Conducting Reactive and Proactive Internet Investigations

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
UN Comprehensive Study on Cybercrime
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security Controls – What Works
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
By Drudeisha Madhub Data Protection Commissioner Date:
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
© Malaysian Communications and Multimedia Commission 1 Malaysia’s Approach to Network Security Bistamam Siru Abdul Rahman, General Manager,
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Office of the Auditor General of Norway Topic: Prevention and detection of irregularities including corruption Presentation by Dag Nenningsland,
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Amina Maknoon Senior Director, Investigation & Enforcement Financial Services Commission.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
MONEY LAUNDERING “The Basics”.
7/7/20161 The Public Sector Equality Duty for Schools in England Jonathan Timbers – Policy Manager, PSED Team, Equality and Human Rights Commission.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Surveillance around the world
Courts System Search Warrants.
MGMT 452 Corporate Social Responsibility
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Seminar On Cyber Crime Submitted To: Submitted By:
INVESTIGATION PROCESS AND TECHNIQUE
Regulation of Investigatory Powers Act 2000
8 Building Blocks of National Cyber Strategies
U.S. Department of Justice
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Red Flags Rule An Introduction County College of Morris
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Hate crime statistics: gaps, progress and challenges ahead
Preventing Information Technology Crimes
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Electronic Surveillance, Post 9/11
Role of US Security and Intelligence Agencies
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
West Midlands Police response to Cybercrime:
Presentation transcript:

Conducting Reactive and Proactive Internet Investigations By Ayodeji Omotade BSc, PgDip, MSc, CEH, CHFI Digital Forensics Limited

Introduction According to a recent United Nations survey over 90% of responding countries indicated that cybercrime most frequently comes to Law Enforcement’s attention through reports by individual or corporate victims.

Internet Investigations When police responds to crime that has already occurred, we call it ‘Reactive’. Proactive investigations occur before and during the commission of the offence.

Challenges of Reactive Internet Investigations Jurisdictional Blind Spot as Compared to Offline Crimes Lack of Basic Training Regarding Internet Crimes The Costs of Investigation is High Preservation of Evidence can be very Fragile

Proactive Internet Investigations Varieties of Proactive Internet Investigations includes Intelligence Collection of Information such as Undercover Investigations Looking for Child Pornographers or Traditional Vice Violations. Investigations Concerning Peer to Peer Networks for Sharing of Contraband or Illegal Trade in Music or Videos. These are Just Examples

Proactive Investigations According to The Bureau of Justice Assistance, The Presence of Social Media, Law Enforcement and Private Sector need to take a broader approach, getting the community at large involved. This brings us to Community Policing in Cyberspace.

Community Policing in Cyberspace

Community Policing in Cyberspace Initiatives Collaboration between the police And community at large that identifies and solves community problems. The creation of police department webpage or portal for community members to facilitate online communication. Chicago Tribune reported a police department sergeant for creating a dynamic website for the community for reporting crime online which was later picked up by other police departments. This increase in number of success rates in both proactive and reactive investigation were many times higher than when a static webpage which only gave the police information only existed.

Community Policing in Cyberspace Initiatives The use of social media sites such as Facebook, Twitter, Youtube and others. The partnership between private technology cyber security organizations. Sharing of information amongst other arms of law enforcement agencies. In 2012, LexisNexis Risk Solutions, in partnership with PoliceOne, conducted a survey of 1,221 law enforcement officers. The findings revealed that 4 out of 5 police officers were using social media platforms, such as Facebook, Youtube and Twitter to help solve crimes. The investigations consisted of both reactive and proactive responses.

3 Ways of Proactive and Reactive Internet Investigation on Social Media Apparent or Overt use: This when an officer access public areas of the internet for instance ‘Googling’ or open Facebook search. Discreet use: This occurs when the investigator uses undercover techniques and even attempts to conceal the IP address to avoid being tracked. Covert use: Most intrusive investigative use which involves not only concealing the information but includes creating an identity

Key Elements for Police Developing Social Media Policy for Investigation The use of social media resources will be consistent with applicable laws Define if and when social media sites or tools are authorized Articulate and define authorization level needed to use information on social media sites Specify that information obtained from sites visited will undergo evaluation: source reliability and content evaluation.

Key Elements for Police Developing Social Media Policy for Investigation Specify the documentation storage and retention requirements related to information obtained. Identify dissemination procedure for criminal intelligence and investigative products that contain information obtained.

Internet Monitoring Tools: Social Media There are three categories of monitoring tools for both reactive and proactive investigations Free tools: like icerocket, plancast, socialpointer etc Commercial Tools: Netbase, Topsy etc Law Enforcement Specific : like IBM solutions, Encase range of solutions SOCMINT which is Social Media Intelligence is a department created by the Metropolitan Police in the United Kingdom to monitor social media for proactive and reactive investigations, gathering of intelligences and also doubles as a CCTV on ground.

Law Enforcement and Private Sectors Working Together Cybercrime investigations are carried out by specialists in specific skills. The scope of Cybercrime investigations are very wide in relation to the traditional offline crimes. The synergy of high technology companies and Law Enforcement in Nigeria can be a starting point to increase successful proactive and reactive investigations

Operations Planning for Internet Investigation Identify intent and scope of the undercover operation Identify the legal restrictions around the undercover operations Determine the limit of the investigators Authority Identify the available resources to support the undercover investigations Prepare risk assessment of the operation Identify data collection requirements

MPS (UK) Association of Chief Police Officers (ACPO): Principles Principle 1: No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court. Principle 2: In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. Principle 3: An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. Principle 4: The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to. Extracts from Janet Williams QPM Deputy Assistant Commissioner Metropolitan Police Service ACPO lead for the e-Crime Portfolio ACPO Good Practice Guide for Digital Evidence

Cybercrimes (Prohibition and Prevention) ACT May 2015 The act provides an effective, unified and comprehensive legal, regulatory framework for the prohibition, prevention, detection, prosecution and punishment of cybercrimes in Nigeria. This act also ensures the protection of critical national infrastructure, and promotes cyber security and the protection of computer systems and networks, electronic communications, data and computer programs, intellectual property and privacy rights.

An Idea of Some Cybercrime Investigations Offences against critical national information infrastructure Unlawful access to a computer. System Interference Interception of Electronic messages Tampering with Critical Infrastructure Computer Related Forgery Theft of Electronic Devices

Some more Ideas on Types of Investigations. Unauthorized Modification of Computer Systems, Network Data and Systems Interference. Electronic Signature Cyber Terrorism Exceptions to Financial Institutions Posting and Authorized Options Reporting Cyber Threats

Cont… Identity Theft and Inpersonation Child Pornography Cyberstalking Attempt, Consipracy, Aiding and Abeting Breach of Confidence by Service Providers Manipulation of ATM/POS Terminals Phishing Electronic Cards Related Fraud

Investigative Tools All Law Enforcement Agencies conducting investigations that may require the use of digital forensics must ensure the investigations can be supported by forensically sound and legally sufficient digital forensic examinations.

Conclusion Reactive and Proactive investigations is still at its infancy in Nigeria. With the advent of the cybercrime act which still needs to be streamlined and the increased awareness of the wide scope which cybercrime in relation to many major crimes affecting our society especially in areas of terrorism, financial fraud and blatant corruption, a lot needs to be done in areas of infusing technology, advocating of new policies and providing resources for capacity building, increased manpower and financial resources.

Digital Forensics Limited www.digitalforensicsng.com info@digitalforensicsng.com 07068866999