We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySamira Colbourne
Modified about 1 year ago
BOTNETs and the Criminal Underground Presented by: Lee Shields Cyber Crime Intel Team National Intelligence Coordination Centre 1
2 What is a BOTNET?
BOTNET Operators Hacktivists Hacker (the kid next door?!) Organized Crime Groups 3
4 Underground Services
Cyber Crime Skills Computer / Device Forensics COMPFOR, A+ Encase, FTK Network Forensics Protocols Devices Tools / Methodologies Cloud Computing 5
Cyber Crime Skills (Cont’d) Specialized Data Acquisition Volatile Data (RAM) Log files VM’s, Mobile Devices, ICS Specialized Data Analysis RAM Dynamic / Static Malware Analysis Timeline Data Correlation and Visualization 6
Questions? Contact Info: RCMP Detachments: 7
Using Intelligence led policing as a model to Prioritize Organized Crime Investigations – A Canadian Perspective.
Successful RCMP Strategies to Combat Human Trafficking.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
OC RIMS Cyber Safety & Security Incident Response.
Senigallia, June 2007 Microelectronics Research Group Università Politecnica delle Marche, Ancona Wireless Sensor Networks for Civil Protection.
IGF Hyderabad 2008 Dimensions of Cyber Security & Cyber Crime Michael Lewis, Carnegie Mellon University & Deputy Director, Q-CERT.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Adapting Incident Response to Meet the Threat Jeff Schilling Director, Global Incident Response and Digital Forensics SecureWorks.
Incident Response Incident Response Process Forensics.
Innovation Change Transformation Enterprise Security Office Enterprise Security: Planning Today for Tomorrows Unknown Threats.
Anti Anti-Forensics: Correlation Tony Rodrigues, CISSP, CFCP inv.forense (at) gmail (dot) com.
COMMITTEE ON HEMISPHERIC SECURITY- Special Security Concerns of small island States of the Caribbean Presented by Kerry-Ann Barrett Ministry of National.
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
C2SM, TD, TAJune 18, 2009 CBRN Crime Scene Modeler (C2SM) TD ( ) TA (2009 – 10)
Common Career and Technical Core Initiative Sandra Porter, Associate Director Lesia Edwards, Program Advisor Edit by Tim Johnston, Program Advisor Arkansas.
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Watching the Detectives Forensic Information in Digital Objects (FIDO)
Multinational police cooperation Personal experiences Patrick Stevens Liaison officer to the USA, Canada, Mexico and the Bahamas.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Planning, Deploying and Managing a Microsoft VDI Infrastructure Level Advanced.
Lessons Learned in OSI EuroIntel 99 F By: Lori Schnittker F The Hague,
E. Gelbstein A. Kamal Information Insecurity Part I: The Problem Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 1 of 49 Information.
Cyber crime issues – current state of cyber security readiness and cyber crime enforcement capability Viet Nam Hitech Crime Investigation Department Dr.
CEBS Workshop in Roma New FINREP taxonomy : Proof of concept Antoine Bourdais - INVOKE.
Addressing the threat of cybercrime Agenda Policy, Strategy, Plans and Programs Cybersecurity Organizations Issues and Concerns.
The Great Data Robbery Cyber theft and the risks to your organization February 11, :45AM – 11:30AM.
Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
Forum on Next Generation Network Standardization Colombo, Sri Lanka, 7-10 April 2009 Forum on Next Generation Network Standardization Colombo, Sri Lanka,
2 What? What do we want to happen? What is our #1 goal? Strengthen & Support all 4 TX Self-Advocacy Organizations How? What needs to happen? Next steps:
Whos the Architect? Credential Provisioning Network Access Directory Services Authentication, Authorization and Accounting Federation Single.
© 2016 SlidePlayer.com Inc. All rights reserved.