Cyber Crime: New Challenge to Mankind Society
Introduction to the Nature of Cyber Crime and its Investigation Process
¤ Co-host with Digital Education Institute, for Information Industry, Taiwan.
¤ Cyber Crime Investigation Course Objective (Presentation Slides)
The purpose of this program is to give all attendees a clear picture on the nature of cyber crimes and how to investigate such crimes by new technology and procedure. Since new cyber crimes arise by the leap development of telecommunication and information technologies, investigators must face such challenges with a totally different thought and technical skills.
We provide this training program not only with newly developed technologies and skills, but we also provide case study on the methodology to break such cyber crimes in real environment by those experienced investigators. Attendee, after taking this training program, will know the basic of cyber crime, and effective ways to investigate it, and, most important, first hand lesson from real cases happened.
The Nature of Cyber Crime
The most distinct nature of cyber crime from traditional one is borderless and anonymous. By the help of pervasive network technology, cyber crime is ramping over areas, regions, and countries. For investigators, it is really hard to get the true picture of the whole crime process because of dispersed elements in different places. In this session, we will present the true profile of cyber crime in terms of process, technology behind, behavior model and mind set. Dr. KC Wu is emeritus professor in Department of Information Technology, National Central Taiwan University, and has full experience and study on development of information technology in crime.
Cyber Fraud (Course Exsample)
Cyber Fraud is the most common and significant type of crime, and cover versatile of facets, such as fraud in cyber auction, VoIP phishing, identity stealing...etc. In this session, we will present you different type of real cyber crime cases, and how it happened, criminal profiling. The most important point is that we will give you a better understanding on these cyber frauds and their weakness. You may easily find the crime model when you deal with cyber fraud, and know how to investigate it and keep all valid legal evidence. Richard Chuang is chief of cyber crime prevention squad in Crime Investigation Bureau of Taiwan National Police Agency, and led lots of investigation on cyber crimes for past 5 years.
Procedure of Lawful Investigation on Cyber Crime
After investigating cyber crimes, you may collect all evidence and are ready to submit to court. Are you sure that all evidence in your hand is valid and legal for the endured lawsuit process? Without a legal procedure on cyber crime investigation, your hardworking effort will be fruitless. In this session, you will understand the formal investigation procedure on cyber crime, difference from the legacy one, and legal requirement of evidence in the court. Dr. Chien is the expert in this field, and also has several research papers on this topic.
Case Study on Internal Threat and Information Security Issues (Case Study Exsample)
In the previous session, we cover cyber crime in many different aspects, but most of the above cyber crimes we mention are external threats. As for cyber crime from internal threat, we will present it in depth in this session. Traditionally this kind of cyber crime is usually neglected by the public. We will highlight it with many case studies and how to deal with it. With full experience and study, Dr. DG Kao will give you a detail understanding on its nature, how to prevent, how to lawsuit it in the court in the viewpoint of lawful enforcement agency.
In this training program, you will get a certificate after passing qualification process. The major achievement is not only qualification certificate, but also the knowledge and skill you will get for your daily job in lawful enforcement task.
¤ The Alliance between Institution for Information Industry and Decision Group