CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Size: px
Start display at page:

Download "CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak"

Transcription

1 CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

2 Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic Law Issues

3 Investigation Process According to many professionals, Computer Forensics is a four (4) step process: Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites

4 Investigation Process According to many professionals, Computer Forensics is a four (4) step process: Evaluation Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws

5 Digital Investigation Process Model Brian Carrier An Event-Based Digital Forensic Investigation Framework

6 Readiness Phases Computer forensics lab Where you conduct your investigation Store evidence House your equipment, hardware, and software American Society of Crime Laboratory Directors (ASCLD) offers guidelines for: Managing a lab Acquiring an official certification Auditing lab functions and procedures

7 Staff Readiness Lab manager duties : Estimate when to expect preliminary and final results Create and monitor lab policies for staff Provide a safe and secure workplace for staff and evidence Staff member duties: Knowledge and training: Hardware and software OS and file types Deductive reasoning

8 Acquiring Certification and Training Update your skills through appropriate training International Association of Computer Investigative Specialists (IACIS) Created by police officers who wanted to formalize credentials in computing investigations Certified Electronic Evidence Collection Specialist (CEECS) Certified Forensic Computer Examiners (CFCEs)

9 Acquiring Certification and Training (continued) High-Tech Crime Network (HTCN) Certified Computer Crime Investigator, Basic and Advanced Level Certified Computer Forensic Technician, Basic and Advanced Level EnCase Certified Examiner (EnCE) Certification AccessData Certified Examiner (ACE) Certification Other Training and Certifications High Technology Crime Investigation Association (HTCIA)

10 Acquiring Certification and Training (continued) Other training and certifications SysAdmin, Audit, Network, Security (SANS) Institute Computer Technology Investigators Network (CTIN) NewTechnologies, Inc. (NTI) Southeast Cybercrime Institute at Kennesaw State University Federal Law Enforcement Training Center (FLETC) National White Collar Crime Center (NW3C)

11 Physical Requirements for a Computer Forensics Lab Most of your investigation is conducted in a lab Lab should be secure so evidence is not lost, corrupted, or destroyed Provide a safe and secure physical environment Keep inventory control of your assets Know when to order more supplies

12 Digital Crime Scene Investigation Phases Brian Carrier An Event-Based Digital Forensic Investigation Framework

13 Digital Evidence Searching Phase

14 Event Reconstruction Phase Brian Carrier An Event-Based Digital Forensic Investigation Framework

15 Ethics and Codes Ethics Rules you internalize and use to measure your performance Codes of professional conduct or responsibility Standards that others apply to you or that you are compelled to adhere to by external forces Such as licensing bodies People need ethics to help maintain their balance And self-respect and the respect of their profession

16 Applying Ethics and Codes Laws governing codes of professional conduct or responsibility Define the lowest level of action or performance required to avoid liability Expert witnesses should present unbiased, specialized, and technical evidence to a jury Expert witnesses testify in more than 80% of trials And in many trials, multiple expert witnesses testify

17 Applying Ethics and Codes to Expert Witnesses The most important laws applying to attorneys and witnesses are the rules of evidence Experts are bound by their own personal ethics and the ethics of their professional organizations In the United States, there s no state or national licensing body for computer forensics examiners

18 Computer Forensics Examiners Roles in Testifying Computer forensics examiners have two roles: Scientific/technical witness and expert witness Scientific/technical witness Person involved in a case, investigator that found and presented the evidence As expert witness You can testify even if you weren t present when the event occurred Or didn t handle the data storage device personally Criticism: it s possible to find and hire an expert to testify to almost any opinion on any topic

19 Organizations with Codes of Ethics No single source offers a definitive code of ethics for forensic investigator You must draw on standards from other organizations to form your own ethical standards

20 International Society of Forensic Computer Examiners Includes guidelines such as the following: Maintain the utmost objectivity in all forensic examinations and present findings accurately Conduct examinations based on established, validated principles Testify truthfully in all matters before any board, court, or proceeding Avoid any action that would appear to be a conflict of interest

21 International Society of Forensic Computer Examiners (continued) Includes guidelines such as the following: (continued) Never misrepresent training, credentials, or association membership Never reveal any confidential matters or knowledge learned in an examination without an order from a court of competent jurisdiction or the client s express permission

22 International High Technology Crime Investigation Association HTCIA core values include the following requirements related to testifying: The HTCIA values the Truth uncovered within digital information and the effective techniques used to uncover that Truth, so that no one is wrongfully convicted The HTCIA values the Integrity of its members and the evidence they expose through common investigative and computer forensic best practices, including specialized techniques used to gather digital evidence

23 International Association of Computer Investigative Specialists Standards for IACIS members include: Maintain the highest level of objectivity in all forensic examinations and accurately present the facts involved Thoroughly examine and analyze the evidence Conduct examinations based upon established, validated principles Render opinions having a basis that is demonstratively reasonable Not withhold any findings that would cause the facts of a case to be misrepresented or distorted

24 BCS CODE OF CONDUCT Public Interest Legitimate rights of third parties include protecting personal identifiable data to prevent unlawful disclosure and identity theft, and also respect for copyright, patents and other intellectual property. Professional Competence and Integrity You should only claim current competence where you can demonstrate you have the required expertise e.g. through recognised competencies, qualifications or experience. Duty to Relevant Authority If any conflict is likely to occur or be seen by a third party as likely to occur you will make full and immediate disclosure to your Relevant Authority. Duty to the Profession Share knowledge and understanding of IT and support inclusion of every sector of society.

25 Legal Issues In criminal investigation you ALWAYS have to have warrant!!! Warrant can be issued for: Entire company, floor, room, a device, car, house, any company/person owned property Mobile phone cases issues with interception rules laid down in RIPSA [Regulations of Investigative Powers (Scotland) Act]

26 Ethics and Warrants A lot of the ethical issues are covered by the warrants system. Before a warrant can be issues a judge is presented with the evidence that suggests a search will find something relating to the crime under investigation. He will then way this against the person's freedoms and decide whether the warrant should be granted.

27 Corporate Investigation Issues Non-criminal internal investigation can be restricted by the individual s right of privacy Data Protection Act Company Polices

28 Best Practice ACPO Principle 1 - No action taken by law enforcement or their agents should change data held on an electronic device or media which may subsequently be relied upon in Court. Principle 2 - In exceptional circumstances where a person finds it necessary to access original data held on an electronic device or media, that person must be competent to do so, and be able to give evidence explaining the relevance and the implications of their actions.

29 Best Practice ACPO Principle 3: An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

30 Best Practice ACPO Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.

31 ANY QUESTIONS?

32 Assessment: Short-Answer Examples Question: What are the requirements for the computer forensic lab? Answer:

33 Assessment: Short-Answer Examples Question: What is a difference between Ethics and Code of Practice? Answer:

34 Assessment: Short-Answer Examples Question: How Data Protection Act can create problems in a corporate investigation? Answer:

Chapter 3: The Investigator s Office and Laboratory

Chapter 3: The Investigator s Office and Laboratory Chapter 3: The Investigator s Office and Laboratory Dept. of Computer Science 1 Objectives Describe certification requirements for computer forensics labs List physical requirements for a computer forensics

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer

More information

Guide to Computer Forensics and Investigations, Second Edition

Guide to Computer Forensics and Investigations, Second Edition Guide to Computer Forensics and Investigations, Second Edition Chapter 3 The Investigator s Office and Laboratory Objectives Understand computer forensics lab certification requirements Determine the physical

More information

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position

More information

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured

More information

Computer Forensics Preparation

Computer Forensics Preparation Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

More information

Course Forensic Science. Unit II History

Course Forensic Science. Unit II History Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private

More information

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015 `STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

CAREER: FORENSIC SCIENCE TECHNICIAN 1

CAREER: FORENSIC SCIENCE TECHNICIAN 1 CAREER: FORENSIC SCIENCE TECHNICIAN 1 Career: Forensic Science Technician Mary C. Cartwright Middlesex Community College CRJ 111-52 Heloisa DaCunha November 29, 2012 CAREER: FORENSIC SCIENCE TECHNICIAN

More information

JAMES R. SWAUGER Digital Forensic Examiner

JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS

More information

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE CURRICULUM VITAE Jason Jordaan: CFE, PMCSSA, ACE MTech (Forensic Investigation), BComHons (Information Systems), BSc (CJ Computer Science) Summa Cum Laude, BTech (Policing) +27 (083) 556 7112 jjordaan@siu.org.za

More information

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS AND

More information

Conviction Integrity Unit Best Practices October 15, 2015

Conviction Integrity Unit Best Practices October 15, 2015 Conviction Integrity Unit Best Practices October 15, 2015 District Attorney s offices are increasingly creating Conviction Integrity Units (CIUs) to re examine questionable convictions and guard against

More information

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis

More information

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: JJordaan@siu.org.za Professional Summary A multidisciplinary digital

More information

GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION

GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION The American Society of Crime Laboratory Directors is a professional organization of managers and supervisors employed in forensic laboratories.

More information

Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery,

Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

STATE OF COLORADO July 2015

STATE OF COLORADO July 2015 STATE OF COLORADO July 2015 CRIMINAL INVESTIGATOR A2A1IX TO A2A5XX DESCRIPTION OF OCCUPATIONAL WORK This class series includes five levels in the Enforcement and Protective Services occupational group

More information

SECURITIES EXAMINER (ENTRY) 5670

SECURITIES EXAMINER (ENTRY) 5670 SECURITIES EXAMINER (ENTRY) 5670 GENERAL DESCRIPTION OF CLASS The SECURITIES EXAMINER (ENTRY), under the guidance of a Securities Examiner, analyzes and evaluates the activities of individuals and businesses

More information

CHFI v8(computer Hacking Forensics Investigator)

CHFI v8(computer Hacking Forensics Investigator) CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

Digital Forensics & e-discovery Services

Digital Forensics & e-discovery Services Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

Piecing Digital Evidence Together. Company Information

Piecing Digital Evidence Together. Company Information Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the

More information

Computer Hacking Forensic Investigator v8

Computer Hacking Forensic Investigator v8 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer

More information

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460. Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security

More information

Digital Forensics & e-discovery Services

Digital Forensics & e-discovery Services Digital Forensics & e-discovery Services Andrews International Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities

More information

ATTORNEY GENERAL INVESTIGATOR

ATTORNEY GENERAL INVESTIGATOR MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION ATTORNEY GENERAL INVESTIGATOR JOB DESCRIPTION Employees in this job function as Attorney General Investigators performing investigative assignments in

More information

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West

More information

Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008

Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008 Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate CDFSL 2008 Oklahoma City, OK April 23, 2008 Gary C. Kessler Champlain College Burlington, VT DISCLAIMER I teach

More information

U.S. MILITARY INVESTIGATIONS: TYPES & PROCEDURES

U.S. MILITARY INVESTIGATIONS: TYPES & PROCEDURES U.S. Military Investigations: Types & Procedures Background Materials U.S. MILITARY INVESTIGATIONS: TYPES & PROCEDURES [ NOTE TO INSTRUCTOR: The words below that appear in plain text also appear in the

More information

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS A. Scope. This Code of Business Conduct and Ethics applies to all Berkshire Hathaway directors, officers and employees, as well as to directors,

More information

Digital Forensics. Larry Daniel

Digital Forensics. Larry Daniel Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters

More information

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York INSTRUCTOR INFORMATION Name: Sanjay Goel Email: goel@albany.edu Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:

More information

PERSON SPECIFICATION. Digital Forensic Technician. Job Title: Post No: HP083 Status: Substantive Date:

PERSON SPECIFICATION. Digital Forensic Technician. Job Title: Post No: HP083 Status: Substantive Date: PERSON SPECIFICATION Area: EMSOU Job Title: Digital Forensic Technician Weekly Hours: Section: CCU Scale: SO2 Version: V1 Post No: HP083 Status: Substantive Version Date: 37 January 2014 Please describe,

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information

More information

PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.

PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. TOYOTA ASSOCIATE DISPUTE RESOLUTION ( T-ADR ): Summary Description

More information

Background Check Laws: District of Columbia Scott J. Wenner and Joleen Okun, Schnader Harrison Segal & Lewis LLP

Background Check Laws: District of Columbia Scott J. Wenner and Joleen Okun, Schnader Harrison Segal & Lewis LLP Background Check Laws: District of Columbia Scott J. Wenner and Joleen Okun, Schnader Harrison Segal & Lewis LLP This Article is published by Practical Law Company on its PLC Law Department web service

More information

INTRODUCTION AREAS OF SPECIALIZATION

INTRODUCTION AREAS OF SPECIALIZATION Eoghan-Intro.qxd 1/6/04 3:01 PM Page 1 INTRODUCTION INTRODUCTION In the years since the first edition of this book, there has been an explosion of interest in digital evidence. This growth has sparked

More information

CYBER FORENSICS (W/LAB) Course Syllabus

CYBER FORENSICS (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information

More information

Legal Ethics Practical Tips from Where else?... Practice

Legal Ethics Practical Tips from Where else?... Practice Legal Ethics Practical Tips from Where else?... Practice Presented by: Mark C. Dosker mark.dosker@squiresanders.com Corporate Miranda or Upjohn Warnings Issues Facing Counsel at the Onset of an Internal

More information

A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF

A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF 6) Course 1: 12-16 March 2012 and 26-30 March 2012 Course

More information

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial

More information

Lance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: lancesl@cfsiusa.com

Lance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: lancesl@cfsiusa.com Lance Eliot Sloves Certified Computer Examiner (CCE, EnCE) Licensed Private Investigator, TX Testifying Expert Independent Government Contractor Active Top Secret/SSBI US Government Clearance Computer

More information

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better. BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts

More information

C R I M E S C E N E. Forensic Science CC 30.07 Spring 2007 Prof. Nehru

C R I M E S C E N E. Forensic Science CC 30.07 Spring 2007 Prof. Nehru C R I M E S C E N E Physical Evidence Crime laboratories run on physical evidence Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link

More information

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in

More information

Cyber Crime and Digital Forensics in Japan

Cyber Crime and Digital Forensics in Japan Cyber Crime and Digital Forensics in Japan Tetsutaro UEHARA Academic Center for Computing and Media Studies, Kyoto University uehara@media.kyoto-u.ac.jp Table of Contents Introduction: Motivation and Background

More information

Roy D. Rector CFCE EnCE

Roy D. Rector CFCE EnCE 1803 West Avenue Austin, Texas 78701 (512) 895-9555 (512) 895-9555 www.r3forensics.com Roy D. Rector CFCE EnCE Operations Manager / Senior Forensic Examiner Roy D. Rector is a founder and the Senior Digital

More information

S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:

S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine: S. Robert Radus, CPA CFE PI Curricula Vitae Catalogue of Forensic Accounting and Computer Services Examination of plaintiff, respondent, and defendant books and records to determine: 1. Violations of Law.

More information

TERMS & CONDITIONS OF BUSINESS

TERMS & CONDITIONS OF BUSINESS TERMS & CONDITIONS OF BUSINESS 1. Introduction These terms and conditions explain the basis upon which we carry out work for you and charge for our services subject to any variations set out in our engagement

More information

FIRE MARSHAL I, DEPUTY

FIRE MARSHAL I, DEPUTY Page 1 FIRE MARSHAL I, DEPUTY CHARACTERISTICS OF WORK: This is fire and arson investigation field work in the highly technical and specialized field of criminal investigation which requires the exercise

More information

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com. CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3

More information

San Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0

San Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0 San Diego Chapter AUDITORS UNCOVERING CRIMINAL ACTS THE REAL BURDEN OF PROOF OR DBPP V1.0 Who is This Guy? George R. Thomas, MBA, CIA, CGAP, CRMA Detective Sergeant San Diego Police Department Current

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 AN ACT TO (1) CREATE THE NORTH CAROLINA FORENSIC SCIENCE ADVISORY BOARD, (2) ENCOURAGE EFFORTS TO ELIMINATE SOURCES OF

More information

STATE POLICE FORENSIC TECHNICAL LEADER

STATE POLICE FORENSIC TECHNICAL LEADER JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,

More information

LAW ENFORCEMENT OFFICER

LAW ENFORCEMENT OFFICER Class Code: 7824 TITLE: REPORTS TO: SUPERVISES: Law Enforcement Officer Grade 21 Director Law Enforcement N/A JOB FUNCTION: Perform a variety of law enforcement activities for an assigned school District

More information

WHISTLEBLOWER POLICY. a) Code means the TALIC's code of conduct as in force from time to time;

WHISTLEBLOWER POLICY. a) Code means the TALIC's code of conduct as in force from time to time; WHISTLEBLOWER POLICY Company s Vision: To be the most trusted Life Insurance Company that values Customers financial well being, consistently delivering best in class solutions and respected by all. The

More information

The Legal System in the United States

The Legal System in the United States The Legal System in the United States At the conclusion of this chapter, students will be able to: 1. Understand how the legal system works; 2. Explain why laws are necessary; 3. Discuss how cases proceed

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011

Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011 Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011 My Qualifications 20 years : Forensic Serology and DNA cases at the FDLE 30+ years: Training Forensic DNA Technologists & DNA Analysts 30+

More information

When you need someone to scrutinize your financial situation, call Kessler International we'll turn your questions into answers.

When you need someone to scrutinize your financial situation, call Kessler International we'll turn your questions into answers. It's no secret that today's highly-volatile business environment demands a high level of financial scrutiny multinational corporations have been brought down by instances of financial fraud, often perpetrated

More information

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be

More information

Terms of Reference. for the. Forensic Science Advisory Council

Terms of Reference. for the. Forensic Science Advisory Council Terms of Reference for the Forensic Science Advisory Council Status The Forensic Science Advisory Council ( the Council ) is a body established to advise and support the Forensic Science Regulator ( the

More information

Section 17: Offenses against the Administration of Justice

Section 17: Offenses against the Administration of Justice 399 Section 17: Offenses against the Administration of Justice General Very often, the legislation of post-conflict states lacks adequate administration-ofjustice offenses. This section is a relatively

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program

Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program Office: Name of Beginning Lawyer: Bar No. Name of Mentor: Bar No. MODEL MENTORING PLAN OF ACTIVITIES AND EXPERIENCES FOR STATE

More information

MINIMUM QUALIFICATIONS: To be eligible for this position, you must possess the qualifying specialized

MINIMUM QUALIFICATIONS: To be eligible for this position, you must possess the qualifying specialized QUALIFICATIONS REQUIRED: MINIMUM QUALIFICATIONS: To be eligible for this position, you must possess the qualifying specialized experience and/or education as described in the OPM occupational requirements.

More information

PROFESSIONAL COUNSELSM

PROFESSIONAL COUNSELSM PROFESSIONAL COUNSELSM ADVICE AND INSIGHT INTO THE PRACTICE OF LAW Lawyers Toolkit 3.0: A Guide to Managing the Attorney-Client Relationship A CNA PROFESSIONAL COUNSEL GUIDE FOR LAWYERS AND LAW FIRMS The

More information

Langara College Spring 2007 - archived

Langara College Spring 2007 - archived Course: Criminal Justice 217 INSTRUCTOR: Mr. Laurie Lowes Phone: Office: 323-5482 Work: 272-7115 (Voice Mail) Home: 597-4373 OFFICE HOURS: 7:30 am - 8:30 am Thursday and Friday (Also by appointment) COURSE

More information

Practice Aid 10 1. Serving as an. Expert Witness. or Consultant 10639-378

Practice Aid 10 1. Serving as an. Expert Witness. or Consultant 10639-378 Practice Aid 10 1 Serving as an Expert Witness or Consultant 10639-378 NOTICE TO READERS This publication is designed to provide illustrative information with respect to the subject matter covered. It

More information

GENERAL UNIVERSITY POLICY APM - 190 REGARDING ACADEMIC APPOINTEES Appendix A-1 Selected Presidential Policies

GENERAL UNIVERSITY POLICY APM - 190 REGARDING ACADEMIC APPOINTEES Appendix A-1 Selected Presidential Policies UNIVERSITY OF CALIFORNIA POLICY ON REPORTING AND INVESTIGATING ALLEGATIONS OF SUSPECTED IMPROPER GOVERNMENTAL ACTIVITIES (WHISTLEBLOWER POLICY) I. Introduction The University of California has a responsibility

More information

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection As amended by P.L.79-2007. INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection IC 5-11-5.5-1 Definitions Sec. 1. The following definitions

More information

Whistleblower Policy (Policy on Reporting and Investigating Allegations of Suspected Improper Governmental Activities)

Whistleblower Policy (Policy on Reporting and Investigating Allegations of Suspected Improper Governmental Activities) (Policy on Reporting and Investigating Allegations of Suspected Improper Governmental Activities) Responsible Officer: SVP - Chief Compliance & Audit Officer Responsible Office: EC - Ethics, Compliance

More information

Computer Forensics: an approach to evidence in cyberspace

Computer Forensics: an approach to evidence in cyberspace Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based

More information

Digital Forensics Educational Needs in the Miami Valley Region

Digital Forensics Educational Needs in the Miami Valley Region Peterson, G.L., Raines, R.A., and Baldwin, R.O., Digital Forensics Educational Needs in the Miami Valley Region, Journal of Applied Security Research, vol. 3, no. 3-4, pp. 429-439, 2008. DOI: 10.1080/19361610801981662.

More information

PART II - CODE OF ORDINANCES GENERAL ORDINANCES Chapter 2 - ADMINISTRATION ARTICLE XVI. - BOARDS, COUNCILS, COMMISSIONS AND AUTHORITIES

PART II - CODE OF ORDINANCES GENERAL ORDINANCES Chapter 2 - ADMINISTRATION ARTICLE XVI. - BOARDS, COUNCILS, COMMISSIONS AND AUTHORITIES DIVISION 11. CITIZEN REVIEW BOARD Sec. 2-2201. Establishment of the Atlanta Citizen Review Board. Sec. 2-2202. Appointment of members. Sec. 2-2203. Composition of board. Sec. 2-2204. Time limit on appointments.

More information

CORRECTIONS INTERNAL AFFAIRS OFFICER

CORRECTIONS INTERNAL AFFAIRS OFFICER MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION CORRECTIONS INTERNAL AFFAIRS OFFICER JOB DESCRIPTION Employees in this job conduct and direct a variety of investigations in correctional facilities

More information

Continental Airlines Compliance Guidelines for Suppliers

Continental Airlines Compliance Guidelines for Suppliers Continental Airlines Compliance Guidelines for Suppliers Effective January 1, 2009 Table of Contents 1. Introduction...3 1.1 Scope of the Guidelines...3 1.2 Supplier Internal Compliance Program...3 1.3

More information

Course Forensic Science. Unit II History

Course Forensic Science. Unit II History Course Forensic Science Unit II History Essential Question What are some examples of careers in Forensic Science? TEKS 130.295(c) (4)(A)(B) Prior Student Learning History of Forensic Science Estimated

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

Curriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner

Curriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner Curriculum Vitae Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner Background and Summary of Qualifications Mr. Odenthal has 35 years experience as an Information

More information

POSITION INFORMATION DOCUMENT

POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Vehicle Examiner Career Group : Engineering and Construction Discipline : Metal Trades Classification : OPS4 Service : Operations Support Service

More information

QUALITY STANDARDS FOR DIGITAL FORENSICS

QUALITY STANDARDS FOR DIGITAL FORENSICS QUALITY STANDARDS FOR DIGITAL FORENSICS November 20, 2012 TABLE OF CONTENTS PREFACE... ii MANAGEMENT STANDARDS... 1 A. DIGITAL FORENSIC CAPABILITY... 1 B. QUALITY MANAGEMENT... 2 PERSONNEL STANDARDS...

More information

The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches

The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches Henry Nnoli, Dale Lindskog, Pavol Zavarsky, Shaun Aghili, Ron Ruhl Information Systems Security Management

More information

M E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities.

M E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities. M E M O R A N D U M TO: FROM: All Directors, Officers and Covered Persons of Power Solutions International, Inc. and its Subsidiaries Catherine Andrews General Counsel and Insider Trading Compliance Officer

More information

CRIME VICTIM ASSISTANCE STANDARDS

CRIME VICTIM ASSISTANCE STANDARDS V I C T I M S E R V I C E S D I V I S I O N Texas Department of Criminal Justice Victim Services Division CRIME VICTIM ASSISTANCE STANDARDS Developed and distributed by the The Texas Crime Victim Clearinghouse

More information

Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional

Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional THE FAMILY LAW PROCESS AND ITS REQUIREMENTS Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional wants.! 1. ARRAIGNMENT: Arraignment

More information