Computer Forensics Dilian Kovatchev & Daniel Leitch.

Slides:



Advertisements
Similar presentations
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Advertisements

Financial Institution Frenzy G1 © Family Economics & Financial Education – April 2006 – Get Ready To Take Charge of Your Finances – Financial Institution.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Neuromuscular Engineering 1 Neuromuscular Engineering & Technology Fraud Detection & Identification System (FDIS)
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Crime Scene Investigation
RESEARCH STUDY FOR THE RELIABILITY OF THE ACE-V PROCESS:
Fingerprinting Continued...
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Small Claims Court Small Claims Court handles disputes involving no more than $8000 Suit must be for money only Plaintiff must be at least 18, or have.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
An Introduction to Forensic Science. Forensic science is the study and application of science to matters of law. You can use the terms forensic science.
2015 ANNUAL TRAINING By: Denise Goff
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Lesson 4-3 Personal Financial Planning Learning Goals: - Explain the purpose and steps of financial planning. - List reliable sources of financial advice.
©2010 Destina Games, Inc. Financial Literacy Jeopardy $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100.
Introduction to ForensicsSection 1 Section 1: Introduction to Forensic Science Preview Bellringer Key Ideas What Is Forensic Science? Tools of Forensic.
Jeopardy Depository Institutions Smart Goals Identity Theft Basics of Taxes Savings Tools Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400.
Evidence Collection 3 rd Grade Workshop. When a crime has been committed, a team of policemen usually called investigators are sent to the scene of the.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
 Services of the Crime Laboratory- ◦ Many local crime laboratories have been created solely for the purpose of processing evidence. Currently most of.
Advances since Watson & Crick
Dimensions of E – Commerce Security
Identity Fraud By: Owen DeBalko. Explanation Identity fraud means the fraudulent use of an individual's identifying information to commit crimes, unlawfully.
Unit 1: Law, Justice, and You
Bank Secrecy Act. Many Laws Make Up “BSA” Bank Secrecy Act Money Laundering Control Act Currency and Foreign Transactions Reporting USA PATRIOT Act.
CAREER PROJECT ON BALLISTIC EXPERTS By: Jameson Hale and Garrett Liming.
MLA FOR ASSET TRACING & RECOVERY INVESTIGATIONS: INTELLIGENCE & EVIDENCE.
Crime Scene Investigator Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
PACER is the system for searching and accessing federal court records.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
BILL OF RIGHTS VOCABULARY. VOCAB Due Process “Principle that the government must act fairly and obey the rules of law.” Search Warrant “A warrant authorizing.
“Scenario One & Two” STRs working Committee DAB, Training Center
Copyright © 2007 Pearson Education, Inc. publishing as Benjamin Cummings PowerPoint® Lectures Lectures by Greg Podgorski, Utah State University CSI: Reality.
11 CHANGES IN ARREST POWERS IN HB NOTE: Officers should have a copy of DOCJT handout entitled: “House Bill 463 Training Letter” “House Bill 463.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Cybercrime What is it, what does it cost, & how is it regulated?
© 2013 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
Protecting Yourself from Fraud including Identity Theft Personal Finance.
All rights Reserved Cengage/NGL/South-Western © 2016.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
The Crime of Lawyer Theft Timothy J. O’Sullivan, Esq. Executive Director NYS Lawyers’ Fund for Client Protection.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
200 S. Biscayne Blvd. Suite # 3150 Miami, FL US Phone: (305) Website: Most Effective Lawyers in the Complex/Business.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
ADE’S GRANTS MANAGEMENT ENTERPRISE (GME) SYSTEM Home-grown: Went on-line in 1998 Used for most of ADE’s federal and state assistance grants In its day,
John Robinson Identity Management: Do You Know Who You Are Doing Business With?
BY: NASUMBA KIZITO KWATUKHA
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Advances since Watson & Crick chemheritage
Introduction to Forensics
BSC Biometric Security System
An Introduction to Forensic Science and Professions
Asset Forfeiture Law, LLC
BSC Biometric Security System
Making a Match.
Karrie L. Casada University of California, Irvine
Forensic Accounting Chapter 16
Presentation transcript:

Computer Forensics Dilian Kovatchev & Daniel Leitch

Daily importance Computer forensics are an important part of legal proceedings because they help document, process, and interpret evidence, so that it may be validly used in a court trial. Computer forensics are mainly used to protect the civil liberties of citizens, but they are also important in the analysis of various data and also for the cross-referencing of different items or substances.

Major examples Identity theft- Joseph Kidd, an ex-con, posed as a certain Larry Smith from Florida since 1993, but the real Larry found out that he had been using his identity as a means of living life. So, the authorities used computer forensics to track the medicare bills of Kidd and to what address they were being sent, until they finally caught him red handed using Smith’s identity.

Major example Governmental/ Monetary fraud- Bernie Madoff’s Ponzi scheme went wrong after he tried to steal billions of private and corporate money using a false investment fund for a false institution/purpose. Authorities captured him by tracing the transactions and filings in his bank account and how money was being wired into and out of it. Eventually, the money just did not add up and Madoff was caught stealing from the federal government and taxpayers.

AFIS scans/referencing A common use for computer forensics is the cross reference of samples. AFIS is the national database for fingerprints, which can be used as standard references against unknown examples. First the fingerprints must be collected using the various techniques available to forensic scientists, after which they are sent to the laboratory for analysis.

AFIS After the fingerprints are received at the laboratory, they are scanned into a powerful computer, which plugs them into the AFIS system and searches for similar prints. Once a match, or what appears to be a match, is found, the technician requests that the fingerprints are sent to him and analyzes them for similarities and differences.

Diagrams

Citations "CyberSecurity Institute: What Is Computer Forensics?." CyberSecurity Institute: World Class Computer Forensics Services and Training. tm (accessed May 31, 2011). tm "Computer Forensics World." Computer Forensics World. (accessed May 31, 2011).