introduction to cyber crime investigation course conducted in english institute for information...
TRANSCRIPT
Introduction to Cyber Crime Investigation Course
Conducted in English
Institute for Information Industry
Decision Group
Course Objective
In order to fight against rampaging cyber crimes in the world effectively, we need to better understand the nature of cyber crime, the legal procedure to investigate, and, most important, learn the lesson of real cases from experienced investigators and experts. In this course, speakers will also introduce the weakness of IT systems, common cyber criminal skill, cross border route investigation…etc, and combine with practical case study.
Course Target
• Understand Cyber Crime Model• Understand Cyber Criminal Behavior• Understand Legal Procedure on Cyber Crime Investigation• Understand Investigation Skills against Cyber Crime• Understand Strategy and Tactic for Cyber Crime Prevention• Understand Vulnerability of Victim System and How to
Improve it• Learn How to Use Lawful Interception Instrument and
Associated Legal Procedure
Speakers1. Prof. KC Wu
– Emeritus Professor– Chairman of Information Department of National Taiwan Central Police
University
2. KS Yang– Chief of Telecom Crime Prevention Unit of High Tech Crime Prevention
Center, Crime Investigation Bureau, Taiwan National Police Agency
3. Richard Chuang– Chief of Cyber Crime Prevention Unit of High Tech Crime Prevention Center,
Crime Investigation Bureau, Taiwan National Police Agency
4. Jackie Chien, Ph D.– Senior Official of Cyber Crime Investigation Department of National
Investigation Bureau, Taiwan Ministry of Justice Administration
5. Da-Yu Kao, Ph D.– Chief of IT Department, Taiwan Coast Guard Administration
Topic of Course
1. Investigation on Telecom Frauds– By KS Yang
2. Investigation on Cyber Frauds– By Richard Chuang
3. LI Law and Legal Procedure– By Jackie Chien, Ph D.
4. Internal Threat– By Da-Yu Kao, Ph D.
5. Lawful Interception Workshop– By Decision Group
Cyber Crime – Investigation on Telecom Fraud
Nature of Cross Border Telecom Fraud
With VoIP and network routing technology, telecom fraud is a complicated, cross border crime, which is hard to investigate…
ChallengesIn terms of the limitation of LEA investigation capability,
awareness of public, cooperation from service providers, and legal environment
Investigation SkillSeveral crime models and how to investigate on those crimes will
be presented
Case StudyStudy on the real cases and learn the lesson
Cyber Crime – Investigation on Cyber Fraud
Cyber PopulationCyber crime rate will rise while cyber population or cyber penetration rate is increasing
Model Analysis on Cyber FraudsAnalysis on the different type of cyber fraud and its model
Investigation SkillEffective method to investigate on new cyber frauds
Case StudyStudy on the real cases and learn the lesson
Strategy on Cyber FraudHow to concentrate all resource to fight against cyber frauds
Cyber Crime – LI Law and Legal Procedure
Lawful Interception LawWhat is lawful interception? Who has right to do it? How long you can do it? Who audits the who procedure?...
Legal ProcedureLimit and scope of lawful interception during investigation in
order to protect human right and privacy
Case StudyStudy on the real cases and learn the lesson
Cyber Crime – Internal Threat
Internal ThreatInternal threat is an IT security issue which is most neglected by public, and also risky to business and operation of enterprises
ISMS for Information Security ProtectionMethodology and procedure in implementing ISMS
Information Security DrillHow to use information security drill to find out vulnerability and call awareness of employees
Case StudyStudy on the real cases and learn the lesson
Cyber Crime – LI Workshop
Introduction to Lawful InterceptionHow to implement lawful interception
Operations of Lawful InterceptionHow to use interception instrument by wired and wireless on the
field
Case StudyDrill for practice on the sceneries by instructors
Course Plan
• Day 1– Introduction to Emerging
High Tech Crime – LI Law and Legal Procedure
• Day 2– Internal Threat– Investigation on Telecom
• Day 3– Investigation on Cyber
Crime
• Day 4 – Introduction to Lawful
Interception– Case Study and Drill on
Lawful Interception
• Day 5– Visit High Tech Crime
Prevention Unit, Taiwan Crime Investigation Bureau
– Seminar with Taiwan Cyber Police and Prosecutors
*Course plan can be adjusted by attendee request
Training Place*
• Place– Training Center in III, or– Taiwan Civil Service Training Center– Taipei, Taiwan
• Accommodation**– Dorm. Of Taipei Civil Service Training Center (Fuhwa International
House), or– The same level hotel– Taipei, Taiwan
• Language in Classroom– English***
*Place can be managed other than Taipei by attendee request**Handicapped facility provided*** Interpreter other than English by charge per day
Attendee Qualification
• Efficient Capability of English in Communication and Writing
• LEA or Intelligent Officials with Service Certificate
• With Basic IT and Network Knowledge• With Basic Criminal Law Background
Training Time
• English Course Held by Request• Joint Course Plan with Requesters from LEA,
Group or Individual– Will adjust course material by adding country specific
information– Material adjustment lead time is around 4-week by fully
discussion with requesters after agreement signed
• 12 Attendees Above in one Training Session• Announce 4 week ahead in the website:
http://www.e4decision.com
Contact Point:
• Gary Tsai
• International Group
• Institute for Information Group
• Email: [email protected]
• Phone: +886 2 27377111 ext 3283
Thank you for your Attention