Building FBI computer forensics capacity: one lab at a time
|
|
|
- Posy Lee
- 10 years ago
- Views:
Transcription
1 Digital Investigation (2004) 1, 177e182 Building FBI computer forensics capacity: one lab at a time Douglas A. Schmitknecht FBI, USA The Federal Bureau of Investigation (FBI) is on a mission: to strengthen law enforcement s computer forensic capabilities throughout the United States. How are we fulfilling such a sweeping and ambitious mandate? Through an innovative initiative entitled the Regional Computer Forensic Laboratory (RCFL) Program. RCFLs provide much needed computer forensic expertise and training to thousands of law enforcement personnel. Although the demand remains high for skilled computer forensic Examiners e a common challenge facing law enforcement worldwide e RCFLs are doing their part to level the playing field. If properly administered, the FBI believes that the RCFL model can be duplicated from Prague to Portland, with the same level of success. The RCFL model The RCFL model is based on two guiding principles: cooperation and partnership. Although the Program is technical in nature, collaboration between an array of law enforcement agencies is the main driver behind the Program s continued success. FBI Director Robert S. Mueller III calls the RCFLs,.a critical component in our efforts to support state and local law enforcement agencies nationwide. By combining the extraordinary talents and resources of law enforcement agencies at all levels, our ability to investigate criminals and detect and prevent acts of terrorism becomes considerably more robust. The actual RCFL model is based on the formula developed by the San Diego RCFL. The San Diego RCFL began as a test project in 1999, where a coalition of law enforcement agencies in Southern California pooled their personnel and funding resources to create an FBI-sponsored, single-service computer forensics laboratory. The San Diego agencies looked to the FBI for training and technical support, and in response, the FBI s Computer Analysis Response Team (CART) program was selected to provide training and certification to the RCFL Examiners. Moreover, the FBI assumed a majority of the start-up costs, while the other coalition members donated personnel to staff the new lab. Within a matter of months of becoming operational, the San Diego RCFL established a clear standard for the effective and efficient examination of digital evidence, enabling them to /$ - see front matter ª 2004 Elsevier Ltd. All rights reserved. doi: /j.diin
2 178 D.A. Schmitknecht address the computer forensic needs of area law enforcement. With only eight Examiners serving a population of over seven million people, the FBI s Dallas Field Office and their local counterparts were working under similar circumstances as their San Diego colleagues e too much casework and not enough skilled computer forensic Examiners on hand. The FBI s Dallas Field Office followed San Diego s model and spearheaded a coalition of area law enforcement agencies with the goal of establishing an RCFL in the North Texas region. In 2000, their vision became reality when the North Texas RCFL opened for business with eleven Examiners detailed 1 from eight participating agencies. Like their predecessors in San Diego, the North Texas RCFL was a welcomed resource that quickly became a genuine success. A program emerges With the passage of the US Patriot Act in 2001, and an impressive and growing list of accomplishments, the US Congress directed the FBI to launch more RCFLs across the country. Therefore, in addition to the facilities in San Diego and North Texas, RCFLs were established in Chicago, Illinois and Kansas City, Missouri in Nine more laboratories will join the Program over the 2004e2005 time period, bringing the total number of RCFLs to Participating Agencies detail employees to serve in an RCFL usually for two or three year terms. These individuals remain as employees of their home agencies, and return there upon concluding their assignment. Existing and future RCFL sites As with any new program, it is essential to have a series of institutionalized procedures and processes in place to manage both the day-to-day operations and to guide future growth. In 2002, the FBI established the RCFL National Program Office (NPO) to assume this role and to facilitate the creation of new RCFLs. Additionally, the NPO supports the laboratories by: Providing technical assistance to ensure consistent quality management of each laboratory. Institutionalizing the policies, practices, and legal processes regarding the establishment and governance of RCFLs. Cultivating working relationships between law enforcement, the private sector, academia and other government agencies by serving as a national clearinghouse for the exchange and dissemination of information among these entities. Serving as an advocate for the Program before key constituent groups. Developing new digital evidence forensic tools. Developing training curricula for digital evidence Examiners and law enforcement officers. Coordinating and communicating training initiatives and tool development efforts for use by the law enforcement community. The NPO is physically located at the FBI s offices in Quantico, Virginia. Since the RCFLs are spread across diverse, geographical locations, one of the NPO s top priorities is to maintain communications with the field. The NPO holds conference calls with RCFL directors, organizes bi-annual meetings and
3 Building FBI computer forensics capacity: one lab at a time 179 holds an annual RCFL conference, which is open to any law enforcement officer. Standardization To ensure uniformity throughout the Program, all FBI-sponsored RCFLs must follow a well-defined Quality Assurance Program, complete with FBIapproved Standard Operating Procedures and Quality Assurance Manuals. These standards govern policies and procedures concerning evidence handling; search and seizure operations; the examination of seized electronic equipment, including computers; and courtroom testimony. The notion of following a uniform set of procedures also applies to data gathering. Throughout the fiscal year (FY), the RCFLs enter case information into a centralized database managed by headquarters. This information is used in part to create the Program s annual report, to track the Program s progress, to identify where resources are needed, and to measure the Program s performance for the year. Each RCFL facility prepares to seek accreditation from the American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB). The benefits of accreditation, including: Improves quality e Accreditation will heighten the quality of the RCFLs services because an independent, impartial and objective team of experts will review the laboratory s findings and operations. Strengthens operations e Accreditation ensures that an RCFL is abiding by criteria that are designed to assess performance, while also strengthening operations. Establishes standards e With accreditation, the general public and the users of the RCFL are assured that the laboratory is following established and widely accepted standards. Enhances quality control e Accredited laboratories must follow appropriate quality controls and quality assurance procedures. Guarantees Examiner qualifications e ASCLD/ LAB requires that laboratories have certified Examiners on staff. All RCFL Examiners must undergo the FBI s CART certification process, and may not perform examinations independently until doing so. (Trainees may need anywhere from six months to a year of training before they are certified.) Certification implies that an individual has a certain body of knowledge, and counters a recent trend where an investigator is deemed an expert after taking a short course in computer forensics. Protects evidence e ASCLD/LAB accreditation focuses on evidence handling procedures, to ensure that evidence is not damaged or misplaced. Ensures accurate results e Accreditation can enhance forensic results by requiring sufficient written protocols that serve as an empirical basis for the most basic and complex procedures. The North Texas RCFL recently requested an ASCLD/LAB inspection and expects to become the first RCFL to obtain this prestigious accreditation. All RCFLs are expected to follow this lead. A powerful network As new RCFLs are formed, they gain access to a powerful, and growing network of resources and manpower. For instance, if a case is particularly complex, or if a specific expertise is needed, an RCFL Director can ask the NPO to identify what resources are available to them within the Program. The fact that all RCFL Examiners are CART certified and proficient in the Program s operating procedures qualifies them to step into national service at a moment s notice. The Pentagon bombing investigation illustrates this point, and most recently, an Examiner assigned to the Chicago RCFL provided expert computer forensics support for an investigation involving a suspected terrorist. While examining the five computers associated with the case, he used Netcase as one of the primary forensic tools. Although all the text was in a foreign language (Arabic), he successfully identified several documents that pertained to terrorist activities. The suspected terrorist was indicted by a federal grand jury this past June for providing material support to al Qaeda, and for obtaining and using fraudulent travel documents. Finally, all RCFL Examiners must obtain a Top Secret clearance, which the NPO facilitates upon their hiring. This allows the immediate sharing of personnel without constraints and enables RCFL Examiners to assist with any Federal, state, or local investigation. In today s post-9/11 environment, having this capability is especially critical. RCFLs in action Any law enforcement agency within the RCFL s service area may request digital evidence technical support, on-site collection assistance, or training.
4 180 D.A. Schmitknecht Every FBI-sponsored RCFL offers the following range of services. Computer forensics expertise Computer forensics expertise may fall into the following categories: Pre-seizure consultation On-site seizure collection Duplication, storage and preservation of digital evidence Impartial examinations of digital evidence Documenting the work and nature of requests in preparation for testimony Courtroom testimony In FY 2003, the RCFL Program accepted 1444 requests for service, participated in 196 search and seizure operations, and conducted 987 computer forensic examinations. To request an RCFL s assistance, a law enforcement agency must complete and submit a simple form to the RCFL. This process is extremely convenient, as each RCFL has a dedicated website with a specific section devoted to requesting assistance. RCFLs support a variety of white collar, violent, and cyber crimes. These investigations include fraud, child pornography, terrorism, computer intrusions and Internet crimes just to name a few. Examples of some of the RCFL success stories follow. Internet stalking case In 1999, the state of California enacted one of the toughest cyber stalking laws in the US. Shortly after the law s passage, the San Diego RCFL supported an Internet stalking case that was brought to trial. An ex-husband impersonated his ex-wife over the Internet by engaging in cyber relationships with several men. He gave the men his ex-wife s phone number and urged them to call her. When authorities seized the suspect s computer and provided it to the San Diego RCFL for examination, at first, the Examiners found no direct evidence in the active files. In time, they unearthed over 500 chat logs in the unused portions of the hard drive detailing the exhusband s illicit activities on the Internet. When this information was presented at trial in 2000, the suspect was convicted of felony stalking charges. September 11 terrorist attack Examiners from both the San Diego and North Texas RCFLs supported the PENTTBOM investigation, which was named after the terrorist attacks against the Pentagon, the World Trade Center, and the crash in Pennsylvania. The San Diego RCFL processed over 29 separate service requests, and examined over 40 computers and hundreds of pieces of loose media. Concurrently, the Lab provided technical and operational assistance to the FBI s Newark Division, which was inundated at that time. Meanwhile, the North Texas RCFL singlehandedly processed over 50% of the digital evidence involving the aftermath of September 11. Thanks to the operational capabilities of all the RCFL Examiners, every request was processed in record time, providing key FBI personnel with results, at times, in a matter of hours. Reclaimed data from melted computer terminal A suspect rang the doorbell of his victim, fatally shot him five times in the face, and then set a computer in the victim s house on fire. The Dallas Police Department brought the once smoldering mound of plastic that was a computer, to the North Texas RCFL for examination. The Examiners replaced the computer s melted circuit board with the same exact model. As if that wasn t enough of a challenge, they next had to retrieve a floppy disk that was now shaped like an S. After removing the casing, putting it into a new sleeve, and repeatedly cleaning the disk, it finally yielded the valuable digital evidence that the Examiners so meticulously searched for. In this case, high technology took a back seat to perseverance, patience, and fierce determination. Training Training is the cornerstone of the RCFL Program, and as such, is one of the most sought after, highly regarded offerings of the Program. This training takes two forms: 1) Training law enforcement personnel in a region e Each RCFL is equipped with a modern computer classroom where they train law enforcement personnel regarding handling sensitive electronic equipment that becomes evidence, computer investigation techniques, and computer forensics. In FY 2003, the RCFL Program trained 1541 law enforcement officers in these techniques. The benefits of having a knowledgeable workforce in computer forensics are immeasurable. A highly trained work force will enhance the preservation of digital evidence, and will help prosecutors convict those individuals who use computer technology to facilitate a crime.
5 Building FBI computer forensics capacity: one lab at a time 181 2) Training RCFL detailees e The NPO coordinates the training of all RCFL Examiners and Examiner candidates. These individuals receive six weeks of standard FBI-approved computer forensics training during their first year, and up to three weeks of training in computer techniques and tools thereafter. Many Examiners cite this training and certification as one of the major benefits of participating in the Program. In FY 2003, 56 RCFL Examiners received FBI-sponsored training, and six Examiners returned to their home agencies, further building computer forensics capacity in the San Diego and North Texas regions. Former Examiners can still access the FBI s prestigious training and certification resources thanks to the Associate Examiner Program. This program is critical in helping former Examiners hone their skills and to stay abreast of new technologies. Image Scan The FBI s CART program developed this Linuxbased software tool to assist investigators with identifying potential evidence of crimes. This tool protects valuable computer evidence by booting up the computer using the Linux operating system. Image Scan mounts the hard drive in a read only manner, and then prompts the investigator to search for pictures files only. During this process, the tool logs every step taken by the investigator during this consent search process. Because Image Scan is primarily used during the investigative stage, it can determine if contraband is present on a seized computer. Currently, each RCFL assigns an Examiner to teach investigators how and when to apply this tool. To date, it has been used on hundreds of cases, and has helped bring child predators to justice. Research and development Each RCFL has a number of activities and services they perform, with research and development being one of them. Each RCFLs has its own unique needs, therefore, each laboratory is pursuing different technologies to meet specific requirements. Once a technology is sufficiently tested and approved, the application is recommended for use by all of the laboratories in the Program. Some of these technologies include the following: Write blocker technology e The San Diego RCFL tested the write blocker technology that allows the user to read all the files on a computer s hard drive without the risk of damaging or altering any of the stored information. Today, every RCFL and the FBI s CART are applying this technology with great success. Storage area network (SAN) e The North Texas RCFL developed the SAN or storage area network. A SAN is a single repository that contains data for an individual case, and enables the Examiner to load large amounts of data to a single location for examination and review by investigators. After being sufficiently tested in FY 2003, the SAN technology was exported to other RCFLs throughout the Program and the FBI. The write blocker and SAN technologies both reflect the collaborative spirit of the RCFL Program. By taking the lead in developing new technologies, the Program is producing cutting-edge tools that benefit all of law enforcement. Future plans The NPO has identified two major goals aimed at strengthening the Program. They are: Growing the program while maintaining quality e Nine RCFLs are scheduled to join the Program over the 2004e2005 time frame. The NPO, in coordination with the representatives of each new RCFL, are establishing standardized procedures, quality controls, and processes for each facility. Increasing agency participation e In FY 2003, 38 law enforcement agencies participated in the RCFL Program. In order to keep pace with the casework, the RCFL Program has made a commitment to increase the number of participating Examiners and agencies involved with each facility. Increased involvement will continue to build capacity and capabilities for the regions served by each RCFL. Conclusion The Program s continued growth and long list of accomplishments are a testament to the original
6 182 D.A. Schmitknecht RCFL model. This pilot project, which started in San Diego, has evolved into America s premier computer forensic laboratory network. As the great football coach Vince Lombardi once said, The achievements of an organization are the results of the combined effort of each individual. To request an RCFL information package, send an to [email protected], or visit our website on Douglas A. Schmidtknecht is a nineteen-year veteran of the FBI. Prior to becoming the Chief of the RCFL National Program Office, he was a member of the FBI s elite Computer Analysis Response Team.
How To Improve The Criminal Justice System
Regional Computer Forensic Laboratory (RCFL) National Program Office (NPO) Commonwealth of Virginia Joint Commission on Technology and Science September 8, 2004 Search Warrant What is an RCFL? A Regional
Audit of the Federal Bureau of Investigation s Philadelphia Regional Computer Forensic Laboratory Radnor, Pennsylvania
Office of the Inspector General U.S. Department of Justice Audit of the Federal Bureau of Investigation s Philadelphia Regional Computer Forensic Laboratory Radnor, Pennsylvania Audit Division 15-14 April
Robert P. Bianchi 5502 Chestermill Court Fairfax, VA 22030 E-mail: [email protected] (571) 233-4780 FAX (703)-222-0258
Robert P. Bianchi 5502 Chestermill Court Fairfax, VA 22030 E-mail: [email protected] (571) 233-4780 FAX (703)-222-0258 Experience November 2003 present - Prescription Drug Research Center I provided
U.S. Department of Justice
U.S. Department of Justice Federal Bureau of Investigation Office of the Director Washington, D.C. 20535-0001 February 1,2013 The Honorable Barbara A. Mikulski Chairwoman Senate Appropriations Committee
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
U.S. Department of Homeland Security STATEMENT
U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY
Minneapolis Police Department Crime Lab ASCLD/LAB ISO International Accreditation
Minneapolis Police Department Crime Lab ASCLD/LAB ISO International Accreditation ASCLD/LAB ISO International Accreditation The American Society of Crime Laboratory Directors/Laboratory Accreditation Board
FACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).
TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint
M ANAGEMENT I NTEGRATION G OAL. Achieve organizational and management excellence
M ANAGEMENT I NTEGRATION G OAL Achieve organizational and management excellence 71 MANAGEMENT INTEGRATION STRATEGIC GOAL Management Integration Goal Achieve organizational and management excellence The
CAREER: FORENSIC SCIENCE TECHNICIAN 1
CAREER: FORENSIC SCIENCE TECHNICIAN 1 Career: Forensic Science Technician Mary C. Cartwright Middlesex Community College CRJ 111-52 Heloisa DaCunha November 29, 2012 CAREER: FORENSIC SCIENCE TECHNICIAN
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
Edward Lowery III. Special Agent in Charge Criminal Investigative Division, U.S. Secret Service. Prepared Testimony
Edward Lowery III Special Agent in Charge Criminal Investigative Division, U.S. Secret Service Prepared Testimony Before the United States Senate Committee on Homeland Security and Governmental Affairs
THE DEPARTMENT OF JUSTICE S EFFORTS TO COMBAT IDENTITY THEFT. U.S. Department of Justice Office of the Inspector General Audit Division
THE DEPARTMENT OF JUSTICE S EFFORTS TO COMBAT IDENTITY THEFT U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 10-21 March 2010 THE DEPARTMENT OF JUSTICE S EFFORTS
An Historical Perspective of Digital Evidence: A Forensic Scientist s View
An Historical Perspective of Digital Evidence: A Forensic Scientist s View Carrie Morgan Whitcomb, Director, National Center for Forensic Science Author s Comments During my tenure as director of the Postal
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
GAO FOOD ASSISTANCE. Reducing Food Stamp Benefit Overpayments and Trafficking
GAO United States General Accounting Office Testimony Before the Subcommittee on Department Operations, Nutrition, and Foreign Agriculture, Committee on Agriculture, House of Representatives For Release
STATE OF WISCONSIN DEPARTMENT OF JUSTICE
STATE OF WISCONSIN DEPARTMENT OF JUSTICE BRAD D. SCHIMEL ATTORNEY GENERAL Andrew C. Cook Deputy Attorney General 114 East, State Capitol P.O. Box 7857 Madison, WI 53707-7857 608/266-1221 TTY 1-800-947-3529
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
(CHRI) CHECKS OF INDIVIDUALS CONDUCTING BUSINESS IN THE AREA OF INSURANCE AND; 2.)
MR. CHAIRMAN, I AM PLEASED TO APPEAR TODAY ON BEHALF OF THE FBI AND SHARE WITH YOUR SUBCOMMITTEES THE FBI'S PERSPECTIVE ON CRIMINAL HISTORY RECORD INFORMATION CHECKS ON INDIVIDUALS CONDUCTING BUSINESS
TESTIMONY ROBERT M. A. JOHNSON ANOKA COUNTY ATTORNEY ANOKA, MINNESOTA JUNE 4, 2009 INDIGENT REPRESENTATION: A GROWING NATIONAL CRISIS
TESTIMONY OF ROBERT M. A. JOHNSON ANOKA COUNTY ATTORNEY ANOKA, MINNESOTA JUNE 4, 2009 ON INDIGENT REPRESENTATION: A GROWING NATIONAL CRISIS TESTIMONY OF ROBERT M.A. JOHNSON FOR THE HOUSE JUDICIARY SUBCOMMITTEE
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
The FDIC s Response to Bank Secrecy Act and Anti-Money Laundering Concerns Identified at FDIC-Supervised Institutions
Office of Audits and Evaluations Report No. AUD-14-009 The FDIC s Response to Bank Secrecy Act and Anti-Money Laundering Concerns Identified at FDIC-Supervised Institutions August 2014 Executive Summary
THE FEDERAL BUREAU OF INVESTIGATION FINANCIAL INSTITUTION FRAUD AND FAILURE REPORT
U.S. Department of Justice Federal Bureau of Investigation FINANCIAL INSTITUTION FRAUD UNIT FINANCIAL CRIMES SECTION FINANCIAL INSTITUTION FRAUD AND FAILURE REPORT FISCAL YEAR 2002 THE FEDERAL BUREAU OF
CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
The Massachusetts Strategic Plan for Cyber Crime
The Massachusetts Strategic Plan for Cyber Crime FALL 2007 Commonwealth of Massachusetts OFFICE OF ATTORNEY GENERAL MARTHA COAKLEY Introduction Introduction The (AGO) takes a broad view of cyber crime,
Scientific Working Group on Digital Evidence (SWGDE)
Scientific Working Group on Digital Evidence (SWGDE) Position on the National Research Council Report to Congress Strengthening Forensic Science in the United States: A Path Forward In the National Research
The Department of the Treasury established the Financial Crimes
Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish
Five-Year Strategic Plan
U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations
WYOMING ATTORNEY GENERAL S OFFICE FY12 ANNUAL REPORT
WYOMING ATTORNEY GENERAL S OFFICE FY12 ANNUAL REPORT General Information Gregory A. Phillips, Attorney General Agency Contact Peter K. Michael, Chief Deputy Attorney General 123 State Capitol Cheyenne,
STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
JOINT STATEMENT BY HER MAJESTY S ATTORNEY GENERAL AND THE LORD ADVOCATE
JOINT STATEMENT BY HER MAJESTY S ATTORNEY GENERAL AND THE LORD ADVOCATE HANDLING OF TERRORIST CASES WHERE THE JURISDICTION TO PROSECUTE IS SHARED BY PROSECUTING AUTHORITIES WITHIN THE UK STATEMENT OF SHARED
CARCO GROUP INC. Leader in Vehicle Pre-Insurance Inspection Management and Technology Development
CARCO GROUP INC. Leader in Vehicle Pre-Insurance Inspection Management and Technology Development A pioneer in vehicle pre-insurance inspection systems, and recognized leader in the field, CARCO Group,
Lawrence Police Department Administrative Policy. August 2013
Lawrence Police Department Administrative Policy SUBJECT Competencies APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES 4 POLICY CHAPTER 10 Competencies
FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
DISTRICT ATTORNEY Michael A. Ramos
250 District Attorney DISTRICT ATTORNEY Michael A. Ramos DEPARTMENT MISSION STATEMENT The San Bernardino County District Attorney s Office represents the interests of the people in the criminal justice
Overview of Current Criminal Justice Information Systems
Overview of Current Criminal Justice Information Systems by James X. Dempsey Center for Democracy & Technology www.cdt.org Criminal justice information systems can be divided roughly into two categories:
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
Awards Made for NIJ FY 12 Solving Cold Cases with DNA
Awards Made for NIJ FY 12 Solving Cold Cases with DNA FY12 Recipient Name: Miami-Dade County (Fla.) Award Number: 2012-DN-BX-K006 Abstract: The purpose and intent of Miami-Dade County s application for
Position Summary The Chief of Police reports to the Vice Chancellor of Administrative Services at the District Office.
Chief of Police San Jose/Evergreen Community College District Opportunity Type: MANAGEMENT EMPLOYMENT OPPORTUNITY Posting Date: 07-11-2014 Closing Date: 08-11-2014 Posting Number: 0010471 Work Location
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
In 2009, the nation s 411 publicly funded crime
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Census of Publicly Funded Forensic Crime Laboratories, Matthew R. Durose, BJS Statistician Kelly A. Walsh, Research Associate,
Course Forensic Science. Unit II History
Course Forensic Science Unit II History Essential Question What are some examples of careers in Forensic Science? TEKS 130.295(c) (4)(A)(B) Prior Student Learning History of Forensic Science Estimated
NC SBI QUALITY ASSURANCE PROGRAM
NC SBI QUALITY ASSURANCE PROGRAM for the SBI Reviewed by: Deputy Assistant Director Bill Weis Date: Approved by: Assistant Director Jerry Richardson Date: Originating Unit: SBI Effective Date: July 25,
How To Become A State Pol Forensic Tech Leader
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,
STATE OF NEVADA COMMISSION on PEACE OFFICERS STANDARDS and TRAINING
STATE OF NEVADA COMMISSION on PEACE OFFICERS STANDARDS and TRAINING Legislative Study Elder Abuse Exhibit D Senior Citizens and Veterans (A.C.R. 35) Document consists of 11 pages. Entire Exhibit Provided.
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Computer Forensics: an approach to evidence in cyberspace
Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based
DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION
DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION TITLE I: AUTHORIZATION OF APPROPRIATIONS Sec. 101. Authorization of Appropriations. This section authorizes
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
As part of their course on law and/or sociology in this module, participants will be able to:
Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 AN ACT TO (1) CREATE THE NORTH CAROLINA FORENSIC SCIENCE ADVISORY BOARD, (2) ENCOURAGE EFFORTS TO ELIMINATE SOURCES OF
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION
GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION The American Society of Crime Laboratory Directors is a professional organization of managers and supervisors employed in forensic laboratories.
How To Hold A Public Safety Summit
PUBLIC SAFETY SUMMIT I Crime Prevention through Cooperative Policing and Best Practices Wednesday, January 16, 2013 Greetings, Thank you for taking time out of your busy schedule to attend today s Public
Violence Against Women Formula Grants
User Guide Violence Against Women Formula Grants STOP Violence Against Women Formula Grants Number: 16.588 Agency: Department of Justice Office: Violence Against Women Office Program Information Authorization
Services. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
National Resources for Sex Trafficking
National Resources for Sex Trafficking Dear John Campaign Atlanta, Georgia Website: https://www.youtube.com/watch?v=frsbo6g21hu The Dear John Campaign is a public education program in Atlanta, Georgia
SAFETY AND SECURITY: Opportunities to Improve Controls Over Police Department Workforce Planning
SAFETY AND SECURITY: Opportunities to Improve Controls Over Police Department Audit Report OIG-A-2015-006 February 12, 2015 2 OPPORTUNITIES EXIST TO IMPROVE WORKFORCE PLANNING PRACTICES AND RELATED SAFETY
The Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM): Bringing together regional and international expertise
Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 17-21 17 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
MORPHO CRIMINAL JUSTICE SUITE
MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background
Visit by the Hon. Janet Napolitano US Department of Homeland Security
Address by Ronald K. Noble INTERPOL Secretary General Visit by the Hon. Janet Napolitano US Department of Homeland Security 8 October 2012 INTERPOL General Secretariat, Lyon, France 1 Madame Secretary,
The Texas District and County Attorneys Association August, 2010
The Texas District and County Attorneys Association August, 2010 The Texas District and County Attorneys Association (TDCAA) is a professional 501(c)(6) nonprofit corporation dedicated to providing educational
Criminal Justice Sector and Rule of Law Working Group
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
22nd INTERPOL Americas Regional Conference
OPENING REMARKS by Ronald K. Noble INTERPOL Secretary General 22nd INTERPOL Americas Regional Conference 1 July 2013 Willemstad, Curaçao The Honorable Nelson Navarro, Minister of Justice of Curaçao, INTERPOL
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context
Testimony Of Ms. Anne Wallace. On behalf of. The Identity Theft Assistance Corporation. Identity Theft: A Victims Bill of Rights
Testimony Of Ms. Anne Wallace On behalf of The Identity Theft Assistance Corporation Identity Theft: A Victims Bill of Rights Information Policy, Census, and National Archives Subcommittee Oversight and
Statement of Introduction on the Nomination of John B. Owens to the U.S. Court of Appeals for the Ninth Circuit. Senator Dianne Feinstein
Statement of Introduction on the Nomination of John B. Owens to the U.S. Court of Appeals for the Ninth Circuit Senator Dianne Feinstein Senate Judiciary Committee October 30, 2013 I will now introduce
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Impact of the Frontline Leader Readiness Program on Succession Planning Should Be Determined March 15, 2011 Reference Number: 2011-10-015 This report
Regional Computer Forensic Laboratory & Digital Forensics. Presented By: D. Justin Price FBI - Philadelphia Computer Analysis Response Team
Regional Computer Forensic Laboratory & Digital Forensics Presented By: D. Justin Price FBI - Philadelphia Computer Analysis Response Team Objectives Objectives RCFL Program Overview PHRCFL Services Forensic
The Department of Justice
The Legislative Fiscal Division Presents an Agency Profile of: The Department of Justice Contact: Greg DeWitt, Senior Fiscal Analyst Room 119, State Capitol Building Phone: 444-5392 E-mail: [email protected]
The Interagency Security Committee and Security Standards for Federal Buildings
Order Code RS22121 Updated November 23, 2007 The Interagency Security Committee and Security Standards for Federal Buildings Summary Stephanie Smith Analyst in American National Government Government and
HUMAN SERVICES COMMITTEE
HUMAN SERVICES COMMITTEE Bob Mitchell, Chair Becky Fults James Goodrich JoAnn L. Miller Miguel A. Ibarra Allen Skip Burt Susan Brewster COUNTY OF SAN BERNARDINO Quaerite Veritatem G R A N D J U R Y HUMAN
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Strengthening Forensic Science in the United States: A Path Forward
Strengthening Forensic Science in the United States: A Path Forward American Society of Crime Laboratory Directors (ASCLD): Recognizes that the committee s recommendations pave the way for a significant
Federal Bureau of Investigation s Integrity and Compliance Program
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
County of Monterey DISTRICT ATTORNEY INVESTIGATOR I
DISTRICT ATTORNEY INVESTIGATOR I DEFINITION Under supervision, investigates cases of suspected welfare fraud and other criminal activity to obtain facts and evidence in support of administrative action
LOUISIANA COMMISSION ON LAW ENFORCEMENT AND ADMINISTRATION OF CRIMINAL JUSTICE STRATEGIC PLAN
LOUISIANA COMMISSION ON LAW ENFORCEMENT AND ADMINISTRATION OF CRIMINAL JUSTICE STRATEGIC PLAN FY 2011-2012 THROUGH FY 2015-2016 LOUISIANA COMMISSION ON LAW ENFORCEMENT (LCLE) VISION: To provide visionary
