VIPs Visit to Forensics Lab

With the opening of the IT Security and Forensics Hub at Temasek Polytechnic on the 27th July 2015, students from the TP ISACA Student Group were honored to give Minister for Communications and Information and Minister-in-charge of Cyber Security Dr Yaacob Ibrahim and several industrial guests a tour in the Forensics Lab. The esteemed visitors were mainly introduced to the workflow involved and forensic tools utilized in a forensic investigation.

In the midst of preparing forensic tools

In the midst of preparing forensic tools

The students have demonstrated the first stage of an investigation – acquisition by connecting the mobile device evidence to the UFed touch from Cellbrite which is used in mobile forensics investigation. Subsequently, an extraction of the phone data to the removable drive is performed. The importance of ensuring that no data would be written into the original evidence while the original evidence is being copied is emphasized as well, as the students present a forensic tool called write-blocker.

Next, proceeding to the analysis stage of an investigation, Physical Analyzer, a software also developed by Cellbrite, was shown to the guests. The software displays a variety of data sources stored in the mobile device that allows investigators to analyze the patterns of the suspect’s behavior.

Finally, at the last stage – reporting, the students illustrated the use of Encase, an industry standard forensic tool, by presenting the important information in an organized and structured manner. Additionally, UFed Link Analysis, another forensic tool used for reporting, was exhibited. It is able to correlate evidence that has been acquired to the case and automatically generates a timeline which would be included in the report for submission in court.

With the quick overview of the forensics tools and workflow stages, the tour with Dr Yaacob and the valued visitors has successfully ended.

IMG_4052

ACE Certification Workshop 2015

The ACE Workshop, organised for Digital Forensics students, was held from 10 to 12 June 2015 for the participants that had signed up for the certification.

The first day of the workshop had commenced with the familiarization of FTK and FTK Imager, bringing the participants in depth to the registry viewer, regular expressions for searching purposes and the processing of a case.

Instructor Kin Zhong teaching on FTK Imager & Registry Viewer

Instructor Kin Zhong teaching on FTK Imager & Registry Viewer

Instructor Leon teaching on FTK's features

          Instructor Leon teaching on FTK’s features

On the second day, how a case can be narrowed and filtered was being taught. The common artifacts such as Thumbs.db and Metadata were being brought into discussion as well. For an investigator, its common to review cases where certain files were encrypted with a password. Hence, Password Recovery ToolKit (PRTK) was being taught to the participants in the process of recovering the password for a particular encrypted document. The participants were also guided through in how a file system can be encrypted by a user and the algorithm behind such encryption protocol. Finally, the procedure in how a case can be generated into a report concluded the teaching course.

Ultimately, on the last day of the workshop, it’s time for the participants to apply what they had learnt in the online test carried out by AccessData. There were 40 MCQ questions involved with a time limit of 90 minutes. The questions comprises of both theory and practical questions, where the practical questions require the students to go through the given image in order to answer them correctly.

20150612_131956 20150612_131927

The entire ACE Workshop had finally ended off with most of them passing the examination. Congratulations to the new batch of students who are now certified as an AccessData Examiner!

Name Admin Number
Leow Chen Kai 1302481E
Wan Teng Chew Spencer 1403289J
Andy Aw 1305943A
Tay Yong Jun Donovan Murdoch 1303859A
Kevin Tan 1400110A
Chan Jian Hao 1404563G
Chua Chiang Sheng, Andy 1403084E
Leow Wen Siong 1400438F
Lee Mei Hui, Adeline 1405312H
Tan Aik Kiong Samson 1301735E
Muhamad Afiq Busari 1406296B
Ong Chang Hong 1403204I
Jerold Nay Li Cong 1303658G

Special thanks to the instructors, Kin Zhong, Leon, Clara, Zhi Wei and Yu Xi who had provided their assistance by guiding the participants through the entire workshop!

A selfie to end off the workshop!

A selfie to end off the workshop on the last day!

PCS Security Video Forensics Workshop – LEVA Digital Multimedia Processing

Proudly sponsored by PCS Security, a 1-day Video Forensics workshop by Leva International, Inc was being held at Temasek Polytechnic for some of the Seniors in Digital Forensics. The trainers were experienced Forensics Video analyst with extensive experience in video/audio evidence analysis, management of large-scale CCTV system and investigation and documentation of homicides.  They had also worked in US law enforcement agency and had much field experience to share.

The workshop began with a lecture in Video Forensics where the instructor went in depth with the various tasks assigned to a video forensics technician and an analyst respectively. After which, they carried on with the hands-on practical training. The training was started off with the analysis of the various images to determine their authenticity in whether they had been modified. The various tools used in steganography, be it seeking for the hidden file from an image or hiding a file within an image, was being introduced as well. The practical session also comprised of the techniques in Motion Tracking using Avid Media Composer and Frame Averaging using Adobe Photoshop CS6 to reduce the digital noises in the image.

Last but not least, to sum up the workshop, the instructors had provided the students a real case scenario encountered during investigation and how video forensics had helped to recognize the suspect who was then eventually sentenced to prison for the crime committed.


Digital multimedia plays a big part in criminology, and with the various video forensics processing techniques, it had essentially aid investigations to a large extent. Hence, it was an honorable opportunity for the students to participate in this workshop, gaining an insight to video forensics and how it actually contributes to solving a crime.

With that, the workshop had ended with a group photo (as shown below) which includes the instructors and the participants.

IMG-20150515-WA0007

DFS Get Together Day 2015

The long-awaited annual DFS Get Together Day was finally held on 8th May 2015. Having a day off from the hectic academic schedule of the students, this day aims to provide a platform for the Freshmen, Juniors and Seniors to interact more with one another, and most importantly, to have fun!

Before the main activity was being commenced, food catering was being served for the participants. The students mingled among themselves outside the LT while helping themselves with the food provided.

Finally, the fun part of the event is about to begin when the students report back to the LT for the briefing of the activity – Who is the Murderer?

IMG_4779

While waiting for the briefing to start

IMG_4769

There are 9 main characters for the murder plot, and the task of the participants is to figure out who the victims are and of course, who the murderer is. Observational and inferential skills were being tested here where the participants have to actively search for the clues and puzzles in the stations (“murder crime scenes”) to reconstruct the whole murder scenario. The winner will be the team that is the fastest in completing the stations and also getting the answers right.

In order to allow the students to interact more among their course-mates, the students were grouped up in teams of 4, which comprises of students from different classes.

After which, to determine which are the teams that goes to the stations first, a mini game called “Takinoko” was being played. The teams that did not win would be held in the holding room whereas the other teams would proceed on with the stations first.

IMG_4782

During the mini game play session

After the mini-game play, the teams departed to their allocated location. The teams that remained in the holding room mingled among themselves, perhaps deriving with a strategy or just a chit-chat session with their course-mates from another class.

IMG_4802 IMG_4808 IMG_5167

So, who is the ultimate murderer? To figure that out, every group went through all 4 compulsory murder crime scenes before heading to the last station to narrate their final conclusion to the master of the station.

The stations are dark… and the teams had to use any light sources they possess to figure out the clues located in each respective stations that could potentially point to the suspect, or what had happened to the person that was dead.

IMG_4905

Taking photos of evidences left behind the murder scene?

IMG_4906

Discussing with the team-mates regarding the evidences retrieved

IMG_4923

Group photo with a team!

IMG_4801

Team photo with another group!

Here are some clues that were found by the teams themselves in the respective stations.

Upon receiving the clues from all 4 stations, the teams proceeded on with an intense discussion among themselves to figure out what had exactly happened – who had killed who?

IMG_5059 IMG_5050 IMG_5043 IMG_5117 IMG_5124 IMG_5148 IMG_5063

Finally, after the thorough discussion within the respective teams, each team had to enter the final station and present their answers to… someone inside the room.

IMG_5185

Oh, hi there, are you that someone?

IMG_5151

Or is it you?

After all the teams had completed all the stations, they reported back to the holding room for the revelation of what had exactly occurred in the various stations they had went to. The event had ended off with the prize ceremony of the winners for the activity which was presented by our Course Manager, Ms Lock. Congratulations to the teams that had won!

IMG_5197 IMG_5199

IMG_5191

This marks the end of DFS Get Together Day 2015 and with that, sit back, relax and enjoy the photos taken during the event.

This slideshow requires JavaScript.

Governance Technology Audit, Control and Security Conference (GTACS) 2015

Proudly organized by ISACA Singapore Chapter, the Governance Technology Audit, Control and Security Conference (2015) was held at The Sands Expo and Convention Center from 3rd to 6th March.

TP ISACA Student Group had deployed students to assist various segments of the event such as registration and ushering. The students are honored to be present for some of the conference sessions while helping out for the event.

Some of our students helpers for the conference

Some of our students helpers for the conference

The key note and session speakers for the conference are as per follow:-

KEY NOTE SPEAKERS

Mr. Damien Pang Tee Kin, Deputy Director (Technology Risk Supervision) of Monetary Authority of Singapore

Mr. Erik Wilgenhof Plante, Chief Compliance Officer of itBit Pte Ltd

Dr. Madan M. Oberoi, Director (Cyber Innovation & Outreach) of INTERPOL

Mr. Steve Durbin, Managing Director of ISF Limited

SESSION SPEAKERS

Mr. Aaron Tan Dani, Chairman and Founder of IASA Asia Pacific

Mr. Chan Meng Fai, IT Auditor of Singapore Airlines

Mr. Christopher Low, Co-Founder of ThinkSECURE Ptd Ltd

Mr. Henry Ee, Managing Director of BCP Asia Ptd Ltd

Mr. John Ellis, Enterprise Security Director of Akamai Technologies

Ms. Joyce Chua Lee Keng, Assistant Vice President (Group Internal Audit) of Singapore Post Ltd

Mr. Lee Chee Yong, Agile Practice Lead of NCS Ptd Ltd

Mr. Lim Kian Kim, Head of Corporate Compliance and Data Protection of Joseph Tan Jude Benny LLP

Mr. Pierre Noel, Chief Security Officer, Advisor of Microsoft

Dr. S.P.T. Krishnan, Laboratory Head (Embedded/Mobile Security) of Institute for Infocomm Research

Mr. Tao Yao Sing, Assistant Director of Infocomm Development Authority of Singapore

Mr. Thomas Kok, Head of Group Business Continuity Management of DBS Bank

Mr. Tommy Seah, Chief Fraud Examiner of CFE-In-Practice

Mr. Rajeev Andharia, Director of Business Technology Partner Pte Ltd

Mr. Viktor Pozgay, Head of Information Risk Management (Enterprise Security Services) of Asia Pacific & Japan Hewlett-Packard Company

***More details regarding the various speakers can be found on the official GTACS website (http://www.cvent.com/events/gtacs-2015/custom-40-ea863b5f79ff487f9140a4b928a1afc3.aspx)

GTACS 2015 had provided the student helpers a good exposure to the industry seminars and conferences while executing their responsibility as a helper. In recognition of their efforts contributed to the conference, the President of ISACA Singapore Chapter had thus issued Certificate(s) of Participation in appreciation and recognition of their invaluable service that had contributed to the success of GTACS 2015.

Certificate of Participation issued to our student helpers

Certificate of Participation issued to our student helpers

It was an enjoyable experience for the student helpers and we hope to receive the honorable opportunity again to be part of GTACS 2016!

GovernmentWare 2014

This year’s GovWare 2014 happened to be the 23rd GovWare held, and was all about Strengthening Cyber Security Ecosystem.

What is GovWare all about?

It is an event where IT professionals from cyber security industries gather together to share updates and information about the latest threats and solutions. There were exhibits held by various vendors to showcase their products and some other projects that are done by our local academia. It is held over a period of 3 days.

Like most events, it started with the registration of guests, which was also to acquire the entry passes for the event.

Crowd of professionals and guests anticipating the start of this year’s exhibition.

Various speakers and experts shared their views on the different aspects of the IT industry. The opening speech was given by Masagos Zulkifli Bin Masagos Mohamad, Senior Minister of State, Ministry of Home Affairs & Ministry of Foreign Affairs.

The 5th Singapore Cyber Conquest was also part of GovWare 2014. There were more than 20 teams participating in this conquest which lasted over 8 hours. The teams were given challenges to complete and gained points from solving each task or question. There were 3 teams representing Temasek Polytechnic who participated in this competition.

Another part of GovWare 2014 are the exhibitions. One of the exhibition is the sharing of projects by the different polytechnics.

Booths stationed adjacently

For Temasek Polytechnic, the third year students from the Diploma in Digital Forensics and Diploma in Cyber & Digital Security showcased their projects. The 3 projects showcased were HALINA, PwnDETECT and Echo-Me. Having the honor of showing the projects to the various guests was a good exposure for our students.

TP Booth

There were many exhibitors that participated in GovWare 2014, including AccessData, HP, Symantec, RSA, Intel, Amazon.

Dr. Yap, a lecturer from DFS, also delivered a presentation on “Programmer or Administrator?”. His presentation discussed the topic on Security for Software Defined Network (SDN) and Network Functions Virtualization (NFV).

This concludes the 3 days of GovWare 2014. It was an interesting experience to see and learn more about the numerous solutions and products implemented by cyber security industries and academia. We look forward to the upcoming GovWare 2015 and we hope to see you there!

Red Hat Certified Systems Administrator Certifications

Recently, a group of students sat for the Red Hat Certified Systems Administrator certificate and have achieved the certification successfully. We are pleased to congratulate the following students:

1 Chew Kin Zhong 1300469B DFS
2 Ngo Tee Koon 1300199E DFS
3 Jacky Chan Chun Kit 1307037J DFS
4 Bernice Choy Pei Zhen 1302454B CDS
5 MUHAMMAD YUSRI BIN MOHD YUNUS 1200629B CDS
6 DERWIN LIM CHIN WEE 1306883H CDS

Congratulations all. For the rest of our students who are interested, do keep in touch with your respective SIG’s to see when the next round of certification is taking place.