Wrap-up and conclussions Guillermo Jorge

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Complex Recovery/ Data Reduction DFRWS Technical Issues Lots of info to be recovered in in deleted file space Partial data recovery: does this give.
The ePSIplus Draft Pricing Questionnaire Athens, Greece, 21 November 2008 funded by eContentPlus.
Overview of OTP Records Independent Panel of Experts Briefing Notes Friday 5 October 2007 Ayodeji Fadugba Chief, Information and Evidence Support Section.
Compliance, eDiscovery, Continuity and Migration made easy with SaaS Archiving Warren Roy, President & CEO, Global Relay.
Visa Personal Payments Visa Personal Payments: Overview 0 What is it? A “transaction railroad” that supports delivery of funds to a Visa account issued.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Evidence Collection & Admissibility Computer Forensics BACS 371.
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
Challenges facing law enforcement agencies in the fight against cybercrime.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Knowledge Management and Intelligence Analysis Tools Innovations in Justice: Information Sharing Strategies and Best Practices June 2007 Kristie L. Manzi.
FORENSIC ACCOUNTING - BA124 - Fall 2009Slide 6-1 Today’s Topics n Inductive Fraud Detection n Financial Statement Analysis and Detection n High Technology.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
June 2003 © S.Hashem Empowering E-Business in Egypt: Facing the Challenges! Dr. Sherif Hashem Director, Information Society Development Office Ministry.
Mobile Device Forensics Rick Ayers. Disclaimer  Certain commercial entities, equipment, or materials may be identified in this presentation in order.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Guide to Computer Forensics and Investigations, Second Edition
Taylor Trayner. Definition  Set of business processes developed in an organization to create, store, transfer, and apply knowledge  Knowledge is a firm.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Map Utilities Computers can allow students to create and use maps in creative ways. This technology grabs the student attention and they want to learn.
Expert area in the Participant Portal
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Computer Forensics Principles and Practices
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
DIGITAL FORENSICS Forensic Toolkit: a tool to process born digital records Emma Jolley Curator of Digital Archives.
Corporate Information Reconnaissance Cell (CIRC).
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
MLA FOR ASSET TRACING & RECOVERY INVESTIGATIONS: INTELLIGENCE & EVIDENCE.
1 The Examiner’s Role in Developing the Fair Lending Case Debra Pearlman, FLEX JoAnna Gekas, Counsel.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Chapter 1 An Introduction to Information Systems
Postgraduate Course LAW AND NEW TECHNOLOGIES Facultad de Derecho Universidad de Valladolid España.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
How To, When To and What To Do in Conducting an Investigation July 10, 2013 Chris M. Wright.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Mastering Windows Network Forensics and Investigation Chapter 17: The Challenges of Cloud Computing and Virtualization.
Privacy and Data Mining What Do “They” Know About You?
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
CIT 180 Security Fundamentals Computer Forensics.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Place image here INFORMATION MANAGEMENT Cloud Computing and Enterprise Information Management March 2010 Jim Cuff VP Strategy, Iron Mountain Digital.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
Definition, purposes/functions, elements of IR systems Lesson 1.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
PhD Oral Exam Presentation
Planning Business Messages
‘Make in India’ series Emerging Trends - International Arbitration: (i) E- discovery (ii) Hot tubbing.
Digital Forensics Dr. Bhavani Thuraisingham
Published Date: 24 February, 2016
Track and measure Social Media and Darknet through
National Academy of Public Administration Fall Meeting
Network monitoring service pricing. Table Of Contents 1.Company Overview 2.Network monitoring service pricing 3.Certifications.
Advanced Embodiment Design 26 March 2015
Business and Technology
Forensics Week 6.
Privacy and Data Mining
Privacy and Data Mining
Hashing files Searching files for keywords
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
How Is Digital Transformation Accelerating The Banking Industry?
Presentation transcript:

Wrap-up and conclussions Guillermo Jorge

Overview General issues Tools and investigation techniques Legal challenges

General issues 1. Two different areas of work Financial intelligence: Digical evidence & Digital forensics 2. Dealing with “volatile data” Gathering (including recovery of deleted data ) Storage, preservation and transforming it into valid evidence – Common law (discovery rules) and civil law Analysis Presenting (visualization tools) 3.Protecting the invesstigation Compromising issues 4.Coordination issues Local International

Investigative tools and techniques Financial investigations – Information analysis – Informal (FIU) and formal (MLA ) international requests Internet research – Social networks – – Audio and video, photos New payment methods – Mobile payment services – Prepaid and valued cards – Internet payment / Bitcoins

Information analysis Software solutions for analyzing massive amounts of data or specific data – HK software transforming bank records into soft excel sheets – Malaysian databases and case management tools – FinCen search engines – Commercial providers like I2 or Palantir performing “link analysis”

Legal challenges – Jurisdictional challenges – Privacy and data protection – MLA challenges – Evidentiary rules: common law & civil law Role of expert witnesses Discovery rules Exclusionary rules Circumstantial evidence

cuperacion_%20de%20Activos.p df ar/sites/star/files/asset_reco very_handbook_0.pdf /fileadmin/docs/publications/boo ks/asset-tracing_web-version.pdf Free handbooks available online

Work plan Questionnaire 1: financial intelligence – July 2013 Questionnaire 2: digital evidence – September Draft of the Handbook – November 2013

Congratulations! Guillermo Jorge