Electronic Crime: Incident Reporting and Forensics Between Law Enforcement and Private Industry D/Sgt. Michael Harrington CEECS, CFCE, EnCE Michigan State.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
© 2004 TransUnion LLC. All Rights Reserved. August 10, 2005 Seven Easy Steps to Fraud Prevention Northwestern University Clifton M. O’Neal Director, Corporate.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
How It Applies In A Virtual World
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Securing Information Systems
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Prepared and presented by Group 5: 1. NGABOYERA Valens 2. TWAGIRAMUNGU Serge 3. KAYIRANGA Augustin 4. BAYINGANA Aimable 5. SAMVURA Jean de Dieu 6. RUKUNDO.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Reliability & Desirability of Data
Protecting Your Information Assets
IT security By Tilly Gerlack.
COMPUTER FORENSIC EXAMINATION IN AUSTRALIAN Wanwimol Panpeng
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing: Trends and Countermeasures Blaine Wilson.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Identity Theft One of America's fastest growing crimes.
Cybersecurity Test Review Introduction to Digital Technology.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Case Brief Gregory Morton William Campbell Dave Wildner.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Add video notes to lecture
IT Security  .
Introduction to Computer Forensics
Phishing is a form of social engineering that attempts to steal sensitive information.
When you get caught for Identity Theft
Cybersecurity Awareness
Ad Hoc Phase Structured Phase Enterprise Phase
Presentation transcript:

Electronic Crime: Incident Reporting and Forensics Between Law Enforcement and Private Industry D/Sgt. Michael Harrington CEECS, CFCE, EnCE Michigan State Police Computer Crimes Unit

Topics  MSP Computer Crimes Unit  Trends  Evidence Collection  Incident Reporting  Evidence Analysis

Mission Statement  CCU was established to provide computer and Internet investigative support in the acquisition of digital evidence for the law enforcement community.

Forensic & Investigative Services  Forensics –Perform Forensic examinations of computers –Assist state, county, & local law enforcement agencies  Investigations –Online Investigations –Illegal Websites –Hacking complaints –Internet Crimes Against Children

Trends  Child Exploitation  Identity Theft –Ebay –Credit Cards –Phishing  Organized Crime

Fraud Trends

Phishing  What is “Phishing”? –Phishing defined: the act of attempting to fraudulently acquire through deception sensitive personal information such as passwords and credit card details by masquerading in an official-looking , IM, etc. as someone trustworthy with a real need for such information. –Wikipedia.org

Phishing  Growing faster than any other online threat  The number of unique phishing attacks increased by 1400% in 2004  An estimated $300-$400 million in fradulent (read unauthorized) bank transfers last year

Phishing  Phishing has been called “The Perfect Crime” –All that is needed is a PC, Internet and a little ingenuity –Difficult to catch the criminals –Hackers are doing for profit and criminals following suit

Phishing  People who receive Phishing attacks are three times as likely to become victims.  Phishing scams are for sale on the internet  Ebay hijacking becoming more and more common (phishing example)phishing example

Phishing  How is phishing done? –Believable to victim –Use programming tricks to hide fake sites –Using pop-up windows to cloak the real address in the victim’s address bar –“Pharming” victim redirected to a scam website when the victim types in the real address

Phishing  How can you protect yourself? –Monitor credit card statements, bills –Keep up-to-date anti-virus protection/anti- spyware/firewallsoftware installed –Obtain credit reports on a regular basis –Don’t answer unknown –If it looks to good to be true….

Child Exploitaion  Business maybe liable to victims if employees are using company Internet for illicit activities  Control chat programs/internet usage through routine monitoring of systems  Hostile work environment through inappropriate usage  AUP/Banners/Incident Response Plans

Liability  Mobile Units –PDAs –Mobile Phones  Wireless Connections  Web Applications  Banners, AUP, Employee Handbooks

Incident Reporting  Must report to the agency that has jurisdiction for the alleged offense  Who/what/when/where/how  Explain in plain English the incident  rg rg  Contact local law enforcement for Digital Forensic contact  MSP Computer Crimes Contact

Digital Forensics

 Definition  Develop a methodology  Evidence Collection  Evidence Analysis

Digital Forensics  Definition-Digital Investigation –Process where we develop and test hypothesis that answer questions abut digital events using the scientific method –Carrier, Brian. File System Forensic Analysis, Addison Wesley 2005

Digital Forensics  Definition-Digital Evidence –A digital object that contains reliable information that supports or refutes a hypothesis. –Carrier, Brian. File System Forensic Analysis, Addison Wesley 2005

Digital Forensics  Definition-Digital Forensic Investigation –Process that uses science and technology to analyze digital objects and develops and tests theories which can be entered into a court of law to answer questions about events that have occurred. –Carrier, Brian. File System Forensic Analysis, Addison Wesley 2005

Digital Forensics  Digital Investigations comprised of three phases –1) System Preservation Reduce the amount of evidence that may be overwritten This continues after acquisition because of further analysis and court

Digital Forensics  Digital Investigations comprised of three phases –2) Evidence Searching Looking for data to support or refute event theories Keywords, internet history graphics

Digital Forensics  Digital Investigations comprised of three phases –3) Incident Analysis This phase is done to reconstruct the execution of the event The “how” of the incident

Evidence Collection  Evidence Collection should be done in a forensically sound manner –Baseline –Minimize invasiveness –Protect original –Document everything

Evidence Analysis  Develop/adopt a forensic methodology –Examine and document the original System Settings Peripherals Add on cards –Write protect hard disks, media –Create an exact bit by bit “forensic copy” of the subject media

Evidence Analysis  Maintain a controlled environment  Correlate and validate data obtained  Document actions taken and evidence obtained

Forensic Software  Commercial software –EnCase Enterprised Edition –SMART for Linux –Forensic Tool Kit –ProDiscover  Open Source –Sleuthkit/autopsy –Live Linux Cds Helix Knoppix STD

Questions? D/Sgt. Michael Harrington 4000 Collins Rd Lansing MI TX: