Академический Документы
Профессиональный Документы
Культура Документы
Ammar Jaffri
Former Additional DG, FIA
&
Currently Chairman Cyber Security
Task Force of Senate Defense
Committee
Scheme of Presentation
About Information Technology & Internet
2
Introduction.. About My Self
• Former Additional Director General FIA and Pioneering
Head of National Response Center for Cyber Crimes.
Information Technology
As
Enabler for Better Policing
4
History of Information
Technology
• Started from ABACUS in China.
• Accurate Counting & Documenting has
always been a desire of Rulers in the Past.
• From Cash Registers to Computers.
• Computers of 70’s.
• 2nd Generation Computers … 90’s
• 3rd Generation Computers …. 2000-2008
• 4th Generation Computers … In your Hands
5
Internet !!!!
• History of Internet.
• Evolution From Radio To TV …..
• Internet before 2005
• Internet Today & Tomorrow.
• Encompasses Almost Every Walk of Life.
• Equal Opportunity For Good or Bad.
• Internet Today
• Internet of Tomorrow.
6
Historical Usage of Invention
by Criminals
• Criminals & First Industrial Revolution.
• Anti-Taghi Act 1860 by British Rulers.
• Double Shah of the Past.
• Criminals as Fast Learners.
• Always Take advantage of Change.
• Misuse of Telephone System by Criminals.
• Nigerian Scam 419…. Advanced Version
• Telephone Frauds ….
7
Use of Internet by Criminals
• Internet brought Equal Opportunities.
• Initially we did not discourage Hackers.
• From Cyber Crimes To Cyber Terrorism
• Cyber Warfare !!!! States Sponsored.
• Low Cost .. Anonymity …. More Loss.
• Dark Web … Under World of Internet.
• Misuse of Social Media
• Cooperation between Criminals
8
Challenges for Police Force
• Technology is evolving Fast … Revolution.
• Criminals are using latest Technologies.
• Budget Constrains for Eqpt & Trainings.
• Dedicated Technical Manpower with
proper Career Planning.
9
Need For Capacity Building of
Police Force
a) Police is always First Responder.
b) Traditional Criminals also Use Internet.
c) Evidence Collection from Crime Scene.
d) Digital Evidence is Volatile ..
f) Preservation of Evidence for Court.
g) Chain of Custody … Documented
h) NR3C ( FIA ) does not have offices
every where.
10
Coordination between
Departments to Catch Criminals.
• Digital Evidence is normally Distributed.
• No One Department has Full Capability.
• Cooperation Model with ISPs.
• WE need an Eco-System in which all may
work together.
• Scale-up model is Forensic Investigations.
• Universities must be engaged for R&D
11
Where Digital Evidence is
Available ???
• With Mobile / Land Phone Companies.
• With NADRA.
• At Airports .. Movement Record.
• ISPs / Cyber Cafes / Airports.
• CCTV Cameras / Hotels/offices/Safe City.
• Computers in Organizations/Homes.
• At Motor Ways ….
• Financial History / Shopping etc
12
Supporting Technologies
• Facial Recognition.
• AFIS ….. Ten Print Cards.
• Social Media
• Internet of Things.
• GPS Mapping
• Google / Search Engines …
• Priority Communication.
• Handheld Devices …. Policeman Book
13
Power of Link Analysis
• From Unknow To Know.
• One Piece of Information Leads to other.
• Crime Patterns With Fusion of Information
• Connecting the Missing Dots.
• Block Building … Software.
• Crime Dashboards for LE Officers.
14
Digital Forensics
• History of Digital Forensics.
• What is Digital Forensics.
• This is Impossible to Kill Data…
• Preservation of Evidence is Challenge.
• Police be trained as First Responder.
• Tangible Evidence ….
• Expert Witness
15
From Stone Coin To BitCoin
• New Ways to Make huge Payments. Police
need to be trained on ‘ FinTech ‘
• About BitCoin & Crypto Currencies.
• Branchless Banking is Future
• Internet of Things ( IoTs ) are coming in
lives very Fast.
• Policing of Driverless Cars.
• Police Need to align itself with CHANGE.
16
International Liaison
• Interpol.
• Crime Stoppers.
• Need Compliance
17
Tracking The Criminal in Cyber
Space
• Criminal are Vulnerable in Cyber Space.
• Digital Foot Prints.
• International Cooperation is available.
• Criminal Data Bases. ( Centralized )
• Presence / Groupings on Social Media.
• Payments to Hire Buildings / Rent a Car /
Hotel Stay / Movement Record etc.
18
Criminals Operate Beyond
Boarders
19
Use of Cyber Space . Future Trends and
Opportunities.
21
World around us is Changing Fast
(Cont’d.)
• Our increasing Dependence on of Social
Networks & VOIP Communication.
Traditional ways to Monitor Criminals
need to Change.
• Without Secure Internet Good
Governance/ Policing is NOT Possible
24
Use of Technology by Terrorists &
Criminals
• Historical linkages between advancements
& latest trends in crimes.
27
From Cyber Crimes to Cyber
Terrorism / Warfare
• Initial success of cyber criminals
encouraged terrorists to use cyber space.
• Anonymity, low cost & scaling up
immediately are other support factors.
• Terrorists are using the cyber space for the
same purposes for which we are using it.
• Attacks on Financial Institutions are
increasing . ( Renent example of
BanglaDesh)
28
From Cyber Crimes to Cyber
Terrorism / Warfare (Cont’d.)
• New technologies have changed the way
terrorist organizations used to` operate.
Terrorists relies on global communications for:
– Command and Control
– Communications
– Propaganda & PsyOps
– Recruitment
– Fundraising
– Data mining
Internet as a Tool for Command &
Control
The same advantages the
Internet brings to the general
public and to business are
useful to international terrorist
groups:
– speed
– Security
– Global linkage
Preparing for Cyber Pearl Harbor
32
Questions
Ammar@brain.net.pk
0300-8551479
33