Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Crime & Investigation IT Security Consultant

Similar presentations


Presentation on theme: "Cyber Crime & Investigation IT Security Consultant"— Presentation transcript:

1 Cyber Crime & Investigation IT Security Consultant
Presented by: Arnel C. Reyes IT Security Consultant

2 Fast Growth of Cyber Crime
Converged Telecom and Information Technologies Frequent Transnational Communication Highly Organized and Globalized Management of Crime Rings Ineffective Investigation with Joint Effort of Multi-countries

3 Globalized Cyber Crime
Where is the swindler? Cloud Computing = Network Computing Through Internet, computers can cooperate with each other, or services are available more far-reaching...

4 Globalized Cyber Crime
Source:

5 Common Cyber Crime Features
Criminals Internet Technical Skills Criminal Model Emerging ICT Technologies Internet as primary criminal tools, places, or targets New Converged ICT Technologies High technical skill at all online and network services Predict and profile the characteristics of unknown criminal subjects or offenders

6 Investigation on Criminals
e-Positioning Tracking Monitoring Lawful Intercept Victim & Witness Interview Interrogation Database Lookup Warrant & Confiscation Traditional investigation on criminals is commonly applied in cyber crime events quite often.

7 Difficulties of Investigation
How to Identify Criminal Hard to Conduct Analysis of Large Volume of Data Hard to Track Transnational Communication Hard to Maintain Integrity of Data Hard to Locate Network Route Hard to Identify Anonymity or Dummy Account

8 Different Investigation Processes

9 Process Flow for Cyber Investigation
Follow-up investigation on related targets & evidence and hunting for clues from other members to combat all gangsters Clues, informer, case claim, daily crime information collection and integration, sourcing Primary Data Sourcing Primary Data Study & Deeper Source Collection Further Investigation Suspects Arrest & Evidence Collection Follow-up Study primary data, cross check databases in Police Department, Google on Internet and confirm crime type in order to prepare investigation Arrest all suspects, confiscate all evidences, check all computers, telephone record, booking record etc... Phone record, lawful intercept, tracking, location positioning, knowledge of crime organization and members

10 e-Detective Tactical Server
Best Tactical Solution for: Network Protocol Decoding and Content Reconstruction Auditing and Record Keeping with ISO 27001, SOX, HIPPA etc… Internet Surveillance/Monitoring & Network Behavior Recording Forensics Analysis and Cyber Investigation E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes and reconstructs various types of Internet traffic. It is commonly used for organization for Internet behavioral monitoring, auditing, record keeping, forensics analysis and investigation as well as for legal and lawful interception by law enforcement agencies (LEA) such as Police Intelligence, Military Intelligence, Cyber Security Department, National Security Agencies, Criminal Investigation Agencies, Counter Terrorism Agencies etc. It also provides compliance solution for many standards or acts like Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA), Gramm–Leach–Bliley Act (GLBA), Securities and Exchange Commission (SEC), National Association Of Securities Dealers (NASD), E-Discovery and many others local customized acts. Internet Surveillance and Forensics Analysis System

11 Lawful Interception Solution
E-Detective system can export reconstructed data and keep this data in NAS/SAN/CD/DVD storage for long term record keeping.

12 Corporate Interception Solution

13 HTTPS/SSL Interception Solution
INTERNET HTTPS MITM (ED2S) Targeted Users HTTPS traffic needs to be routed or redirected to this MITM system. Gateway Router L3 Core Switch (Re-routing Function) Web/Mail Server HTTPS/SSL 1 2 Target Users

14 e-Detective is Easy to Operate
Just use IE Browser login system from local or remote Uses https protocol for security protection Multi password, user’s name and User’s Group for system login control

15 e-Detective: Homepage

16 e-Detective: Email – POP3/SMTP/IMAP

17 e-Detective: Web Mail (Read)

18 e-Detective: Web Mail (Sent)

19 e-Detective: IM/Chat - Yahoo

20 e-Detective: File Transfer - FTP

21 e-Detective: File Transfer – P2P

22 e-Detective: HTTP – Link/Content

23 e-Detective: HTTP Upload/Download

24 e-Detective: HTTP Video Stream

25 e-Detective: Search – Condition/Parameter

26 e-Detective: Search – Association/Relation

27 e-Detective: Backup Storage
External Storage (SAN/NAS/CD/DVD) for preserving digital assets & for future recovery of DATA (Backup CD Reader SW is provided)

28 Who Needs e-Detective? Types Of Companies Need E-Detective Aside from Government Companies that install E-Detective as a Deterrent, will inform their staffs that Internet activities are being fully monitored. Financial, Banking and Investment Companies such as derivatives, futures, etc. All transactions to be monitored. Companies like marketing, design house, high technologies, which critically need to prevent leakage of data. Staffs communicate with customers or vendors through web-based system need E-Detective to archive data.

29 Crackdown on Fraud Rings
Europe US China Taiwan Vietnam Thailand Philippines Malaysia Indonesia Africa

30 Network Forensics and Lawful Interception
E-Detective Wireless-Detective E-Detective Decoding Centre Enterprise Data Guard System E-Detective LEMF Centralized Management System Data Retention Management System HTTPS/SSL Interceptor VoIP Detective FIT (Forensics Investigation Toolkit) NIT (Network Investigation Toolkit) Network Packet Forensic Analysis Training Cyber Crime Investigation Training National Security Surveillance Training DECISION GROUP INC.

31 I hope you find it informative…
Thank you!!! I hope you find it informative… Visit our


Download ppt "Cyber Crime & Investigation IT Security Consultant"

Similar presentations


Ads by Google