+ All Categories
Home > Documents > Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Date post: 11-Jan-2016
Category:
Upload: dulcie-audrey-french
View: 215 times
Download: 0 times
Share this document with a friend
Popular Tags:
31
Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant
Transcript
Page 1: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Cyber Crime & Investigation

Presented by:Arnel C. Reyes

IT Security Consultant

Page 2: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Fast Growth of Cyber Crime

Converged Telecom and Information TechnologiesFrequent Transnational CommunicationHighly Organized and Globalized Management of Crime RingsIneffective Investigation with Joint Effort of Multi-countries

Page 3: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Globalized Cyber Crime

Where is the swindler?

Cloud Computing = Network ComputingThrough Internet, computers can cooperate with each other, or services are available more far-reaching...

Page 4: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Globalized Cyber Crime

Source: http://www.darkgovernment.com/news/fbi-warning-cyber-threat-bigger-than-ever

Page 5: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Common Cyber Crime Features

Criminals

Internet

Technical Skills

Criminal Model

Emerging ICT Technologies

Internet as primary criminal tools, places, or targets

High technical skill at all online and network services

Predict and profile the characteristics of unknown criminal subjects or offenders

New Converged ICT Technologies

Page 6: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Investigation on Criminals

e-Positioning Tracking

Monitoring Lawful Intercept

Victim & Witness Interview Interrogation

Database Lookup Warrant & Confiscation

Traditional investigation on criminals is commonly applied in cyber crime events quite often.

Page 7: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

How to Identify Criminal Hard to Conduct Analysis of Large Volume of Data

Hard to Track Transnational Communication

Hard to Maintain Integrity of Data

Difficulties of Investigation

Hard to Locate Network Route Hard to Identify Anonymity or Dummy Account

Page 8: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Different Investigation Processes

Page 9: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Process Flow for Cyber Investigation

Primary Data Sourcing

Primary Data Study &

Deeper Source Collection

Further Investigation

Suspects Arrest & Evidence Collection

Follow-up

Clues, informer, case claim, daily crime information collection and integration, sourcing

Study primary data, cross check databases in Police Department, Google on Internet and confirm crime type in order to prepare investigation

Phone record, lawful intercept, tracking, location positioning, knowledge of crime organization and members

Arrest all suspects, confiscate all evidences, check all computers, telephone record, booking record etc...

Follow-up investigation on related targets & evidence and hunting for clues from other members to combat all gangsters

Page 10: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective Tactical ServerBest Tactical Solution for:

Network Protocol Decoding and Content ReconstructionAuditing and Record Keeping with ISO 27001, SOX, HIPPA etc…Internet Surveillance/Monitoring & Network Behavior RecordingForensics Analysis and Cyber Investigation

Internet Surveillance and Forensics Analysis System

Page 11: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Lawful Interception Solution

Page 12: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Corporate Interception Solution

Page 13: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

INTERNET

HTTPS MITM(ED2S)

Targeted Users HTTPS traffic needs tobe routed or redirected to this

MITM system.

GatewayRouter

L3 Core Switch

(Re-routing Function)

Web/Mail ServerHTTPS/SSL

1

2

Target Users

HTTPS/SSL Interception Solution

Page 14: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective is Easy to Operate

1. Just use IE Browser login system from local or remote2. Uses https protocol for security protection3. Multi password, user’s name and User’s Group for

system login control

Page 15: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: Homepage

Page 16: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: Email – POP3/SMTP/IMAP

Page 17: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: Web Mail (Read)

Page 18: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: Web Mail (Sent)

Page 19: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: IM/Chat - Yahoo

Page 20: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: File Transfer - FTP

Page 21: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: File Transfer – P2P

Page 22: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: HTTP – Link/Content

Page 23: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: HTTP Upload/Download

Page 24: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: HTTP Video Stream

Page 25: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: Search – Condition/Parameter

Page 26: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

e-Detective: Search – Association/Relation

Page 27: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

External Storage (SAN/NAS/CD/DVD)for preserving digital assets &

for future recovery of DATA(Backup CD Reader SW is provided)

e-Detective: Backup Storage

Page 28: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Types Of Companies Need E-Detective Aside from Government

Companies that install E-Detective as a Deterrent, will inform their staffs that Internet activities are being fully monitored.

Financial, Banking and Investment Companies such as derivatives, futures, etc. All transactions to be monitored.

Companies like marketing, design house, high technologies, which critically need to prevent leakage of data. Staffs communicate with customers or vendors through web-based system need E-Detective to archive data.

Who Needs e-Detective?

Page 29: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Crackdown on Fraud Rings

Thailand

China

IndonesiaMalaysia

Philippines

Taiwan

Europe

Vietnam

US

Africa

Page 30: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

DECISION GROUP INC.

E-DetectiveWireless-Detective

E-Detective Decoding Centre

Data Retention Management System

NIT (Network Investigation Toolkit)Network Packet Forensic Analysis Training

FIT (Forensics Investigation Toolkit)VoIP DetectiveHTTPS/SSL Interceptor

E-Detective LEMFCentralized Management System

Enterprise Data Guard System

National Security Surveillance TrainingCyber Crime Investigation Training

Network Forensics and Lawful Interception

Page 31: Cyber Crime & Investigation Presented by: Arnel C. Reyes IT Security Consultant.

Thank you!!!

I hope you find it informative…

Email Me @[email protected]

Visit our website @www.tasaheelglobal.com


Recommended