First Pacific Islands Capacity Building Workshop on Child Online Protection



Similar documents
AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL

CYBERSECURITY. PROGRAMME 14 April Lunch / Delegates Registration

How To Get A Security Degree In Australia

FAQs Organised Crime and Anti-corruption Legislation Bill

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

Playing Our Part in Responding to National Threats

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

Graduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation

South Australia Police POSITION INFORMATION DOCUMENT

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

South Australia Police POSITION INFORMATION DOCUMENT

A17.0 Research Higher Degree Programs Policy

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER am 1.00pm Green Park Conference Centre, Reading

Global Security Program Overview

Digital Forensics G-Cloud Service Definition

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework

Union Law Minister Shri Bindeshwari Dubey (extreme right) inaugurating the National Law Institute of India (NLII)

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor

Nsw Policing Studies Criminal Law Handbook

Commonwealth Organised Crime Strategic Framework: Overview

CEOP Relationship Management Strategy

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

OFFICIAL. Operational Case for the Retention of Internet Connection Records

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

70250 Graduate Certificate in Digital Forensics

Piecing Digital Evidence Together. Service Information

THE THREAT OF BETTING-RELATED MATCH-FIXING IN SPORTS

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Criminal Justice M.S.

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

Keith Barger MFS, MCSE, CCE

2016 INTERNATIONAL COURSES AND FEES LIST - Online study

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Australian Graduate School of Leadership. Torrens University Australia. Doctor of Business Leadership. Course Information

Europol Unclassified Basic Protection Level VACANCY NOTICE

The FBI and the Internet

Foreign language Physical education State security Internal security of the European Union

Crime and Policing newsletter: March 2013

FIVE REASONS TO STUDY PSYCHOLOGY AT UOW

IP CRIME HIGHLIGHT REPORT 2013/14

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

SECTION 10 SUMMARY ORGANISED AND COMPLEX ABUSE

Accessing electronically stored evidence of child exploitation material offences

erisks Policyholder s Guide to Privacy & Security Breach Response Planning

Delivery Plan

How To Get A Phd In Child And Youth Development

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

RUAG Cyber Security. More security for your data

INVESTIGATING AND PROSECUTING MONEY LAUNDERING

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

School of Psychology. Postgraduate information session

AUSTRAC. supervision strategy

BSc (Hons) Counter Fraud and Criminal Justice Studies

How To Get A Computer Hacking Program

FACULTY OF EDUCATION AND SOCIAL WORK

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO)

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

Job Description. BRANCH Integrated Services GRADE JM2

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Victim services commissioning intentions

Master of Science in Cyber Security and Management

Doctor of Philosophy. Programme of Study for the degree of Doctor of Philosophy

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

Is your business secure in a hosted world?

Presentation to the Control Systems Security Outreach Coordination Meeting. Mark P. Morgan Lori Ross O Neil July 24, 2007

Watchdog International Ltd

Piecing Digital Evidence Together. Company Information

How do we Police Cyber Crime?

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

Robert P. Bianchi 5502 Chestermill Court Fairfax, VA (571) FAX (703)

APG ANNUAL MEETING 2006 JURISDICTION REPORT: NEW ZEALAND. 1. Steps taken since July 2005 to implement the international AML/CFT standards

Reporting the crime to the police

SEXUAL ABUSE THE RESPONSE OF THE ARCHDIOCESE OF SYDNEY

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue

8674/15 MC/pf 1 DGD 1B

Introduction to Cyber Security

HEALTH AND COMMUNITY EMPLOYEES PSYCHOLOGISTS (STATE) AWARD

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

LAW ENFORCEMENT YOUTH PARTICIPATION CETS. Gabrielle Shaw Head of International and Relations Child Exploitation and Online Protection Centre

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) e dhains@vincents.com.au w

Visit by the Hon. Janet Napolitano US Department of Homeland Security

ORGANIZATIONAL STRUCTURE, MANAGEMENT AND POLICIES OF QUEENSLAND POLICE INVOLVED WITH CHILD PROTECTION INVESTIGATIONS

Course. Fee Amount Code

CRIMINAL JUSTICE.

CRIMINAL JUSTICE. Preparation for Graduate School. Requirements for Admission to the Criminal Justice Major

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

REGULATION 5.1 HIGHER DOCTORATES, THE DOCTORAL DEGREE (RESEARCH), THE DOCTORAL DEGREE (PROFESSIONAL) AND THE MASTERS DEGREE (RESEARCH)

Different treatment of Domestic Violence in Different Courts. Introduction

IBM Content Analytics: Rapid insight for crime investigation

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

PROGRAMME SPECIFICATION

Royal Canadian Mounted Police Cybercrime Strategy

Transcription:

First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence & Counter Terrorism MACQUARIE UNIVERSITY

Background Former NZ Army Soldier (9 years) Former NZ Police Officer (9 years) 5 years as intelligence analyst Managed own computer forensic business in NZ for (10 years) Moved to Sydney 2008 Head of e.forensics for corporate litigation support company 2011 commenced with NSW Police as Senior Electronic Evidence Specialist 2013 commenced as Cyber Program Coordinator/Lecturer at PICT, Macquarie University 2014 Appointed as an INTERPOL Cyber Security Panel member to, ICGI, Singapore

Education Diploma NZ Policing Bachelor of Business Studies (Accounting) Bachelor of Science (Information Systems) Post Graduate Diploma Forensic Science Master of Science (Honours) Thesis on Cyber Terrorism Doctor of Philosophy Thesis on file movement and concealment

Certifications Certified Forensic Computer Examiner (IACIS) Certified Fraud Examiner (ACFE) Completed over 1000 Digital Forensic Investigations

Cyber Program Coordinator What I do: Convenor Masters Degree Cyber Courses: Cyber Terrorism Cyber Security Cyber Crime Cyber Policing and Intelligence (From 2015) Research Cyber Terrorism Trafficking of Child Abuse Material Supervise PhD Students Masters Research Students

The Situation A serious approach toward the investigation into the trafficking and possession of Child abuse material is needed. Increased efforts in the apprehension of offenders will stem the demand and reduce the supply diminishing the physical, sexual and emotional abuse of children worldwide

The Problem Law Enforcement Agencies encounter a magnitude of digital devices each year that have been submitted for investigation into the trafficking and possession of Child Abuse Material. Due to excessive workloads, lack of human and other physical resources, many investigations are restricted to gathering sufficient evidence to prove the current matter at hand.

The Opportunity Many of these devices will contain other evidence that could locate the source of the material or other locations that the perpetrators have distributed the material to. This evidence could provide further inquiries that would expand an investigation to include many others involved in the distribution of the material.

The Solution If this was to be conducted currently, manual searches for links to others involved would need to be conducted. However, if an automated process and model was available, follow-on investigations could ensue, resulting in a wider net being cast to apprehend those involved.

Greater need for intelligence sharing

The benefits of systematic intelligence sharing Share technology Establishment of a common platform Collaborate on digital investigations Catch criminals Collect information/ intelligence Share expertise

Application to child abuse material For each law enforcement/ intelligence agency investigation Extract Local LE server List of MD5 hashes, IP addresses, user names, and email addresses associated with investigation sent to Cloud-based intelligence-sharing server(s) Create MD5 hash of images Seizes Identify exact duplicates of images based on matching MD5 hashes being distributed among different individuals and/or groups. UK Germany Australia Canada USA

Issues to consider when introducing and maintaining an intelligence sharing initiative Is a global intelligence sharing initiative feasible? Who can/should and would want to participate in the intelligence sharing initiative? What would the cost of implementing a global intelligence sharing system be? Who would bear the cost? Who would manage it? How do we deal with the vast amounts/high volumes of data that will be generated? How do we deal with duplication of data and different platforms, file formats and file structures? Who owns the data held in the intelligence sharing database? How will the data be secured/who will control access? How do we deal with language barriers (intelligence in languages other than English)? What are the privacy issues/from a legal perspective, how can the data be used? How do we deal with the differing laws and regulatory landscapes?

Interpol as a suitable facilitator for the intelligence sharing initiative Global reach Already has established relationships Intergovernmental law enforcement organisation Already has many intelligence sharing initiatives in place Investing heavily in cyber crime research, innovation and outreach to formulate a global security strategy (Interpol Global Complex for Innovation in Singapore) Ability to develop the legal, financial and administrative frameworks relating to cyber crime Ability to provide operational and investigative support

Any questions? Dr Allan Watt allan.watt@mq.edu.au Skype: forensic_guy