CRIMINAL JOURNEY MAPPING

Size: px
Start display at page:

Download "CRIMINAL JOURNEY MAPPING"

Transcription

1 The Quarterly Magazine for Digital Forensics Practitioners Issue 23 May 2015 Digital ForensicS / magazine WIN! an ipod Nano CRIMINAL JOURNEY MAPPING How to use Cyber Criminal Journeys to support forensics investigation and response deployment Latest News, 360 Book Reviews, IRQ & much more inside! PLUS! Honeynets Bioinformatics Focus on the SOC Embracing ediscovery Issue 23 / TR Media

2 / FEATURE EMBRACING EDISCOVERY Paul Slater on meeting the demands of today s digital investigations with the budget of 10 years ago. / ADVANCED Digital forensic investigators are dealing with large and growing volumes of evidence across an increasing number and variety of sources. This has stretched traditional forensic tools and processes to capacity. All the while, budgets are tightening and backlogs increasing. According to the 2014 State of Policing report from Sir Thomas Winsor, Her Majesty s Chief Inspector of Constabulary [1], although performing well in many respects, the police are falling behind the curve of rapidly changing criminality, policing the crimes of today with the methods of yesterday and insufficiently prepared for the crimes of the future. Looking at technology specifically, it says: forces need urgently to match their digital forensic capability to the reality of modern crime. Technology is an integral part of policing today. However, many police forces ability to gather and analyse digital evidence are underdeveloped. Forensic analysis simply takes too long. Officers told of significant delays in receiving evidence from digital devices, the report says. The absence of this evidence can cause unacceptable delays in investigations and prosecutions. This problem has an adverse effect on police officers ability to investigate the crimes that affect the public every day. It is not acceptable that evidential material that happens to be stored digitally cannot be made available to investigating officers for weeks, and sometimes months, after the crime. If I were a police chief or forensic investigator reading this, I d be tempted to answer back, That s all very well, but you try policing the crimes of today with a smaller budget than I had a decade ago. Especially in light of recent comments by the Chief Inspector of Constabulary that, police cuts are here to stay [2]. While there s little police forces can do about their budgets, there is a lot they can do about working more efficiently with the resources they have. For digital forensic capabilities to match the realities of modern crime, investigators must work smarter not harder. / Adapting To Meet Changing Demands I have worked with quite a few investigative organisations that have streamlined their processes for handling digital evidence. Often this has required letting go of the my way or the highway attitude and taking lessons from other disciplines. Specifically, investigators can learn a lot from the way legal teams handle electronic discovery, which typically involves even larger volumes of digital evidence than investigations. Findings from the recently released report ediscovery in Digital Forensic Investigations [3] published by the United Kingdom Home Office, shed additional light on the benefits of this approach. The report details the results of a review into the use of ediscovery software and workflows in the context of digital forensic investigation, conducted 8 Digital ForensicS / MAGAZINE

3 by the London Metropolitan Police Service and the UK Centre for Applied Science and Technology. After examining a number of commercial ediscovery applications, they determined that: there are clear benefits to investigators if they can access the data relevant to their case faster and see all the relevant data in one common format rather than separate reports or platforms for data from different sources. If the investigators can be enabled to conduct their own searching of digital information then the technical staff can also benefit through having more time available to focus on the technical issues which will continue to emerge as technology progresses. This is an approach my colleagues and I have been advocating for several years. We have seen the benefits of digital investigators embracing legal discovery workflows and technologies to complement their existing tools in criminal investigations first hand. / Lessons From ediscovery Case investigators, such as police detectives, often view digital evidence as a way of joining the dots in a broader investigation. As a result, digital forensic investigators tend to examine evidence sources individually, often without knowing the broader details of the case. They must make critical decisions about particular evidence sources and extract the information they believe is relevant from each device. This lack of collaboration means non-technical investigators and subject matter experts must rely on an incomplete and subjective slice of the evidence. Because cases often hinge on the connections between multiple evidence sources, the context of evidence as well as its content, investigators can lose sight of the bigger picture. Similarly, legal teams often use a tiered review system, assigning junior staff to perform a first cut review of the material to eliminate documents and evidence sources that are clearly not relevant. However, rather than allowing these reviewers to 9

4 / FEATURE make arbitrary decisions, someone who has in-depth knowledge of the case would create a pre-defined set of guidelines for them to follow. This person may also review, validate or amend these decisions. In this way, smaller and smaller volumes of more and more relevant material are passed up the chain. The highly knowledgeable, and usually highly paid, experts need only see the hot documents, safe in the knowledge that someone has reviewed and classified all other material. This process is a very efficient way of classifying huge volumes of material into relevant or not relevant bundles. For it to work, legal teams must be able to: Divide up the available evidence into parcels for multiple people to review. Ensure each reviewer understands the ground rules for deciding what is relevant. Make the most relevant documents available for experts to analyse and examine. This approach is not new, even in investigative circles. For example, in many complex criminal matters, rank-and-file detectives do the groundwork, such as identifying witnesses and evidence, before passing on their findings to senior officers and subject matter experts for review. It is however rare for digital forensic investigators to follow this process when dealing with electronic evidence, often because traditional tools make it difficult to combine information from multiple sources and make it available to nontechnical investigators or subject matter experts for review. / The Investigative Lab Model for Collaboration An investigative lab workflow can dramatically increase the volume and quality of digital evidence a team of investigators can analyse. This collaborative approach offers investigators a more efficient way of utilising available resources. The investigative lab model couples the rigour of traditional digital investigation methodologies with a tiered review system similar to the way legal teams handle electronic discovery. The first stage of this process involves the investigative team assembling all available evidence, including forensic images, and mobile phone communications, into a single location. Conducting a light metadata scan of these sources then helps quickly establish which items are likely to be relevant. Digital forensic investigators can then process these likely evidence sources in greater depth, following a set of previously agreed standards and settings. Over time, investigative organisations can build a series of best practices or case-specific workflows. By reducing operator-level decisions and inconsistencies around many time-consuming and error-prone tasks, investigative teams can deliver more consistent and repeatable outcomes. They can quickly condense large evidence sets into smaller highly relevant items for expert review. / Collaboration & Review To complete the task faster, investigative teams now divide up the digital evidence between many people. They may choose to divide the evidence by date ranges, custodians, location, language or content. This eliminates the reliance on a single digital forensic specialist to examine each evidence sources one by one, and means different types of evidence can be distributed to the people most qualified to understand it and its context. For example, in an inappropriate images investigation, detectives could package potentially relevant pictures and videos for specialist child protection teams, while leaving other file types for their digital forensic investigators. Or in a fraud case, investigators could pass on financial records to forensic accountants and Internet activity to technical specialists. In multi-jurisdictional investigations, investigative teams can produce evidence or intelligence packages for other agencies to review, comment on and return. LINK ANALYSIS USES TECHNOLOGY TO REPLACE THE MANUAL PROCESS OF FINDING CONNECTIONS BETWEEN SUSPECTS AND EVIDENCE SOURCES. / Digital evidence Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence is relevant, whether it is authentic, if it is hearsay and whether a copy is acceptable or the original is required. Source: Wikipedia / Link Analysis In network theory, link analysis is a data-analysis technique used to evaluate relationships (connections) between nodes. Relationships may be identified among various types of nodes (objects), including organizations, people and transactions. Link analysis has been used for investigation of criminal activity (fraud detection, counterterrorism, and intelligence), computer security analysis, search engine optimization, market research and medical research. Source: Wikipedia 10 Digital ForensicS / MAGAZINE

5 Perhaps one of the most significant costs that many law enforcement agencies face in investigating digital evidence is the need to travel to the data in order to review it. For some larger or national agencies it is not uncommon for investigators to spend days or weeks out of the office reviewing evidence. Not only is this incredibly inefficient, it can also be incredibly costly. So why isn t the data brought to the reviewer and not the other way around? When it comes to ediscovery, lawyers can access data 24 hours a day, anywhere in the world. This is another area where law enforcement can take a lesson from ediscovery to save valuable resources. This approach should become the rule and not the exception. / Intelligence & Analytics Often, solving crimes requires finding the connections across multiple individuals, places, events and evidence sources. Human intuition has its place in the process, but much of the effort involves the time consuming task of picking out and matching specific pieces of information from massive volumes of data. Computers, when applied judiciously, have a natural advantage in intelligence sharing, collaboration and data visualisation. As digital evidence becomes larger and more complex, investigators greatest struggle is not a lack of information, but having too much to make sense of. One example of how technology can make this easier is by extracting, highlighting and cross-referencing intelligence items such as: Names addresses IP addresses Company names Credit card numbers Bank account numbers Identity numbers Amounts of money Comparing and connecting this intelligence across all available evidence can rapidly reveal relationships between people, objects, locations and events. Over time, investigators can build a library of intelligence that they can query across multiple cases. 11

6 / FEATURE Visually representing these large volumes of data can be a fast way to locate the key facts and connections within a case. It enables people, even with limited technical knowledge, to follow a hunch or idea down to very specific details in a matter of seconds. Common analytical techniques include: Top types. Quickly understanding the makeup of data sets by showing the most common file types as bar or pie charts. Pivot. Analysing the relationship between any two elements in a data set including custodians, file extensions, file types, languages, named entities, tags and word lists. Date trending. Visualising the frequency of data over the entire case or any filtered subset, then drilling down to year, month or day views. Timeline. Reviewing the content of s, documents, phone calls or other communications from multiple sources or custodians in the order they happened. Communication network. Showing the interactions between persons of interest with an interactive network diagram that shows the number of connections for each link. Link analysis. Understanding the connections between people and intelligence items such as credit card numbers, IP addresses, organisations and sums of money. Intersection. Rapidly understanding how key elements in the data overlap and pinpointing the critical intersections between multiple result sets and data types. Shingle and word lists. Rapidly understanding the key words and phrases, and their context, in the case. Combining analytical techniques can help investigators progress from a bewildering array of information to highly relevant details very quickly. For example, you could filter an entire evidence set to just messages within a relevant date range that contain credit card numbers. If that still returns too many results, you could use other techniques such as suspect names or keyword searches to further filter the evidence. Now you can use a network diagram to see who is ing credit card numbers to whom. Link analysis uses technology to replace the manual process of finding connections between suspects and evidence sources. It automatically tallies and displays connections between people and named entities such as credit card or phone numbers. When applied across a compound case containing multiple case files, link analysis has proven particularly effective in finding connections between seemingly unrelated people and events. A timeline view, traditionally used for messages, is also useful for SMS messages, mobile device call logs, instant messages, Skype chats and social media messages. In my experience, many people say things in instant messages that they would avoid in . This may stem from the belief that these formats are not as rigorously logged as . But from the investigator s perspective, advanced technologies make these communication formats just as permanent and searchable as . / What About Forensics? Investigators and forensic technicians may be asking themselves, But what about forensics, will any of this stand up in court? The techniques I have discussed do not eliminate the need for forensic analysis, particularly in the areas of provenance and authenticity. However, the volume of evidence in most cases makes it too time-consuming to conduct deep forensic analysis on every data source. As a result, in-depth forensic analysis must become the exception rather than the rule. Budget issues are an inevitable part of law enforcement, and they make it especially hard to solve the issues the Chief Inspector of Constabulary identified in relation to the speed of digital forensic analysis. However, the recent Home Office findings about the benefits of using ediscovery workflows in digital forensic investigation are part of the answer. By re-examining how they handle, process and review digital evidence, how they utilise their human and technological resources within the investigative workflow, and maximising the value of information and intelligence within a case, law enforcement agencies can start to fight back and start to address the challenges of policing the digital crimes of today, even with the budget of 10 years ago. / REFERENCES 1. State of policing: the annual assessment of policing in England and Wales 2013/14. The 2014 State of Policing report from Sir Thomas Winsor, Her Majesty s Chief Inspector of Constabulary. publication/state-of-policing-13-14/ 2. Police cuts are here to stay, says head of watchdog ediscovery in Digital Forensic Investigations system/uploads/attachment_data/ file/394779/ediscovery-digital-forensicinvestigations-3214.pdf / Author BioGRAPHY Paul Slater has over 20 years experience in investigations, digital forensics and ediscovery as a police officer and consultant. He has an MSc in Computer Forensics and started his career in forensic technology as a computer forensic investigator in the UK s Greater Manchester Police. Slater has been a senior manager within PwC s and Deloitte s regional UK Forensic Technology teams and has served as interim head of the Digital Forensics Unit in the UK s Serious Fraud Office. He was also a member of the review board for the 2012 update of the UK Association of Chief Police Officers Good Practice Guide for Digital Evidence. 12 Digital ForensicS / MAGAZINE

7

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER CONTENTS Executive summary...2 The digital forensic investigation impasse...3 Lessons from

More information

Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014

Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014 Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014 All rights reserved 2014. Nuix Software ABOUT THE PRESENTERS Paul Slater Director of Forensic

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

white paper Modernizing the User Interface: a Smarter View with Rumba+

white paper Modernizing the User Interface: a Smarter View with Rumba+ white paper Modernizing the User Interface: a Smarter View with Rumba+ INTRODUCTION Organizations need to rapidly adapt in order to meet business demands. With a large percentage of businesscritical IT

More information

Welcome to the webinar Does your department or company use the valuable data it collects to plan for future needs and trends?

Welcome to the webinar Does your department or company use the valuable data it collects to plan for future needs and trends? Welcome to the webinar Does your department or company use the valuable data it collects to plan for future needs and trends? Host: Janet Barker Presenter: Nick Pope Getting more strategic with data Does

More information

CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions

CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions AccessData Group CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions White Paper "#$%&'()'*+&*+, Overview... 1 Top 5 Communications Company: Background and Its ediscovery Requirements...

More information

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013 LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction

More information

Consultation on the Implementation of Direct Entry in the Police

Consultation on the Implementation of Direct Entry in the Police Consultation on the Implementation of Direct Entry in the Police Contents Consultation summary... 3 Current situation... 5 The future... 6 Independent Review of Police Officer and Staff Remuneration and

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Make the right decisions with Distribution Intelligence

Make the right decisions with Distribution Intelligence Make the right decisions with Distribution Intelligence Bengt Jensfelt, Business Product Manager, Distribution Intelligence, April 2010 Introduction It is not so very long ago that most companies made

More information

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix Ady Cassidy Systems Consultant Nuix Ady is a computer forensic investigator and ediscovery consultant with more than 10 years experience as a Computer

More information

The Business Case for ECA

The Business Case for ECA ! AccessData Group The Business Case for ECA White Paper TABLE OF CONTENTS Introduction... 1 What is ECA?... 1 ECA as a Process... 2 ECA as a Software Process... 2 AccessData ECA... 3 What Does This Mean

More information

Vancouver Police Department Crown Counsel Queries Audit

Vancouver Police Department Crown Counsel Queries Audit Vancouver Police Department Crown Counsel Queries Audit Simon Demers, Audit Manager Vancouver Police Department February 2010 Vancouver Police Department 312 Main Street Vancouver, British Columbia V6A

More information

AccessData Corporation. Divide & Conquer: Overcoming Computer Forensic Backlog through Distributed Processing and Division of Labor.

AccessData Corporation. Divide & Conquer: Overcoming Computer Forensic Backlog through Distributed Processing and Division of Labor. AccessData Corporation Divide & Conquer: Overcoming Computer Forensic Backlog through Distributed Processing and Division of Labor White Paper A Pioneer in Digital Investigations Since 1987 TABLEOFCONTENTS

More information

Disco reinvents ediscovery for lawyers. Introducing ediscovery software every lawyer can love.

Disco reinvents ediscovery for lawyers. Introducing ediscovery software every lawyer can love. Disco reinvents ediscovery for lawyers Introducing ediscovery software every lawyer can love. We are lawyers who have made ediscovery technology work for us not the other way around. By now it s a familiar

More information

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach Unlocking The Value of the Deep Web Harvesting Big Data that Google Doesn t Reach Introduction Every day, untold millions search the web with Google, Bing and other search engines. The volumes truly are

More information

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations

More information

STATE OF WISCONSIN DEPARTMENT OF JUSTICE

STATE OF WISCONSIN DEPARTMENT OF JUSTICE STATE OF WISCONSIN DEPARTMENT OF JUSTICE BRAD D. SCHIMEL ATTORNEY GENERAL Andrew C. Cook Deputy Attorney General 114 East, State Capitol P.O. Box 7857 Madison, WI 53707-7857 608/266-1221 TTY 1-800-947-3529

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

Lock your doors. Be aware of your surroundings. Shoplifters

Lock your doors. Be aware of your surroundings. Shoplifters Crime Fighters By Michael Soloy Lock your doors. Be aware of your surroundings. Shoplifters will be prosecuted. Reminders of crime seem to surround Americans as they go about their everyday lives. Most

More information

Digital Forensics Services

Digital Forensics Services Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together

More information

White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011

White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 FBI 2009 Report: 1,756 terabytes of data processed 58,609 pieces of digital media 21,810 CDs

More information

<no narration for this slide>

<no narration for this slide> 1 2 The standard narration text is : After completing this lesson, you will be able to: < > SAP Visual Intelligence is our latest innovation

More information

HOBS OVERVIEW INTRODUCTION

HOBS OVERVIEW INTRODUCTION OVERVIEW 2 HOBS OVERVIEW INTRODUCTION Hobs Legal Docs Limited www.hobslegaldocs.com - is a company within the Group of Hobs Reprographics plc - www.hobsrepro.com The Hobs Group of companies, was founded

More information

Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence

Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence Threat intelligence visibility the way forward Mike Adler, Senior Product Manager Assure Threat Intelligence The modern challenge Today, organisations worldwide need to protect themselves against a growing

More information

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University

More information

Making confident decisions with the full spectrum of analysis capabilities

Making confident decisions with the full spectrum of analysis capabilities IBM Software Business Analytics Analysis Making confident decisions with the full spectrum of analysis capabilities Making confident decisions with the full spectrum of analysis capabilities Contents 2

More information

counter fraud specialist (cacfs)

counter fraud specialist (cacfs) CIPFA accredited counter fraud specialist (cacfs) Building the counter fraud profession CIPFA COUNTER FRAUD CENTRE It will certainly help us to safeguard our assets against the risk of fraud. And it will

More information

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS Extract the Insights that Focus Investigations CELLEBRITE UFED PRO SERIES THE DATA SOURCES THAT MATTER MOST 95% MOBILE DEVICE ITSELF 59% THIRD-PARTY

More information

Hospitals without walls. Care without boundaries?

Hospitals without walls. Care without boundaries? Hospitals without walls. Care without boundaries? Patient safety. Audit trails. Clinical governance. Efficiency. Cost reduction and collaboration. In partnership, Hospedia empowers Unify OpenScape through

More information

Case study on asset tracing

Case study on asset tracing Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million

More information

ediscovery WORKFLOW AUTOMATION IN SIX EASY STEPS

ediscovery WORKFLOW AUTOMATION IN SIX EASY STEPS NUIX INFORMATION PAPER ediscovery WORKFLOW AUTOMATION IN SIX EASY STEPS SUMMARY Many organizations rely on a small number of expert staff who have the process knowledge and technical expertise to deliver

More information

Piecing Digital Evidence Together. Company Information

Piecing Digital Evidence Together. Company Information Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the

More information

Intelligent document management for the legal industry

Intelligent document management for the legal industry Brochure Intelligent document management for the legal industry HP WorkSite The leading legal enterprise content management solution Sharing documents between legal teams, clients, and service providers

More information

4net Technologies. Managed Services and Cloud Solutions

4net Technologies. Managed Services and Cloud Solutions 4net Technologies Managed Services and Cloud Solutions Managed Services and Cloud Solutions Managed Services and Cloud Solutions are an opportunity for organisations to bring control to complexity by managing

More information

DOCUMATION S PURCHASE TO PAY (P2P) SUITE

DOCUMATION S PURCHASE TO PAY (P2P) SUITE Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

Can spreadsheets alone help your business performance excel? How business intelligence dashboards can overcome the issues inherent in spreadsheets

Can spreadsheets alone help your business performance excel? How business intelligence dashboards can overcome the issues inherent in spreadsheets Can spreadsheets alone help your business performance excel? How business intelligence dashboards can overcome the issues inherent in spreadsheets See the bigger picture with Business Intelligence dashboards

More information

An ECM White Paper for Government August 2008. Court case management: Enterprise content management delivers operational efficiency and effectiveness

An ECM White Paper for Government August 2008. Court case management: Enterprise content management delivers operational efficiency and effectiveness An ECM White Paper for Government August 2008 Court case management: Enterprise content management delivers operational efficiency and effectiveness 2 Table of Contents Navigating today s legal systems

More information

GUIDANCE SOFTWARE EnCase Portable. EnCase Portable. A Data Collection and Triage Solution that Anyone can Use

GUIDANCE SOFTWARE EnCase Portable. EnCase Portable. A Data Collection and Triage Solution that Anyone can Use GUIDANCE SOFTWARE EnCase Portable EnCase Portable A Data Collection and Triage Solution that Anyone can Use TM GUIDANCE SOFTWARE EnCase Portable EnCase Portable Who Can Use EnCase Portable Police Officers

More information

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally

More information

Countering Fraud For Competitive Advantage

Countering Fraud For Competitive Advantage PKF Littlejohn LLP Countering Fraud For Competitive Advantage How UK FTSE listed companies can reduce the cost of fraud and maximise profitability Jim Gee and Professor Mark Button FORENSIC & COUNTER FRAUD

More information

Renowned Law Firm Reduces Cost and Risk by Moving from Legacy Software to AccessData E-Discovery Suite

Renowned Law Firm Reduces Cost and Risk by Moving from Legacy Software to AccessData E-Discovery Suite LEGAL CASE STUDY Solomon Renowned Law Firm Reduces Cost and Risk by Moving from Legacy Software to AccessData E-Discovery Suite By: Introduction Solomon is a San Diego-based law firm that has provided

More information

Analyzing Huge Data Sets in Forensic Investigations

Analyzing Huge Data Sets in Forensic Investigations Analyzing Huge Data Sets in Forensic Investigations Kasun De Zoysa Yasantha Hettiarachi Department of Communication and Media Technologies University of Colombo School of Computing Colombo, Sri Lanka Centre

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

Integrated business intelligence solutions for your organization

Integrated business intelligence solutions for your organization Integrated business intelligence solutions for your organization In the business world, critical information influences individuals goals, affects how people work across teams and ultimately helps organizations

More information

The criminal and civil justice systems in England and Wales

The criminal and civil justice systems in England and Wales The criminal and civil justice systems in England and Wales Introduction Important differences exist between UK civil and criminal proceedings that have implications for fraud investigations, including

More information

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO)

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO) Service Level Agreement between the Association of Chief Police Officers (ACPO) and the Internet Watch Foundation (IWF) 1 Sections 1. Parties to the Agreement 2. Introduction 3. Purpose of the Agreement

More information

Winning with an Intuitive Business Intelligence Solution for Midsize Companies

Winning with an Intuitive Business Intelligence Solution for Midsize Companies SAP Product Brief SAP s for Small Businesses and Midsize Companies SAP BusinessObjects Business Intelligence, Edge Edition Objectives Winning with an Intuitive Business Intelligence for Midsize Companies

More information

Best Practice Implementation is Changing ERP. CPiO White Paper. T 0844 880 6140 E marketing@cpio.co.uk. CPiO. Part of the Waterdale Group of Companies

Best Practice Implementation is Changing ERP. CPiO White Paper. T 0844 880 6140 E marketing@cpio.co.uk. CPiO. Part of the Waterdale Group of Companies White Paper Best Practice Implementation is Changing ERP Part of the Waterdale Group of Companies Part of the Waterdale Group of Companies 1 I White Paper I Best Practice Implementation is Changing ERP

More information

The New SEO Imperative. A Guide to Your SEO with Google s Secure Search

The New SEO Imperative. A Guide to Your SEO with Google s Secure Search The New SEO Imperative A Guide to Your SEO with Google s Secure Search Index Contents 3 4 4 4 5 6 6 8 9 9 10 Secure Search Manifesto Introduction and Background The Path Forward A Challenging Paradox Methodology

More information

A SMART CHOICE FOR LAW ENFORCEMENT TODAY

A SMART CHOICE FOR LAW ENFORCEMENT TODAY A SMART CHOICE FOR LAW ENFORCEMENT TODAY Today s Law Enforcement agencies are facing increasing documentation demands in a time when shrinking budgets make it necessary to reduce clerical staff. This results

More information

A guide to reducing the cost of AML compliance with electronic identity verification

A guide to reducing the cost of AML compliance with electronic identity verification A guide to reducing the cost of AML compliance with electronic identity verification Legal firms often struggle with the cost of compliance associated with Anti-Money Laundering Regulations. Electronic

More information

USING DATA DISCOVERY TO MANAGE AND MITIGATE RISK: INSIGHT IS EVERYONE S JOB

USING DATA DISCOVERY TO MANAGE AND MITIGATE RISK: INSIGHT IS EVERYONE S JOB USING DATA DISCOVERY TO MANAGE AND MITIGATE RISK: INSIGHT IS EVERYONE S JOB If you manage risk in your organization, you re probably surrounded by paper right now. After all, you need reports to help mitigate

More information

Softlink s online library and learning resource management solution, designed specifically for secondary schools, academies and sixth form colleges

Softlink s online library and learning resource management solution, designed specifically for secondary schools, academies and sixth form colleges Powering Knowledge Performance Softlink s online library and learning resource management solution, designed specifically for secondary schools, academies and sixth form colleges www.softlinkint.com Placing

More information

Criminal appeals. Page 1 of 19 Criminal appeals version 3.0 Published for Home Office staff on 08 July 2015

Criminal appeals. Page 1 of 19 Criminal appeals version 3.0 Published for Home Office staff on 08 July 2015 Page 1 of 19 Criminal appeals version 3.0 Published for Home Office staff on 08 July 2015 About this guidance An overview of appeals Appeals relating to immigration enforcement investigation cases The

More information

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach

More information

Improving Analytical Tools The Future of Interrogating Data London, October 26 2010

Improving Analytical Tools The Future of Interrogating Data London, October 26 2010 Improving Analytical Tools The Future of Interrogating Data London, October 26 2010 OrbisIP Technology Services Consultancy Technology scouting and evaluation Product Distribution Technology Readiness

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

The New Way to Work Together

The New Way to Work Together Getting to know The New Way to Work Together SharePoint is about giving you and the people you work with a better way to get things done together. That means your content is stored and organized in one

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Business Intelligence

Business Intelligence WHITEPAPER Business Intelligence Solution for Clubs This whitepaper at a glance This whitepaper discusses the business value of implementing a business intelligence solution at clubs and provides a brief

More information

How To Solve A Violent Home Invasion With A United Force

How To Solve A Violent Home Invasion With A United Force Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone

More information

Moving from Sage 50 Accounts to Sage 200 Standard Online

Moving from Sage 50 Accounts to Sage 200 Standard Online Moving from Sage 50 Accounts to Sage 200 Standard Online 2 Contents Contents Software that grows with your business...4 Straightforward online accounting...5 Reasons to upgrade...6 Financials - Managing

More information

In-house Counsel s Next Cost Savings Frontier: Cost Minimization by Centralizing Litigation Document Collections

In-house Counsel s Next Cost Savings Frontier: Cost Minimization by Centralizing Litigation Document Collections A One TouchTM White Paper A unique approach to the management of discovery documents, combining centralized management, personnel, expertise and systems to enable and foster retention of work product and

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

Build Stronger Cases with Mobile Device Link Analysis

Build Stronger Cases with Mobile Device Link Analysis White Paper Build Stronger Cases with Mobile Device Link Analysis How data from mobile devices reveals the patterns of life that can make for stronger proactive and reactive investigations - on the street

More information

CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION

CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION Made by the Secretary of State for the Home Department under sections 39 and 39A of the Police Act 1996 and sections 28, 28A, 73 and 73A of the

More information

Top 5 best practices for creating effective dashboards. and the 7 mistakes you don t want to make

Top 5 best practices for creating effective dashboards. and the 7 mistakes you don t want to make Top 5 best practices for creating effective dashboards and the 7 mistakes you don t want to make p2 Financial services professionals are buried in data that measure and track: relationships and processes,

More information

5 things to consider when estimating the ROI on cyber security.

5 things to consider when estimating the ROI on cyber security. Security ROI in 2015 5 things to consider when estimating the ROI on cyber security. In June 2015, one of Australia s top cyber police officers, Detective Superintendent Arthur Katsogiannis, stated that

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

POLICE. SmartContact. More accessible, consistent and joined up Public Contact Management in UK policing. Delivering Transformation. Together.

POLICE. SmartContact. More accessible, consistent and joined up Public Contact Management in UK policing. Delivering Transformation. Together. POLICE SmartContact More accessible, consistent and joined up Public Contact Management in UK policing Delivering Transformation. Together. Shaping the policing response to citizen contact Public Contact

More information

PIVOTAL CRM. CRM that does what you want it to do BROCHURE

PIVOTAL CRM. CRM that does what you want it to do BROCHURE PIVOTAL CRM CRM that does what you want it to do BROCHURE THE PIVOTAL CRM PHILOSOPHY THE PIVOTAL ADVANTAGE Today s business world is a fast moving and dynamic environment one in which your teams expect

More information

Using Tableau Software with Hortonworks Data Platform

Using Tableau Software with Hortonworks Data Platform Using Tableau Software with Hortonworks Data Platform September 2013 2013 Hortonworks Inc. http:// Modern businesses need to manage vast amounts of data, and in many cases they have accumulated this data

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture Managed Security Services Leverage our experienced security operations team to improve your cyber security posture Our approach to Managed Security Services Enterprises spend millions on technology to

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

A critical or decisive time on which much depends; a crucial moment.

A critical or decisive time on which much depends; a crucial moment. Marketing Platform A critical or decisive time on which much depends; a crucial moment. Call it what you will, but in the old days marketers had time to build up to this moment, whether it was a purchase

More information

FORENSIC ACCOUNTANT AND EXPERT WITNESS ACCREDITATION SCHEME Guidance from the assessors

FORENSIC ACCOUNTANT AND EXPERT WITNESS ACCREDITATION SCHEME Guidance from the assessors FORENSIC ACCOUNTANT AND EXPERT WITNESS ACCREDITATION SCHEME Guidance from the assessors Preparing your submission These notes refer to, and should be read in conjunction with, Section 3 of the application

More information

Asia Disputes Academy

Asia Disputes Academy Asia Disputes Academy Electronic document discovery how it is relevant to you Tim Mak, Jonathan Wong (Freshfields) and Donald Chan (Control Risks) 18 September 2014 Introduction Buzzwords Big Data, e-discovery,

More information

the parties may request a review of the provisions of this MoU.

the parties may request a review of the provisions of this MoU. MEMORANDUM OF UNDERSTANDING between THE CROWN PROSECUTION SERVICE and the AIR ACCIDENTS INVESTIGATION BRANCH, MARINE ACCIDENT INVESTIGATION BRANCH, AND RAIL ACCIDENT INVESTIGATION BRANCH. Introduction

More information

Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure

Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure June 11, 2015 Stu Van Dusen Lexbe LC ediscovery Webinar Series Info Future Takes Place Monthly Cover a Variety of Relevant

More information

Augmented Search for Software Testing

Augmented Search for Software Testing Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,

More information

Business Intelligence

Business Intelligence Business Intelligence What is it? Why do you need it? This white paper at a glance This whitepaper discusses Professional Advantage s approach to Business Intelligence. It also looks at the business value

More information

How ediscovery Technology Can Accelerate Information Governance for Corporations

How ediscovery Technology Can Accelerate Information Governance for Corporations Nuix Insight Paper How ediscovery Technology Can Accelerate Information Governance for Corporations With risk management and operational efficiencies becoming strategic priorities for both private and

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

JOINT STATEMENT BY HER MAJESTY S ATTORNEY GENERAL AND THE LORD ADVOCATE

JOINT STATEMENT BY HER MAJESTY S ATTORNEY GENERAL AND THE LORD ADVOCATE JOINT STATEMENT BY HER MAJESTY S ATTORNEY GENERAL AND THE LORD ADVOCATE HANDLING OF TERRORIST CASES WHERE THE JURISDICTION TO PROSECUTE IS SHARED BY PROSECUTING AUTHORITIES WITHIN THE UK STATEMENT OF SHARED

More information

Digital Forensics, ediscovery and Electronic Evidence

Digital Forensics, ediscovery and Electronic Evidence Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics

More information

Streamlining Government Investigations

Streamlining Government Investigations STREAMLINING GOVERNMENT INVESTIGATIONS WITH THE CLEARWELL E-DISCOVERY PLATFORM PAGE : 1 Streamlining Government Investigations With The Clearwell E-Discovery Platform A Technology White Paper STREAMLINING

More information

Transforming study start-up for optimal results

Transforming study start-up for optimal results Insight brief Transforming study start-up for optimal results A holistic, data-driven approach integrating technology, insights and proven processes to position clinical trials for ultimate success Up

More information

SharePoint Training DVD Videos

SharePoint Training DVD Videos SharePoint Training DVD Videos SharePoint 2013 Administration Intended for: Prerequisites: Hours: Enterprise Content Managers / Administrators Planners / Project managers None 16 hours of video + 18 hours

More information

Visualization Starter Pack from SAP Overview Enabling Self-Service Data Exploration and Visualization

Visualization Starter Pack from SAP Overview Enabling Self-Service Data Exploration and Visualization Business Intelligence Visualization Starter Pack from SAP Overview Enabling Self-Service Data Exploration and Visualization In today s environment, almost every corporation has to work with enormous data

More information

Eric Hagopian, Senior Solutions Engineer, Novetta Solutions

Eric Hagopian, Senior Solutions Engineer, Novetta Solutions Government Data Sharing Community of Practice Panel Discussion on Technological Challenges to Sharing Data: Meeting Minutes Presented in Conjunction with the MeriTalk Big Data Exchange (BDX) February 12,

More information

Crown Prosecution Service, London Business Plan 2014-15

Crown Prosecution Service, London Business Plan 2014-15 Crown Prosecution Service, London Business Plan 2014-15 0 Introduction from the Chief Crown Prosecutor This document sets out the key business activities that CPS London will deliver over the next 12 months

More information

Win the race against time to stay ahead of cybercriminals

Win the race against time to stay ahead of cybercriminals IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine

More information

Voice and data recording Red Box makes it easier than you imagine

Voice and data recording Red Box makes it easier than you imagine Voice and data recording Red Box makes it easier than you imagine SIMPLER SMARTER VOICE If you re reading this, there s a good chance your organization has to record phone calls, radio conversations or

More information

BIG DATA. vansonbourne.com/research-insights/big-data. big.data

BIG DATA. vansonbourne.com/research-insights/big-data. big.data BIG DATA big.data For most organisations, big data is now the reality of doing business. Technological and social innovations are resulting in huge flows of new data every day. As we enter this undeniable

More information