The bid partners Leeds Beckett University West Yorkshire Police

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Psychology of Homicide Unit III Lecture
The forensic use of bioinformation
ICT: A necessity of this age. Agenda What is ICT? Applications and relevance of ICT Merits and De-merits of ICT Steps to Compliance.
Forensic Information Scanning Hub Doug Reid Associate Director, Business Development Asia Pacific e|: p|: Fordingbridge,
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
Challenges facing law enforcement agencies in the fight against cybercrime.
Crime Laboratories Forensic Science Mr. Glatt
Evaluating the Mixed Economy Model in Central Scotland Police Kenneth Scott Director, Centre for Criminal Justice and Police Studies University of the.
Starting a Police Investigation What happens when there is a crime?
PROCESSING EVIDENCE.
Criminal Justice 2011 Chapter 2: The Crime Scene: Field Notes, Documenting, and Reporting Criminal Investigation The Art and the Science by Michael D.
1. True or False? When testing for DNA, investigators must use all of the sample to make sure they get an accurate test. 2. Where do we find DNA in a cell?
Forensic science in illegal trade on wildlife Dr Richard K Bagine Kenya Wildlife Service.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Forensics Falconer Central School Ellicott Police Department Chautauqua County Sheriff Department Falconer Central School Ellicott Police Department Chautauqua.
What is FORENSICS? Why do we need Network Forensics?
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
3-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein PHYSICAL EVIDENCE Chapter.
Welcome to Forensic Science! Today’s Lesson Question: What is Forensic Science?
INTRODUCTION TO FORENSICS Let’s get started!. What is forensics? The application of science to law.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
History of Forensic Science and the Crime Scene. Warm-Up Activity Study the diagram shown. ► How many animals were here? What kind were they? ► What were.
1 Criminal Investigative Analysis. 2 A Comprehensive Investigative Aid Indirect Personality Assessments Equivocal Death Analysis Investigative Suggestions.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
Introduction to Forensics September 7, 2005 Mr. Schildknecht SUPA Forensics The Science Behind Catching Criminals.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Crime Laboratories Forensic Science Services. Objectives   List and describe the functions of the various units found in a modern all- purpose crime.
Enhancement of forensic abilities: Topics: * Forensic crime scene investigation: Training & Equipment * Forensic laboratories: Experts ’ training & Instrumentation.
Intro to Forensic Science and Crime Laboratories
Notes 1.2 Organization and Services of the Crime Lab.
Introduction to Forensic Science and Crime Scene Processing.
WEST SUSSEX FIRE AND RESCUE SERVICE REDUCING DELIBERATE FIRES THROUGH EFFECTIVE STREET SCENE INITIATIVES Kathy John Arson Reduction Manager.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
Crime Lab Services. Federal FBI DEA ATF U.S. Postal Inspection Service.
Investigating Corporate Manslaughter Mark Smith – British Transport Police Detective Chief Superintendent.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
Wayne Tucker Road Safety Manager South Wales Police “Former” Senior Investigating Officer Road Death Investigation Unit.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
FORENSIC TRAPS Deputy Inspector Andrzej Rogalski
CJS 215 RANK creative knowledge /cjs215rank.com
Research findings from the East Midlands Digital Evidence Survey
Chapter 3 First Response.
Crime Scene Investigation
Forensic Science Services
INVESTIGATION PROCESS AND TECHNIQUE
Kent Internet Risk Assessment Tool (KIRAT)
The 1Million Project Using Your Smartphone at Home and at School.
Mobile app development. Mobile app development is a term used to denote the act or process by which a mobile app is developed for mobile devices, such.
CJS 215 RANK Lessons in Excellence-- cjs215rank.com.
Computer Information Services (CIS) New Hire Orientation
INTRODUCTION TO Compliance audit METHODOLGY and CAM
Structure Starting with a needs assessment Research training Research workstream project selection Nine workstreams Automated forensic analysis Image.
Ad Hoc Phase Structured Phase Enterprise Phase
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Physical Evidence.
The Acquisition Process Presented by: Stacy Haynes
Forensic Science and Criminalistics
Yeyoluntu Crime reporting App Civic Engagement at community level:
Science of Crime Scenes
15-5 Automated Fingerprint Identification System
Introduction to Digital Forensics
Presentation transcript:

The bid partners Leeds Beckett University West Yorkshire Police Steering Group: WYP West Yorkshire for Innovation (WyFi) College of Policing Canterbury Christ Church University CENTRIC Sheffield Hallam University

Structure Starting with a needs assessment Research training Research workstream project selection Nine workstreams Automated forensic analysis Image linkage for victim identification and framework for image fingerprint management Automated grooming detection Frontline officer awareness development and decision support mobile app Assessment of methods of cyber training Framework for seizure, preservation and preservation of cloud evidence An evaluation of the role of the Digital Media Investigator within WYP Characteristics of victims of cybercrime Broadcast media artefacts

Frontline officer awareness development and decision support mobile app

Traditional Digital Fingerprint DNA Drugs Footwear CCTV Mobile Phones Photograph Scene CSP / ISP Data Social Media Cloud Storage Wi-Fi Routers Fire Firearms Residue Marks

The problem Frontline officers need assistance: Identifying digital evidence: physical devices and Internet-based evidence Require access to training materials and to procedures on the go Capturing information about cases Digital Forensics Units (DFU) struggle with workload related to officers seizing irrelevant devices

Methods and results Developed an Android app to assist front-line officers User participatory design: Focus groups and input from: Front-Line Officers / Safeguarding; DFU; Cyber Crime Team (CCT); Central Authorities Bureau (CAB); Telecom Unit Input on requirements: Legislation, and Policies / Procedures; and app design Development of training videos Evaluation: simulated seizure, measuring usability, confidence and correct selection of devices to seize Statistically significant improvements to seizure; acceptable usability

Conclusion A mobile app to help frontline officers to identify relevant digital-related evidence whilst at the scene of a potential crime Videos Reduces the amount of irrelevant exhibits seized Captures evidence and notes at the scene Provides structured guidance for preservation of digital evidence and contact details