Digital Forensics & e-discovery Services
|
|
- Beatrix Hawkins
- 8 years ago
- Views:
Transcription
1 Digital Forensics & e-discovery Services
2 U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities and legal issues of extracting and analyzing electronic evidence. Our expertise ranges from computer, PDA and mobile phone hardware to operating systems that manage personal computers, network servers, and Internetwork devices such as routers, firewalls, and intrusion detection systems. Our global network of specialists work to assure that evidence is acquired in a forensically sound manner and to ensure court admissibility. Furthermore, throughout the forensic investigative phase, our experienced analysts utilize established software, forensic hardware tools and industry best-practices. As the process moves into the litigation stage, U.S. Security Associates (USA) will team up with counsel to perform forensic analysis, e-discovery and court certified expert witness testimony. Related services include: Electronic Evidence Acquisition Investigative and Financial Data Analysis e-discovery Advisory & Relativity review Intellectual Property Risk Control Litigation Support Expert Witness Testimony Data and Computer Security Assessments As data kept in electronic devices has become essential in legal proceedings, so has the area of electronic discovery. e-discovery entails the collection of electronic data produced through digital forensics and/or non-forensic means such as court ordered production requests. Unlike the investigative and computer "autopsy-like" disciplines of digital forensics which is focused on finding documents which may have already been deleted or hidden, electronic discovery usually
3 deals with large amounts of readily available information stored in computers which needs to be collected utilizing sound practices and copied to a retrievable media. Once collected, the documents are processed and staged for review by legal teams, which involves document classification, highlighting, searching, redacting, etc. Finally, the actual production of relevant documents to be used in legal proceedings. U.S. Security Associates offers end-to-end electronic discovery services including designated experienced practice managers and an award-winning web-based review platform. As a tier-one provider, U.S. Security Associates offers the legal profession the ability to handle their complex matters involving extremely large data sets. Additionally, U.S. Security Associates platform is architected to easily export to other popular litigation management software such as Concordance and Summation. With over 13 years and a thousand cases, U.S. Security Associates is a proven industry leader. Referenced below are select cases handled by U.S. Security Associates professionals: Former Account Executive Leaves and Copies Intellectual Property from Plaintiff's Systems Engaged by Plaintiff to determine if former account executive breached his employment contract. Forensically imaged the Subject's computer using Logicube's MD5. Staged and analyzed the forensic images in Encase. Through basic registry analysis, log files and examination of file date and time stamps, established that the user had in fact misappropriated sensitive client information by copying the data to a USB thumb-drive. The Windows Link files revealed that the user had accessed the client contact information from the USB drive after it was copied. Provided Expert witness testimony.
4 University and Threatening Assisted local university in tracing a threatening received by a professor. Obtained headers and examined the SMTP routing. USA determined the identification of the ISP and provided client with advisory services on how to proceed, which was to file a lawsuit and obtain a subpoena duces tecum for records from the ISP and the web-based services provider. FTC Shuts Down Websites Accused of Processing Stolen Credit Cards Hired by Court appointed Receiver on behalf of the Federal Trade Commission to assist in the seizure of a web hosting company which hosted many pornographic sites. The Defendant was accused of processing stolen credit cards. The day of the seizure, U.S. Security Associates entered as the digital forensic specialist for the Receiver and shutdown all remote connectivity. In addition, U.S. Security Associates obtained all login credentials and worked with FTC digital forensic specialists in the acquisition of workstations and logical acquisitions of MySQL Server based tables containing billing information. U.S. Security Associates performed velocity analysis of billed credit cards to identify trends of frequently used cards, and calculated revenue for varying periods. As a support role for the FTC, U.S. Security Associates provided results of analysis and copies of the billing records for the FTC to stage on their systems. Hotel Operator v Hotel Owner USA s role in the matter was to perform forensic analysis and expert witness testimony on behalf of Defendant. The Plaintiff alleged Defendant was gaining unauthorized access to the Plaintiff s computer network, and thus to and other proprietary and confidential materials located on the network, in violation of various statutes. USA s forensic analysis was primarily focused on firewall forensics, which entailed analysis of firewall logs and identifying and classifying rejected packets to determine nature of rejections. Analysis was performed on electronic evidence provided by Plaintiff, and the case involved a few hearings and ultimately went to trial. Provided expert witness testimony. Resort Reservation Management Company v Former Employees for Theft of Intellectual Property (Source-Code) Hired by the Plaintiff in this case, U.S. Security Associates was asked to carry a court order and forensically image computers from Defendant s operation. Thereafter, U.S. Security Associates was directed by Plaintiff counsel to determine if the source-code of the reservation management system originated or was the genesis of the Plaintiff s reservation system. The lawsuit entailed allegations that a former computer programmer
5 and sales executive started up a competing company after the non-compete period lapsed, but used Plaintiff s reservation software system as the core for their system. USA assisted counsel on drafting the motion for the forensic acquisition protocol, and carried it out on the computers. Thereafter, U.S. Security Associates staged the Plaintiff s system and the Defendant s SQL Server based system side-by-side for GUI comparison. U.S. Security Associates ran keyword searches using Encase on Plaintiff s servers and developer workstations to ascertain if Plaintiff source-code existed. U.S. Security Associates then proceeded to examine the data schema of Defendant s SQL tables and compared them to the Plaintiff s data structures and noted that through the order and case (upper/lower) that the Defendant s tables were created from either an import of the Plaintiff s files or simply typing the field names while viewing Plaintiff s files. Defendants deposed U.S. Security Associates on all computer related aspects of the case. Thereafter, U.S. Security Associates provided expert witness testimony in one hearing where it successfully demonstrated that the developer had changed the date on his workstation to deceive the Plaintiff in this case. Furthermore, U.S. Security Associates illustrated that the Defendant used a CD to burn a copy of the Plaintiff s source-code just prior to handing the computer over for forensic imaging. International Bank Defrauded of $150,000,000 + (Civil & Criminal) U.S. Security Associates role was to act as the digital forensic specialist for a Court appointed receiver, which was a forensic accounting firm. U.S. Security Associates was on the scene when the operation was seized and assessed the technical environment to disconnect all remote connectivity and preserve all of the electronic evidence. Thereafter, U.S. Security Associates supported the receiver, and the FBI with general e-discovery and providing images and reporting from the AS/400 and various servers and workstations. The case involved a factoring company, which borrowed funds from the bank, and after defaulting on the loans a lawsuit was filed. The lawsuit alleged that owners of the factoring company had swindled funds to other companies owned by them. Upon arrival U.S. Security Associates assessed the environment and disconnected routers and modems. Thereafter, servers and workstations were shutdown imaging process began with Encase. Upon completion, U.S. Security Associates staged images for viewing in Encase and started providing reports for ad-hoc requests. U.S. Security Associates mounted for viewing and ran various keyword searches and carved unallocated space for all relevant Microsoft compound documents. U.S. Security Associates provided the Encase images to the FBI as per their request, and to opposing counsel. U.S. Security Associates testified for the prosecution as an expert witness and the electronic evidence was introduced through its testimony. Central American Country Superintendent of Banks' Intervention of Major Bank Engaged by the Superintendent of Banks (SIB) and one of the Big 5 auditing firms to provide advisory services to with respect to identifying all electronic stored information
6 (ESI) and developing a strategy for forensically acquiring relevant ESI, and prepare for staging into an e-discovery platform. U.S. Security Associates met with SIB government officials, local lawyers and U.S. lawyers to define the scope and prepare an estimate of the acquisition phase. Upon approval, U.S. Security Associates traveled to the country and put together a local team to assist in forensically acquiring ESI. Tools used in the acquisition and hash verifications included Encase, Logicube's MD5 and FTK Imager. ESI was gathered from workstations, servers with internal storage and SANs with logical RAIDs, log files from networking and internetworking devices. Airline Anticipates Litigation -- Implements Litigation Hold and Prepares For e- Discovery Requests Engaged by carrier's outside counsel to design and implement a forensic ESI acquisition and evidence processing plan in support of anticipated e-discovery requests. U.S. Security Associates devised a plan to image the data and forensically acquire ESI from various locations using Logicube's MD5 and Encase. U.S. Security Associates worked on extracting files from active space and carved files from unallocated, pagefile.ssys and hiberfil.sys from files, and then providing these files to an e-discovery service provider who in-turn staged files in Clearwell. The carrier's format was Groupwise, and due to Clearwell's inability to natively process Groupwise, U.S. Security Associates ran conversions to PST files using Paraben's Network Examiner and Transcend Migrator. Company Sued in Personal Injury Case Hired by Plaintiff to carry out a Court ordered production request. The judge was not satisfied with the documents produced by the Defendant, and ordered a digital forensic specialist to search Defendant's systems for responsive documents related to insurance claims filed against the moving company. U.S. Security Associates went onsite and assessed all environments where ESI resided and could possibly locate responsive documents. Data was located on two insurance claims systems -- the company is self-insured. One was an older commercial application on an AS/400 using a DB2 database, and the other was a proprietary system using SQL Server. An SQL Server data warehouse and a commercially available document management system were searched. In order to locate new responsive claims which the company had not produced, U.S. Security Associates created and run various SQL queries; used BusinessObjects to query and analyze the MS SQL Server data, and wrote scripts to tally and remove duplicate hits. Work resulted in the production of additional responsive documents.
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services Andrews International Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
More informationComputer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
More informationVancouver Toronto Seattle
Company Profile litigation support services Consulting Project Management Electronic Discovery Document Hosting Computer Forensics Database Re-engineering Trial Support leadership Searchlight is a full-service
More informationBDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
More informationCase Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
More informationSensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
More informationAn overview of IT Security Forensics
An overview of IT Security Forensics Manu Malek, Ph.D. Stevens Institute of Technology mmalek@ieee.org www.cs.stevens.edu/~mmalek April 2008 IEEE Calif. 1 Outline Growing Threats/Attacks Need for Security
More informationE- Discovery in Criminal Law
E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically
More informationBest Practices in Electronic Record Retention
I. Some Key Considerations In Whether To Engage An E-Discovery Vendor (Or Vendors) A. It is difficult to decide whether to retain a vendor if you don t know what your organization can do and at what cost.
More informationHow To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
More informationDigital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
More informationIntroduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
More informationPRIVACY IMPACT ASSESSMENT
PRIVACY IMPACT ASSESSMENT Outsourced Litigation Support Services September 2013 FDIC External Service Table of Contents System Overview Personally Identifiable Information (PII) in OLSS Purpose & Use of
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationInformation Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
More informationComputer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
More informationBreakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements
Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University
More informationArticle originally appeared in the Fall 2011 issue of The Professional Engineer
Article originally appeared in the Fall 2011 issue of The Professional Engineer Electronic Discovery in Litigation By Douglas P. Jeremiah, P.E., Esq. Your firm is involved in litigation and you get the
More informationMeasures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)
University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor
More informationS. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:
S. Robert Radus, CPA CFE PI Curricula Vitae Catalogue of Forensic Accounting and Computer Services Examination of plaintiff, respondent, and defendant books and records to determine: 1. Violations of Law.
More informationIN THE COURT OF CHANCERY OF THE STATE OF DELAWARE ) ) ) ) ) ) ) ) ) STIPULATION AND [PROPOSED] ORDER GOVERNING EXPERT DISCOVERY
This is the sample expert discovery stipulation referenced at Section II(4(h(ii(d of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should be modified to fit the
More informationJournal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
More informationClearwell Legal ediscovery Solution
SOLUTION BRIEF: CLEARWELL LEGAL ediscovery SOLUTION Solution Brief Clearwell Legal ediscovery Solution The Challenge: Months Delay in Ascertaining Case Facts and Determining Case Strategy, High Cost of
More informationCOWLEY COLLEGE & Area Vocational Technical School
COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Prerequisites: Basic
More informationWhat You Should Know About ediscovery
KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the
More informationThe Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
More informationDigital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
More informatione-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
More informationRule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover
: Discovering What There Is to Discover One of the challenges in electronic discovery is identifying the various sources of electronically stored information (ESI) that could potentially be relevant to
More informationComputer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
More informationSolution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
More informationDigital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
More informationXact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013
MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. kburke@xactdatadiscovery.com Scott Polus, Director of Forensic Services spolus@xactdatadiscovery.com 1 Where Do I Start??
More informationComputer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationEC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationInformation Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
More informationSufficiency of Windows Event log as Evidence in Digital Forensics
Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK
More informationWhat's New With E-Discovery?
What's New With E-Discovery? With the growing importance of e-discovery, new tools and time-saving strategies are making the process smoother and more efficient for litigation support professionals, attorneys
More informationThe Many Different Types of Electronic Discovery Searches
May 2004 Volume 2, Number 2 Result Categories of Electronic Discovery Searches Table of Contents The Ethical Implications of Your Computer Result Categories of Electronic Discovery Searches Lawyers often
More informationCertified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
More informationCase 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA
Case 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA UNITED STATES OF AMERICA CASE NO. 14-80031-CR-MARRA(s)(s) vs.
More informationChapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
More informationComputer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery,
Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis
More informationCSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
More informationPiec ing together financ ial puzzles
Piec ing together financ ial puzzles Stephen Pedneault, CPA/CFF, FCPA, CFE Stephen Pedneault is the Principal of Forensic Accounting Services, LLC, a Glastonbury, Connecticut CPA firm, focused exclusively
More informationE-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert
E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert While updating the two-day seminar Chris Grillo and
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationAbout Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
More informationE-Discovery and Data Management. Managing Litigation in the Digital Age. Attorney Advertising
E-Discovery and Data Management Managing Litigation in the Digital Age Attorney Advertising Every day, 12 billion corporate e-mails are created. That number doubles annually. Litigation success starts
More informationCYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
More informationhttps://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
More informationfor Insurance Claims Professionals
A Practical Guide to Understanding ediscovery for Insurance Claims Professionals ediscovery Defined and its Relationship to an Insurance Claim Simply put, ediscovery (or Electronic Discovery) refers to
More informationINDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection
As amended by P.L.79-2007. INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection IC 5-11-5.5-1 Definitions Sec. 1. The following definitions
More informationDigital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
More informationANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER
CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information
More informationDigital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
More informationWhen E-Discovery Becomes Evidence
Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal
More informationDOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
More informationNightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services
EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise
More informationACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 8.D DATE: March 15, 2007 ****************************************************************************** SUBJECT: Electronic Records Discovery Electronic records management
More informationAPPENDIX B TO REQUEST FOR PROPOSALS
Overview and Instructions APPENDIX B The service provider s responsibilities will include the following: (A) Processing of ESI produced to CTAG in a variety of file formats; (B) Hosting ESI produced to
More informationOpen Source Digital Forensics Tools
The Legal Argument 1 carrier@cerias.purdue.edu Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationHong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014
CLIENT MEMORANDUM Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014 August 28, 2014 Mandatory application of e-discovery Mandatory application of e-discovery to
More informationCAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013
LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction
More informationAcknowledgments Introduction: Welcome to the Labyrinth. CHAPTER 1 Gathering the Evidence 1. CHAPTER 2 Third-Party Experts 25
Acknowledgments Introduction: Welcome to the Labyrinth xi xiii CHAPTER 1 Gathering the Evidence 1 Form 1.1: General Preliminary Electronic Evidence Questions for Your Client 3 Form 1.2: Checklist to Define
More informationOverview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
More informationInfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationDigital Forensics Services
Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together
More informationE-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.
More informationHOUSE BILL NO. HB0106. Medical malpractice-use of expert witnesses. A BILL. for. AN ACT relating to medical malpractice actions; providing
00 STATE OF WYOMING 0LSO-0 HOUSE BILL NO. HB0 Medical malpractice-use of expert witnesses. Sponsored by: Representative(s) Gingery A BILL for AN ACT relating to medical malpractice actions; providing for
More informationTen Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
More informationelectronic discovery requests
Making and responding to electronic discovery requests By Martin Felsky and Peg Duncan One of the significant impacts of electronic discovery on litigation is the way in which it reconfigures the adversarial
More informationPRIVACY IMPACT ASSESSMENT
PRIVACY IMPACT ASSESSMENT Electronic Litigation Support System June 2012 FDIC Internal System Table of Contents System Overview Personally Identifiable Information (PII) in ELS Purpose & Use of Information
More informationOCTOBER 7, 2015 SMALL BUSINESS ADVISORY REVIEW PANEL FOR POTENTIAL RULEMAKING ON ARBITRATION AGREEMENTS
OCTOBER 7, 2015 SMALL BUSINESS ADVISORY REVIEW PANEL FOR POTENTIAL RULEMAKING ON ARBITRATION AGREEMENTS DISCUSSION ISSUES FOR SMALL ENTITY REPRESENTATIVES To help frame discussion of issues and cost of
More informationAre Mailboxes Enough?
Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day
More informationIN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND. v. * Civil Action No.: RDB 10-1895 MEMORANDUM OPINION
Joel I. Sher, Chapter 11 Trustee, * IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND Plaintiff, * v. * Civil Action No.: RDB 10-1895 SAF Financial, Inc., et al., * Defendants. * * * * *
More informationScene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
More informationAnd you can receive a substantial reward for doing so.
Who is a whistleblower under the False Claims Act? Anyone who sees a Government contractor cheating the United States and wants to do something about it can blow the whistle. If you d like to put a stop
More informationKeith Barger MFS, MCSE, CCE
Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting
More informationCCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
More informationCloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu
Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document
More informationLecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
More informationUNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com
UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE 1 What is ESI? Information that exists in a medium that can only be read through the use of computers Examples E-mail Word Documents Databases Spreadsheets Multimedia
More informationCERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
More informationDigital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
More informationAddressing Abusive Lawyer Conduct in Relation to Litigation Proceedings
Author: Attorney Dan A. Riegleman N63 W23965 Main Street Sussex, Wisconsin 53089 Prepared: 06/01/10 WHITE PAPER: DR2504 Addressing Abusive Lawyer Conduct in Relation to Litigation Proceedings There are
More informationESI Risk Assessment: Critical in Light of the new E-discovery and notification laws
ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational
More informationediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director
ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director Background Olivia Gerroll, ediscovery Solutions Group Director Over sixteen years of experience in litigation
More informationCFF Content Specification Outline
CFF Content Specification Outline The Pathway to the CFF Credential The American Institute of CPAs launched the Certified in Financial Forensic credential in June of 2008. The AICPA s CFF credential combines
More informationDiscussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners
Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and
More informationSubscribe to Credit Monitoring and/or Submit a Claim Form to get benefits. EXCLUDE YOURSELF
SUPERIOR COURT OF THE STATE OF CALIFORNIA, COUNTY OF ORANGE If you applied for health insurance through WellPoint / Anthem Blue Cross before March 10, 2010, you could get benefits from a class action settlement.
More informationErnesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
More informationHow To Write A Hit Report On A Lawsuit Against A Company
Everything You Wanted to Know About ESI and E-Discovery but Were Afraid to Ask Jason M. Pistacchio Presented By: Gregory S. Johnson Attorney Attorney/Legal Technologist Cosgrave Vergeer Kester LLP Paine
More informationComputer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
More informationHOBS OVERVIEW INTRODUCTION
OVERVIEW 2 HOBS OVERVIEW INTRODUCTION Hobs Legal Docs Limited www.hobslegaldocs.com - is a company within the Group of Hobs Reprographics plc - www.hobsrepro.com The Hobs Group of companies, was founded
More informationENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
More informationHow To Process A Small Claims Case In Anarizonia
What is a small claims division? Every justice court in Arizona has a small claims division to provide an inexpensive and speedy method for resolving most civil disputes that do not exceed $2,500. All
More information