduct a forensically safe investigation Mounir Kamal Mkamal@Qcert.org Q-CERT ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT 2 The Importance of Crime Scene One of the main goals in an investigation is to attribute the crime to its

More information

CRIMINAL JUSTICE PROGRAM

CRIMINAL JUSTICE PROGRAM CRIMINAL JUSTICE PROGRAM University Plaza, Building D (435) 652-7815 http://dixie.edu/criminal_justice/index.php To find faculty & staff phone numbers and email addresses, please consult the University

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Promoting Network Security (A Service Provider Perspective)

Promoting Network Security (A Service Provider Perspective) Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

LODI POLICE DEPARTMENT David J. Main, Chief of Police

LODI POLICE DEPARTMENT David J. Main, Chief of Police Release Date and Time: 090309 Subject: Avoid the 10 DUI Grant Details: On 08/28/09 the Lodi Police Department conducted a DUI Check Point in the 500 block of E Lockeford. During this check point, LPD arrested

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

New Horizons Regional Education Centers (C&T) Pacing Guide

New Horizons Regional Education Centers (C&T) Pacing Guide New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003 Introducing

More information

Criminal Law. We re on your side. Petherbridge Bassra. Your Local Solicitors

Criminal Law. We re on your side. Petherbridge Bassra. Your Local Solicitors Criminal Law We re on your side is a Bradford firm helping clients with cases close to home, nationally and internationally. These pages will tell you what we do and how we do it and naturally we will

More information

New Horizons Regional Education Centers (C&T) Pacing Guide

New Horizons Regional Education Centers (C&T) Pacing Guide New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Handout & Lecture Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003

More information

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013) 1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: [email protected] Laplink Software, Inc. 600 108th Ave.

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 8 (Gatto) As Introduced December 1, 2014

ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 8 (Gatto) As Introduced December 1, 2014 Page 1 Date of Hearing: April 28, 2015 Chief Counsel: Gregory Pagan ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair AB 8 (Gatto) As Introduced December 1, 2014 SUMMARY: Authorizes a law enforcement

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

McGraw-Hill Technology Education McGraw-Hill Technology Education

McGraw-Hill Technology Education McGraw-Hill Technology Education McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Digital Forensics for IaaS Cloud Computing

Digital Forensics for IaaS Cloud Computing Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or

More information

Irene Barath Ontario Police College Criminal Investigations Training Unit (519) 773-4458 [email protected].

Irene Barath Ontario Police College Criminal Investigations Training Unit (519) 773-4458 Irene.barth@jus.gov.on.ca. Ontario Police College: Present Responsibilities- Irene Barath Ontario Police College Criminal Investigations Training Unit (519) 773-4458 [email protected] Curriculum Vitae Full-time Instructor,

More information