Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering- Detection and Prevention Overview 2016 I/M Solutions Forum 05.02.2016.

Slides:



Advertisements
Similar presentations
Options Scenarios- Enhanced Inspection Program Input Sought from Stakeholders and Public New Jersey Motor Vehicle Commission and Department of Environmental.
Advertisements

SATO Label Gallery ™ Standard Series Overview
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
ASAP Unit Advanced Surveillance And Protection.  Uniquely High Number of Violent Street Gangs  58 Gangs  11,000 Documented Gang Members  Relatively.
Grand Haven Security Assessment By Anthony Gaeta.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Security Controls – What Works
Fuels Systems Management Program CRTP First Nation Communities Types of Facilities Commercial (gas station); Industrial (remote Fuel Farms); Residential.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Chapter 12 Monitoring and Auditing AIS Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Top Tactics for Maximizing GMP Compliance in Blue Mountain RAM Jake Jacanin, Regional Sales Manager September 18, 2013.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Security Guide for Interconnecting Information Technology Systems
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
OBD Communication Protocol
An Introduction to the Federal Motor Carrier Safety Administration.
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
9/18/2015www.protocolnet.com1 PROTOCOL ONLINE SERVICES Pvt. Ltd., “To become a leader in Information Technology by providing entire spectrum of hardware,
Implementing Network Access Protection
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Integrating the Healthcare Enterprise Audit Trail and Node Authentication Profile IHE IT Technical and Planning Committee June 15 th – July 15 th 2004.
Hosted by: June 23-26, 2003 New York City Copyright Managing Multiple Access & Entry Points.
Integrating the Healthcare Enterprise Audit Trail and Node Authentication Profile Name of Presenter IHE affiliation.
Compliance Promotion Formalizing an Approach to Support Stakeholder Compliance.
Module 11: Designing Security for Network Perimeters.
On-Board Diagnostics (OBD) II Regulatory Update Mobile Source Control Division California Air Resources Board April 25, 2002 Sacramento, California.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
OBD Inspection System & New Test Procedures I/M Solutions 2013 May 7,
Michael St. Denis, Robert Budd, Revecorp Inc. I/M Solutions May 2015 Virginia Beach, Virginia.
1 I/M solutions 2012 Training for the I/M Industry Bonnie McPherson, Training Manager PARSONS.
2013 IM Solutions Training Forum Emission Testing Readiness Issues Presented By Scot Manna Top Tech Training Inc.
1 SGS IS THE WORLD’S LEADING INSPECTION, VERIFICATION, TESTING AND CERTIFICATION COMPANY.
Department of Environmental Quality Oregon’s OBD Test Options.
Vermont- Automated Vehicle Inspection Program (AVIP)
Presented by Craig Woleader IM Solutions, Schaumburg, IL May 7, 2013.
Utah Oregon 1. Vehicle Link 2. Access Point with Wireless Hot-Spot 3.Vehicle Inspection Database (VID)
What’s New in WebTMA Jenny Pino TMA Systems. mobileTMA GO Native iOS Application Use Built-In Camera for Barcode Scanning 24 Hour Data Expiration Data.
I/M SOLUTIONS 2012 Training Forum for Jurisdictions Opacity Testing in I/M Programs Using Acoustics to Ensure Proper Testing.
Michael St. Denis, Robert Budd, Revecorp Inc. I/M Solutions 2014 April 27 – 30, 2014 Salt Lake City, Utah.
Gene Tierney Systech.
Changing I/M Programs Coast to Coast New York. Transition Approach Challenging Schedule March Alpha Testing May Beta Testing July ready for official testing.
Tampering Tales from the “MACs” presented by Craig Woleader IM Solutions, Salt Lake City, UT April 29, 2014.
DEQ Oregon – SysTechFACA Workgroup – Oregon FACA Workgroup Meeting SysTech International Innovative Technologies for Future OBD Based I/M Program Design.
I/M Solutions Forum Session #7 Fraud Prevention & Detection Lewis Hays: Enforcement Unit Manager Stephen Leydon: Vehicle Testing Coordinator Georgia Department.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Department of Consumer Affairs Bureau of Automotive Repair OBD Readiness Monitors and Vehicles of Interest Paul Hedglin, Engineering and Research Branch.
Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile.
Overview of Ridesharing Industry and Issues What is RideSafe™? Applying RideSafe™ to I/M Summary.
Bureau of Automotive Repair (BAR) May 23, 2012 I/M Solutions Training Forum Sacramento, CA.
OBD Inspection Using SAE J2534.
Triggers and Covert Audits Go Hand in Hand Identifying and Reducing Fraudulent Inspections in Texas Air Quality Division Edgar J. Gilmore Mobile Source.
I/M Solutions 2012 Conference Sacramento, CA Auditing – A Range of Options Jim Sands May 22, 2012.
WELCOME 1 I/M 4 Clean Air DEC THE WASHINGTON STATE EMISSION CHECK PROGRAM DAVID ADLER DIESEL EMISSIONS SPECIALIST.
Virginia On-Road Emissions Program Richard Olin – Virginia Department of Environmental Quality Chris Smith – Opus Inspection May 19 th, 2015 I/M Solutions.
Review of Trigger Effectiveness How Much is Enough? Rob Klausmeier, de la Torre Klausmeier Consulting, Inc. IM Solutions April 29,
11 Vendors Eye View of New I/M Network Design Vince Mow – Applus Technologies, Inc. I/M Solutions – Chicago – May 20, 2012 I/M SOLUTIONS 2013 Training.
Fraud Prevention in Illinois Program May 7, 2013 Illinois Program Fraud Prevention.
1 Triggers for OBDII I/M Programs Rob Klausmeier dKC.
Onsite CRM Security
Chapter 7. Identifying Assets and Activities to Be Protected
Computer Information Systems
Smart Retail Digital Store.
Energy Control Procedures Lockout/Tagout 29 CFR
ISMS Information Security Management System
Protection Mechanisms in Security Management
Presentation transcript:

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering- Detection and Prevention Overview 2016 I/M Solutions Forum Anthony Liebusch

Tampering- Detection and Prevention Overview I/M Solutions Forum Tampering Detection and Prevention Pre-Inspection Inspection Process Post-Inspection Detection and Prevention

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering - Pre-Inspection Vehicle  Tailpipe  Disconnect Components  Manipulate Timing  EGR Valve  Vacuum Leak  Sensor/Component Simulators  Tuning/Flashing/PassThru  Code Clearing  Reprogramming E-VIN  DLC  Vehicle OBD Simulators 3

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering – Inspection Process Inspection Equipment Tampers  Cabinet Implementation  Tamper Switches  BIOS Lockdown  OS Lockdown  Tablet Implementation  BIOS Lockdown  OS Lockdown  Wireless Lockdown  Router, Printer, Scan Tool  Internet Access  Authentication, Authorization  External Ports 4

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering – Inspection Process Inspection Equipment Tampers  Tailpipe  Secondary Probe (Induced leak)  RPM Bypass  Opacity  RPM Bypass  Temperature Probe  OBD  Vehicle Communication  IP Based  Host Communication  PC, Tablet, Remote OBD  Firmware  Serial Number, Firmware Version 5

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering – Post Inspection Stickers  Cut out sticker and glued to another vehicle  Scan and print  Smart Phone Printer Vehicle Inspection Report (VIR)  Cut and Paste  Vehicle Information from Fail  Inspection, Station information from Pass 6

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering – Detection and Prevention Stickers  Sticker Compliance  Decals  Watermarks  Laser ID Markings  RFID  Vehicle and Test Information  VIN, Plate, Test ID, Date Stickers/VIR  Barcode  Sticker, Vehicle and Test Information  Security Code  Online Lookup – Offline Testing  Registration Facility Finds Pass Test – Online Testing 7

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering – Detection and Prevention Detection and Prevention Approaches  Post Test Triggers  Triggered Events  Covert Audits  Video Bookmarks  Bay Cameras  Real-time Viewing  Recording  Auto/Manual Bookmarks  Post- test Review  Clips, Bookmarks  Real-time Test Interruption  Real-time Data Analysis  Real-time Triggers  Video Conference 8

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Real-Time Data Analysis 9

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Real-Time Triggers Industry proven approach Client collaboration Built around program rules and regulations, etc. Analyze emissions test data for statistical patterns and anomalies Utilization of vehicle lookup table that evolves as the data repository grows 10

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Technical Investigation Solution Technical experts analyze data in real-time Data readily available to client 11

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Real-Time Audit Analysis Results Options  Compliant  Continue Test  Non-Compliant  Abort and Retest  Ensure Repairs are Completed Following Program Rules  Ability to Lockout the Vehicle  Ability to Lockout the Inspector or Technician  Ability to Lockout the Facility  Auditor can also set the Vehicle/Inspector/ Technician/ Station to High Risk 12

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Facility Support/Education Audio/Video Conference Can be initiated by facility staff on the analyzer by pressing button Education/Support  Equipment Service Assistance  Rules and Regulation Interpretation  Testing Protocols  Repair Assistance 13

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Innovative System Solution Non-Equipment Based Solution Based on Integrated Approach  Call Center Application  Video/Audio Playback  Current/Previous Emission Data History  Current/Previous Repair Data History  Equipment Service History  Training Activity  Previous Audit History  Previous Compliance History 14

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering Deterrence Powerful Deterrent Effect Detects tampering activities real-time Prevented tampered tests from being completed resulting in motorist protection Identify and deny inappropriate repairs Demonstrate to facilities that all data is reviewed during the test and repair process, including after hours. 15

Tampering- Detection and Prevention Overview I/M Solutions Forum Results Embraced by facility owners, by identifying employee issues Provides real-time support and education for Inspectors and Repair Technicians Enhanced program integrity and environmental protection

Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering- Detection and Prevention Overview 2016 I/M Solutions Forum Anthony Liebusch