Cybercrime and Forensic Sciences Executive Policy Forum. The Conference Center at Snowbird Snowbird, Utah June 9 10, 2011
|
|
- Marcia Horn
- 6 years ago
- Views:
Transcription
1 AGENDA Cybercrime and Forensic Sciences Executive Policy Forum The Conference Center at Snowbird Snowbird, Utah June 9 10, 2011 Hosted by: National Governors Association Center for Best Practices (NGA Center) In partnership with: U.S. Department of Justice Thursday, June 9, :00 a.m. 8:00 a.m. Lobby Registration / Breakfast Compliments of the Hotel 8:00 a.m. 8:15 a.m. Welcome, Introductions, and Overview Thomas MacLellan, Division Director, Homeland Security and Public Safety Division, NGA Center for Best Practices Jeff McLeod, Policy Analyst, Homeland Security and Public Safety Division, NGA Center for Best Practices 8:15 a.m. 9:00 a.m. Advances in Technology and Forensic Sciences and Their Implications for State Criminal Justice Policy Recent advances in forensic sciences provide law enforcement powerful new crime fighting tools that enhance investigative efforts and make it more difficult for individuals to get away with criminal behavior. At the same time, however, the rapid pace at which technology is changing provides criminals with new opportunity and ways to commit crimes. The challenge to many states is developing policy that encourages and utilizes innovations in forensic sciences, while at the same time adequately addressing the evolving ability criminals have to commit crime with modern technology. This session will provide a broad overview of recent advances in technology and forensic sciences and the implications for state criminal justice policy. It will identify potential gaps in state policy that exist due to the rapid pace at which technology is changing and recommend strategies states can use to enhance their response to cyber and electronic crime. Kevin Lothridge, Chief Executive Officer, National Forensic Science Technology Center
2 9:00 a.m. 10:00 a.m. State Priorities Roundtable This session will feature an open discussion among state representatives addressing state priorities and challenges related to advances in technology and forensic sciences. 10:00 a.m. 10:15 a.m. Break 10:15 a.m. 10:45 a.m. Plenary 1: Familial DNA Searches Scientists can now use DNA collected from a crime scene and run it through a DNA databank to identify close-but-not-exact matches to an immediate relative of a suspect. This new tool allows forensic experts to develop leads and expedite the identification of criminals. Colorado is one of a few states who use the tool, and the Denver District Attorney s Office is helping to lead the way. District Attorney Mitch Morrissey will discuss how this technology works and ways in which it has enhanced his Office s law enforcement efforts. Mitchell Morrissey, District Attorney, Denver District Attorney s Office 10:45 a.m. 11:45 p.m. Table Top Scenario 1: Familial DNA Searches The session moderator will lead the panel in a scenario-based discussion illustrating how familial DNA searches can be used to improve the effectiveness of law enforcement efforts. Takeaways from the discussion will include an understanding of 1) how familial DNA searches can be used in the criminal justice process, and 2) ways states can promote the tool to improve criminal justice outcomes. Moderator: Mitchell Morrissey, District Attorney, Denver District Attorney s Office Panel: Stephanie Stoiloff, Commander, Miami-Dade Police Department Forensic Services Bureau Dennis Kilcoyne, Detective, Los Angeles Police Department Jill Spriggs, Bureau Chief, California Department of Justice Bureau of Forensic Services John Lane, Executive Policy Advisor to Washington Governor Chris Gregoire 11:45 p.m. 1:00 p.m. Golden Cliff Room Working Lunch: Presentation by Lance Davenport, Commissioner of the Utah Department of Public Safety, and Jay Henry, Director of the Utah Department of Public Safety/Crime Laboratory Commissioner Davenport and Director Henry will discuss the impact recent advances in technology and forensic sciences have had in Utah and strategies the Utah Department of Public Safety is using to take advantage of them.
3 1:00 p.m. 1:30 p.m. Plenary 2: Criminal Use of Modern Technology to Exploit Children Children increasingly rely on modern technology for socialization, entertainment, and education. But while modern technology presents many benefits, it also poses potentially significant risks to children. Through peer-to-peer file sharing networks, mobile applications, stenography, social networking sites, and other technology, criminals have proven adept at exploiting children. This session explores these risks and recommends actions states can take to protect children. 1:30 p.m. 2:30 p.m. Table Top Scenario 2: Criminal Use of Modern Technology to Exploit Children The session moderator will lead the panel in a scenario-based discussion exploring threats to children in a digital age. Takeaways from the discussion will include an understanding of 1) how criminals utilize modern technology to exploit children, and 2) effective law enforcement and policy responses states can use to combat these threats. Moderator: Peter Wolf, Director, Kroll Inc. Panel: Russell Yawn, Deputy Director, Electronic Crime Technology Center of Excellence, Andrew Paris, Deputy Policy Director, Office of Pennsylvania Governor Tom Corbett 2:30 p.m. 2:45 p.m. Break 2:45 p.m. 3:30 p.m. Plenary 3: Identity Theft and Fraud Greater use of the Internet, credit cards, mobile phones, and other modern technology has left consumers more exposed than ever to identity theft and fraud. The Federal Trade Commission reports that in 2010 it received over 1.3 million consumer complaints, and of these 54% were related to fraud costing consumers over $1.7 billion while 19% related to identity theft. This session will explore how criminals exploit modern technological advances to commit identity theft and fraud, and it will identify effective strategies states can use to combat these threats. Erin Kenneally, CEO and Founder, elchemy, Inc. Marty Bugbee, President/Professional Investigator, Infrarisk Assessments LLC
4 3:30 p.m. 4:15 p.m. Plenary 4: Digital Evidence This session will examine what is digital evidence, the collection and analysis of digital evidence, the state role in providing digital evidence services, whether custodians of digital evidence may be held liable for holding child pornography, the role of fusion centers, and related policy issues as well as constitutional considerations. Russell Yawn, Deputy Director, Electronic Crime Technology Center of Excellence, 4:15 p.m. 5:00 p.m. Table Top Scenario 3: Electronic Crimes and Digital Evidence The session moderator will lead the panel in a scenario-based discussion exploring how criminals can utilize modern technological advances to commit identity theft and fraud. In addition, the discussion will address issues related to obtaining and analyzing digital evidence during investigation and prosecution. Takeaways from the discussion will include an understanding of 1) ways criminals commit identity theft and fraud, and 2)law enforcement and state policy responses that may be effective in combatting these threats. Moderator: Panel: Erin Kenneally, CEO and Founder, elchemy, Inc. Marty Bugbee, President/Professional Investigator, Infrarisk Assessments LLC Russell Yawn, Chief of Prosecution Services, Alabama District Attorney s Office Mark Perez, Special Agent in Charge / Homeland Security Advisor, Florida Department of Law Enforcement 5:00 p.m. 6:00 p.m. Wrap Up and Networking Session 6:00 p.m. 7:30 p.m. Golden Cliff Room Working Evening Program: Case Study-The Grim Sleeper Serial Killer A serial killer terrorized Los Angeles between 1985 and 2010, murdering at least 11 people. Using a familial DNA search police apprehended the man known as the Grim Sleeper. Police compared DNA found at some of the crime scenes with the DNA of the suspect s son, who was a convicted felon. Detective Dennis Kilcoyne of the Los Angeles Police Department s Robbery-Homicide Division was in charge of the investigation. Detective Kilcoyne will discuss the investigation and, with Bureau Chief Jill Spriggs of the California Department of Justice Bureau of Forensic Serves, the use of familial DNA searches in California. Dennis Kilcoyne, Detective, Los Angeles Police Department Jill Spriggs, Bureau Chief, California Department of Justice Bureau of Forensic Services
5 Friday, June 10, :30 a.m. 8:30 a.m. Lobby Networking Breakfast 8:30 a.m. 9:30 a.m. Plenary 5: Technological Advances in Policing Advances in police technology have greatly enhanced law enforcement s ability to fight crime. Facial recognition systems, license plate readers, biometrics, and CrimeView mapping software are among some of the new tools available to police. This session will provide a broad overview of how these tools work and examples of ways in which law enforcement can utilize them. Captain Main will also discuss ways new technology can help law enforcement operate more efficiently and reduce costs. Jim Main, Captain, Pinellas County Sheriff s Office 9:30 a.m. 10:30 a.m. Plenary 6: Predictive Policing and Modeling Using sophisticated computer models and data about previous crimes, police may be able to anticipate, and possibly prevent, many types of crime. For example, researchers at UCLA have built computer simulations of criminals moving through city neighborhoods to better understand why they tend to cluster in certain areas and how they disperse when police go looking for them. Some say humans are too complex and random for their behavior to be predicted, but advances in computer modeling and data analysis suggests otherwise. This session will explore how predictive policing and modeling works and the ways law enforcement can use these tools to improve the effectiveness of their efforts. Dr. Craig Uchida, President, Justice and Security Strategies, Inc. Susan Smith, Crime Analyst, Shawnee Police Department 10:30 a.m. 10:45 a.m. Break 10:45 a.m. 12:00 noon Plenary 7: Information Sharing, Data Aggregation, and Privacy This session will explore how states can improve criminal justice outcomes through incorporation of the latest in information sharing and data aggregation tools. The session will also explore the role of state fusion centers and look at potential privacy considerations. Judge Anthony Capizzi, Montgomery County, Ohio Juvenile Court Becki Goggins, Manager, Crime Statistics and Information Division Alabama Criminal Justice Information Center Barbara Hurst, Deputy Public Defender, Rhode Island Public Defender Mark Perez, Special Agent in Charge / Homeland Security Advisor, Florida Department of Law Enforcement
6 12:00 noon 1:00 p.m. Working Lunch: Presentation by Baltimore County Chief of Police Jim Johnson Chief Johnson will present several real-world cases from Baltimore County to help illustrate the impact at the local level of cyber and electronic crime and recent advances in forensic sciences. Jim Johnson, Chief of Police, Baltimore County Police Department 1:00 p.m. 1:30 p.m. Wrap Up: Moving Forward The purpose of this session is to establish key takeaways from the Policy Forum and identify potential state needs for future technical assistance. Thomas MacLellan, Division Director, Homeland Security and Public Safety Division, NGA Center for Best Practices
Statement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationPRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement
CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March
More informationANZPAA National Institute of Forensic Science BUSINESS PLAN
ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate
More informationINTEGRATING RESOURCES TO ACHIEVE SUCCESSFUL OUTCOMES FOR JUSTICE INVOLVED INDIVIDUALS
Third Annual Conference on Public Safety Realignment Innovations in Public Safety and Justice in California INTEGRATING RESOURCES TO ACHIEVE SUCCESSFUL OUTCOMES FOR JUSTICE INVOLVED INDIVIDUALS Thursday,
More informationLIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150
COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More information15412/16 RR/dk 1 DGD 1C
Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations
More informationRUSSELL BOHSE.
RUSSELL BOHSE Peekinv@aol.com Peekinv@aol.com Professional Summary Fire Investigator offering over 30 years of both public and private investigation experience specializing in origin and cause and case
More information2017 National Law Enforcement Training on Child Exploitation
2017 National Law Enforcement Training on Child Exploitation 2017 National Law Enforcement Training on Child Exploitation JUNE 6-8, 2017 ATLANTA, GA Post Conference Report A SUCCESSFUL TRAINING EVENT This
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationMedia Kit. California Cybersecurity Institute
Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationLegal Foundation and Enforcement: Promoting Cybersecurity
Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance,
More informationDAY 1 - Monday 30th September 2013
DAY 1 - Monday 30th September 2013 Opening Ceremony 8.30am 10.00 am Remarks Oral Reid, Chairman Crime Stoppers Barbados Remarks Darwin Dottin, Commissioner of Police of Barbados Remarks Alex MacDonald,
More informationSkills Academy. Forensic Studies Courses
Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and
More informationAssistant Secretary-General Michèle Coninsx Executive Director, CTED
High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations
More informationFacing Up to the Challenges
Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information
More informationA Planet of Smarter Cities: Security and critical infrastructures impact
A Planet of Smarter Cities: Security and critical infrastructures impact Alberto Barrientos Director of Public Sector IBM Smarter Cities Alberto.barrientos@es.ibm.com Urban population growth expected to
More informationMEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV
MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV OTHER MINISTERS OR ATTORNEYS GENERAL CIBER-VIII/doc.1/11 OF THE AMERICAS 6 November 2013 Original: English Eighth Meeting of the Working Group on Cyber-crime
More information2017 YEAR END REPORT. 101 Sheriff Dierker Ct. O Fallon, MO Office: Fax:
2017 YEAR END REPORT 101 Sheriff Dierker Ct. O Fallon, MO 63366 Office: 636-949-1848 Fax: 636-949-3059 Email: cybercrime@sccmo.org WWW.STCHARLESCYBER.ORG OVERVIEW Contents: Overview 2017 General Statistics
More informationNOT PROTECTIVELY MARKED. Public SPA Board Meeting Date 15 December 2016 Assembly Room, Tulliallan, Alloa
Meeting Public SPA Board Meeting Date 15 December 2016 Location Assembly Room, Tulliallan, Alloa Title of Paper SPA Forensic Services Report Item Number 14 Presented By Tom Nelson, SPA Recommendation to
More informationIP CHANGES IN THE THAI COMPUTER CRIME ACT. Cyber crime in Thailand Introduction & Overview
IP CHANGES IN THE THAI COMPUTER CRIME ACT Cyber crime in Thailand Introduction & Overview POL.LT.COL.NAUGHTAKID PHROMCHAN DEPUTY SUPERINTENDENT SOCIAL MEDIA MONITORING CENTER, ROYAL THAI POLICE 7th November
More informationCase 1:18-cr TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA
Case 1:18-cr-00308-TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division i 20 2018 1:1 UNITED STATES OF AMERICA
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationDay One November 30 The Dupont Circle Hotel, Dupont Ballroom A Ground Floor
The RPS Collaborative 2016 National Summit on RPS November 30 December 1 The Dupont Circle Hotel 1500 New Hampshire Ave. NW Washington, DC AGENDA Day One November 30 The Dupont Circle Hotel, Dupont Ballroom
More informationNATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationWhen: Monday, August 21 through Thursday, August 24, 2006
OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Public Affairs Office Release No. 06-09 Washington, DC 20511 For Release: August 9, 2006 (202) 201-1111 Contact: Ross Feinstein (202) 201-1124 Phone: 202-201-1111
More informationRegional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia
Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia This workshop has been organized by the Secretariat of the Inter- American Committee against Terrorism
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationFederal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission
Federal Trade Commission Protecting Consumer Privacy J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission FTC s Approach to Privacy Consumers are concerned about consequences
More informationPolicy recommendations. Technology fraud and online exploitation
Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationData Protection and Cybercrime Challenges
Data Protection and Cybercrime Challenges (Preliminary Presentation) Sigrid Arzt Commissioner IFAI, Mexico Octopus Conference 6-8 June 2012 Strasbourg, France DATA PROTECTION IN MEXICO: A BRIEF OVERVIEW.
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationThe National Organization of Black Law Enforcement Executives (NOBLE) Justice: Exploring Principles In Innovation For A More Equitable Future
The National Organization of Black Law Enforcement Executives (NOBLE) be Justice: Exploring Principles In Innovation For A More Equitable Future Partnership with NOBLE Table of Contents Executive Summary...Page
More informationTCJIUG Texas Criminal Justice Information Users' Group PO Box Austin, TX 78768
TCJIUG Texas Criminal Justice Information Users' Group PO Box 684096 Austin, TX 78768 A statewide organization of law enforcement, communications and information systems personnel working to improve the
More informationOrganization of Scientific Area Committees for Forensic Science (OSAC)
Stetson University College of Law Essentials in Forensic Science and the Law Webinar Series Organization of Scientific Area Committees for Forensic Science (OSAC) Mark D. Stolorow Director for OSAC Affairs
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationAGENDA FLORIDA DEPARTMENT OF LAW ENFORCEMENT. June 1, ITEM 1. Respectfully submit the Minutes of the April 19, 2005 Cabinet Meeting.
AGENDA FLORIDA DEPARTMENT OF LAW ENFORCEMENT June 1, 2005 ITEM 1. Respectfully submit the Minutes of the April 19, 2005 Cabinet Meeting. (See Attachment 1) RECOMMEND APPROVAL ITEM 2. Respectfully submit
More informationGina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program
Gina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program Manager New York State Forensic Overview Office of Forensic
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More information10025/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10025/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationSEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES
SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More information5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationEXPERT GROUP MEETING ON CYBERCRIME
EXPERT GROUP MEETING ON CYBERCRIME VIENNA, 17-21 JANUARY 2011 Presentation by Ayo Olukanni Charge D affaires ai Embassy/Permanent Mission of Nigeria, Vienna Nigeria and the fight against Cybercrime Establishment
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationCriminal Justice System INFRASTRUCTURE COMMITTEE
Criminal Justice System INFRASTRUCTURE COMMITTEE SUB-COMMITTEE CHAIR: John Casbon Call for Action Hurricanes Katrina and Rita severely damaged law enforcement, prosecution, and judicial infrastructure
More informationComprehensive Case Information System (CCIS) August 22, 2017
Comprehensive Case Information System (CCIS) August 22, 2017 CCIS Background CCIS Comprehensive Case Information System Statewide Court Case Data and Records Florida Statute - 28.24(12)(e) Provides controlled
More informationCoquitlam, BC May 9-10, NWFIA s Spring Training Conference Card Skimming Advanced Data Mining
Coquitlam, BC May 9-10, 2014 NWFIA s Spring Training Conference Card Skimming Advanced Data Mining Registration packet and agenda Also available online at: www.nwfia.org The NWFIA would like to thank our
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationAGENDA. 24-Aug-15 FORENSIC TECHNOLOGY: ADDING VALUE TO LITIGATION FROM THE PERSPECTIVE OF A LAWYER
FORENSIC TECHNOLOGY: ADDING VALUE TO LITIGATION FROM THE PERSPECTIVE OF A LAWYER Presented @ ANNUAL GENERAL CONFERENCE OF NIGERIAN BAR ASSOCIATION by Dr. Peter O. Olayiwola, BBA, MBA, Ph.D., FNCS, MCPN,
More informationTACTICAL AND STRATEGIC ANALYSIS SOLUTIONS. Nick Stohlman
TACTICAL AND STRATEGIC ANALYSIS SOLUTIONS Nick Stohlman MISSION STATEMENT The Omega Group is dedicated to enriching the quality of life in communities by providing solutions for public safety and education
More informationREDACTED FOR PUBLIC RELEASE. U.S. Department of Justice Office of the Inspector General Audit Division. Audit Report September 2005
THE EXTERNAL EFFECTS OF THE FEDERAL BUREAU OF INVESTIGATION S REPRIORITIZATION EFFORTS U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-37 September 2005 THE EXTERNAL
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationPrivacy, Civil Rights, and Civil Liberties 101 December 10, 2012
Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012 e-courts 2012 Conference - Las Vegas, NV National Center for State Courts The Honorable Anthony Capizzi Montgomery County, Ohio, Juvenile
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More informationGuelph Police Service
Guelph Police Service The Guelph Police Service provides policing services to the City of Guelph and has an authorized complement of 196.5 police officers and 89.42 civilians. We serve our community by
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationData-Driven Policing Summit
Reduce Crime and Manage Risk in Policing with Data Analysis Data-Driven Policing Summit Using Data Analytics and Predictive Modeling to Mitigate Risk and Reduce Crime September 18-19, 2017 Washington,
More informationFACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM
WEDNESDAY, MAY 29, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM When terrorism
More informationMission Statement: Cuyahoga County Department of Justice Affairs
Cuyahoga County Department of Justice Affairs Mission Statement: Providing hope and opportunity for a safer community, ensuring justice, support and recovery for all citizens Cuyahoga County Department
More informationSonoma County s System-wide Efforts to Improve the Broader Criminal Justice System
Sonoma County s System-wide Efforts to Improve the Broader Criminal Justice System Jennifer Murray, Deputy County Administrator Tom Schwedhelm, Santa Rosa Chief of Police Robert Ochs, Chief Probation Officer
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia
ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of
More informationTESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)
TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT
More informationIdentity Management Symposium
Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria,
More informationFUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS
COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018
More informationPolice Department About the Police Department
About the The Wheat Ridge is a full service suburban police department organized under two major divisions: Patrol Operations and Support Services. The key public safety services provided to citizens and
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationUnified antiquated systems with Odyssey, advancing the statewide judiciary to an e-court environment
2017 TYLER PUBLIC SECTOR EXCELLENCE AWARD WINNERS Rhode Island Judiciary Unified antiquated systems with Odyssey, advancing the statewide judiciary to an e-court environment Challenged by separate, outdated
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form CROATIA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationFBI Role in Overseas Investigations
DONALD VAN DUYN CHIEF INTELLIGENCE OFFICER FEDERAL BUREAU OF INVESTIGATION BEFORE THE SENATE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS JANUARY 8, 2009 Good afternoon Chairman Lieberman, Senator
More informationEstablishing a Crime Gun Intelligence Program Within Your Agency/Region
Establishing a Crime Gun Intelligence Program Within Your Agency/Region Participants Ron Nichols, Firearm and Toolmark Examiner, Nichols Forensic Science Consulting Pamela Hofsass, Chief of Forensic Science
More informationThe Golden Triangle Business Improvement District Washington, DC Program: Safe, Secure, Prepared Award Category: Downtown Leadership and Management
The Golden Triangle Business Improvement District Washington, DC Program: Safe, Secure, Prepared Award Category: Downtown Leadership and Management Encompasses 43 square blocks of prime commercial real
More informationSmart Policing and Technology Applications
Smart Policing and Technology Applications Presentation at the IACP LEIM Conference San Diego, California June 15,2011 This project was supported by Grant No. 2009-DG-BX-K021 awarded by the Bureau of Justice
More informationSpeakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc
View the Replay Speakers Shellie Zavatsky Director of Internal Audit at Hurley Medical Center Trent Long Director of Managed Privacy Services at FairWarning, Inc Agenda What are the new advanced threats
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationNIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014
NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 OUR MANDATE O The EFCC is the agency charged with the responsibility for the enforcement
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationCYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012
CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja,
More informationRole of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities
Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities Ioana Albani Chief prosecutor albani_ioana@mpublic.ro www.diicot.ro DAKAR, MARCH
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationUNODC tackling cybercrime in support of a safe and secure AP-IS
UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway
More informationASIS International 2011
ASIS International 2011 2 Common Goals Common Tasks Each has knowledge of mission Well defined outcomes Time Tables Education for all involved Purpose Clearly defined leaders Operational planning Mutual
More informationB. EXECUTIVE SUMMARY. Page 2 of 7
B. EXECUTIVE SUMMARY The New York State Division of Criminal Justice Services (DCJS) takes New York s Governor David A. Paterson s comment -- More and more citizens and businesses rely on technology to
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationbordersecuritysummit.dsigroup.org
Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection
More informationPreliminary programme Latest update: June 15, 2018 All speakers confirmed unless otherwise stated.
Preliminary programme Latest update: June 15, 2018 All speakers confirmed unless otherwise stated. Austrian EU-Presidency conference Finance 5.0 a challenge for cyber security? July 16, 2018 Auditorium
More informationNGI and Rap Back Focus Group Briefing
NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus
More informationCouncil of the European Union Brussels, 16 March 2015 (OR. en)
Conseil UE Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE PUBLIC JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More information