Digital Forensics - challenges and opportunities Marc Kirby Cranfield University.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Campbell County Middle School
Securing NPI Mary Schuster Mike Murphy.  Gramm-Leach-Bliley Act Enacted to control the ways that financial institutions deal with the private information.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Breaking Trust On The Internet
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security & Encryption Thomas Fenske & Joseph Minter.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Developing a Records & Information Retention & Disposition Program:
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Induction in IT Services for New Students IT Services Training Team.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
1 CADE Finance and HR Reports Administrative Staff Leadership Conference Presenter: Mary Jo Kuffner, Assistant Director Administration.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Item Web 2.0 application relevant to teacher’s work.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Saul Stevens I.T. Director- Family Mosaic Digital by Default !
????. What is a QR code? It’s a type of barcode invented by the Japanese motor industry to keep track of spare parts.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
ICT in Banking.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
CYBER CRIME.
Computer Forensics Principles and Practices
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Information Security Training for People who Supervise Computer Users.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
CITU e-government A Corporate IT Strategy for Government Sue Broyd Central IT Unit Cabinet Office MAY 2000.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Cybersecurity Test Review Introduction to Digital Technology.
Using Google Apps at Coonabarabran High 2013 An introduction to new DEC- approved tools for staff and students.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Case Brief Gregory Morton William Campbell Dave Wildner.
2015Computer Services – Information Security| Information Security Training Budget Officers.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Done by… Hanoof Al-Khaldi Information Assurance
Protection of CONSUMER information
Computer Forensics 1 1.
Lecture 14: Business Information Systems - ICT Security
Chapter 1: Applying Computer Basics – Lesson 1
Starter What is identity theft?
Red Flags Rule An Introduction County College of Morris
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Understanding the Internet
Safe and secure? Protecting yourself, your equipment and your wallet in today’s digital universe.
Communicating in the IT Industry
West Midlands Police response to Cybercrime:
Presentation transcript:

Digital Forensics - challenges and opportunities Marc Kirby Cranfield University

Health Warning Based on my experiences as a manager and practitioner since 2000 They are only my views, there are others Debatable… Which is the purpose of this session… “To get us thinking about the future and allow us to chart a course for the next few years” Fail to plan… plan to fail PPPPPP (Six Ps) or is it seven?

Digital Forensics - The challenges and opportunities

Practical Challenges (today!) Challenges Data quantity Data Preservation Connectivity Interconnectivity Data storage Disclosure to Courts / 3 rd parties Multiplicity of devices Encryption Steganography Field investigations (Internet Cafes) Covert Capabilities Blue sky / keeping up to date Operating Systems Vista

Management /Strategic Challenge Costs Budgets Staff retention Bringing big business on board ISP Liaison Disclosure to Courts / 3 rd parties Laws relating to computer crimes Terrorism / Organised Crime Rules of evidence Covert Capabilities Funding appropriate research Staff Recruitment Training pathways Official standards Vendor Liaison Are staff experts in everything?

Opportunities Loads Maybe Not at all

Opportunities……. It’s not all bad! Encryption Interconnectivity Vista Connectivity Data quantity Covert Ops The digital age is here and everyone is a part of it Sat Nav and the like

A Case in point Younis Tsouli described himself online as Terrorist 007 One of the most notorious cyber- jihadists in the world. He built websites and ran web forums for al-Qaeda and soon he became the main distributor of video material from in Iraq. He looked for home movies from US soldiers that would show the inside of US bases in Iraq, so they (al-Qaeda) could do a better job at launching attacks into those bases

Part of a PowerPoint presentation on how to make a car bomb found on Tsouli's laptop Example

"What it did show us was the extent to which they could conduct operational planning on the internet. It was the first virtual conspiracy to murder that we had seen," …… Peter Clarke of Scotland Yard. Lesson Organised Crime On the hard drives of two associates were 37,000 credit card details, including security codes. Used to fund web hosting and other disbursements

Proved through Digital forensic investigation of ……. Hard Drives USB memory CD/DVD Internet Café Mob Phones Documents Metadata Pictures Video IP records etc. etc.etc.

Challenge = Opportunity What some fear as our greatest challenges have turned into our greatest opportunities. Digital traces were left everywhere. Operating systems such as Vista are actually our best friends. It is really hard to destroy or hide data. Digital devices all connect much more easily than even seven years ago. USB / WiFi / Internet / Bluetooth.

Electronic Devices

Electronic Device

Case Study

Case Study Op Euphroe Background Financial sector of UK notices abnormal levels of PHISHING Mules recruited via web sites to work as agents for a “new Russian company”. Believed legitimate employment Credit Card &other data obtained from unsuspecting public Used to clone cards / create false identities Cash or goods

Documents & Equipment  Create multiple identities such as US and UK Driving Licences.  MSR 2000 Card readers/encoders.  Fargo Printer to print Credit Cards and encode magnetic data.  Money Counting machine.

Thanks For your time and patience Marc Kirby Senior Lecturer in Forensic Computing