Structure Starting with a needs assessment Research training Research workstream project selection Nine workstreams Automated forensic analysis Image.

Slides:



Advertisements
Similar presentations
Achieve Benefit from IT Projects. Aim This presentation is prepared to support and give a general overview of the ‘How to Achieve Benefits from IT Projects’
Advertisements

MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
ICDFI 2013 Keynote Speech 1: Quantifying Likelihood in Digital Forensic Investigations Dr Richard Overill Department of Informatics, King’s College London.
BACS 371 Computer Forensics
Forensic and Investigative Accounting
Fingerprint Authentication Kevin Amendt David Friend April 26, MIT Course Project Presentations.
Adaptive Integrated Microsystems Introduction ECE 418 Algorithms of Circuit Design (Fall 2005)
Object Detection Procedure CAMERA SOFTWARE LABVIEW IMAGE PROCESSING ALGORITHMS MOTOR CONTROLLERS TCP/IP
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Leonardo da Vinci Project BLENDED LEARNING TRANSFER Rationalising, Learning and Transferring the use of technological platforms to enterprise-based learning.
By Drudeisha Madhub Data Protection Commissioner Date:
Mobile Learning. Local History Scavenger Hunt What technology is needed? Cell Phone with capability to take pictures and send a text message. Computer.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
INTERPOL For official use only. Facial Recogniton Project Campbell McGhee.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Digital Crime Scene Investigative Process
RESTRAIL Final Conference Lessons Learned from WP4 – Mitigation of Consequences Gilad Rafaeli, MTRS3,
Ch. 12: The Forensics Laboratory
Chapter 16 Tool Marks By the end of this chapter you will be able to:
JARAP Cybercrime D/Inspector Phil Tebbs – Cybercrime Implementation Lead.
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
Crime Scene Investigator Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
Forensic Science: Fundamentals & Investigations, Chapter 16 1 Chapter 16 Tool Marks By the end of this chapter you will be able to: o Describe the three.
Ali Alhamdan, PhD National Information Center Ministry of Interior
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Computer Basics SystemsViruses Alternative Input Speech.
1 Machine Vision. 2 VISION the most powerful sense.
Chapter 2 Crime Scene.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
National blended learning programmes How QA & Evaluation strategies help to improve performance – demonstrably! Jean Garrod Centrex.
Enhancement of forensic abilities: Topics: * Forensic crime scene investigation: Training & Equipment * Forensic laboratories: Experts ’ training & Instrumentation.
Unit 19 Computer Music Systems 1 Examine the hardware options available for the composition and production of music using computer technology assess the.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
Ch. 12: The Forensics Laboratory. I. Forensics Lab A.Must be accredited and are monitored to keep this accreditation B.Quality assurance program 1. Necessary.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification Irene Amerini, Roberto Caldelli, Vito.
Digital Evidence Acquisition Using Cyberforensics Tools Oral Paper Presentation Graduate Student Research Development Day Virtual Conference October 25,
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Unit 3: Impression Evidence tool marks
GIS Mapping for K-12 Students
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Chapter 16 Tool Marks By the end of this chapter you will be able to:
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
Image Recognition. Contents: Motivation Objective Definition Introduction Preprocessing / Edge Detection Neural Networks in Image Recognition Practical.
Presentation by: Vincent Bivona
The bid partners Leeds Beckett University West Yorkshire Police
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Customer-centric and Real-time Parking Recommendation
Pearson Lanka (Pvt) Ltd.
Using Tensorflow to Detect Objects in an Image
Historic Document Image De-Noising using Principal Component Analysis (PCA) and Local Pixel Grouping (LPG) Han-Yang Tang1, Azah Kamilah Muda1, Yun-Huoy.
Learning to See in the Dark
Fast Camera: Process Data on the Fly
Chapter 16 Tool Marks By the end of this chapter you will be able to:
How the Biometrics Works
TOOL MARKS.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Dental and Tool Mark Impressions Notes
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Ch 14 Fingerprints part 2.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Personal issue Body Worn Cameras on the Isle of White
The Acquisition Process Presented by: Stacy Haynes
Chapter 16 Tool Marks By the end of this chapter you will be able to:
15-5 Automated Fingerprint Identification System
Presentation transcript:

Structure Starting with a needs assessment Research training Research workstream project selection Nine workstreams Automated forensic analysis Image linkage for victim identification and framework for image fingerprint management Automated grooming detection Frontline officer awareness development and decision support mobile app Assessment of methods of cyber training Framework for seizure, preservation and preservation of cloud evidence An evaluation of the role of the Digital Media Investigator within WYP Characteristics of victims of cybercrime Broadcast media artefacts

Linking images to source camera devices

Motivation Often images and camera devices are part of the digital evidence that is seized Digital images are used in the commission of crime; for example, Child Sexual Exploitation Forces would benefit from a method to link digital pictures to the source camera devices Image: http://smartphones.reviewed.com

Image Acquisition Process

Sensor Noise as Digital Fingerprint Sensor Pattern Noise (SPN) Natural imperfections in the silicon chip and different sensitivity of pixels to light SPN created by one sensor is different to other imaging sensors Can differentiate between sensors from same model Image: By Filya1, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=6304562

Our results SPN algorithm improvements A less lossy algorithm, that was shown to improve accuracy of results Evaluated against state-of-the-art SPN, using image datasets Development into a software tool available to forces Operating procedures and user guide Installed and evaluated in WYP Digital Forensics Unit (DFU) 18 Canon digital cameras with 5 pictures each Followed procedures to match images to devices Police user feedback

Request permission from superior Device Fingerprint Creation Process Flow No Device Imaged? Get device Imaged Yes No Internal Yes Request permission from superior Memory card slot present? No memory End full? Yes No Yes Yes Memory card present? Remove original memory card No Insert compatible memory card

Conclusion New algorithm and software outputs, along with supporting procedures Capability to help identify victims of CSE, and links new cases to historical cases based on images matches to previously seized devices Future work: improve scale, and capabilities to match troves of images to each other