Vous êtes sur la page 1sur 15

Cyber Crime Investigation

Decision Group 2012

Fast Growth of Cyber Crime


1. 2. 3. 4. Converged Telecom and Information Technologies Frequent Transnational Communication Highly Organized and Globalized Management of Crime Rings Ineffective Investigation with Joint Effort of Multi-countries

2 DECISION GROUP INC.

Globalized Cyber Crime

Thailand
Taiwan

North America South Korea China/HK

Vietnam Japan
Cloud Computing = Network Computing
Through Internet, computers can cooperate with each other, or services are available more far-reaching 3 DECISION GROUP INC.

Cyber Crime Everywhere

Source: http://www.darkgovernment.com/news/fbi-warning-cyber-threat-bigger-than-ever/

4 DECISION GROUP INC.

Common Cyber Criminal Features


Internet New Converged ICT Technologies
Emerging ICT Technologies

Internet as primary criminal tools, places, or targets

Criminals (Group)

Technical Skill High technical skill at all online and network services

Predict and profile the characteristics of unknown criminal subjects or offenders

Criminal Model

5 DECISION GROUP INC.

Investigation on Criminals
e-Positioning Monitoring Victim & Witness Interview Tracking Lawful Intercept Interrogation

Database Look-up

Warrant & Confiscation

Traditional investigation on criminals is commonly applied in cyber crime events quite often. Sometimes, it works successfully, but some other times it doesnt work.
6 DECISION GROUP INC.

Difficulties of Investigation
Hard to Identify Criminal Hard to Conduct Analysis on Large Volume of Data

Hard to Track Transnational Communication

Hard to Maintain Integrity of Data

Hard to Locate Network Route

Hard to Identify Anonymity or Dummy Account


7 DECISION GROUP INC.

Different Investigation Processes


Common Crimes

Clues

Informers others

Evidence collection & investigation

Finance Record InterviewVideo Enforcement CDR, LI

humanapprehend arrest placewarrant, confiscate

Cyber Crimes
Crime side web or tool Analysis & non-Crime side highlight Social network

Different sources: hard to get clue (dont know how to do it), and no way to trace!
others human Evidence IP tracking excluded apprehend, collection & Useless Finance Record Enforcement arrest investigation Lock CDR, LI placewarrant, activities confiscate by Account

Sourcing clues

8 DECISION GROUP INC.

Process Flow for Cyber Investigation

Follow-up

Primary data sourcing and collection

Suspect arrest and evidence collect

Primary data study and deeper source collection

Further Investigation

9 DECISION GROUP INC.

Primary data sourcing and collection

A1 clueinformercase claimdaily crime information collection and integration, sourcing

Primary data study and deeper source collection


Further Investigation

Study primary data, cross check databases in Police Department, google on Internet and confirm crime type in order to prepare investigation Phone record, check post, lawful intercept, tracking, location positioning, knowledge of crime organization and members

Suspects arrest and evidence collection

Arrest all suspects, confiscate all evidence, check all computers, telephone record, booking recordetc. follow-up investigation on related targets & evidence and hunting for clues from other members to combat all gangsters
10 DECISION GROUP INC.

Follow-up

E-Detective Tactical Server


Internet Surveillance and Forensics Analysis System
Best Tactical Solution for: Network Protocol Decoding and Content Reconstruction Internet Surveillance Forensics Analysis and Cyber Investigation

Most Advanced Device for Network Surveillance, Lawful Interception and Network Forensic
DECISION GROUP INC.

Decision Group Lawful Interception Solutions


Lawful Interception

DECISION GROUP INC.

Professional Training
Cyber Crime Investigation Network Packet Forensic Training Analysis Training
In order to fight against rampaging cyber crimes in the world effectively, you need to understand the nature of cyber crime, the legal procedure, and learn the lesson of real cases from experienced investigators and experts. In this course, experienced speakers will introduce common cyber criminal skill, how to take investigation, digital data analysis with practical case study. This 3 day course utilizes the knowledge of computer security concepts together with switched network topologies and gives students hands on practical exposure to critical knowledge base essential for network forensic investigation and analysis.

DECISION GROUP INC.

What We Provide
Solid Consulting and Delivery Services:
Clear objectives Appropriate surveillance systems Vulnerability assessment Deployment plan Legal procedure Data analysis/text mining

Extensive Training Programs:


Train-the-trainer Law enforcement officials & prosecutors Administrators

Future Development Plan:


Technology update and upgrade Technical skill shift Integration with backend warrant and Lawful Interception data analysis system

DECISION GROUP INC.

Reference

Contact us @
decision@decision.com.tw URL: http://www.edecision4u.com
DECISION GROUP INC. 15

Vous aimerez peut-être aussi