LEGAL METHODS OF USING COMPUTER FORENSICS TECHNIQUES FOR COMPUTER CRIME ANALYSIS AND INVESTIGATION
|
|
|
- Adelia McCoy
- 9 years ago
- Views:
Transcription
1 LEGAL METHODS OF USING COMPUTER FORENSICS TECHNIQUES FOR COMPUTER CRIME ANALYSIS AND INVESTIGATION Daphyne Saunders Thomas, James Madison University, Harrisonburg, Virginia Karen A. Forcht, Utah State University, Logan, Utah ABSTRACT Computer forensics is the scientific collection; recovery preservation, legal analysis and presentation of data held or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. Forensics specialists must consider the legal and ethical parameters of evidence collection so that critical elements are not corrupted. Keywords: Computer forensics, digital computer forensic science, electronic investigation, forensics techniques, imaging, investigation, law enforcement techniques, legal use of forensics INTRODUCTION Computer forensics and investigation has been considered a professional field for many years. Most of the experts in the field have been self-taught due to the lack of formal education and training in the computer forensics field. Although training within the private sector has recently become increasingly popular and important, forensics has been prevalent in the law enforcement fields and government agencies since the mid -1980s. Definition of Computer Forensics Computer forensics is defined as the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. (21) Reasons that legal evidence might be sought constitute a wide range of computer crimes or misuses, including theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer specialists have many ways of discovering data that reside in a computer system, or of recovering deleted, encrypted, or damaged file information. The data discovered is important in litigation and in solving various computer crimes. The benefits of being able to use computer forensics are numerous when compared to paper evidence. Data on a computer has the potential to exist in many formats, such as on the hard drive or a disk. Forensics Specialists A computer forensics specialist has many duties and responsibilities relating to computer systems analysis, such as: Protecting the computer system from any tampering, data corruption, damage, or viruses Ensuring that the computer system is not destroyed or damaged in any way Discovering all hidden, deleted, encrypted, or password protected files Recovering as much as possible about the deleted files and accessing the protected or encrypted files Volume V, No 2, Issues in Information Systems
2 Analyzing the data found and providing printout of the overall analysis Providing testimony and expert consultation about the corrupted computer system Individuals who implement computer forensics analysis techniques include: criminal prosecutors, insurance companies, corporations, and law enforcement officials (8) In each case, the computer specialist has specific knowledge of the hardware and software. The expert has knowledge of the different formats in which the evidence can be discovered and tries to find a form that the criminal forgot. These experienced experts look at and search backups that are available. Before the investigation starts, it is vital that the computer is handled with care so that no evidence is destroyed or damaged, no computer virus may infect the system, and no evidence is destroyed by mechanical or electromagnetical influences. It is also crucial that the evidence is always kept in custody and that none of the confidential information on the suspect s system is misused. After the expert discovers all hidden files, recovers all deleted files and access all encrypted files, they create an overall analysis in which an overview of the computer system is given and every conspicuous pattern is displayed. The electronic investigations also show which files have been deleted or protected. The computer forensic expert will then assist in the investigation or litigation as a consultant. When computer investigators arrive at a crime scene, they first unplug the computer in case it is running a file-erasure program that could potentially destroy evidence. An image backup (a byte-by-byte copy of a computer s hard drive) is made and used for all examination of the data so that there is no chance of damage to the original drive. The backup will include all active and deleted files, fragments of data not completely overwritten; swap files, embedded data and metadata, and much more. Because of the volatile nature of electronic evidence, simple tasks such as booting up a computer or saving a document can alter data or other files. A computer forensics expert is able to make an image backup without damaging or tampering with potential evidence, which is critical in the legal system. Next, the mirror image is taken to the lab for retrieval and analysis. Some criminals use encryption programs to make their files unreadable, but experts are able to recover encrypted or password protected documents during the retrieval process. A forensics expert can also recover deleted computer files and , identify what websites have been visited and what files have been downloaded, and find any attempts to conceal or destroy evidence. The biggest challenge in computer investigations is not the encryption (because the majority of suspects do not bother with it). The biggest challenge in computer investigations is the size of today s computer hard drives. The bigger the hard drive, the longer the investigation takes. Once the files have been obtained from the computer, the rest of the process is a matter of oldfashioned research as investigators scrutinize the information. Seldom does a computer search provide evidence that positively proves a suspect s guilt. The evidence found often only contributes pieces to the investigation. Volume V, No 2, Issues in Information Systems
3 LEGAL CONSIDERATIONS OF FORENSICS Computer forensics involves essentially taking an autopsy of the computer using specialized software and techniques to analyze exactly what actions the computer has taken and what data is stored. It does not, however, prove causality. The evidence obtained may then be explained and presented to those who will make the ultimate decision about how to proceed in the criminal investigation. Computer forensics requires more than merely copying files from a computer. The investigator must also consider issues such as: where the data is stored, how the operating system deals with files (specifically reading and writing to disk), how to deal with encrypted data, and many other computer specific details. In addition to technical issues, investigators must be very careful with how they gather this evidence so that it can be proven that no tampering has occurred. The teaching of the investigatory techniques and usage of these specialized tools has recently become more widespread to help catch computer criminals and obtain proof of their actions. The field of computer forensics has become more widespread and so too has its validity in a court of law. Computer crimes are now being assigned more specific and severe punishments as these acts become more common; and as this continues, computer forensics will become more important to help curb the occurrences of these crimes. According to New Technologies Inc, the term Computer Forensics was coined back in 1991 in the first training session held by the International Association of Computer Specialists (IACIS). Computer forensics refers to the application of law in the field of computing. It deals with the preservation, identification, extraction and documentation of computer evidence. Computer evidence can be anything from entire copies of hard drives to individual files on a desktop. (22) The field of computer forensics has grown rapidly in the past decade as the amount of computerrelated crime has risen. Corporations are using the techniques not only to investigate computer crimes within a company, but also as a preventative measure to deter future crimes. In addition, law enforcement agencies are learning to use computer forensics to gain evidence in crimes not computer related. Thomas Rude of CISSP writes The Science of Computer Forensics is fast becoming a very necessary skillset for law enforcement departments, government entities, and corporations worldwide. As society becomes more digitized, the need for skilled personnel in this arena becomes more and more pressing. (27) Rude also outlined a few key elements of a computer forensics investigation: 1) A forensic examiner is impartial. Our job is to analyze the media and report our findings with no presumption of guilt or innocence. 2) The media used in forensic examinations must be sterilized before each use. 3) A true image (bit stream) of the original media must be made and used for the analysis. 4) The integrity of the original media must be maintained throughout the entire investigation. (27) Volume V, No 2, Issues in Information Systems
4 Examples of Forensics Application The United States Secret Service website offers a list of recommendations in the event that there is a possible crime and a computer needs to be seized for examination. They suggest first determining what role the computer played in the alleged crime. For instance, is the computer hardware or software stolen, or was the computer used as a tool in committing the crime? Once the role is determined, it is then necessary to determine whether there is sufficient probable cause to seize the hardware, software, or data. The site also emphasizes the importance of keeping the data from being corrupted or contaminated in any way. If the data becomes corrupted or contaminated, it could cause the loss of important information. In the event that the information is needed as proof in court, it is important to have forensically sound evidence. (37) There are many groups of people who benefit from the usage of computer forensic methods. For example, individuals who are the victims of fraud will benefit from the evidence that forensic professionals can retrieve from the computers of the accused criminal. Corporations can also benefit from computer forensics in case they are the victims of stolen trade secrets. Corporations can even obtain evidence of embezzling and other illegal activities within the company. Ultimately, with the rise of computer crimes, it is important for people to recognize that a new digital crime scene has taken shape. There is a wealth of potential evidence to be found through computer forensics, and the effectiveness and benefits of this form of forensics is only now beginning to be realized. The FBI uses computer forensics to retrieve information from a computer s storage media (hard drive), chips, boards, central processing units, monitors, and printers. After research, the FBI developed techniques to restore even deleted information. When a file is deleted from one s computer, the information still remains on the hard drive because the operating system only considers the file open to being overwritten. Information on one s computer is only truly deleted when the sector on the hard drive is overwritten. Therefore, the FBI scans the hard drive for all the information stored on servers or networks on a user s computer in order to create timelines of crimes or whereabouts. (24) Validating electronic forensics Like any new evidentiary procedure, electronic forensics has had to be validated. In the late 19 th century, fingerprints had to be proven as valid evidence. Fingerprints have become one of the most valuable trace evidence types in use today. In the 20 th century, the uniqueness of striations found on fired bullets became a valid method of tying a gun to a specific crime. The polygraph has a long and colourful history of being used to distinguish between truth and falsehood but has no basis in science and is therefore, not valid in any court of law. There has never been a scientifically controlled study that proves conclusively any linkage between physiologic change and truth or falsehood. It has been investigated in 1965, 1976, and again in 1983 by the Office of Technology Assessment (formerly an office of Congress) which concluded: There is very little research or scientific evidence to establish polygraph validity. Justice Clarence Thomas in US vs. Scheffer (No March 31, 1998) stated in his opinion: Volume V, No 2, Issues in Information Systems
5 scientific field studies suggest the accuracy rate of the control question technique polygraph is little better then could be obtained by the toss of a coin, that is, 50 percent. Not all evidentiary techniques put forward are or have been accepted. In the US, for example, there was a precedent setting case in 1993; Daubert v. Merrell Dow Pharmaceuticals (92-102), 509 U.S. 579 (1993). That case lays out a set of five elements that must be achieved in order for evidence gathered by an unproven technique to be accepted: 1. Whether the theory or technique can be and has been tested. 2. Whether it has been subjected to peer review and publication. 3. The known or potential error. 4. The general acceptance of the theory in the scientific community. 5. Whether the proffered testimony is based upon the expert s special skill. Other countries have their own precedents that validate electronic forensics evidence gathering methods. The tools, techniques and methodologies of electronic investigation, gathering and analysis have been tried and proven and are accepted in many countries.(34 Forensic evidence in computing The gathering of evidence in a computing environment is not merely copying files from the suspect s computer and printing them out for presentation in a proceeding. While that indeed may be an important part of it, there is data that may be pertinent to such proceedings that is not readily or apparently available through ordinary means. Moreover, accessing and finding such data requires an awareness of what kinds of information exist on a PC and how to go about gathering and preserving the original data and making certified copies of that evidence. When working with a potential case, all exculpatory evidence (evidence tending to exonerate or diminish the liability of a defendant) must be disclosed. Lack of disclosure to the court and judge could result in an accusation of evidence tampering or withholding. Depositions are often conducted prior to a trial. Two types of depositions are discovery- and testimony preservation. Both are used to verify facts and to substantiate the background information provided by the expert. (21) SUMMARY Computer forensics has been around for a while and is rapidly becoming a specialized and accepted investigative technique (in a court of law) with its own tools and legal precedents that validate the discipline. It is basically a computing profession dedicated to finding the truth. (34) The domain of computer forensics is not to assign guilt or innocence but rather to find facts in the form of electronic evidence that can be presented in a coherent way so that others may weigh the evidence and then assign guilt or innocence where appropriate. The field of computer forensics will, no doubt, grow rapidly at an exponential rate over the next decade as the development of new and better technologies relating to computer use bring vulnerability of information and the potential of risk and abuse. Volume V, No 2, Issues in Information Systems
6 REFERENCES 1. Caloyhannides, Michael A., (2001). Computer Forensics and Privacy, Artrech House Publishers. 2. Casey, Eoghan, (2003). Handbook of computer Crime Investigation, Forensic Tools and Technology, Academic Pres. 3. Center for computer forensics (computer-forensics.net) 4. Chu, James (2001). Law Enforcement Information Technology, CRC Press, LLC, Boca Raton, Florida, USA 5. Clark, Franklin, and Diliberto, Ken, (1996). Investigating computer Crime, CRC Press, Boca Raton, Florida, USA 6. Computer conversions, Inc. (computer-conversions.com) 7. Holly, James. Computer Forensics Icove, David, Seger, Karl, and Vonstorch, William, (1995). Computer Crime A Crime Fighter s Handbook, O Reilly & Associates, Inc. 14. Kovacich, Gerald by Jones, Andy, and Luzwick, Perry G. (2002). Information Warfare How businesses, governments, and others achieve global objectives and attain competitive advantage, CRC Press LLC, Boca Raton, Florida, USA. 15. Lang, David L., (2002). Introduction to Computer forensics, CRC Press LLC, Boca Raton, Florida, USA 16. Marcella, Albert J., Jr. and Greenfield, Robert C. (2001), cyber Forensics A Field Manual for Collecting, Examining, and Presenting Evidence of Computer Crimes, CRC Press LLC, Boca Raton, Florida, USA. 17. Mel, H.X., and Baker, Doris (2001). Cryptography Decrypted, Addison-Wesley. 18. Mena, Jesus, (2002), Investigative Data Mining for Security and Criminal Detection, Elsevier Publishing, San Diego, California. 19. Middleton, Bruce (2001). Cyber Crime Investigator s Field Guide, CRC Press LLC, Boca Raton, Florida, USA. 20. Middleton, Bruce (2002). Investigating Network Intrusions, CRC Press LLC, Boca Raton, Florida, USA. 21. Nelson, Bill, Phillips, Amelia, Enfinger, Frank, and Stewart, Chris (2004). Guide to Computer Forensics and Investigations Thomson, Course Technology, Boston, 22. New Technologies, Inc. (Forensics-intl.com) 23. Noblett, M.G. Report of the Federal Bureau of Investigation on development of forensic tools and examinations for data recovery form computer evidence. In: Proceedings of the 11 th INTERPOL Forensic Science Symposium, Lyon, France. The Forensic Sciences foundation Press, Boulder, Colorado, Noblett, Michael G., Pollitt, Mark M., and Presley, Lawrence A. (2002), Recovering and Examining Computer Forensic Evidence, U. S. Department of Justice, Federal Bureau of Investigation, Forensic Science Communications, Vol. 2, No. 4 ( Volume V, No 2, Issues in Information Systems
7 25. Pollitt, M. Computer Evidence Examinations at the FBI. Unpublished presentation at the 2 nd International Law Enforcement Conference on computer Evidence, Baltimore, Maryland, April 10, Pollitt, M. The Federal Bureau of Investigation report on computer evidence and forensics. In: Proceedings of the 12 th INTERPOL Forensic Science Symposium, Lyon, France. The Forensic Sciences foundation Press, Boulder, Colorado, Rude, Thomas, (2000). Guidance Seizure Methodology for Computer Forensics, Russ, John C. (2001). Forensic Uses of Digital Imaging, CRC Press LLC, Boca Raton, Florida, USA. 29. Sammes, Tom and Jenkinson, Brian, (2000). Forensic Computing A Practitioner s Guide, Springer-Verlag London, Ltd. 30. Stephenson, Peter, (1999), Investigating Computer-Related Crime, CRC Press, Boca Raton, Florida, USA. 31. Tessel, John D., Young, Susan, and Lindner, Felix (2002). The Hacker s Handbook, CRC Press LLC, Boca Raton, Florida, USA. 32. The International Association of Computer Investigative Specialists (IACIS.com) 33. United States Secret Service. Best Practices For Seizing Electronic Evidence Wolfe, Henry B., (2003). Computers and Security, El sevier Science, Ltd., pp ( Volume V, No 2, Issues in Information Systems
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
Electronic Forensics: A Case for First Responders
Title: Electronic Forensics: A Case for First Responders by Dr. Henry B. Wolfe Abstract Almost every aspect of our lives is touched or somehow controlled by technology driven processes, procedures and
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead COURSE DESCRIPTION: Fingerprints. Blood spatter. DNA analysis. The world of law enforcement is increasingly making use of the techniques
Keywords: Computers, digital evidence, digital evidence bags, forensics, forensics tools
Computer Forensics Procedures, Tools, and Digital Evidence Bags 1 Computer Forensic Tools Keywords: Computers, digital evidence, digital evidence bags, forensics, forensics tools Computer Forensics Procedures,
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
Modalities for Forensic Review of Computer Related Frauds
Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
Legal view of digital evidence
Chapter 2 Legal view of digital evidence Before developing a model or a theory, it is important to understand the requirements of the domain in which the model or the theory is going to be used. The ultimate
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Forensic Test 1 Review: Mathieu Orfila (1738 1853) Father of Modern Toxicology 1814 wrote first treatise. (formal scientific work) Alphonse Bertillon
Forensic Test 1 Review: Mathieu Orfila (1738 1853) Father of Modern Toxicology 1814 wrote first treatise. (formal scientific work) Alphonse Bertillon (1853 1914) Father of Criminal Investigation first
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Investigation Techniques
Investigation Techniques Planning and Conducting a Fraud Examination 2013 Association of Certified Fraud Examiners, Inc. Fraud Examination Fraud examination refers to a process of resolving allegations
Computer Forensics. Computer Forensics: History, Tools and Outlooks. By John Burns IT-103-002. Research Paper
1 Computer Forensics: History, Tools and Outlooks By John Burns IT-103-002 Research Paper 02/25/2012 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
The Enhanced Digital Investigation Process Model
The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe [email protected], [email protected] Institute of Computer Science, Makerere University P.O.Box 7062,
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Computer Forensics Overcoming the after-the-fact approach Dr. P Dennis Newsom, CIS March, 2006
Proper procedures in computer forensics must be followed in any investigation relying on computer or electronic information, regardless. Computer Forensics Overcoming the after-the-fact approach Dr. P
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
Metadata, Electronic File Management and File Destruction
Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
An Historical Perspective of Digital Evidence: A Forensic Scientist s View
An Historical Perspective of Digital Evidence: A Forensic Scientist s View Carrie Morgan Whitcomb, Director, National Center for Forensic Science Author s Comments During my tenure as director of the Postal
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) Sundresan Perumal 1, and Norita Md Norwawi. 2 1 Universiti Sains Islam Malaysia,[email protected] 2 Universiti Sains Islam Malaysia,
The Ethical Obligations of an Attorney When Using Technology
The Ethical Obligations of an Attorney When Using Technology A Cell Phone Does Not Create an Invisible Cone of Silence and Other Adventures on the New Frontier David I. Bloom Partner (202) 263 3204 [email protected]
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Ricoh Legal. Live Data Acquisition: The New Default Standard for Capturing ESI?
Ricoh Legal Live Data Acquisition: The New Default Standard for Capturing ESI? By David Greetham, National Director of Forensics, Legal Enterprise Solutions Live computer forensic imaging, which is performed
Incident Response and Forensics
Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12 Outline Computer
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
FACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
IT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
Computer Forensics in a LAN Environment
Computer Forensics in a LAN Environment Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds The industry has, at long last, accepted Computer
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
Criminal Investigation CRJ141. Matthew McCarty
Criminal Investigation CRJ141 Matthew McCarty Chapter 1 Criminal Investigation: An Overview CSI Effect The exaggerated depiction of how television forensic science operates, creating a phenomenon in which
CHAPTER 18 CYBER CRIMES
CHAPTER 18 CYBER CRIMES 18.1 With increased use of computers in homes and offices, there has been a proliferation of computer-related crimes. These crimes include: Crimes committed by using computers as
OFFICE OF THE UNITED STATES ATTORNEY SOUTHERN DISTRICT OF CALIFORNIA San Diego, California. United States Attorney Laura E. Duffy
NEWS RELEASE OFFICE OF THE UNITED STATES ATTORNEY SOUTHERN DISTRICT OF CALIFORNIA San Diego, California United States Attorney Laura E. Duffy For Further Information, Contact: For Immediate Release Assistant
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
When E-Discovery Becomes Evidence
Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
IS 6363 Computer Forensics Spring 2006
Class Information: IS 6363 Computer Forensics Spring 2006 Class Time: 5:30-6:45 p.m. Tue/Thu Class Location: BB 3.03.10 Lab Location & Hours: BB 3.03.10 (Hours as posted. Should mirror APL hours.) Instructor
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
What You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: [email protected]
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
Digital and Cloud Forensics
Digital and Cloud Forensics Stavros Simou Cultural Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, University Hill, GR 81100 Mytilene, Greece [email protected]
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
Introduction to Forensic Science. So what is Forensic Science? Major Contributors. Chapter 1: Intro to FS
Introduction to Forensic Science Chapter 1: Intro to FS So what is? In its broadest definition, forensic science is the application of science to criminal and civil laws. We will put emphasize on the applications
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation
Crime Scene Investigation Protocol
Crime Scene Investigation Protocol The State of the Art Larry Barksdale, 8-9-04 Protocols A protocol is a defined way of going about doing something. A protocol may be formally defined in a written policy,
Computer Forensics Today
L A W, I N V E S T I G A T I O N S, A N D E T H I C S Computer Forensics Today Kelly J. (KJ) Kuchta When people hear the word forensics, it often generates a mental image of the movie series with Jack
Developing Computer Forensics Solutions for Terabyte Investigations
Developing Computer Forensics Solutions for Terabyte Investigations Eric Thompson Corporation Orem, Utah USA www.accessdata.com Overview Computer Forensic Definition, Objectives and Policies History of
