1 / 31

Cyber Crime & Investigation

Cyber Crime & Investigation. Presented by: Arnel C. Reyes IT Security Consultant. Fast Growth of Cyber Crime. Converged Telecom and Information Technologies Frequent Transnational Communication Highly Organized and Globalized Management of Crime Rings

elana
Download Presentation

Cyber Crime & Investigation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant

  2. Fast Growth of Cyber Crime Converged Telecom and Information Technologies Frequent Transnational Communication Highly Organized and Globalized Management of Crime Rings Ineffective Investigation with Joint Effort of Multi-countries

  3. Globalized Cyber Crime Where is the swindler? Cloud Computing = Network Computing Through Internet, computers can cooperate with each other, or services are available more far-reaching...

  4. Globalized Cyber Crime Source: http://www.darkgovernment.com/news/fbi-warning-cyber-threat-bigger-than-ever

  5. Common Cyber Crime Features Internet as primary criminal tools, places, or targets New Converged ICT Technologies High technical skill at all online and network services Predict and profile the characteristics of unknown criminal subjects or offenders

  6. Investigation on Criminals e-Positioning Tracking Monitoring Lawful Intercept Victim & Witness Interview Interrogation Database Lookup Warrant & Confiscation Traditional investigation on criminals is commonly applied in cyber crime events quite often.

  7. Difficulties of Investigation How to Identify Criminal Hard to Conduct Analysis of Large Volume of Data Hard to Track Transnational Communication Hard to Maintain Integrity of Data Hard to Locate Network Route Hard to Identify Anonymity or Dummy Account

  8. Different Investigation Processes

  9. Process Flow for Cyber Investigation Follow-up investigation on related targets & evidence and hunting for clues from other members to combat all gangsters Clues, informer, case claim, daily crime information collection and integration, sourcing Study primary data, cross check databases in Police Department, Google on Internet and confirm crime type in order to prepare investigation Arrest all suspects, confiscate all evidences, check all computers, telephone record, booking record etc... Phone record, lawful intercept, tracking, location positioning, knowledge of crime organization and members

  10. e-Detective Tactical Server Best Tactical Solution for: Network Protocol Decoding and Content Reconstruction Auditing and Record Keeping with ISO 27001, SOX, HIPPA etc… Internet Surveillance/Monitoring & Network Behavior Recording Forensics Analysis and Cyber Investigation Internet Surveillance and Forensics Analysis System

  11. Lawful Interception Solution

  12. Corporate Interception Solution

  13. INTERNET HTTPS/SSL Interception Solution Web/Mail Server HTTPS/SSL 2 Gateway Router HTTPS MITM (ED2S) L3 Core Switch (Re-routing Function) Targeted Users HTTPS traffic needs to be routed or redirected to this MITM system. 1 Target Users

  14. e-Detective is Easy to Operate Just use IE Browser login system from local or remote Uses https protocol for security protection Multi password, user’s name and User’s Group for system login control

  15. e-Detective: Homepage

  16. e-Detective: Email – POP3/SMTP/IMAP

  17. e-Detective: Web Mail (Read)

  18. e-Detective: Web Mail (Sent)

  19. e-Detective: IM/Chat - Yahoo

  20. e-Detective: File Transfer - FTP

  21. e-Detective: File Transfer – P2P

  22. e-Detective: HTTP – Link/Content

  23. e-Detective: HTTP Upload/Download

  24. e-Detective: HTTP Video Stream

  25. e-Detective: Search – Condition/Parameter

  26. e-Detective: Search – Association/Relation

  27. e-Detective: Backup Storage External Storage (SAN/NAS/CD/DVD) for preserving digital assets & for future recovery of DATA (Backup CD Reader SW is provided)

  28. Who Needs e-Detective? Types Of Companies Need E-Detective Aside from Government Companies that install E-Detective as a Deterrent, will inform their staffs that Internet activities are being fully monitored. Financial, Banking and Investment Companies such as derivatives, futures, etc. All transactions to be monitored. Companies like marketing, design house, high technologies, which critically need to prevent leakage of data. Staffs communicate with customers or vendors through web-based system need E-Detective to archive data.

  29. Crackdown on Fraud Rings Europe US China Taiwan Vietnam Philippines Thailand Malaysia Indonesia Africa

  30. Network Forensics and Lawful Interception E-Detective Wireless-Detective E-Detective Decoding Centre Enterprise Data Guard System E-Detective LEMF Centralized Management System Data Retention Management System HTTPS/SSL Interceptor VoIP Detective FIT (Forensics Investigation Toolkit) NIT (Network Investigation Toolkit) Network Packet Forensic Analysis Training National Security Surveillance Training Cyber Crime Investigation Training DECISION GROUP INC.

  31. Thank you!!! I hope you find it informative… Email Me @ a.reyes@tasaheelglobal.com Visit our website @ www.tasaheelglobal.com

More Related