warren williams - msbmocs.msbm-uwi.org/public/conferences/9/schedconfs/13... · •cyber espionage...
TRANSCRIPT
![Page 1: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/1.jpg)
PRESENTER
WARREN WILLIAMS
![Page 2: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/2.jpg)
Communication Forensics & Cybercrime Unit
![Page 3: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/3.jpg)
Organised Crime Investigation
Division
8 – 10 Ocean Boulevard, Kingston Jamaica
[876]967-5948,[ 867]922-3288)
Email: [email protected]
![Page 4: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/4.jpg)
Digital Crimes
Digital Forensics
Tracking Perpetrators
Statistics
Q & A
AGENDA
![Page 5: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/5.jpg)
Crime & Technology
![Page 6: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/6.jpg)
• The telephone – 1876
• The Transistor - 1947
• The computer – 1950
• The Internet
(ARPANET)– 1960
• TCP/IP - 1974
• IPV4 - 1974
In the Beginning…..
![Page 7: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/7.jpg)
• Smart phone
• Tablet
• IP based technologies
• IPV6
• RFID
Now and beyond…..
![Page 8: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/8.jpg)
Digital
crimes
8
![Page 9: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/9.jpg)
IMPLEMENT OF DIGITAL CRIMES
![Page 10: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/10.jpg)
• Cyber crimes
• Computer related crimes
• Mobile related crimes
Different forms of Digital crimes
![Page 11: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/11.jpg)
• Cyber extortion
• Cyber Terrorism
• Cyber Stalking
• Cyber Harassment
• Cyber Bullying
• Cyber Espionage
• Cyber defamation
• Data trafficking
Different forms of Cyber crimes
![Page 12: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/12.jpg)
STOLEN
IDENTITY
ELECTRONIC
FRAUD
COMPUTER CRIMES
Programs &
tools
USINGOn a network
![Page 13: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/13.jpg)
Electronic
Crimes
13
![Page 14: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/14.jpg)
Implements of EF
![Page 15: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/15.jpg)
NETWORK
FORENSICS
COMPTUER
FORENSICSMOBILE
FORENSICS
ANY OTHER
DIGITAL DEVICE
DIGITAL FORENSICS
COM.
FORENSICS
![Page 16: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/16.jpg)
Digital Forensic Tools
• .
16
• ENCASE
• FTK
IMAGER
• Wireshark
• Deep packet
Inspection (DPI)
• UFED
• XRY
• OXYGEN
![Page 17: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/17.jpg)
Any criminal activity involving the use of a
digital device to facilitate a crime either over
the internet/ network or as a standalone.
Crimes such as:
• Unauthorized access to data
• Credit/Debit card fraud
• Illegal transfer of funds from one account to
another
• Stealing, changing or erasing data
Tracking Digital Criminals
![Page 18: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/18.jpg)
Examine
Acquire
Recover
Analyse
Present
USING DIGITAL FORENSIC TOOLS
![Page 19: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/19.jpg)
ArtefactsUncovered
tracksLeads
A crime is normally NEVER perfect
DIGITAL FOOTPRINTS
![Page 20: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/20.jpg)
0 200 400 600 800 1000
2013
2012
2011
All other
Mobile
Computer
![Page 21: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/21.jpg)
• Digital evidence and
cybercrime investigative
support.
• Training & Technical
Assistance.
• Digital lab services
What can the JCF offer??
![Page 22: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/22.jpg)
Going Forward –Digital Solution
• .
22
![Page 23: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN](https://reader034.vdocuments.net/reader034/viewer/2022042313/5edcee2fad6a402d6667d2e5/html5/thumbnails/23.jpg)
.…..END OF PRESENTATION…..
___________________
THANK YOU
23
Q, A & S