CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
|
|
- Florence Peters
- 8 years ago
- Views:
Transcription
1 CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
2 Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic Law Issues
3 Investigation Process According to many professionals, Computer Forensics is a four (4) step process: Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites
4 Investigation Process According to many professionals, Computer Forensics is a four (4) step process: Evaluation Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
5 Digital Investigation Process Model Brian Carrier An Event-Based Digital Forensic Investigation Framework
6 Readiness Phases Computer forensics lab Where you conduct your investigation Store evidence House your equipment, hardware, and software American Society of Crime Laboratory Directors (ASCLD) offers guidelines for: Managing a lab Acquiring an official certification Auditing lab functions and procedures
7 Staff Readiness Lab manager duties : Estimate when to expect preliminary and final results Create and monitor lab policies for staff Provide a safe and secure workplace for staff and evidence Staff member duties: Knowledge and training: Hardware and software OS and file types Deductive reasoning
8 Acquiring Certification and Training Update your skills through appropriate training International Association of Computer Investigative Specialists (IACIS) Created by police officers who wanted to formalize credentials in computing investigations Certified Electronic Evidence Collection Specialist (CEECS) Certified Forensic Computer Examiners (CFCEs)
9 Acquiring Certification and Training (continued) High-Tech Crime Network (HTCN) Certified Computer Crime Investigator, Basic and Advanced Level Certified Computer Forensic Technician, Basic and Advanced Level EnCase Certified Examiner (EnCE) Certification AccessData Certified Examiner (ACE) Certification Other Training and Certifications High Technology Crime Investigation Association (HTCIA)
10 Acquiring Certification and Training (continued) Other training and certifications SysAdmin, Audit, Network, Security (SANS) Institute Computer Technology Investigators Network (CTIN) NewTechnologies, Inc. (NTI) Southeast Cybercrime Institute at Kennesaw State University Federal Law Enforcement Training Center (FLETC) National White Collar Crime Center (NW3C)
11 Physical Requirements for a Computer Forensics Lab Most of your investigation is conducted in a lab Lab should be secure so evidence is not lost, corrupted, or destroyed Provide a safe and secure physical environment Keep inventory control of your assets Know when to order more supplies
12 Digital Crime Scene Investigation Phases Brian Carrier An Event-Based Digital Forensic Investigation Framework
13 Digital Evidence Searching Phase
14 Event Reconstruction Phase Brian Carrier An Event-Based Digital Forensic Investigation Framework
15 Ethics and Codes Ethics Rules you internalize and use to measure your performance Codes of professional conduct or responsibility Standards that others apply to you or that you are compelled to adhere to by external forces Such as licensing bodies People need ethics to help maintain their balance And self-respect and the respect of their profession
16 Applying Ethics and Codes Laws governing codes of professional conduct or responsibility Define the lowest level of action or performance required to avoid liability Expert witnesses should present unbiased, specialized, and technical evidence to a jury Expert witnesses testify in more than 80% of trials And in many trials, multiple expert witnesses testify
17 Applying Ethics and Codes to Expert Witnesses The most important laws applying to attorneys and witnesses are the rules of evidence Experts are bound by their own personal ethics and the ethics of their professional organizations In the United States, there s no state or national licensing body for computer forensics examiners
18 Computer Forensics Examiners Roles in Testifying Computer forensics examiners have two roles: Scientific/technical witness and expert witness Scientific/technical witness Person involved in a case, investigator that found and presented the evidence As expert witness You can testify even if you weren t present when the event occurred Or didn t handle the data storage device personally Criticism: it s possible to find and hire an expert to testify to almost any opinion on any topic
19 Organizations with Codes of Ethics No single source offers a definitive code of ethics for forensic investigator You must draw on standards from other organizations to form your own ethical standards
20 International Society of Forensic Computer Examiners Includes guidelines such as the following: Maintain the utmost objectivity in all forensic examinations and present findings accurately Conduct examinations based on established, validated principles Testify truthfully in all matters before any board, court, or proceeding Avoid any action that would appear to be a conflict of interest
21 International Society of Forensic Computer Examiners (continued) Includes guidelines such as the following: (continued) Never misrepresent training, credentials, or association membership Never reveal any confidential matters or knowledge learned in an examination without an order from a court of competent jurisdiction or the client s express permission
22 International High Technology Crime Investigation Association HTCIA core values include the following requirements related to testifying: The HTCIA values the Truth uncovered within digital information and the effective techniques used to uncover that Truth, so that no one is wrongfully convicted The HTCIA values the Integrity of its members and the evidence they expose through common investigative and computer forensic best practices, including specialized techniques used to gather digital evidence
23 International Association of Computer Investigative Specialists Standards for IACIS members include: Maintain the highest level of objectivity in all forensic examinations and accurately present the facts involved Thoroughly examine and analyze the evidence Conduct examinations based upon established, validated principles Render opinions having a basis that is demonstratively reasonable Not withhold any findings that would cause the facts of a case to be misrepresented or distorted
24 BCS CODE OF CONDUCT Public Interest Legitimate rights of third parties include protecting personal identifiable data to prevent unlawful disclosure and identity theft, and also respect for copyright, patents and other intellectual property. Professional Competence and Integrity You should only claim current competence where you can demonstrate you have the required expertise e.g. through recognised competencies, qualifications or experience. Duty to Relevant Authority If any conflict is likely to occur or be seen by a third party as likely to occur you will make full and immediate disclosure to your Relevant Authority. Duty to the Profession Share knowledge and understanding of IT and support inclusion of every sector of society.
25 Legal Issues In criminal investigation you ALWAYS have to have warrant!!! Warrant can be issued for: Entire company, floor, room, a device, car, house, any company/person owned property Mobile phone cases issues with interception rules laid down in RIPSA [Regulations of Investigative Powers (Scotland) Act]
26 Ethics and Warrants A lot of the ethical issues are covered by the warrants system. Before a warrant can be issues a judge is presented with the evidence that suggests a search will find something relating to the crime under investigation. He will then way this against the person's freedoms and decide whether the warrant should be granted.
27 Corporate Investigation Issues Non-criminal internal investigation can be restricted by the individual s right of privacy Data Protection Act Company Polices
28 Best Practice ACPO Principle 1 - No action taken by law enforcement or their agents should change data held on an electronic device or media which may subsequently be relied upon in Court. Principle 2 - In exceptional circumstances where a person finds it necessary to access original data held on an electronic device or media, that person must be competent to do so, and be able to give evidence explaining the relevance and the implications of their actions.
29 Best Practice ACPO Principle 3: An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.
30 Best Practice ACPO Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.
31 ANY QUESTIONS?
32 Assessment: Short-Answer Examples Question: What are the requirements for the computer forensic lab? Answer:
33 Assessment: Short-Answer Examples Question: What is a difference between Ethics and Code of Practice? Answer:
34 Assessment: Short-Answer Examples Question: How Data Protection Act can create problems in a corporate investigation? Answer:
Chapter 3: The Investigator s Office and Laboratory
Chapter 3: The Investigator s Office and Laboratory Dept. of Computer Science 1 Objectives Describe certification requirements for computer forensics labs List physical requirements for a computer forensics
More informationCSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
More informationGuide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 3 The Investigator s Office and Laboratory Objectives Understand computer forensics lab certification requirements Determine the physical
More informationComputer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
More informationSouth Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
More informationSouth Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position
More informationENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
More informationCourse Forensic Science. Unit II History
Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationComputer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
More informationEC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationSensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
More informationServices. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
More informationJAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS
More informationCAREER: FORENSIC SCIENCE TECHNICIAN 1
CAREER: FORENSIC SCIENCE TECHNICIAN 1 Career: Forensic Science Technician Mary C. Cartwright Middlesex Community College CRJ 111-52 Heloisa DaCunha November 29, 2012 CAREER: FORENSIC SCIENCE TECHNICIAN
More informationCURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS AND
More informationCURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE
CURRICULUM VITAE Jason Jordaan: CFE, PMCSSA, ACE MTech (Forensic Investigation), BComHons (Information Systems), BSc (CJ Computer Science) Summa Cum Laude, BTech (Policing) +27 (083) 556 7112 jjordaan@siu.org.za
More informationDigital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
More informationEXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
More informationShort courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
More informationJason Jordaan: MTech, BTech, CFE, PMCSSA, ACE
Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: JJordaan@siu.org.za Professional Summary A multidisciplinary digital
More informationConviction Integrity Unit Best Practices October 15, 2015
Conviction Integrity Unit Best Practices October 15, 2015 District Attorney s offices are increasingly creating Conviction Integrity Units (CIUs) to re examine questionable convictions and guard against
More informationGUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION
GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION The American Society of Crime Laboratory Directors is a professional organization of managers and supervisors employed in forensic laboratories.
More informationComputer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery,
Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis
More informationJOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015
`STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose
More informationForensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
More informationSTATE OF COLORADO July 2015
STATE OF COLORADO July 2015 CRIMINAL INVESTIGATOR A2A1IX TO A2A5XX DESCRIPTION OF OCCUPATIONAL WORK This class series includes five levels in the Enforcement and Protective Services occupational group
More informationHow To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
More informationDigital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
More informationPiecing Digital Evidence Together. Company Information
Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the
More informationComputer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
More informationPiecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationDigital Forensics & e-discovery Services
Digital Forensics & e-discovery Services Andrews International Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
More informationCrimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
More informationComputer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008
Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate CDFSL 2008 Oklahoma City, OK April 23, 2008 Gary C. Kessler Champlain College Burlington, VT DISCLAIMER I teach
More informationSECURITIES EXAMINER (ENTRY) 5670
SECURITIES EXAMINER (ENTRY) 5670 GENERAL DESCRIPTION OF CLASS The SECURITIES EXAMINER (ENTRY), under the guidance of a Securities Examiner, analyzes and evaluates the activities of individuals and businesses
More informationDigital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
More informationCOLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
More informationITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: goel@albany.edu Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
More informationANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER
CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information
More informationDigital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
More informationPLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.
PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. TOYOTA ASSOCIATE DISPUTE RESOLUTION ( T-ADR ): Summary Description
More informationCYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
More informationA FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF
A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF 6) Course 1: 12-16 March 2012 and 26-30 March 2012 Course
More informationAuthority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy
Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West
More informationU.S. MILITARY INVESTIGATIONS: TYPES & PROCEDURES
U.S. Military Investigations: Types & Procedures Background Materials U.S. MILITARY INVESTIGATIONS: TYPES & PROCEDURES [ NOTE TO INSTRUCTOR: The words below that appear in plain text also appear in the
More informationCyber Crime and Digital Forensics in Japan
Cyber Crime and Digital Forensics in Japan Tetsutaro UEHARA Academic Center for Computing and Media Studies, Kyoto University uehara@media.kyoto-u.ac.jp Table of Contents Introduction: Motivation and Background
More informationC R I M E S C E N E. Forensic Science CC 30.07 Spring 2007 Prof. Nehru
C R I M E S C E N E Physical Evidence Crime laboratories run on physical evidence Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link
More informationMARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in
More informationATTORNEY GENERAL INVESTIGATOR
MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION ATTORNEY GENERAL INVESTIGATOR JOB DESCRIPTION Employees in this job function as Attorney General Investigators performing investigative assignments in
More informationRoy D. Rector CFCE EnCE
1803 West Avenue Austin, Texas 78701 (512) 895-9555 (512) 895-9555 www.r3forensics.com Roy D. Rector CFCE EnCE Operations Manager / Senior Forensic Examiner Roy D. Rector is a founder and the Senior Digital
More informationBERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS
BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS A. Scope. This Code of Business Conduct and Ethics applies to all Berkshire Hathaway directors, officers and employees, as well as to directors,
More informationHow To Become A Forensic Technician
PERSON SPECIFICATION Area: EMSOU Job Title: Digital Forensic Technician Weekly Hours: Section: CCU Scale: SO2 Version: V1 Post No: HP083 Status: Substantive Version Date: 37 January 2014 Please describe,
More informationState of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
More informationINTRODUCTION AREAS OF SPECIALIZATION
Eoghan-Intro.qxd 1/6/04 3:01 PM Page 1 INTRODUCTION INTRODUCTION In the years since the first edition of this book, there has been an explosion of interest in digital evidence. This growth has sparked
More informationWhen you need someone to scrutinize your financial situation, call Kessler International we'll turn your questions into answers.
It's no secret that today's highly-volatile business environment demands a high level of financial scrutiny multinational corporations have been brought down by instances of financial fraud, often perpetrated
More informationNancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011
Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011 My Qualifications 20 years : Forensic Serology and DNA cases at the FDLE 30+ years: Training Forensic DNA Technologists & DNA Analysts 30+
More informationDecades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now
Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be
More informationLance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: lancesl@cfsiusa.com
Lance Eliot Sloves Certified Computer Examiner (CCE, EnCE) Licensed Private Investigator, TX Testifying Expert Independent Government Contractor Active Top Secret/SSBI US Government Clearance Computer
More informationFRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives
FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial
More informationBDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.
BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts
More informationCAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.
CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3
More informationLegal Ethics Practical Tips from Where else?... Practice
Legal Ethics Practical Tips from Where else?... Practice Presented by: Mark C. Dosker mark.dosker@squiresanders.com Corporate Miranda or Upjohn Warnings Issues Facing Counsel at the Onset of an Internal
More informationS. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:
S. Robert Radus, CPA CFE PI Curricula Vitae Catalogue of Forensic Accounting and Computer Services Examination of plaintiff, respondent, and defendant books and records to determine: 1. Violations of Law.
More informationFIRE MARSHAL I, DEPUTY
Page 1 FIRE MARSHAL I, DEPUTY CHARACTERISTICS OF WORK: This is fire and arson investigation field work in the highly technical and specialized field of criminal investigation which requires the exercise
More informationDigital Forensics Educational Needs in the Miami Valley Region
Peterson, G.L., Raines, R.A., and Baldwin, R.O., Digital Forensics Educational Needs in the Miami Valley Region, Journal of Applied Security Research, vol. 3, no. 3-4, pp. 429-439, 2008. DOI: 10.1080/19361610801981662.
More informationComputer Forensics: an approach to evidence in cyberspace
Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based
More informationSan Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0
San Diego Chapter AUDITORS UNCOVERING CRIMINAL ACTS THE REAL BURDEN OF PROOF OR DBPP V1.0 Who is This Guy? George R. Thomas, MBA, CIA, CGAP, CRMA Detective Sergeant San Diego Police Department Current
More informationGENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 AN ACT TO (1) CREATE THE NORTH CAROLINA FORENSIC SCIENCE ADVISORY BOARD, (2) ENCOURAGE EFFORTS TO ELIMINATE SOURCES OF
More informationBackground Check Laws: District of Columbia Scott J. Wenner and Joleen Okun, Schnader Harrison Segal & Lewis LLP
Background Check Laws: District of Columbia Scott J. Wenner and Joleen Okun, Schnader Harrison Segal & Lewis LLP This Article is published by Practical Law Company on its PLC Law Department web service
More informationSTATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
More informationCurriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner
Curriculum Vitae Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner Background and Summary of Qualifications Mr. Odenthal has 35 years experience as an Information
More informationName: State Bar number: Telephone: Fax: Full time SF office address: Mailing address (if different):
Lawyer Referral and Information Service 301 Battery Street, Third Floor San Francisco, CA 94111 Telephone: (415) 477-2374 Fax: (415) 477-2389 URL: www.sfbar.org APPLICATION FOR JUVENILE DELINQUENCY LAW
More informationwww.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
More informationWHISTLEBLOWER POLICY. a) Code means the TALIC's code of conduct as in force from time to time;
WHISTLEBLOWER POLICY Company s Vision: To be the most trusted Life Insurance Company that values Customers financial well being, consistently delivering best in class solutions and respected by all. The
More informationHow To Become A State Pol Forensic Tech Leader
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,
More informationModalities for Forensic Review of Computer Related Frauds
Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance
More informationPREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S):
More informationHow to Use the California Identity Theft Registry
How to Use the California Identity Theft Registry A Guide for Victims of Criminal Identity Theft Tips for Consumers Consumer Information Sheet 8 June 2014 What Is Criminal Identity Theft?...1 How You May
More informationLAW ENFORCEMENT OFFICER
Class Code: 7824 TITLE: REPORTS TO: SUPERVISES: Law Enforcement Officer Grade 21 Director Law Enforcement N/A JOB FUNCTION: Perform a variety of law enforcement activities for an assigned school District
More informationCOS/PSA 412 Computer Forensics and Investigations
COS/PSA 412 Computer Forensics and Investigations Date: November 18, 2003 Division: Natural and Behavioral Sciences Number of Credits: 4 Location: Nadeau 109 Meeting Times: TBD Course Description Computer
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationForensic Science: Crime Scene Basics. T. Trimpe 2006 http://sciencespot.net
Forensic Science: Crime Scene Basics T. Trimpe 2006 http://sciencespot.net Crime Scene Vocabulary CRIME SCENE: Any physical location in which a crime has occurred or is suspected of having occurred. PRIMARY
More information- Michael G. Kessler President & CEO, Kessler International. Message from Michael G. Kessler
As most people have come to realize, the extraordinary growth of the computer industry has become, at best, a double-edged sword. Unquestionably, advances in computer technology and the explosion of the
More informationGENERAL UNIVERSITY POLICY APM - 190 REGARDING ACADEMIC APPOINTEES Appendix A-1 Selected Presidential Policies
UNIVERSITY OF CALIFORNIA POLICY ON REPORTING AND INVESTIGATING ALLEGATIONS OF SUSPECTED IMPROPER GOVERNMENTAL ACTIVITIES (WHISTLEBLOWER POLICY) I. Introduction The University of California has a responsibility
More informationProsecuting Attorneys Council of Georgia Transition Into Prosecution Program
Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program Office: Name of Beginning Lawyer: Bar No. Name of Mentor: Bar No. MODEL MENTORING PLAN OF ACTIVITIES AND EXPERIENCES FOR STATE
More informationPROFESSIONAL COUNSELSM
PROFESSIONAL COUNSELSM ADVICE AND INSIGHT INTO THE PRACTICE OF LAW Lawyers Toolkit 3.0: A Guide to Managing the Attorney-Client Relationship A CNA PROFESSIONAL COUNSEL GUIDE FOR LAWYERS AND LAW FIRMS The
More informationForensic Accounting: Relevance In Corporate Governance
Forensic Accounting: Relevance In Corporate Governance Govind Teju Rathod Vishakha s. Gavali Head MBA Program, BIGCE, Assistant Professor, BIGCE, Faculty of Management Studies, Solapur. Faculty of Management
More informationWhistleblower Policy (Policy on Reporting and Investigating Allegations of Suspected Improper Governmental Activities)
(Policy on Reporting and Investigating Allegations of Suspected Improper Governmental Activities) Responsible Officer: SVP - Chief Compliance & Audit Officer Responsible Office: EC - Ethics, Compliance
More informationSection 17: Offenses against the Administration of Justice
399 Section 17: Offenses against the Administration of Justice General Very often, the legislation of post-conflict states lacks adequate administration-ofjustice offenses. This section is a relatively
More informationINDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection
As amended by P.L.79-2007. INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection IC 5-11-5.5-1 Definitions Sec. 1. The following definitions
More informationPractice Aid 10 1. Serving as an. Expert Witness. or Consultant 10639-378
Practice Aid 10 1 Serving as an Expert Witness or Consultant 10639-378 NOTICE TO READERS This publication is designed to provide illustrative information with respect to the subject matter covered. It
More informationKIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm
KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM OF INVESTIGATORS Rob Kimmons,
More informationKIMMONS INVESTIGATIVE SERVICES, INC.
KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN National & Worldwide Affiliates KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM
More informationINTRODUCTION TO CRIME SCENES:
INTRODUCTION TO CRIME SCENES: Physical Evidence As automobiles run on gasoline, crime laboratories "runt' on physical evidence. physical evidence encompasses any and all objects that can establish that
More informationTHE CRIME SCENE. Chapter 2 2-1. 2011, 2008 Pearson Education, Inc. Upper Saddle River, NJ 07458
Chapter 2 THE CRIME SCENE 2-1 Physical Evidence As automobiles run on gasoline, crime laboratories run on physical evidence. Physical evidence encompasses any and all objects that can establish that a
More informationLabor and Employment 2015 Conference
Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ
More informationTERMS & CONDITIONS OF BUSINESS
TERMS & CONDITIONS OF BUSINESS 1. Introduction These terms and conditions explain the basis upon which we carry out work for you and charge for our services subject to any variations set out in our engagement
More informationANTI-FRAUD POLICY Adopted August 13, 2015
ANTI-FRAUD POLICY Adopted August 13, 2015 Introduction The Board of Commissioners of the Housing Authority of the City of Muskogee (MHA) has established an anti-fraud policy to enforce controls and to
More informationPART II - CODE OF ORDINANCES GENERAL ORDINANCES Chapter 2 - ADMINISTRATION ARTICLE XVI. - BOARDS, COUNCILS, COMMISSIONS AND AUTHORITIES
DIVISION 11. CITIZEN REVIEW BOARD Sec. 2-2201. Establishment of the Atlanta Citizen Review Board. Sec. 2-2202. Appointment of members. Sec. 2-2203. Composition of board. Sec. 2-2204. Time limit on appointments.
More information