Professional Documents
Culture Documents
Techniques by means of
Forensic IT
Technological Crime
Trends
Gina Carletti’s
Scotiabank
Canada
Agenda
Risk Mitigation
Prevent, Detect & Respond
Focus on Technological Crime and Forensics
Technological Crime Trends
Business Impact/ Potential Risk
Computer Forensics
Forensic Tools
Technology as an Investigation tool
Recommendations
Q&A
Risk Mitigation
Profile of an Investigator
Manage and respond to time sensitive Electronic Crime Investigations.
Intelligence analysis used to identify new suspect profiles that may be involved in
money laundering, fraud or other criminal activity.
The identification of new technological crime trends and exploit vectors.
Provide computer forensic support to investigations such as: Defalcation, Irregular
practice, Bank Card Fraud, etc.
Provide technical assistance in personal security incidents.
Technological Crime Trends
Note: Computer and cyber forensics as well as electronic surveillance are now
common tools used to investigate fraud.
Technological Crime Trends - Continue…
Online Social Networks – websites that allow people of common interest to share
experiences. In the social networking site Myspace, the fraudsters have discovered
ways to inject malicious code and deceive users to divulge confidential information.
Vishing - Is also a social engineering method that incorporates the use of Voice
Over Internet Protocol (VOIP) and traditional phishing tactics to garner confidential
personal information.
Skimming (ATM/POS) - is where the data in the card's magnetic strip is copied to a
duplicate card without the card owner's knowledge
Technological Crime Trends - Continue…
Log analysis:
Web logs
Systems logs
Application logs
Telephone logs
Technology as an Investigation tool
Types of Investigations:
Irregular Practices
Insider Threats
Fraud Investigations
Money Laundering and Terrorist Financing
Harassment
Inappropriate Internet Use
Pornography
Privacy
Technological Tools:
Email Analysis
Forensic Analysis of Digital Media
Forensic Analysis of Systems
Cyber Forensics
Recommendations