Challenges and Opportunities for Statistics in Digital Forensics
|
|
- Cody Harrington
- 6 years ago
- Views:
Transcription
1 Challenges and Opportunities for Statistics in Digital Forensics Turing Gateway to Mathematics Isaac Newton Institute 1 st December 2016 Dr. James Luck (james.luck@met.police.uk) TOTAL POLICING Date Arial 14pt
2 Overview Brief overview of Digital Forensics in the MPS The requirement to define Uncertainty Digital Forensic areas where we do define Uncertainty Areas where we could define Uncertainty, but don t Areas where we don t define Uncertainty Possible relief through the ValiD Project TOTAL POLICING
3 Digital Forensics in the MPS TOTAL POLICING
4 96 Technical Staff in Central Laboratory + 61 in Hubs Supporting Front-Line Policing Audio Video AV Cell Site Analysis CSP/ISP Data Analysis CELL SITE & COMMS DATA A/V Enhancements Authentication Data Recovery PRNU / ENF / Face Comp. Phones Computers Network Data Recovery Complex Data Recovery MOBILE DEVICES Data Analysis Interpretation CASEWORK DEVELOPMENT Strategic R & D Academic Engagement Industry Liaison Unusual Casework TOTAL POLICING
5 The Scale of MPS Digital Forensics Estimate 49,036 Exhibits for FY 2016/17 > 40% of Computer Forensics Cases are Child Exploitation 8.5% Year-on year growth in Smart Devices 32,600 mobile devices examined last FY Growth in volume and complexity of data Downloaded 47.8 million pictures in the last six months Perivale Car Pound: 752 vehicles for DNA & F/P in one month - we examined just 5 electronically this year TOTAL POLICING
6 Requirement to Define Uncertainty TOTAL POLICING
7 Why Define Uncertainty in DF? 1. Evidence - so we must have confidence in our results. 2. ISO Accreditation TOTAL POLICING
8 Why Define Uncertainty in DF? Criminal Practice Directions (2015) 19A.5: a. Validity of Methods, b. Safety of an opinion e.g. from statistical significance, c. Estimate Uncertainty. ISO Accreditation Use appropriate methods and procedures to estimate Uncertainty, where appropriate. TOTAL POLICING
9 Where might we look for how to ISO 17025: Sources of Uncertainty include: - Methods - Equipment - The operator UKAS M3003: Testing labs should have: - A policy for evaluating Uncertainty - Use documented procedures for evaluating Uncertainty Forensic Regulator s Codes : Refer to: - GUM - Criminal Practice Directions (2015) 19A.5c (doesn t really tell us how to do it in digital Forensics ) TOTAL POLICING
10 The GUM does tell you how to e.g. Standard Uncertainty s r N i 1 X i X N 1 2 ( but this is for Measurement ) TOTAL POLICING
11 Digital Forensic areas where we do Define Uncertainty TOTAL POLICING
12 Photo Response Non Uniformity (PRNU) Image Source camera/phone Suspect Camera CCD/CMOS sensor Fingerprint Each camera has a sensor that produces a unique noise pattern. This unique pattern is embedded in the image enabling the image to be matched to the camera that produced it!
13 R&D - Photo Response Non Uniformity (PRNU)
14 Electrical Network Frequency (ENF)
15 ENF - Match
16 A Digital Forensic area where we could Define Uncertainty (but don t) TOTAL POLICING
17 Cell Site Analysis Mobile Mobile Mobile Network Internet Voice over IP Cell Site Call Data Record Land Line Switched connections through the mobile network cause a Call Data Record (CDR) to be created The CDR contains the Mast (Sector) ID.
18 A Physical Cell Mast Mast on top of block of flats (Bromyard House)
19 Radio Frequency Propagation Survey Cell ID 30 02d0 7ce8 BROMYARD HOUSE Cell ID 30 02d0 7ce7 BROMYARD HOUSE Cell ID 30 02d CRANE HOUSE We can measure where cells provide coverage using RF survey equipment. Each dot represents where a measurement was taken. The colour of the dot indicates which cell had the best signal at that point. Here we can see the footprints of 2 cells located on the BROMYARD HOUSE mast and 1 cell located on the CRANE HOUSE mast. Notice the small islands of coverage beyond the main areas of coverage.
20 Coverage Areas BROMYARD HOUSE mast Sector 1 Cell ID 30 02d2 7ce6 Sector 3 Cell ID 30 02d2 7ce8 Sector 2 Cell ID 30 02d2 7ce7 Each antenna provides an area of coverage but it is not sharply defined
21 Coverage Areas BROMYARD HOUSE mast Sector 1 Cell ID 30 02d2 7ce6 Sector 3 Cell ID 30 02d2 7ce8 Sector 2 Cell ID 30 02d2 7ce7 Each antenna provides an area of coverage but it is not sharply defined
22 Wi-Fi Wi-Fi may be considered to be similar to Cell Site but Hotspots have much smaller coverage areas than cells. Devices record the Wi-Fi ID information - we could then RF survey the Hotspots.
23 Digital Forensic Areas where we don t Define Uncertainty TOTAL POLICING
24
25 Typical Phone Reading Equipment
26 Typical Mobile Phone Forensic Report SMS messages
27 Mobile Phone Kiosks for Rapid Results Locally MSAB Cellebrite Equipment is used by Staff & Police Officers with minimal training. Implications when we are considering uncertainty. Risk needs to be mitigated by (i) lock-down, (ii) case selection, (iii) Validation, (iv) QC
28 Computer Forensics Hard Drive
29 Device and Data Complexity is Increasing! TOTAL POLICING
30 Internet of Things! Smartphone IP Phone INTERNET
31 Strategic R & D Suspect s car was recovered burnt-out Chip off Berla ive File System mounted Data recovered includes; Frequent locations, Phone books, text messages, Call logs, and GPS
32 Unusual Casework Medical Devices Pacemaker removed from murder victim: Could we determine the time of death? - Device taken to manufacturer to recover significant event date and times. - We attempted deleted data recovery (to no avail).
33 The ValiD Project TOTAL POLICING
34 The ValiD Project ENFSI Direct Grant Project: MP2016 (Start Jan 18) Funding: EC Internal Security Fund Police Programme A database of data sets A database of tool test results Will gather statistics on Tool Performance May help estimate the Combined Uncertainty in the Method TOTAL POLICING
35 Question TOTAL POLICING
36 The Question is How do we define and evaluate Uncertainty in the areas of Digital Forensics where we haven t done so up to now? TOTAL POLICING
37 Thank You TOTAL POLICING
38 Freedom of Information Act Protective Marking Not Protectively Marked Publication Scheme Y/N: Y Title: Challenges and Opportunities for Statistics in Digital Forensics Summary: Isaac Newton Institute Cambridge 2016 Date created: 24/11/2016 Review date: - Version: 1.0 Author: Dr. James Luck (MPS) TOTAL POLICING
39 Facial Comparison (Interpretation) Used as expert evidence in UK courts for over 20 years Increase in CCTV, personal image capture devices and social media will increase demand for this type of evidence UK practitioners typically use three techniques: morphology, proportional alignment and superimposition Morphology Anthropometry Superimposition
40 Facial Comparison (Interpretation) Looking forward DEFS actively collaborates with international partners to produce best practice guidance and testing material (FBI and ENFSI) Working with academic partners and the Home Office to undertake important testing and validation of training material Working with the forensic regulator to address current quality issues in facial image comparison and other areas of image interpretation
NOT PROTECTIVELY MARKED. Public SPA Board Meeting Date 15 December 2016 Assembly Room, Tulliallan, Alloa
Meeting Public SPA Board Meeting Date 15 December 2016 Location Assembly Room, Tulliallan, Alloa Title of Paper SPA Forensic Services Report Item Number 14 Presented By Tom Nelson, SPA Recommendation to
More informationIntroduction to UKAS Accreditation Fire Scene Development Programme. David Compton November 2017
Introduction to UKAS Accreditation Fire Scene Development Programme David Compton November 2017 What is UKAS Accreditation? Procedure by which an authoritative body gives formal recognition that a body
More informationTom Haye Chief Officer Hampshire Special Constabulary
Tom Haye Chief Officer Hampshire Special Constabulary Cyber crime in 2017 Community is at (high) risk of cyber/digital related or enabled crime SME s are not suitably prepared to defend against cyber attacks
More informationGlobal Cybercrime Certification
Global Cybercrime Certification Yves Vandermeer ECTEG chair yves.vandermeer@ Way to a new IT crime ecosystem Standard Operation Procedures and Education docs ACPO - Good Practice Guide For Digital Evidence
More informationCisco Connected Stadium Wi-Fi Services
Data Sheet Cisco Connected Stadium Wi-Fi Services Enhance the Mobile Fan Experience in the Venue with Cisco Connected Stadium Wi-Fi Services Overview The Cisco Connected Stadium Wi-Fi solution is designed
More informationANZPAA National Institute of Forensic Science BUSINESS PLAN
ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate
More informationCALIFORNIA CYBERSECURITY TASK FORCE
CALIFORNIA CYBERSECURITY TASK FORCE Advancing California s cybersecurity priorities through public, private, corporate, and academic sector collaboration. Agenda Task Force Overview California Cybersecurity
More informationNew Data: Sources, Governance, Infrastructure, Analysis. Tim Holt UK Data Forum
New Data: Sources, Governance, Infrastructure, Analysis Tim Holt UK Data Forum What do me mean by new forms of data? What the UK has done so far? What do we mean by infrastructure? Access Going Forward:
More informationField Series. Jump-start investigations with forensically sound data in real time.
Field Series Jump-start investigations with forensically sound data in real time. Frontline teams need real-time insights they can act on, fast. As devices and data become more embedded in our lives, the
More informationDesigning Robustness and Resilience in Digital Investigation Laboratories
DIGITAL FORENSIC RESEARCH CONFERENCE Designing Robustness and Resilience in Digital Investigation Laboratories By Philipp Amann and Joshua James Presented At The Digital Forensic Research Conference DFRWS
More informationSilicon Image HD Connectivity That Just Works
Needham January 2014 Silicon Image HD Connectivity That Just Works Safe Harbor Except for historical information contained herein, this presentation contains forward-looking statements within the meaning
More informationPresenter Name. Date
Presenter Name Date Smartphone Forensics! Henry E. Saint-Fleur Antenna NFC microchip Presenter Name Date Smartphone Forensics Background Henry Saint-Fleur! Background! Computer Science / Network Administration
More informationCall Detail Records The Evidence 10/19/2017. Locating Cell Phones
Cell Phone Location Evidence for Legal Professionals Larry Daniel DFCP, EnCE, ACE, AME, BCE, CTNS, CTA, CWA Locating Cell Phones Least Precise to Most Call Detail Records (Drive Testing) Google Location
More informationFEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy
R2S Forensic provides R2S software and media support capabilities that assist in effective law enforcement, criminal investigation and public protection. We work with police forces, legal bodies, government
More informationSkills Academy. Forensic Studies Courses
Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationThe Use of Technology to Enhance Investigation
The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source
More informationPRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement
CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March
More informationEmergency Telecommunications as the ASP Regional Initiative
0 Emergency Telecommunications as the ASP Regional Initiative Japan s International Contribution in the Field of ICT for Disaster Risk Reduction Mutsuharu NAKAJIMA Director for International Policy Coordination
More informationSmall Business Guide to CCTV. Getting the most out of your Surveillance Camera System
Small Business Guide to CCTV Getting the most out of your Surveillance Camera System November 2018 Small Business Guide to CCTV Getting the most out of your Surveillance Camera System This document offers
More informationLOCATION DATA. Location information from mobile devices is typically obtained using the following:
LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationKodiak Broadband PTT for Public Safety
Kodiak Broadband PTT for Public Safety An Application Brief MOTOROLA SOLUTIONS and KODIAK are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. This document is not an offer, commitment,
More informationMobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter
Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might
More informationBroadband Summit. Public Safety LTE Lessons Learned from the Las Vegas Metro Police Department Band 14 Trial David Fein Systems Engineer
Broadband Summit Public Safety LTE Lessons Learned from the Las Vegas Metro Police Department Band 14 Trial David Fein Systems Engineer May 5, 2014 A Little History Nevada has a close knit communications
More informationUNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017
UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment
More informationCE4024 and CZ 4024 Cryptography and Network Security
CE4024 and CZ 4024 Cryptography and Network Security Academic s AY1819 Semester 2 CE/CZ4024 Cryptography and Network Security CE3005 Computer Networks OR CZ3006 Net Centric Computing Lectures 26 TEL Tutorials
More informationDigital Forensics for Attorneys
Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital
More informationInnovation Infrastructure Partnership
Innovation Infrastructure Partnership Vision The Innovation Infrastructure Partnership s vision is to support the creation, adoption and commercialisation of new technologies, helping UK companies to gain
More informationSMART CITIES. The Gateway to a New India
SMART CITIES The Gateway to a New India Contents Urban India A Changing Landscape Smart Cities Mission Spotlight on BSNL BSNL Presence in Smart Cities BSNL Case Studies India is experiencing Rapid Urbanization
More informationMOBILE DEVICE FORENSICS
MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital
More informationBuilding Programmes. Academies BSF Single School Pathfinders BSF Primary Capital Programme PFI and conventional funding FE and HE
O2 Learning Spaces Building Programmes Academies BSF Single School Pathfinders BSF Primary Capital Programme PFI and conventional funding FE and HE The Design Process Procurement timeline 30-50 months
More informationAre there any new or emerging trends in technology that will impact the scope and work activities of the TC? Please describe briefly.
SMB/5748/R STRATEGIC BUSINESS PLAN (SBP) IEC/TC OR SC: SECRETARIAT: DATE: TC 106 Germany 30 September 2015 NOTE: THIS DOCUMENT CONTAINS THE STRATEGIC BUSINESS PLAN OF IEC TC 106. THE BOXES IN GREY PROVIDE
More informationLevel 5 Diploma in Crime Prevention Designing Out Crime
Level 5 Diploma in Crime Prevention Designing Out Crime Qualification Specification ProQual 2018 Contents Page Introduction 3 Qualification profile 3 Qualification structure 4 Centre requirements 4 Support
More informationPrivacy Impact Assessment
Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions
More informationElectronic warfare, information and cyber
Electronic warfare, information and cyber 2018-2019 Symposia Symposia at Shrivenham provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration
More informationStrategic and operational threat analysis at Europol's EC3
Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified
More informationICT for Disaster Management including Movable and Deployable ICT Resource Unit (MDRU)
ICT for Disaster Management including Movable and Deployable ICT Resource Unit (MDRU) 22 May, 2018 Hideo IMANAKA Vice-Rapporteur of ITU-D SG2 Q5 NTT, Japan Introduction Many disasters in the world eg.
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationDigital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James
Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future
More informationThe way we work is changing. Introducing One Phone. Overview of Proposition. Marketing Overview AOB, Q&A
The way we work is changing Introducing One Phone Overview of Proposition Marketing Overview AOB, Q&A Customers are more demanding than ever and expect an instant response, with your competitors only a
More informationPRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)
PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera
More informationSmart Wi-Fi for Even Smarter Cities
Smart Wi-Fi for Even Smarter Cities It all starts with a Connected City Smart cities are no longer a dream. Urbanization, demographic shifts, environmental changes, and new technologies are reshaping the
More informationIntroduction to Cyber Security Issues for Transportation
Introduction to Cyber Security Issues for Transportation T3 Webinar December 7, 2011 Michael G. Dinning Cyber Security is One of the Most Serious Potential Risks in Transportation Increasing dependence
More informationUp in the Air: The state of cloud adoption in local government in 2016
Up in the Air: The state of cloud adoption in local government in 2016 Introduction When a Cloud First policy was announced by the Government Digital Service in 2013, the expectation was that from that
More informationNATIONAL COMMISSION ON FORENSIC SCIENCE
NATIONAL COMMISSION ON FORENSIC SCIENCE Recommendation for the Accreditation of Digital and Multimedia Forensic Science Service Providers 1 Subcommittee Date of Current Version 25/02/16 Accreditation and
More informationNational Center for Excellence in Technology for Internal Security (NCETIS)
National Center for Excellence in Technology for Internal Security (NCETIS) Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Mumbai 400 076 Internal Security
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationDistracted Driving. EMEA Claims Conference EMEA Claims Conference Rüschlikon, March 6th & 7th 2018 Marion Villalobos, Constanze Brand
Distracted Driving EMEA Claims Conference 2018 1 Agenda Distracted Driving: Definition and examples Overview USA Overview EMEA markets Impact to the Insurance sector and solution approaches Further challenges
More informationSSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia
SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing
More informationAndroid Forensics: Simplifying Cell Phone Examinations
Android Forensics: Simplifying Cell Phone Examinations Jeff Lessard, Gary Kessler 2010 Presented By: Manaf Bin Yahya Outlines Introduction Mobile Forensics Physical analysis Logical analysis CelleBrite
More informationForensic Division Has Taken Appropriate Steps to Address Oregon s Sexual Assault Kit Testing Backlog
Oregon State Police Forensic Division Has Taken Appropriate Steps to Address Oregon s Sexual Assault Kit Testing Backlog Report 2018-16 May 2018 Secretary of State Oregon Audits Division Audit Objective
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationInitial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationEarth Observation, Climate and Space for Smarter Government
Earth Observation, Climate and Space for Smarter Government Beth Greenaway, Head of Earth Observation 30 March 2015 http://www.bis.gov.uk/ukspaceagency Overview UK Space Agency EO Importance and priorities
More informationIndia s First Live Smart City Services
Gandhinagar India s First Live Smart City Services A Success Story Presentation By: Shri D.N.Modi IAS Commissioner, Gandhinagar Municipal Corporation 1 Project Outline Project Awarded in January 2016 Project
More informationGuelph Police Service
Guelph Police Service The Guelph Police Service provides policing services to the City of Guelph and has an authorized complement of 196.5 police officers and 89.42 civilians. We serve our community by
More informationPOLICE EQUIPMENT AND SERVICES
POLICE EQUIPMENT AND SERVICES SmartWater s teams of investigators and covert operatives frequently partner with law enforcement agencies on operations that call for the development of new technologies
More informationAn introduction. UK National Intelligence Model. Intelligence-led crime reduction
Hot Times, Hot Places and Crime: Understanding More About Crime Hotspots Jerry Ratcliffe www.jratcliffe.net jhr@temple.edu An introduction 11 years Metropolitan Police Patrol, intelligence, diplomatic
More informationTRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING
TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing
More informationMobile Devices. Objectives. Types of Devices 4/25/2012
Mobile Devices Objectives Identify mobile devices Learn how mobile devices obtain and transmit information Identify potential evidence that may be obtained from mobile devices Learn where data is stored
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationEPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use
EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission
More informationLevel 3 Award in Introduction to Crime Prevention
Qualification Specification ProQual 2018 Contents Page Introduction 3 Qualification profile 3 Qualification structure 4 Centre requirements 4 Support for candidates 5 Assessment 5 Internal quality assurance
More informationGetting the best digital evidence is what matters XRY extracts more data faster, with full integrity
Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without
More informationCARED Safety Confirmation System Training Module. Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015
CARED Safety Confirmation System Training Module Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015 Table of Contents Introduction... 3 Who are we?... 3 Our Programs and Experience... 3
More informationAV-4000 GSM AV-4000 DVR
E a s y L o a d e r AV-4000 GSM AV-4000 DVR (for LED keypads) Integrated Alarm Control panel & Communicator Series 4000 Appendix for GSM Alarm Panels Version 1.05 Edition I This product is subject to continuous
More informationRegulation and the Internet of Things
Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions
More informationProxim Wireless. All rights reserved.
Wireless Network Design Best Practices Regardless of the application, today wireless broadband is the order of the day, providing fiber like connectivity and reliability in a matter of hours. However,
More informationA Comparative Study of Teaching Forensics at a University Degree Level
A Comparative Study of Teaching Forensics at a University Degree Level Martin Mink University of Mannheim, Germany IMF 2006, Stuttgart October 19 Joint Work Laboratory for Dependable Distributed Systems
More informationTHE AUDIOPLUS. lab PORTFOLIO GUIDE BEYOND AUDIO VISUALS WEDDINGS CONFERENCE HOUSE OF WORSHIP MUSICAL TECHNOLOGY
THE AUDIOPLUS lab PORTFOLIO GUIDE BEYOND AUDIO VISUALS WEDDINGS CONFERENCE HOUSE OF WORSHIP MUSICAL ABOUT AUDIO + Audio+ provides event technical services and equipment rental to the events; corporate
More informationCompTIA Mobility+ Certification
CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,
More informationOrganization of Scientific Area Committees for Forensic Science (OSAC)
Stetson University College of Law Essentials in Forensic Science and the Law Webinar Series Organization of Scientific Area Committees for Forensic Science (OSAC) Mark D. Stolorow Director for OSAC Affairs
More informationWashington Metropolitan Area Transit Authority Board Action/Information Summary
Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 200972 Resolution: Yes No TITLE: MTPD 2014 Part I Crime Report, January - June PRESENTATION
More informationPresentation Structure. Information about CDR. I. INTRODUCTION of CDR. Historic cell site analysis Overview of principles and survey
Historic cell site analysis Overview of principles and survey Presented by Xiao MA Presentation Structure! Introduction of CDR! Mobile network brief! Access service area! Data interpretation! Experiments
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More information2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System
2014 TRANSIT CEOs SEMINAR Cybersecurity What Every CEO Should Know to Help Secure the System APTA Enterprise Cyber Security WG update Vulnerable Systems Cyber attacks may be targeted toward one or more
More informationApplying Mitigation. to Build Resilient Communities
Applying Mitigation to Build Resilient Communities The Hazards Around Us Think about the natural hazard that... poses the greatest risk to where you live or work OR has had the greatest impact on you personally
More informationCrossMount MediaTek White Paper April2015
MediaTek White Paper April2015 2015 MediaTek Inc. Technology Introducing is a new MediaTek technology that simplifies hardware and software resource sharing between different consumer devices. Designed
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationCrime Reporting in the Age of Technology
Crime Reporting in the Age of Technology Jan M. Chaiken Bureau of Justice Statistics U.S. Department of Justice June 14, 2000 Developments reflect efforts of many people in the Justice Department Federal
More informationBCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA
BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information
More informationMatt Danner Flashback Data
Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods
More informationTechnology Safety Quick Tips
Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,
More informationUsing High Capacity Multi- Point For Video Surveillance
Using High Capacity Multi- Point For Video Surveillance INTRODUCTION Video surveillance is increasingly important in crime detection, crime prevention and maintaining public safety. IP networked camera
More informationConnected & Smart Home Research Package
TECHNOLOGY, MEDIA & TELECOMMUNICATION KEY COMPONENTS Intelligence Services Real-time access to continually updated market data and forecasts, analyst insights, topical research reports and analyst presentations.
More informationTechnology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 04/12/2017
Technology Roadmap for Managed IT and Security Michael Kirby II, Scott Yoshimura 04/12/2017 Agenda Managed IT Roadmap Operational Risk and Compliance Cybersecurity Managed Security Services 2 Managed IT
More informationIntegrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting
Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting January 30, 2007 1 Agenda ICLN Background Information Network Coordinating Group Accomplishments Responsible Federal
More informationNOT PROTECTIVELY MARKED ACPO Migration and Associated Matters Portfolio Operation Eagle Strategic Plan 04/04/2013
The ACPO provides a template for forces nationally to implement procedures to improve the Police response in tackling Organised Immigration Crime (OIC) and Human Trafficking (HT). The aim of implementing
More informationOfqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial
Ofqual Ofqual Supporting a Cloud-First Programme Client Testimonial 2017 CoreAzure Limited. All rights reserved. This document is provided "as-is". Information and views expressed in this document, including
More informationSatellite Communications Critical Infrastructure for Disaster Response
Satellite Communications Critical Infrastructure for Disaster Response Gonzalo de Dios, Associate General Counsel May 25, 2018 1 2 Intelsat s Mission Envision The Impossible Through a More Digitally Inclusive
More informationRoyalty Rates for Technology Computers and Communications, 3rd Edition
Contents PREFACE... 3 ROYALTY RATE DERIVATION MODELS... 12 INTELLECTUAL PROPERTY & INTANGIBLE ASSETS DRIVE ACQUISITIONS AND DEALS... 13 BUSINESS ENTERPRISE FRAMEWORK... 14 INTELLECTUAL PROPERTY SHARING
More informationMilitary Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD
Military Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD Military Forensics : COLLECT, EXPLOIT, AND REACT IN THE FIELD 2 Collect, Exploit, and React in the Field Timely access to battlefield intelligence
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool
More information