Computer Forensics in Investigations and in Court



Similar documents
Case Study: Hiring a licensed Security Provider

What You Should Know About ediscovery

Journal of Digital Forensic Practice

Best Practices Page 1

Information Technologies and Fraud

MSc Computer Security and Forensics. Examinations for / Semester 1

Digital Forensics & e-discovery Services

Digital Forensics for Attorneys Overview of Digital Forensics

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. DECEMBER 2013

Admissibility of Digital Photographs in Criminal Trials

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

Acceptable Use Policy ("AUP")

Case Study: Mobile Device Forensics in Texting and Driving Cases

Retail/Consumer Client. Internet Banking Awareness and Education Program

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Case Study: Smart Phone Deleted Data Recovery

Anthony Serero. Fbi computer forensics training Anthony Serero

How To Manage Cloud Data Safely

KPMG Forensic Technology Services

FKCC AUP/LOCAL AUTHORITY

Apple ios 8 Security

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Computer Forensics Preparation

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

Standard: Information Security Incident Management

Overview of Computer Forensics

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Chapter 7 Securing Information Systems

BE SAFE ONLINE: Lesson Plan

Physical Protection Policy Sample (Required Written Policy)

Computer Forensic Capabilities

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

Hands-On How-To Computer Forensics Training

Build Context into Your Digital Forensic Exam With Online Evidence

ITU Session Two: Conduct a forensically safe investigation Mounir Kamal Mkamal@Qcert.org Q-CERT

Chapter 15. Conducting Investigations and Report Writing

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) e dhains@vincents.com.au w

E-Discovery Technology Considerations

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

Computer Forensics as an Integral Component of the Information Security Enterprise

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

BACKUP THOSE IRREPLACEABLE FILES TO ANOTHER MEDIUM FOR SAFE KEEPING

Stay ahead of insiderthreats with predictive,intelligent security

e-discovery Forensics Incident Response

E-Discovery: New to California 1

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

COB 302 Management Information System (Lesson 8)

Scene of the Cybercrime Second Edition. Michael Cross

Bring Your Own Device Security and Privacy Legal Risks

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

Metadata, Electronic File Management and File Destruction

information security and its Describe what drives the need for information security.

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Getting Physical with the Digital Investigation Process

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

INTRODUCTION DEVELOPMENT AND PHENOMENA

Incident Response. Six Best Practices for Managing Cyber Breaches.

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

Prevent Security Breaches by Protecting Information Proactively

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Case 9:14-cr KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Guide to advanced ediscovery solutions

Corona Police Department

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

Marble & MobileIron Mobile App Risk Mitigation

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Transcription:

Computer Forensics in Investigations and in Court Presented to: The Center for Cybercrime Studies and The Center for Modern Forensic Practice, John Jay College of Criminal Justice (CUNY) by Edward M. Stroz, Co-President, Stroz Friedberg November 11, 2009

WHAT WE DO Consulting and Technical Services Specializing In: RESPONSE TO DIGITAL ELECTRONIC DATA BREACH ONLINE FRAUD FORENSICS DISCOVERY RESPONSE AND ABUSE INVESTIGATIONS

OUR CLIENTS 8 of the Fortune 10 Companies 72 of the Top 100 US Law Firms (AmLaw 100) 16 of the Top 20 UK Law Firms LEADING U.S. WORK MARTHA STEWART SECURITIES FRAUD CASE FTC BOGUS ANTI-SPYWARE CASES ENRON BARGE TRIAL AMD v. INTEL ATTY GEN L TASK FORCE TJX DATA BREACH MADOFF MONITOR

INDUSTRY LEADERSHIP Sedona Conference, Working Group1: Electronic Discovery New York State Bar Association: Electronic Discovery Committee Minnesota Bar Association: Computer Law Section American Bar Association Cybercrime Law Committee Digital Forensics and Cybercrime Textbook Writers Widely Published in Digital Forensics, E-Discovery, and Cybercrime journals Speaking Engagements: Sedona, ABA, IQPC, PLI, ISC2, IAPP, FTC, et al.

DIGITAL FORENSICS - CASES Theft of trade secrets Other job disputes (threats, discrimination) Data breaches Fraud investigations (SEC, FCPA) Patent infringement Trademark infringement E-discovery (spoliation claims, preservation)

Forensic Targets Workplace Computers Home Computers Storage Devices (DVDs, CDs, flash drives) Blackberries, PDA s, Cell Phones Digital Cameras Printers and Digital Faxes Servers (FTP, Web, E-mail, File) Web pages

Other Digital Sources Video surveillance Key cards Key loggers Packet Sniffers

FORENSICS IN E-DISCOVERY Digital Forensics PRESERVATION PROCESSING Expert Forensic Testimony INFORMATION MANAGEMENT IDENTIFICATION REVIEW PRODUCTION PRESENTATION COLLECTION ANALYSIS VOLUME RELEVANCE Consulting, Strategic Planning and Comprehensive Project Management

AVAILABLE EVIDENCE Hard Drives Deletion Activity ( deleted or partial files, wiping activity) Internet and Search History (surfing and webmail activity) System Activity (logins, files printed, devices inserted) Metadata ( modified created accessed dates, authors ) Removable Devices (thumb drives, DVD s) Link Files (access to files on and off the hard drive) Matching Files (exact copies and near-duplicates) CDs and DVDs Burn programs and dates

Cell Phones Contacts and last numbers dialed Saved files/photos Email, text messages Web Sites Offline, surfable copies of web site Source code Dynamic surfing or packet activity Email Psycho-linguistic patterns

DELETION ACTIVITY

INTERNET HISTORY Find webmail accounts such as Gmail or Hotmail Locate suspicious or inappropriate Internet activity (i.e. visiting competitors websites, pornography, etc.)

REMOVABLE DEVICES Traces of past devices can be uncovered with forensic analysis. The make and model of a thumb drive can often be found. The date and time when a device was first connected and last connected can be determined. Mass copying can often be determined by correlating the device connection with numerous files bearing the same last access times.

LINK FILES Provide data on files now missing or outside the hard drive. Proprietary tool created by Stroz Friedberg allows us to quickly and efficiently view the contents of link files Link file shows this document was accessed On a particular date and time And where the file was located.

FONT color=#fffff3 changes font color to white (on white) FONT color=#9999cc changes font color back to light blue

FORENSICS IN E-DISCOVERY - Auto-Coding Extracts text from the face of the document and organizes the information Beeman Judy, Judy.Beeman2@usdoj.gov

May 14, 2009 Dear To: Sent: 05/14/2009 8:32am From: Subject: Hi original message Sincerely, Mapping data location within a particular document type shows real author.

WORKS ON PAPER PHASE I PHASE II PHASE III Enhanced OCR Intelligence Extract Results

FORENSICS IN E-DISCOVERY Near Duplicate Identification Clustering Options: A Attachment Set E Exact Duplicates N Near Duplicates

FORENSICS IN E-DISCOVERY Near Duplicate Comparison Side by Side Comparison Highlights Differences

PSYCHO-LINGUISTIC PROFILING

PSYCHO-LINGUISTIC PROFILING (Asked to train his back-up, subject refuses) His experience was ZERO. He does not know ANYTHING about...our reporting tools. Until you fire me or I quit, I have to take orders from you Until he is a trained expert, I won t give him access...if you order me to give him root access, then you have to permanently relieve me of my duties on that machine. I can t be a garbage cleaner if someone screws up.i won t compromise on that. Content Analysis Cues Negatives/anger Me/victimization Key word/risk behavior

The Digital Thugs Ex-CIA profiler estimated that suspect was extremely angry and technologically sophisticated, had a history of work problems, and possibly owned weapons. Suspect sent multi-million million extortion demand and threatened to unleash a DOS attack using MicroPatent s name Suspect revealed he had been dumpster diving, prompting physical surveillance. Suspect was arrested at local college and his residence was searched...

When the defendant s d house in Maryland was searched, the FBI found numerous firearms, explosives and chemicals, as well as a recipe for the production of a deadly toxin.

Summary - When Forensics Make Cents Need Verified Preservation? Of key employee data By trusted third party Using scientific process Authenticity at Issue? Timing (hour/minute/sec) Authorship Data integrity Latent Data Needed? Full Metadata Historic/deleted data System logs Source code

Questions and Discussion Edward M. Stroz Co-President Stroz Friedberg, New York www.strozfriedberg.com