Mid-term forensic challenges of E-crime mag.oec. Sasa Aksentijevic,univ.spec.oec. court expert in information and telecommunication technology.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Philippine Cybercrime Efforts
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
Security Classification Practical Issues in dealing with different types of cybercrime.
"Safe and Secure Solutions for Smarter Cities" The value of standardization and certification in planning and managing Smart Cities 12/05/2014Euralarm.
Financial Statements Audit
MINISTRY FOR INFORMATION SOCIETY AND TELECOMMINUCATIONS CIRT - Computer Incident Response Team GOVERNMENT OF MONTENEGRO MINISTRY FOR INFORMATION SOCIETY.
Christopher Cooney International Liaison Officer Scottish Crime & Drug Enforcement Agency December 2012.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Local Company Est Employees. Ex Police. Crime Prevention. CID & Drug Squad. Special Branch. Extensive Training & Experience in Preventing & Detecting.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
COMPUTER FORENSICS Aug. 11, 2000 for Cambridge, Massachusetts.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Note ̶ Taking and Reports.
Management Information Systems
NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 4 INVESTIGATION.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Information Warfare Playgrounds to Battlegrounds.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
1 REPORT WRITING Learning Domain INVESTIGATIVE REPORT Definition: Definition: Written _____________ prepared by a peace officer, in detail, of an.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
The 5 th IAACA Seminar 22 – 24 June 2013 Jinan, Shandong Province, China Chapter VI of UNCAC: Technical Assistance and Information Exchange Kevin P. Zervos,
 Internet crime is, Any crime or illegal activity committed online or through the internet.
IPTS Workshop on Cyber Crime German Developments.
Hurdles in implementation of cyber security in India.
The Development of Computer Forensic Legal System in Mainland China Yonghao Mai Digital Forensics key Laboratory, Hubei University of Police, China.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Information Warfare Playgrounds to Battlegrounds.
Quiz #2 Chapter 3 Forensic Science 9/27/14. Drill Any questions from Chapter 3? Phones in the bin & grab two folders Make sure you have Pencil/pen Calculator.
What A Forensic Scientists Does Ch 1 Notes Pages
Forensic Science T. Trimpe 2006
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
  Brand Intelligence   “We liked the existing investigative services, but we prefer having our own (intelligence) capability.” Introduction Our clients.
Computer Forensics 1 1.
INVESTIGATION PROCESS AND TECHNIQUE
Global Virtual Private Cloud Market Research Report by Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED BY.
Prepared By : Binay Tiwari
Forensics Week 2.
Challenges and Successes in the Zambian ICT Security Sector
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
Introduction to Digital Forensics
Presentation transcript:

Mid-term forensic challenges of E-crime mag.oec. Sasa Aksentijevic,univ.spec.oec. court expert in information and telecommunication technology

ICT forensics key players Police crime investigators (inspectors) Legislative branch investigators (prosecutors, attorneys) Intelligence agencies and military sector ICT court experts (expert witnesses) Private detectives and agencies Companies, NGOs (for internal or external use) FORENSIC REPORTS

ICT forensic reports – Preliminary part: introduction, expertise area, who ordered it, which documentation and evidence was used – Findings: fact gathering, interviews, forensic analysis of evidence, cooperation with police and court, usage of scientific methods, evaluation – Expert opinion: synthetic report that includes explanation of the findings, effects, consequences and importance of discovered facts PROPERTIES – Simple language, clear, logical, all-encompassing – Methods must be explained, evidence evaluated – All findings must be reproducible – expert must be able to answer to all questions from the court, involved parties and lawyers in the process – expert can be required to update the report according to additional requests

ICT forensics principles – The principle of non-tampering with evidence – The principle of identification of evidence material – The principle of usage of evidence copies – The principle of evidence interpretation – The principle of chain-of-custody of evidence – The principle of scientific method

ICT forensics challenges TECHNOLOGY

Technology is becoming more and more complex Legislative investigators and those who issue court orders do not understand issues related to technology: they expect immediate results ignoring any limitations Main constraints: time and money, if the quality of forensic reports is required to remain constant or improved It is increasingly difficult for freelance ICT forensics investigators to conduct investigation Forensic investigators should be involved immediately, not ex-post

ICT forensics is a joint endeavor of those in charge to initiate and conduct investigation, secure evidence, perform forensic analysis and produce/present results. In reality, cooperation between different involved parties is erratic and there are no clear lines between responsibilities. There is no best model (“golden standard”) to achieve results. Exact proceedings depend not only on organizational and technical factors, but also local legislation system, cultural blueprints and even maturity of executive/legislative branch. ICT forensics challenges ORGANIZATION

Field of ICT forensics is very diverse and will be constantly developing. ICT forensics challenges CURRENT FORMS OF ICT CRIME Computer crime Network targeted Computer targeted Spam Fraud Offensive content Harassment Cyber warfare Cyber terrorism Other non specific

The latest developments in the past decade include dealing with: Computer trespass (USA) Cyber bullying Cyber defamation Economic and Industrial Espionage using ICT Internet homicide Internet stalking Internet suicide Internet Wars (1st Internet war: East Timor-Indonesia; Web War One: Estonia South Ossetia-Russia Internet war, 2010 China Telekom, 2010 Stuxnet worm) Online predators Organized crime White collar crime Virtualization ICT forensics challenges NEW FORMS OF ICT CRIME

The rise of new technologies: Mass virtualization (Storage aaS, Software aaS, Platform aaS, Infrastructure aaS –Everything aaS) E-passports, biometrics and personal identity Forensics and storage of CCTV surveillance data Mass event log forensics Nomad computing (mobile phones,notebooks,netbooks,pads) forensics Technology adaptive to the legislative regulation Forensics of bio-computing and nano-computing ICT forensics challenges IMPACT OF NEW TECHNOLOGIES

Mid-term forensic challenges of E-crime (Q&A) mag.oec. Sasa Aksentijevic,univ.spec.oec. court expert in information and telecommunication technology