MOBILE DEVICE FORENSICS 101: A GENERAL OVERVIEW OF SMARTPHONE INVESTIGATIONS
|
|
|
- Cornelia Roberts
- 10 years ago
- Views:
Transcription
1 MOBILE DEVICE FORENSICS 101: A GENERAL OVERVIEW OF SMARTPHONE INVESTIGATIONS Course Description, Objectives, Agenda and Presenters Mobile Device Forensics is the extraction, processing and analysis of information stored on smartphones and tablet devices. Understanding this process, its uses and limitations is essential for attorneys in counseling their clients on discovery issues. This course has been approved for Minimum Continuing Legal Education Credit by the State Bar of Texas Committee on MCLE in the amount of 1.5 credit hours.
2 MOBILE DEVICE FORENSICS 101, GENERAL OVERVIEW OF SMARTPHONE INVESTIGATIONS COURSE DESCRIPTION: Mobile devices have become key in communication on both a personal and business level. Often, there is no separation between business and personal with the two melding together onto one source of key communication the mobile device. Recent political scandals often involve a digital component which includes s, text messages, images and social media (i.e. Facebook, Instagram and Twitter, etc.) High profile criminal cases often use computer and mobile device forensics to look for everything from pictures, images and s to Google search terms. All communication in the modern world takes place on computers and mobile devices (smartphones and tablets). This communication leaves a trail of digital data that can contain discoverable information. The ability to extract the data and analyze it in a forensically sound manner is crucial in both civil and criminal cases. Mobile device forensics focuses specifically on smartphones and tablet devices. While these devices are similar to their laptop and pc counterparts, there are distinct differences in their operating systems that require expertise specific to those devices. Mobile devices have emerged as key sources of data in cases such as: Family Law Contentious Divorce, Child Custody Employment Law Non Compete Enforcement Intellectual Property Law Theft of Intellectual Property, Trademark Disputes Bankruptcy Law Fraud and Hidden Assets Criminal Law Embezzlement and Fraud COURSE OBJECTIVE: This course provides a general overview of the mobile device forensics process to help attorneys counsel their clients on relative discovery issues. At course completion, attorneys should have a basic understanding of the types of data that can be extracted and analyzed, methods for obtaining data, typical smartphone operating systems and the limitations on data recovery specific to those operating systems. AGENDA (90 MINUTE PRESENTATION) 1.5 HOURS CLE CREDIT General overview of computer and mobile device forensics The forensic imaging process What types of mobile devices can be analyzed What types of data can be extracted and analyzed Issues and problems with the extraction of data in a fluid technology landscape Question and answer session 1 P age
3 PRESENTERS: BRETT DEARMAN, COMPUTER FORENSICS EXAMINER Brett Dearman has performed or participated in over 200 internal investigations of varying complexity from 2002 to present in the role of digital forensics examiner. These include alleged corporate espionage, theft of intellectual property, illegal trading practices, possession and distribution of pornography, and Human Resources related issues. Many of the collections were performed after normal working hours or by covert action. Mr. Dearman performed or assisted with numerous e-discovery initiatives including probable cause for reasonable termination. This includes the preliminary examination of personal computers and/or network servers as part of e- discovery. In the course of these investigations, interaction with attorneys, federal agents and law enforcement officers was common. Case Highlights: Mr. Dearman participated in the role of digital forensic examiner during a Department of Justice investigation regarding illegal natural gas trading practices. Mr. Dearman worked with lead investigation coordinator on direction of the investigation based on relevant evidence as it was discovered. Due to the nature of the employee s work as a commodities trader, the collection of evidence had to be done covertly. The employee took measures to obfuscate activities; however after an exhaustive examination of the collected evidence, a number of key files were recovered from unallocated disk space (deleted files), AOL Instant Messenger conversations and s. Evidence provided lead to a number of indictments and ultimately, one conviction. (UNITED STATES OF AMERICA v. MICHELLE M. VALENCIA (False Reporting; 7 U.S.C. 13(a)(2) and Wire Fraud; 18 U.S.C. 1343). Mr. Dearman worked with investigators on the matter involving the Securities and Exchange Commission and three Dynegy executives accused of securities fraud. The investigation started with a limited scope, but soon grew to include the collection and examination of a significant number of employee computers. The preponderance of evidence came from a plethora of spreadsheets and other documents, all of which were turned over to investigators. The three executives were then charged and later convicted. (SECURITIES AND EXCHANGE COMMISSION v. GENE S. FOSTER, JAMIE OLIS, HELEN C. SHARKEY) Mr. Dearman performed initial investigation and evidence collection on alleged child pornography case. Over 5,000 graphic images were discovered during a routine digital forensic examination of a personal computer. Once files were identified as child pornography, the FBI was contacted as required by law. Because there was no evidence that the individual was selling or otherwise trafficking in child pornography, the case was turned over to the local police department. Evidence collected was then turned over to the local authority where an arrest was made and charges were filed for the possession of child pornography. 2 P age
4 Mr. Dearman performed initial investigation regarding an employee sending proprietary source code to their personal offline storage account from his workstation. Once the activity was detected, it was documented and presented to the corporate security investigator who approved a deeper examination. At that time, it was discovered the employee being investigated had in fact transferred nearly 500 megabytes of source code and in one case, a text file containing the login ID and password of a bank account file transfer site belonging to the company. Mr. Dearman assisted corporate security investigator with the interview of the employee. The results of the interview were reviewed, resulting in the employee s termination. Mr. Dearman performed initial investigation of a potential network intrusion and attempted theft of intellectual property. Mr. Dearman assisted with the digital forensics exam of the laptop suspected of being the source of the activity. It was determined the employee s laptop had inadvertently been infected with a Trojan Horse during a recent visit to a construction site in mainland China. The Trojan allowed Chinese hackers to access the laptop remotely and ultimately, the entire enterprise network. They had been in the process of uploading a number of proprietary engineering drawings when the intrusion was discovered. Evidence gathered by examination exonerated the employee or any wrongdoing while allowing investigators to pursue the hackers. Mr. Dearman created Dynegy s digital forensics lab in 2002 in response to investigations being conducted by the Department of Justice as well as a number of pending civil suits. With the assistance of former FBI and law enforcement officers, he developed the processes and procedures for digital forensic examination including proper evidence collection, processing and storage, chain of custody documentation, examination and reporting. During this process, he was trained on the forensics examination system EnCase (Guidance Software, Inc.) and ultimately obtained their Encase Certified Examiner certification. Certifications: CNE (x2) Certified Netware Engineer COE Certified OS/2 Engineer COLE Certified OS/2 LANServer Engineer MCP Microsoft Certified Professional MCP+I Microsoft Certified Professional + Internet MCSE Microsoft Certified Systems Engineer CMA Certified Metaframe Administrator (Citrix, Inc.) EnCE (x2) Encase Certified Examiner (Guidance Software, Inc.) CISSP Certified Information Systems Security Professional (International Security Certification Consortium) CPE Certified PGP engineer (PGP Encryption) ACE AccessData Certified Examiner - Forensic Toolkit (AccessData, Inc.) 3 P age
5 DANIEL WEISS, MANAGING PARTNER Mr. Weiss began his career in the security industry while in graduate school at Northeastern University, where he worked at a maximum security prison in Massachusetts, Walpole State Prison. Mr. Weiss left the public sector and entered the private security sector. During the past 15 years, Mr. Weiss has held managerial positions at Wells Fargo and Chubb. Mr. Weiss was also founder and CEO of EPS Security and Infrastruct Security. Mr. Weiss is the founding Texas partner of McCann Investigations, LLC, a Texas Corporation. Mr. Weiss has been interviewed as a subject matter expert on security by ABC, NBC, CBS, Security Director News, SDM, and Security System News. In addition Mr. Weiss has been featured in the Houston Chronicle and Houston Business Journal. Mr. Weiss brings extensive experience as a security professional in the area of private investigation, computer forensics, loss prevention, electronic security system design, and surveillance. As an industry entrepreneur, Mr. Weiss brings his wealth of knowledge in business with extensive experience in due diligence, private equity and venture capital, and financial controls. Mr. Weiss background supports the unique balance between business and former law enforcement that is a unique hallmark of McCann Investigations. For over 15 years, Mr. Weiss has held a qualified managers license in State of Texas. Mr. Weiss has been directly responsible for hundreds of security assessments for Fortune 1000 companies and government agencies. In addition, Mr. Weiss has had the pleasure of providing investigative services for scores of middle market commercial, industrial and direct to executives. In addition, Mr. Weiss has been utilized as an expert by law firms involving complex civil and criminal matters. During his career in the public and private sector Mr. Weiss has been personally instrumental in: Case Highlights : For the Plaintiff: Peak Completions Mr. Weiss was the lead investigator in a case which involved the theft of intellectual property and non-compete violations. The case involved two current employees in collusion with a former employee who were using Peak s plans and designs to build fracking equipment which was to be used to start a competing company. McCann Investigations facilitated a complex investigation that included computer forensic, mobile forensic, digital surveillance, traditional surveillance, and undercover investigations to gather evidence for Peak. o Peak Completions and Summit vs. Steve Jackson, Everest Completion Tools and Team Oil Tools, LP (pending in Midland, TX) o Peak Completions and Summit vs. Daniel Rojas, Kevin Kippola, Romer Bracho, et al. (pending in Houston, TX) For the Plaintiff: NTTA (North Texas Transit Authority) Mr. Weiss was the lead investigator in an embezzlement, fraud case, and data breach. NTTA discovered that files with customer information that included credit card billing information was being transferred to an unknown location. McCann Investigations first pass of the IT network indicated that the source was an 4 P age
6 individual in the accounting department. A more in depth investigation revealed that perpetrator was a senior member of the IT staff and was in fact the person who created a false digital trail leading to the accounting department. Mr. Weiss led McCann Investigators in a complex investigation that included computer forensic, and network vulnerability analysis for NTTA. o NTTA referred the case to Dallas County District Attorney For the Trustee: Tax Masters Mr. Weiss was lead investigator for the trustee overseeing the Estate of Tax Masters. The case involved the imaging of over 100 computers, servers, and laptops and the forensic wiping of over 800 electronic storage devices including desktops, printers, IP phones, servers, and other electronic devices. o The case in pending in the Southern District Bankruptcy Court For the Plaintiff: ESP Resources, Inc. - Mr. Weiss was the lead investigator in a case which involved the theft of intellectual property, non-compete violations, and product tampering. The case involved three employees in collusion who were using ESP s plans and designs to reverse engineer a competing chemical that was to be used to start a competing company. McCann Investigations facilitated a complex investigation that included computer forensic, mobile forensic and traditional surveillance to gather evidence for the plaintiff. o ESP Resources, Inc. vs Cottrell Over 500 site security assessments ranging from: o Financial Institutions o Jewelry and Precious Metals Vaults and Storage o High Profile Residences Including Former Government Officials o Petrochemical Facilities o Defense Sector Providers o Public/Private Critical Infrastructure: Dams, Nuclear Power Plants, and Pipelines Investigations: o Network Intrusion: Identification and forensic documentation of a network intrusion of a municipal government agency involving credit card and personal information being stolen. o Non-Compete Enforcement: Numerous cases of forensic documentation of downloaded customer data, conspiracy with current and former employees, and direct theft of company materials. o Intellectual Property Theft: Numerous cases of current and former employees and competitors stealing and damaging company intellectual and physical property. o Harassment and Cyber Stalking: Investigation and forensic documentation of inner company based harassment and attempt to cover up activity. o Digital Wiretapping: Numerous investigations of cyber wiretapping of servers, desktops, laptops and mobile devices conducted by unwanted parties. o Background Investigations: Provided executive background investigations for management teams for Private Equity and Venture Capital firms. 5 P age
7 Mr. Weiss also believes in the importance of law enforcement and the private sector working together. Examples of this commitment are found in various committees and associations that he currently serves: Crime Stoppers American Society for Industrial Security Energy Security Council Entrepreneur Organization (EO) 6 P age
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
Lance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: [email protected]
Lance Eliot Sloves Certified Computer Examiner (CCE, EnCE) Licensed Private Investigator, TX Testifying Expert Independent Government Contractor Active Top Secret/SSBI US Government Clearance Computer
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
Case Study: Cyber Stalking and Spyware in Divorce Cases
Case Study: Cyber Stalking and Spyware in Divorce Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
SUMMARY SELECTED EXAMPLE ENGAGEMENTS. Jerry Hatchett
SUMMARY Mr. Hatchett consults in the areas of digital forensics and electronic providing assistance to law firms, businesses of all sizes, federal and state courts, and foreign and domestic governmental
Case 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA
Case 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA UNITED STATES OF AMERICA CASE NO. 14-80031-CR-MARRA(s)(s) vs.
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.
CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC
CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Services. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
Presentation Presented By FORENSIC INVESTIGATIVE TEAM
Presentation Presented By FORENSIC INVESTIGATIVE TEAM Proud of our Past - Focused on your Future! Our investigative team has received extensive training by the American Institute of CPA's, Association
Computer Forensics and What Is, and Is Not, There on Your Client s Computer. Rick Lavaty, Computer Systems Administrator, District of Arizona
Computer Forensics and What Is, and Is Not, There on Your Client s Computer Rick Lavaty, Computer Systems Administrator, District of Arizona Eddy Archibeque, Computer Systems Administrator, District of
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
WHITE-COLLAR CRIMES IN CALIFORNIA DOMENIC J. LOMBARDO
WHITE-COLLAR CRIMES IN CALIFORNIA Although White-Collar Crimes are Non-Violent Offenses They are Criminal Offenses Nonetheless and Can be Punished Just as Harshly as Other, More Well-Known, Crimes; a Basic
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Presentation Title Presentation Subtitle. The Unique Alternative to the Big Four
Presentation Title Presentation Subtitle The Unique Alternative to the Big Four Speaker Biography Tim L. Bryan, CPA/CFF/CITP, CISA, EnCE Senior Manager, Crowe Horwath LLP Forensic Technology Services Leader
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
Lance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: [email protected]
Lance Eliot Sloves Certified Computer Examiner (CCE, EnCE) Licensed Private Investigator, TX Testifying Expert Government Contractor Active Top Secret/SSBI US Government Clearance Computer Forensic Services,
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
EnCase Enterprise For Corporations
TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee
FOR IMMEDIATE RELEASE: Contact: James Hallinan September 24, 2015 (505) 660-2216 Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee Albuquerque, NM Today,
Curriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner
Curriculum Vitae Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner Background and Summary of Qualifications Mr. Odenthal has 35 years experience as an Information
Labor and Employment 2015 Conference
Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ
S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:
S. Robert Radus, CPA CFE PI Curricula Vitae Catalogue of Forensic Accounting and Computer Services Examination of plaintiff, respondent, and defendant books and records to determine: 1. Violations of Law.
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
ATTACHMENT A AFFIDAVIT. A. Introduction 1. I am a Special Agent of the Federal Bureau of Investigation (FBI) and
ATTACHMENT A AFFIDAVIT I, Kenneth Carl Heitkamp, being duly sworn, depose and state as follows: A. Introduction 1. I am a Special Agent of the Federal Bureau of Investigation (FBI) and have been so employed
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Chapter 15 Criminal Law and Procedures
Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
CERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
CARCO GROUP INC. Leader in Vehicle Pre-Insurance Inspection Management and Technology Development
CARCO GROUP INC. Leader in Vehicle Pre-Insurance Inspection Management and Technology Development A pioneer in vehicle pre-insurance inspection systems, and recognized leader in the field, CARCO Group,
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
Keith Barger MFS, MCSE, CCE
Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting
CODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
To do Justice, as no one is above the Law nor beneath its protection.
Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
Presented by: Greg Chatten, CEO Forensic Computer Service, Inc. 636.273.4400 [email protected] (c) Forensic Computer Service, Inc.
Presented by: Greg Chatten, CEO Forensic Computer Service, Inc. 636.273.4400 [email protected] Before consumer electronics hit the world electronic recovery and examination of computer
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
How To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
EnCase Endpoint Security Product Overview
GUIDANCE SOFTWARE EnCase Endpoint Security EnCase Endpoint Security Product Overview Detect Sooner. Respond Faster. Recover Effectively. GUIDANCE SOFTWARE EnCase Endpoint Security EnCase Endpoint Security
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
Preservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014
A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft
Computer Forensics. Computer Forensics: History, Tools and Outlooks. By John Burns IT-103-002. Research Paper
1 Computer Forensics: History, Tools and Outlooks By John Burns IT-103-002 Research Paper 02/25/2012 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code
UNITED STATES DISTRICT COURT DISTRICT OF OREGON Portland Division. V. CRYSTAL COX, Pro Se Defendant
Crystal L. Cox Attorney Pro Se UNITED STATES DISTRICT COURT DISTRICT OF OREGON Portland Division OBSIDIAN FINANCE GROUP, LLC and KEVIN D. PADRICK, Plaintiffs, V. CRYSTAL COX, Pro Se Defendant Objection
Robert D. Moody, JD CISA CISM ACE
Robert D. Moody, JD CISA CISM ACE [email protected] Summary of Experience Mr. Moody is the founder of Forensic Data Services, Inc. He is certified in the areas of Information Systems Auditing,
Criminal Investigation. Stolen Identity Refund Fraud (SIRF)
Speaker s Bio: Bill Beckham has been employed with the Internal Revenue Service for 28 years. He began his career as a Revenue Officer in the Collection Division. In 2000 he became a Special Agent with
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
DONALD F. CONWAY, CPA, Managing Director, The Mercadien Group
DONALD F. CONWAY, CPA, Managing Director, The Mercadien Group Donald F. Conway, CPA, is a principal in Mercadien, P.C., a CPA firm with a multi-disciplined consulting practice. Mr. Conway specializes in
OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT
OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT SERVING ARAPAHOE, DOUGLAS, ELBERT AND LINCOLN COUNTIES 6450 S. REVERE PARKWAY CENTENNIAL, CO 80111 (720) 874-8500
New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor
New Hampshire Cyber Crime Initiative Overview Briefing NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor Background: Cyber Crime Many traditional crimes now have a cyber component
