Prescription for Criminal Justice Forensics. The government has all but declared a national state of emergency regarding computer-related crimes and has.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Cyber Crime and Technology
OC RIMS Cyber Safety & Security Incident Response.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Security Classification Practical Issues in dealing with different types of cybercrime.
Study Guide.  A. sturdy  B. light weight  C. recognizable  D. similar color.
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Group 7 Exploring Privacy through policies, laws and human rights down to the bits Daniel Beach Alex Cruz Rahmatullah Ismail Conrad Skye Sandoval David.
Computer Forensics BACS 371
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
An electronic machine that bank customers and credit union members can use to withdraw cash and make other financial transactions.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Combating cyber-crime: the context Justice Canada March 2005.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Federal Bureau of Investigation
Bank On It 1. 2 Purpose Bank On It : Is an overview of banking services. Will help you build a positive relationship with banks, thrifts, and credit unions.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Possible application with SMS. Banks Inform the customer whether their order (stock or currencies) is successful – E.g. Buy AUS$25000 at the exchange.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
Types of Investment Risk Personal Finance. Rate of Return People save and invest their money to receive a return on that saving or investment Investment.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Cyber Security Nevada Businesses Overview June, 2014.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
CHAPTER 9 CREDIT PROBLEMS AND LAWS LESSON 9-1: RESOLVING CREDIT PROBLEMS Learning Goals -Explain how to dispute errors on billing statements and list ways.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Webmail security.. Webmail security should be of interest to you, because using web based programs like: Gmail, Hotmail, Yahoo, MSN, Rocket, basically.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Information Warfare Playgrounds to Battlegrounds.
Financial Institution Frenzy G1 © Family Economics & Financial Education – April 2006 – Get Ready To Take Charge of Your Finances – Financial Institution.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
Home Business Shopping Online – Purchasing goods and services using the Internet.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Chapter 9 Objectives 1.Explain how to dispute errors on billing statements 2. Explain the purposes and types of bankruptcy and list strategies for avoiding.
Cyber Security Zafar Sadik
A Project on CYBER SECURITY
PART III Ethical Issues in Business
Cybersecurity – Three Perspectives
Depository Institution Discovery
U.S. Department of Justice
Ethical Use of Computers
Private Investigations vs. Public Investigations
Business Compromise and Cyber Threat
A Successful Business In Other Words A Profitable Business... MEGHA OFFER!!!!ONE TIME CAMPAIGN FREE
Presentation transcript:

Prescription for Criminal Justice Forensics

The government has all but declared a national state of emergency regarding computer-related crimes and has effectively declared war on the perpetrators of such crimes. But what does the government’s new- found zeal in this area portend for the right to privacy?

To what extent is the government using traditional law enforcement tools in ways that push the boundaries of the long-accepted contours of the Fourth Amendment?

To what extent is the government deploying new technologies and techniques to investigate computer-related crimes (and even non-computer crimes) in ways that place Fourth Amendment protections under threat?

This panel will explore the ways in which the government’s efforts to bring the fight to cyber and other criminals may bring the government into homes, offices, and other private spaces in ways never before envisioned. It will further explore whether Fourth Amendment law as we know it is up to fending off this looming threat.

Discussion of overarching legal issues. United States v. Jones. If central tenets of the "mosaic theory" of privacy (e.g, focusing more on the aggregation and use of personal data vs. collection methods) are adopted by courts, how will that practically impact government investigations and criminal litigation (and discovery)?

Privacy construct: There are 3 actors that can negatively impact privacy: governments, hackers or corporations. Who is most likely to be overzealous?

Hypothetical: Vulnerable Bank receives a call from a customer complaining that $1000 was improperly debited from his account. Vulnerable investigates and determines that a counterfeit cash card was used to deduct the funds.

Vulnerable decides to report the incident to the U.S. Attorney’s Office.

It turns out the same counterfeit debit card was used at an internet café an hour after the withdrawal to pay for wi-fi service, and the user logged into the wi-fi service with a Gmail address.

The in the Gmail account is stored by Google.

In reviewing opened s from the Gmail account, the government comes across s discussing rapid buying and selling activity in the stock of two companies -- Pumper Company and Dumper Company. According to a multi- agency law enforcement database [internal note: this is a hypothetical after all.... ;) ], KS, a broker dealer, has informed the SEC and the FBI that KS’s clients reported account intrusions. Additional broker dealers reported similar activity. In the compromised customer accounts, the existing shares of Pumper Company and Dumper Company were liquidated and the funds were used to purchase shares in the same stocks that were the subject of the stock manipulation. The FBI was also contacted by Spamhaus, a spam monitoring organization. Spamhaus revealed that the same stock was promoted by a concerted spam campaign perpetrated through a botnet.

To confirm the stock purchases from the compromised accounts, the perpetrators made calls to the broker dealers from cellular telephones. The broker dealers have phone and IP logs for the compromised accounts.

The SEC identified accounts that appears to profit from the stock manipulation and the FBI has IP addresses and addresses associated with those accounts. The FBI now wants to locate the person that hacked into the brokerage account. A “who is” lookup reveals that the IP address may have come from a proxy server.

International Issues: The investigation has led overseas. The account user is not a U.S. citizen and lives in Ukraine.

Other Issues National Security Matters: What about National Security Letters (NSLs)? Currency issues related to cybercrime? Privacy: Amount of Data The Future of Privacy