SlideShare a Scribd company logo
1 of 40
FBI and Cyber Security Unit Chief David Wallace Cyber Division Federal Bureau of Investigation
Overview ,[object Object],[object Object],[object Object]
Mission ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Mission
Mission HQ Mission : Coordinate, supervise and facilitate the FBI's investigation of those federal violations in which the Internet, computer systems, or networks are exploited as … targets of terrorist organizations, foreign government sponsored intelligence operations, or criminal activity;
[object Object],[object Object],Cyber Criminal Threat
Criminal Threats to Internet Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One type of Cyber Extortion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DDoS Extortions  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scareware – also a form of Cyber Extortion
Criminal Threats to Internet Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example of Phishing Emails Sent to Customers of U.S.-based Bank
Criminal Threats to Internet Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conficker Botnet ,[object Object],[object Object],[object Object]
Example of Pervasive Malware – Keylogger ,[object Object],[object Object],[object Object],[object Object]
Example of Non-Pervasive Malware – DNS Changer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Criminal Threats to Internet Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats to Corporate Entities ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Scope of the Scheme Financial Services Intrusion
Cyber Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Counterintelligence and Economic Espionage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Counterintelligence and Economic Espionage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Primary Intrusion Vectors “The exploitation of Trust” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted E-mail ,[object Object],[object Object],[object Object],[object Object]
Trusted Web Site ,[object Object],[object Object],[object Object],[object Object]
Trusted Applications ,[object Object],[object Object],[object Object],[object Object]
Trusted Server ,[object Object],[object Object],[object Object]
Trusted Relationships ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FBI Response
[object Object],[object Object],[object Object],FBI Response
[object Object],[object Object],[object Object],[object Object],[object Object],FBI Response
Threat Focus Cells ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Botnet Threat Focus Cell Coreflood Takedown ,[object Object],[object Object],[object Object],[object Object],[object Object]
Botnet Threat Focus Cell Coreflood Takedown
Botnet Threat Focus Cell Coreflood Takedown
Intelligence Sharing At All Levels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
InfraGard.net
Intelligence Sharing At All Levels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FBI Response
Director Mueller at RSA ,[object Object]

More Related Content

What's hot

Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminalsChip Thornsburg
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper HellerKyle Heller
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on RiseDominic Karunesudas
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach ColumnMichael Sexton
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Dan L. Dodson
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryFerrariT1
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
Cybercriminality
CybercriminalityCybercriminality
CybercriminalityChantal Abam
 
2015 Internet Crime Report
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report Rob Wilson
 

What's hot (19)

Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report 2012 Data Breach Investigations Report
2012 Data Breach Investigations Report
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care Industry
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
 
2015 Internet Crime Report
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report
 

Viewers also liked

Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceZubair Baig
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Cyber Risks
Cyber RisksCyber Risks
Cyber RisksRickWaldman
 
Promote Crime Stoppers International
Promote Crime Stoppers InternationalPromote Crime Stoppers International
Promote Crime Stoppers InternationalScott Mills
 
Verkkokirjastot, Kuortane
Verkkokirjastot, KuortaneVerkkokirjastot, Kuortane
Verkkokirjastot, KuortaneHeidi Eriksson
 
브라보 김일행 인생
브라보 김일행 인생브라보 김일행 인생
브라보 김일행 인생일행 김일행
 
Historie og karakterutvikling-spill historiefortelling
Historie og karakterutvikling-spill historiefortellingHistorie og karakterutvikling-spill historiefortelling
Historie og karakterutvikling-spill historiefortellingOle Goethe
 
Laatste les voor proefwerk
Laatste les voor proefwerkLaatste les voor proefwerk
Laatste les voor proefwerkNielsbiologie
 
Social Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsSocial Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsScott Mills
 
CATÁLOGO TRUCOS DE LA ABUELA
CATÁLOGO TRUCOS DE LA ABUELACATÁLOGO TRUCOS DE LA ABUELA
CATÁLOGO TRUCOS DE LA ABUELAtrucosdelabuela
 
Barışmakaleolayadayalı
BarışmakaleolayadayalıBarışmakaleolayadayalı
BarışmakaleolayadayalıUn Ars
 
Illusioni Octavio Ocampo
Illusioni Octavio OcampoIllusioni Octavio Ocampo
Illusioni Octavio OcampoAshrufzz Media
 
The EFT Solutions for Clean Air
The EFT Solutions for Clean AirThe EFT Solutions for Clean Air
The EFT Solutions for Clean AirEli Malano
 
The EFT Solutions for Clean Air
The EFT Solutions for Clean AirThe EFT Solutions for Clean Air
The EFT Solutions for Clean AirEli Malano
 

Viewers also liked (20)

Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Promote Crime Stoppers International
Promote Crime Stoppers InternationalPromote Crime Stoppers International
Promote Crime Stoppers International
 
La palma, our island corrected
La palma, our island correctedLa palma, our island corrected
La palma, our island corrected
 
Verkkokirjastot, Kuortane
Verkkokirjastot, KuortaneVerkkokirjastot, Kuortane
Verkkokirjastot, Kuortane
 
Bc data mining_chung
Bc data mining_chungBc data mining_chung
Bc data mining_chung
 
브라보 김일행 인생
브라보 김일행 인생브라보 김일행 인생
브라보 김일행 인생
 
Historie og karakterutvikling-spill historiefortelling
Historie og karakterutvikling-spill historiefortellingHistorie og karakterutvikling-spill historiefortelling
Historie og karakterutvikling-spill historiefortelling
 
Matching
MatchingMatching
Matching
 
Laatste les voor proefwerk
Laatste les voor proefwerkLaatste les voor proefwerk
Laatste les voor proefwerk
 
Social Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsSocial Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott Mills
 
CATÁLOGO TRUCOS DE LA ABUELA
CATÁLOGO TRUCOS DE LA ABUELACATÁLOGO TRUCOS DE LA ABUELA
CATÁLOGO TRUCOS DE LA ABUELA
 
Barışmakaleolayadayalı
BarışmakaleolayadayalıBarışmakaleolayadayalı
Barışmakaleolayadayalı
 
Illusioni Octavio Ocampo
Illusioni Octavio OcampoIllusioni Octavio Ocampo
Illusioni Octavio Ocampo
 
The EFT Solutions for Clean Air
The EFT Solutions for Clean AirThe EFT Solutions for Clean Air
The EFT Solutions for Clean Air
 
La palma, our island corrected
La palma, our island correctedLa palma, our island corrected
La palma, our island corrected
 
The EFT Solutions for Clean Air
The EFT Solutions for Clean AirThe EFT Solutions for Clean Air
The EFT Solutions for Clean Air
 

Similar to FBI And Cyber Crime | Crime Stoppers International

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeAccenture
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are LurkingCharlie Lewis M.S.
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 

Similar to FBI And Cyber Crime | Crime Stoppers International (20)

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 

More from Scott Mills

Beyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyBeyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyScott Mills
 
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya #SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya Scott Mills
 
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisStopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisScott Mills
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...Scott Mills
 
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsLawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsScott Mills
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Scott Mills
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...Scott Mills
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHScott Mills
 
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Scott Mills
 
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38Scott Mills
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Scott Mills
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsScott Mills
 
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Scott Mills
 
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Scott Mills
 
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...Scott Mills
 
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Scott Mills
 
Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Scott Mills
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Scott Mills
 

More from Scott Mills (20)

Beyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyBeyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media Strategy
 
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya #SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
 
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisStopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
 
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsLawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
 
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
 
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In Schools
 
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
 
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
 
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
 
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
 
Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
 

Recently uploaded

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A BeĂąa
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

FBI And Cyber Crime | Crime Stoppers International

  • 1. FBI and Cyber Security Unit Chief David Wallace Cyber Division Federal Bureau of Investigation
  • 2.
  • 3.
  • 4.
  • 5. Mission HQ Mission : Coordinate, supervise and facilitate the FBI's investigation of those federal violations in which the Internet, computer systems, or networks are exploited as … targets of terrorist organizations, foreign government sponsored intelligence operations, or criminal activity;
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Scareware – also a form of Cyber Extortion
  • 11.
  • 12. Example of Phishing Emails Sent to Customers of U.S.-based Bank
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Botnet Threat Focus Cell Coreflood Takedown
  • 35. Botnet Threat Focus Cell Coreflood Takedown
  • 36.
  • 38.
  • 39.
  • 40.