WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage...

23
PRESENTER WARREN WILLIAMS

Transcript of WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage...

Page 1: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

PRESENTER

WARREN WILLIAMS

Page 2: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Communication Forensics & Cybercrime Unit

Page 3: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Organised Crime Investigation

Division

8 – 10 Ocean Boulevard, Kingston Jamaica

[876]967-5948,[ 867]922-3288)

Email: [email protected]

Page 4: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Digital Crimes

Digital Forensics

Tracking Perpetrators

Statistics

Q & A

AGENDA

Page 5: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Crime & Technology

Page 6: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

• The telephone – 1876

• The Transistor - 1947

• The computer – 1950

• The Internet

(ARPANET)– 1960

• TCP/IP - 1974

• IPV4 - 1974

In the Beginning…..

Page 7: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

• Smart phone

• Tablet

• IP based technologies

• IPV6

• RFID

Now and beyond…..

Page 8: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Digital

crimes

8

Page 9: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

IMPLEMENT OF DIGITAL CRIMES

Page 10: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

• Cyber crimes

• Computer related crimes

• Mobile related crimes

Different forms of Digital crimes

Page 11: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

• Cyber extortion

• Cyber Terrorism

• Cyber Stalking

• Cyber Harassment

• Cyber Bullying

• Cyber Espionage

• Cyber defamation

• Data trafficking

Different forms of Cyber crimes

Page 12: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

STOLEN

IDENTITY

ELECTRONIC

FRAUD

COMPUTER CRIMES

Programs &

tools

USINGOn a network

Page 13: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Electronic

Crimes

13

Page 14: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Implements of EF

Page 15: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

NETWORK

FORENSICS

COMPTUER

FORENSICSMOBILE

FORENSICS

ANY OTHER

DIGITAL DEVICE

DIGITAL FORENSICS

COM.

FORENSICS

Page 16: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Digital Forensic Tools

• .

16

• ENCASE

• FTK

IMAGER

• Wireshark

• Deep packet

Inspection (DPI)

• UFED

• XRY

• OXYGEN

Page 17: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Any criminal activity involving the use of a

digital device to facilitate a crime either over

the internet/ network or as a standalone.

Crimes such as:

• Unauthorized access to data

• Credit/Debit card fraud

• Illegal transfer of funds from one account to

another

• Stealing, changing or erasing data

Tracking Digital Criminals

Page 18: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Examine

Acquire

Recover

Analyse

Present

USING DIGITAL FORENSIC TOOLS

Page 19: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

ArtefactsUncovered

tracksLeads

A crime is normally NEVER perfect

DIGITAL FOOTPRINTS

Page 20: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

0 200 400 600 800 1000

2013

2012

2011

All other

Mobile

Computer

Page 21: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

• Digital evidence and

cybercrime investigative

support.

• Training & Technical

Assistance.

• Digital lab services

What can the JCF offer??

Page 22: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

Going Forward –Digital Solution

• .

22

Page 23: WARREN WILLIAMS - MSBMocs.msbm-uwi.org/public/conferences/9/schedConfs/13... · •Cyber Espionage •Cyber defamation •Data trafficking Different forms of Cyber crimes. STOLEN

.…..END OF PRESENTATION…..

___________________

THANK YOU

23

Q, A & S