269 research outputs found

    Audit Tools for Cyber Crime Investigation

    Get PDF

    Forensics analysis of wi-fi communication traces in mobile devices

    Get PDF

    KEKHUSUSAN PROSES PENYIDIKAN TINDAK PIDANA CYBER CRIME

    Get PDF
    The existence of the internet in human life is very supportive of all forms of human activity in today's digital era. However, technological advances with the use of the internet have resulted in the emergence of cybercrime or cyber crime. In its development, cyber crime requires special handling by the police in the process of investigation. For this reason, using normative juridical research, this study will examine the specificities of the cyber crime investigation process. In general, the process is almost the same as the criminal investigation process in general, except that it is carried out by cyber units or special units that have the task of carrying out cyber crime investigations. Apart from that, investigators of cybercrime will also use other special laws such as ITE, Consumer Protection, Banking, and so on

    Adversarial Out-domain Examples for Generative Models

    Full text link
    Deep generative models are rapidly becoming a common tool for researchers and developers. However, as exhaustively shown for the family of discriminative models, the test-time inference of deep neural networks cannot be fully controlled and erroneous behaviors can be induced by an attacker. In the present work, we show how a malicious user can force a pre-trained generator to reproduce arbitrary data instances by feeding it suitable adversarial inputs. Moreover, we show that these adversarial latent vectors can be shaped so as to be statistically indistinguishable from the set of genuine inputs. The proposed attack technique is evaluated with respect to various GAN images generators using different architectures, training processes and for both conditional and not-conditional setups.Comment: accepted in proceedings of the Workshop on Machine Learning for Cyber-Crime Investigation and Cybersecurit

    Cyber-Crime Investigations: Complex Collaborative Decision Making

    Get PDF
    This paper reports on the challenges computer forensic investigators face in relation to collaborative decision making, communication and coordination. The opportunities, operational environment and modus operandi of a cyber criminal are considered and used to develop the requirements in terms of both skill sets and procedural support a forensics investigator should have in order to respond to the respective threat vectors. As such, we show how a published framework for systemic thinking can be fit fir purpose for supporting the collaborative enquiry and decision making process

    Analysis of the ‘Db’ Windows Registry Data Structure

    Get PDF
    The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of the most popular digital investigation suites fail to recognise this structure and do not allow the investigator to view the contents of the structure. Keywords: Windows Registry, Data Structur

    A return on investment: the future of police cooperation between Australia and Indonesia

    Get PDF
    This Special Report presents a strategy for the future relationship between Indonesia’s National Police—known as POLRI—and the Australian Federal Police (AFP). It draws on 60 interviews with current and retired police officers, officials from other Australian and Indonesian agencies, and academic experts in related fields. The report presents a strategy for the future POLRI–AFP relationship in two parts. The first paperexamines the near term to early 2015. POLRI and the AFP should first aim to restore full trust and cooperation in all relevant policing areas, especially in cybercrime. Early initiatives could include a 10‑year celebration for the Jakarta Centre for Law Enforcement Cooperation, workshops for future AFP and POLRI leaders, and a request for POLRI officers to support the AFP during the G20 meeting in November 2014. It would also be worth sponsoring an international ‘needs analysis’ for POLRI. Reinstating funding for the Law Enforcement Cooperation Program is needed to promote the AFP’s flexibility and responsiveness during this time. The second paper provides background, tracing the remarkable relationship between the Australian Federal Police and the Indonesian National Police from its early days, where the focus was on information sharing, through a journey into joint operations. The paper describes the numerous capability cooperation initiatives that the forces have undertaken, especially since 2002, and charts both successes and times where cooperation didn’t necessarily deliver as intended
    • …
    corecore