Electronic evidence: More than just a hard drive. March 2015 Publication No
|
|
|
- Lenard Johns
- 10 years ago
- Views:
Transcription
1 Electronic evidence: More than just a hard drive March 2015 Publication No
2 1 Introduction 2 Over the last decade, the computer hard drive has been the main point of data storage and therefore the key source of electronic evidence for investigations and litigation. This has changed rapidly in recent years with the rapid growth of new data storage technologies, such as smart phones, tablet devices and of course cloud storage. In this article, Daniel Walton, a Forensic Technology manager in our Sydney office, discusses potential new sources of electronic evidence, and some examples of their use in our Forensic Technology team s recent work. 2 A new digital landscape Recently there has been a huge explosion in the number of personal electronic devices, triggered by the rapid increase in mobile phone technology and rising internet speeds. Nearly everyone now has a smartphone, with almost their entire lives stored on it, making these devices and internet access the new basic human need (see the image below). Selfactualisation Pursue inner talent Creativity Fulfillment Self-Esteem Achievement Mastery Recognition Respect Belonging - Love Friends Family Spouse Lover Safety Security Stability Freedom from Fear Physiological Food Water Shelter Warmth Original Malsow s Hierachy of Needs Source: Maslow A., Motivation and Personality, Harper, 1970 Selfactualisation Pursue inner talent Creativity Fulfillment Self-Esteem Achievement Mastery Recognition Respect Belonging - Love Friends Family Spouse Lover Safety Security Stability Freedom from Fear Physiological Food Water Shelter Warmth WIFI BATTERY Malsow s Hierachy of Needs 3.0 Source: Many people are using their personal devices for both personal and business use meaning information vital to an investigation or litigation could be stored on a phone or tablet (often a device with internal storage capacity similar to desktop computers from ten years ago). Additionally, information could be retained on devices you have never considered might store data, such as in-car GPS navigation devices, gaming consoles or printers. We suggest that the following devices should be considered as potential sources of electronic evidence.
3 Traditional data sources for electronic evidence New sources of electronic evidence 3 Desktop computers Mobile phones including smart phones Laptop computers GPS navigation devices these devices can record location data Servers including multiple disk storage Multi-Function Printers (MFP s) these devices can store print logs and potentially print jobs USB devices Digital video recorders CD/DVDs Digital voice recorders Floppy disks Digital still cameras including SD/CF cards and other types of memory cards Backup devices including tapes Internet and cloud storage (see callout box below) The Cloud Cloud Computing is the practice of using an on-demand, robust and scalable network of remote computer technologies to store, manage and process data, rather than using local servers or personal computers. Online data storage, also known as cloud storage, has become a popular way of storing data, and it is now easy for users to back up or copy photos, music and other data remotely to the cloud from mobile phones. This means that organisations should be alive to the possibility of Intellectual Property (IP) theft, as it is now so easy for employees to synchronise company data to their own cloud accounts. Cloud storage sites like Dropbox and Google Drive are common in daily use and can be a convenient tool for misappropriating company data. Also, depending on the setup of a users mobile device, some users are storing data in the cloud without even knowing: companies such as Facebook, Google Plus and LinkedIn are storing our information on the cloud. It may also be appropriate to consider these sites as potential sources of electronic evidence in an investigation or as part of litigation.
4 Internet sources of evidence 4 Social networking sites such as Facebook, LinkedIn and Instagram. Cloud storage sites such as Dropbox, Google Docs and icloud. Communication and chat sites such as Twitter, MSN, Skype Chat and Facebook chat. Commerce sites such as share trading sites, banking sites and auction/ shopping sites such as ebay and Amazon. 3 Recent examples of cases undertaken by our team GPS An insurance claim was being investigated regarding a suspicious claim from the Brisbane floods in The claimant had claimed that their luxury vehicle had been flooded and that this incident could not be avoided. When an examination of the car s on-board computer and GPS was conducted, the evidence showed that the vehicle had been driven toward the rising floodwaters just before the Brisbane River broke its banks. The claimant s story did not match the data from the vehicle s GPS and, as a result, the claim was denied. DropBox A staff member left a Company A taking company information with them and then set up a Company B in competition. Analysis of their Dropbox usage showed they had uploaded data from Company A to Dropbox toward the end of their employment and then shared and accessed this information from Company B after they had left. Legal action was taken and this information was used in court. Digital still camera/smart phone There was an insurance case in which a claimant claimed to have lost their handbag. This handbag was reported to contain numerous expensive items including a large amount of cash and an ipad. Forensic analysis of the digital photos provided by the claimant showed that these photos had been taken a significant time after the alleged date of loss and just a few hours after the insurance company had asked for photos as proof of the claimed items. The insurance company was then able to decline the claim based on this information.
5 4 Conclusion 5 It s always important to consider the many different types of devices that are now available to store information, or which are perhaps storing information without the user s knowledge! Whilst personal computers and file servers are still relevant data sources, it is important to make sure that all potentially useful sources of evidence are obtained and reviewed by forensic technology specialists, as they could be pivotal in proving or disproving a case. Furthermore, obtaining data from the cloud is often complex, so when faced with an investigation or litigation, we suggest that acquisitions of cloud data are undertaken by experienced forensic technology specialists to avoid the risk of data modification. About the author Daniel Walton Manager Sydney [email protected] Daniel has 4.5 years experience in the area of computer forensic investigations, working on corporate frauds, financial crimes, e-discovery, intellectual property theft and contractual disputes. This has included assisting investigations of law enforcement and regulatory bodies with the execution of a number of Anton Pillar Orders and Search Warrants. Daniel has a broad range of technical skills forged in over 20 years computer networking, systems administration, data storage systems, and data recovery experience.
6 KordaMentha Forensic We provide clarity and objectivity to organisations when the commercial stakes are high, and the evidence is critical to the outcome. Our specialist forensic tools, rigorous analysis and clear presentation of the financial, factual and electronic information provides insights that are otherwise hidden in the detail of a dispute, investigation, or review. Melbourne Owain Stone [email protected] Robert Cockerell [email protected] Stephen Helberg [email protected] Craig Macaulay [email protected] Anthony Hodgkinson [email protected] Brittany Lincoln [email protected] Sydney Andrew Ross [email protected] John Temple-Cole [email protected] Nigel Carson [email protected] Paul Curby [email protected] Alex Bell [email protected] Perth Grant Whiteley Director [email protected] Brisbane David Van Homrigh [email protected] Brian Wood [email protected] Adelaide Stephen Duncan [email protected] Briston Talbot Associate Director [email protected] Singapore Matthew Fleming [email protected] Subscribe to our publications at kordamentha.com/subscribe Learn more about our forensic services at kordamentha.com/forensic This publication, and the information contained therein, is prepared by KordaMentha Forensic s and staff. It is of a general nature and is not intended to address the circumstances of any particular individual or entity. It does not constitute advice, legal or otherwise, and should not be relied on as such. Professional advice should be sought prior to actions being taken on any of the information. The authors note that much of the material presented was originally prepared by others and this publication provides a summary of that material and the personal opinions of the authors. Limited liability under a scheme approved under Professional Standards Legislation.
Oppression remedies: who should buy out whom, and at what price?
Oppression remedies: who should buy out whom, and at what price? Case note on Patterson -v- Humfrey [2014] WASC 446 April 2015 Publication No. 15-01 1 Introduction The shares should be valued on a basis
A revised standard for forensic accountants
A revised standard for forensic accountants APES 215 Forensic Accounting Services (Revised December 2013) January 2014 Publication No. 14-01 1 Introduction APES 215 Forensic Accounting Services (Revised
To gross-up or not to gross-up
To gross-up or not to gross-up Taxation in the assessment of damages June 2013 Publication No. 13-01 1 Introduction When we think about a damages award arising from litigation, we think of barristers,
Clarity Middle School Survey
Clarity Middle School Survey Instructions Take 10 minutes to help your school with technology in the classroom. This is an anonymous survey regarding your technology use. It will take approximately 10
Clarity High School Student Survey
Clarity High School Student Survey Instructions Take 10 minutes to help your school with technology in the classroom. This is an anonymous survey regarding your technology use. It will take approximately
Introduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
CD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks.
Slide 1 Safe in the Cloud This presentation was given to the U3A South East Region Committees Workshop October 25 th 2013 and follows up the article published in Third Age Matters Issue 7 Summer 2013 page
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Media Trends: Q4 Report
Media Trends: Q4 Report By Marketing Mechanics DECEMBER 2014 Media Trends Q4 2014 1 Introduction Marketing Mechanics are pleased to present Q4 Media Trends Report of 2014. Our research is based on insights
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
forensics matters Audit negligence: Who is to blame when it all goes wrong? Publication No. 11-04
Audit negligence: Who is to blame when it all goes wrong? Publication No. 11-04 Audit negligence following the GFC The recent collapses of Allco, Westpoint, Centro, Storm Financial, Opes Prime, ABC Learning,
Computer Adelaide & Internet City Training Program
Free Computer Adelaide & Internet City Training Program April to June 2014 BOOK NOW for FREE computer and internet training at the Adelaide City Digital Hub Gain new skills through group and one-on-one
Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
Shafiq Khan. An Introduction to. Cloud Computing 13/12/2012
Shafiq Khan An Introduction to Cloud Computing 13/12/2012 Who we are. > Part of East Lancashire Chamber of Commerce > Web design agency established in 1998 > Customer focused with web solutions for every
forensics matters Advanced interview techniques
Advanced interview techniques If it is important to ask the question, then it must be equally as important to listen to the response. Publication No. 11-05 Advanced interview techniques If it is important
TECHconnect Classes for Seniors
Events for Seniors TECHconnect Classes for Seniors Covering computer basics, social media and mobile technology. LIMITED SPACES Regular hands-on computer workshops for beginners and intermediate users
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.
Questionnaire on Electronically Stored Information (May 2014) Comment The Questionnaire is intended to be a comprehensive set of questions about a company s computer systems. The extent to which you should
Computing Services and Systems Development 2015 2016 PittStart
Computing Services and Systems Development 2015 2016 PittStart CSSD @ Pitt We provide the technology tools and services that make your life at Pitt easier! Visit us at technology.pitt.edu Presentation
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Communications report 2013 14 series Report 1 Australians digital lives MARCH 2015
Communications report 2013 14 series Report 1 Australians digital lives MARCH 2015 Canberra Red Building Benjamin Offices Chan Street Belconnen ACT PO Box 78 Belconnen ACT 2616 T +61 2 6219 5555 F +61
Case study on asset tracing
Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million
Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data
Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally
Introduction to Cloud Storage GOOGLE DRIVE
Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,
Internet. [email protected] switchtelecom.com.au. May2014-Version 1
Internet 1800 800 723 [email protected] switchtelecom.com.au May2014-Version 1 Welcome to a new kind of telecommunications company Best Products Mobile Offering an extensive range of
City Surveillance and the Cloud
Keep Watch on Your Projects Through the Cloud, 24/7/365 Unlock the all the potential tools of a modern enterprise video surveillance system with a costeffective and elegantly simple cloud video surveillance
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:
Peter Hirsch Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Computation Software Applications Data access Storage services.that do not require
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
SMART PHONES. A review based on Android from Samsung Apple IPhones will have very similar operational characteristics
SMART PHONES A review based on Android from Samsung Apple IPhones will have very similar operational characteristics Compelling reasons to own one Some are now low cost May cost less than a new battery
Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida
2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Key Words: Internet marketing, social media marketing, mobile advertising
Internet Marketing Professor, College of Business, San Francisco State University (William Perttula interviewed by Theodor Valentin Purc rea) The trend toward internet marketing has been going on since
About me & Submission details
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe
USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
Remote Infrastructure Management Emergence of the Cloud-based Helpdesk
Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary
ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper
ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Dell Wyse Cloud Connect
Dell Wyse Cloud Connect Secure productivity from work, home, and on the go. The ultra-compact personal cloud device that can make any HDMI/MHL-equipped display your own. For personal access to all of your
Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary
Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!
device management solutions
device management solutions devicemanagement Do you have a high number of geographically dispersed remote or field workers who use mobile devices? Do you need to monitor and track the devices and upload
Case Study: Cyber Stalking and Spyware in Divorce Cases
Case Study: Cyber Stalking and Spyware in Divorce Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer
The 9 Pillars of Enterprise Mobility
The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align
T H E E D U C A T I O N C L O U D. Freedom... a true Cloud based solution for education!
T H E E D U C A T I O N C L O U D Freedom... a true Cloud based solution for education! Contents T H E E D U C A T I O N C L O U D What is Freedom? 04 Freedom... a Cloud based solution for education! High
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4
CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.
CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3
How To Answer A Question About Your Organization'S History Of Esi
Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.
Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors
Solve the Dropbox Problem with Enterprise Content Connectors An Accellion Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors Executive Summary Dropbox is one of the most popular services
Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura [email protected]
Mobile Cloud Computing Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura [email protected] Mobile Computing Rapid progress of mobile computing have become a powerful trend in the
The Autonomous Customer 2015: On-hold for Intelligent Customer Service - Global
The Autonomous Customer 2015: On-hold for Intelligent Customer Service - Global 1 Contents Autonomous Customer 2015 Global - Introducing the Autonomous Customer & Methodology 3 - Summary Global and Country
For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.
DropBox vs SugarSync - File storage in the cloud 1 Dropbox There are a number of solutions emerging into the market, which provide users the ability to store files in the cloud, which provide a number
endpoint www.egosecure.com Antivirus Application Control Removable Device Encryption enjoy Data protection
Egosecure endpoint Access Control Antivirus Content Analysis & Filter Application Control Removable Device Encryption Folder ENCRyPTION Mobile Device Management Power Management enjoy Data protection Facts
Top Talent is Mobile. Are You?
Top Talent is Mobile. Are You? The Rise of Mobile Technology in Talent Acquisition JOB an ebook by: We turn to our smartphones and tablets for almost everything, and these mobile devices are well on their
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated
Chapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
Monetizing Mobile Applications How to maximize investment, move up the value chain and expand into new markets
Monetizing Mobile Applications How to maximize investment, move up the value chain and expand into new markets Strategic White Paper Network providers are well aware of the challenges presented by today
Commercial Security Made Simple with Cloud Video Surveillance
Commercial Security Made Simple with Cloud Video Surveillance From the Fine Detail to the Big Picture See It All from Anywhere Keep Watch on Your Properties Through the Cloud, 24/7/365 Unlock the all the
Mobile Testing That s Just a Smaller Screen, Right?
Mobile Testing That s Just a Smaller Screen, Right? Stephen Janaway Senior Software Test Manager Nokia Mobile Phones Who am I? Stephen Janaway 12 years experience in mobile software testing. Software testing
Backing up your digital image collection provides it with essential protection.
Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.
2015 USER GROUP CONFERENCE
2015 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.
ABC PRIVACY POLICY The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. Our goal is to provide you and your family with media experiences
Mobile Technology For Tourism
Topic Social Media Tutorial 50 Mobile Technology For Tourism Mobile technology is fast becoming vital for tourism businesses. This tutorial explains how travellers are using smartphones and how you can
A Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
IT Peace of Mind. Powered by: Secure Backup and Collaboration for Enterprises
Powered by: Secure Backup and Collaboration for Enterprises Firewall IT Peace of Mind Do You Know Where Your Data Is? Cloud-based back-up and collaboration Your employees are using cloud-based services
PARKING PRACTICE NOTES Revised March 2012. Technology in the Parking industry
PARKING PRACTICE NOTES Revised March 2012 Technology in the Parking industry Introduction Revised March 2012 The use of technology within the parking industry across the UK has become increasingly widespread
