Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.

Slides:



Advertisements
Similar presentations
Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Advertisements

New Communication Technologies in the Fight against Corruption Rebecca LI Assistant Director of Operations Independent Commission Against Corruption Hong.
Intermediate 2 Computing
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Gathering digital evidence by the EU Commission in inspections
Wrap-up and conclussions Guillermo Jorge
The next generation in digital forensics Mobile Phones A New Frontier in Digital Forensics BK Forensics.
Evidence Collection & Admissibility Computer Forensics BACS 371.
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
(C) Oxygen Software, Oxygen Forensic Suite – Premium Mobile Examination Extracting.
BACS 371 Computer Forensics
Hong-Kong, Mar Mobile Data in Legal Proceedings and methods for Extraction, Analysis and Delivering Yuval Ben-Moshe Forensics Technical Director.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Computer Forensics Principles and Practices
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Your Professional Network Powered by NCURA By: Stephanie Moore NCURA Community Curator.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
Online Presence for SAIPs What’s Online Presence?
Company/Product Overview. You have lots of files all over the place.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Confidential - © 2012 StreamWIDE © StreamWIDE
FINANCIAL MANAGEMENT AUTOMATING FINANCE 24 AUGUST :30 PRESENTED BY:Scott Watson Wing Financial Analyst
APT29 HAMMERTOSS Jayakrishnan M.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Computer Communications Before the Internet. Pre-Internet Networks and Protocols: Usenet Usenet was developed to allow regular users to transfer files,
Computer Forensics Principles and Practices
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
The 5 th IAACA Seminar 22 – 24 June 2013 Jinan, Shandong Province, China Chapter VI of UNCAC: Technical Assistance and Information Exchange Kevin P. Zervos,
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
Social Network Forensic By Xing Liu CSC153 Spring 2009.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Do not turn on your computers.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
Communications & Networks National 4 & 5 Computing Science.
Chapter 2 Rheachel, Jessica, Megan, and Cassidy Communications, Networks, the Internet, and the World Wide Web.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Mobile Device Collection More Than Just a Phone. More than just a phone… Cell phone Address book Planner & Organizer Messenger Photo & Video camera GPS.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
Cellular Records Review and Analysis Part 2: Verizon.
Cell Phone Forensics Investigator - ICFECI
DIGITAL PLATFORM TUTORIAL HOW TO USE THE MERCURE AWARDS WEBSITE.
Case Brief Gregory Morton William Campbell Dave Wildner.
Presented By: Terry Hallman In the Cloud: File Storage, Collaboration, & Communication An Office 365 Overview March 4, 2016.
Yahoo is the one of the topmost “internal portal” on the web that is used for  Homepage customization  Search s  Search as a World Wide Web 
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
What is Cloud Computing?
Facebook privacy policy
What is WhatsApp? WhatsApp Text - Simple, reliable messaging
ANALYSIS OF CELL PHONES
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
What is Tapestry? An Online learning journal system.
Progress leisure OCR GCSE ICT.
Presentation transcript:

Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent Commission Against Corruption Hong Kong Special Administrative Region, China Raymond SO Wing-keung Assistant Director Independent Commission Against Corruption Hong Kong Special Administrative Region, China APEC ACT Workshop, Santiago, Chile 11th-13th June 2013 APEC ACT Workshop, Santiago, Chile 11th-13th June 2013

2 Computing Devices

3 Social Networking Tools

4 370,000+ Minutes Voice Calls 98,000+ Tweets 100+ New Accounts 80,000+ Wall Posts 510,000+ Comments 6,600+ Pictures Uploaded 600+ Videos (25 Hours+) Uploaded 168+ Million s Sent 700,000+ Search Queries (Source: Go-Globe.com) Every 60 Seconds on the Internet

5 Why Criminals Use IT Share information Multi-national communication Swift action Hiding identity Process and storage of large amount of data ………………….ultimately to avoid detection

6 How do we use IT resources?

7 Digital Forensics Data acquisition, recovery, preservation and examination Computer – –Document file… Mobile phone –Call history –Contact list –Short message – –Photo –WhatsApp

8 Mobile Digital Forensics Laboratory Shielded environment to block communication, e.g. remote wipe

9 Faraday Bags

10 Technical Tools Data recovery –Recover deleted files Information analysis –Call records –SMS – … –WhatsApp

11 Data Recovery Tool

12 Call Record Analysis

13 SMS Analysis

14 Analysis

ultinational Fast Food Managing Director Accepted Bribes

16 Record Digitization System Handled > 100,000 pages of bank statement each year Automatic conversion of statements/records in pre-defined templates into Excel files Developed by internal IT experts

17

18 R. D. S.

19 Centralized Storage of Digital Exhibits Storage Area Network (SAN) –Over 250TB storage –Connected by fibre channel Multiple examiners can work collaboratively on one case

20 ISP Enquiry Internet Service Provider (ISP) may provide –Subscriber information –Login IP address: for tracing physical location and subscriber information – content: usually court warrant is needed –How about ISP or their servers in other jurisdictions? Mutual Legal Assistance

21 Challenges (1) Technical difficulties Cloud computing –Information and evidence are remotely stored –Liaison with online service providers Huge data size –Storage Area Network (SAN) to keep forensic image Data encryption –Password cracking tool –Chip level data acquisition

22 Challenges (2) Admissibility of digital evidence Local digital evidence Foreign digital evidence Expert opinion on chain of evidence Admissibility of evidence in court trials

23 The Way Ahead Capacity Building Dedicated expert teams Training Collaboration with IT counterparts

24 The Way Ahead International Cooperation Formal Cooperation – UNCAC Informal Channels – APEC

Thank You