Forensic Computer Techniques

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
John D. Gregory Ministry of the Attorney General (Ontario) October 29, 2012.
Litigation Holds: Don’t Live in Fear of Spoliation Jason CISO – University of Connecticut October 30, 2014 Information Security Office.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
Sexting Frederick S. Lane Boston College 03 March 2011 How One Click Can Ruin Your Child’s Life
E-Discovery for System Administrators Russell M. Shumway.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Investigation Myths and Facts November 29, 2011 IOT Security: Caroline Drum Bradley.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Boyertown Area School District Acceptable Use Policy.
School Law Boot Camp – Part 1.  LEGAL ONE Video LEGAL ONE Video  SMALL GROUP ACTIVITY  ALL GROUPS – ◦ Analyze the Cyberbullying Video Scenario Questions.
Developing a Records & Information Retention & Disposition Program:
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
What Every Principal & Staff Should Know About The Ethics of Technology ( Internet ) * Establish Guidelines * Acceptable Use Policy *Internet Safety *Privacy.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Mattson Middle School One to One Laptop Program September 26, 2012.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
ARMS Bring Your Own Technology ARMS Media Committee 2012.
Using SWHS: The AUP [Acceptable Use Policy]
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Employee Guidelines for Acceptable Use of Technology Resources.
Audio and Video Recording in Harford County Public Schools Information for Field Observation Students, Student Interns, and HCPS Host Teachers.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Rewriting the Law in the Digital Age
Computer Forensics Principles and Practices
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Shutting Down Cyberbullies A Cyber-safety Act Presentation.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.
THE NEW ANTI-BULLYING LAW PROCEDURES AND POLICY REQUIREMENTS.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
August 31, The Etowah County School District’s electronic network is available to all students and employees. The goal is to foster learning environments.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
When the law firm is the client Handling legal holds, document collections and productions of your own firm’s documents.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
School Law and Technology Fall 2013 Week 4 - Ced 555.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
PhD Oral Exam Presentation
Cybertraps for Educators: Preserving Boundaries in Cyberspace
Fusion Center ITS security and Privacy Operations Joe Thomas
Cabarrus County schools SECURITY, Social Media POLICY AND BYOT
Hot Topics:Mobility in the Cloud
Guide to Computer Forensics and Investigations Fifth Edition
Investigation Myths and Facts
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
Computer Forensics Discovery and recovery of digital evidence
Litigation Holds: Don’t Live in Fear of Spoliation
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Health Care: Privacy in a Digital Age
Keeping Member Data Safe
How would you define media? Give an example
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Crossing the Line Creating and Maintaining School Safety
On-Site Investigations
Presentation transcript:

Forensic Computer Techniques How to Identify Useful Data and Secure a Chain of Custody Frederick S. Lane NASDTEC/Professional Practices Institute Boise, ID 24 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com

Background and Expertise Attorney and Author of 7 Books Computer Forensics Expert -- 15 years Over 100 criminal cases Lecturer on Computer-Related Topics – 20+ years Computer user (midframes, desktops, laptops) – 35+ years 10 yrs on Burlington VT School Board

From VT to Brooklyn

Current Projects Cybertraps for Educators (2014) Safe Student and School Employee Relationships (2014) Cybertraps.wordpress.com CPCaseDigest.com MessageSafe.com Informational Web Sites: www.FrederickLane.com www.ComputerForensicsDigest.com www.CybertrapsfortheYoung.com

Lecture Overview Pre-Incident Preparation Common Types of Incidents Electronic Evidence Is Everywhere Response to Civil Litigation Response to Criminal Activity Risks for Administrators and Teachers A Quick Intro to Computer Forensics

Pre-Incident Preparation Policies and Procedures District Decisions re Access, Services, Storage AUPs for Staff and Students Data Handling and Response Protocols Professional Development for Teachers and Staff Typically First Responders Potential Legal Risks Technology Is Continually Changing Student Education Critical Component of K-12 Curricula

Common Types of Incidents Employment Issues Harassment/Hostile Work Environment Disciplinary Issues Student Misconduct Cyberbullying & Cyberharassment Sexting Teacher/Student Misconduct Student Attacks on Teachers Inappropriate Relationships

E-Evidence Is Everywhere Inventory Possible Devices Computers (Desktops, Laptops, Servers) Mobile Devices (Phones, Tablets) Peripherals (USBs, CDs, external drives, etc.) Inventory Possible Types of Data Communication (E-Mail, IMs, Texts, etc.) Social Media (Facebook, Twitter, etc.) Web Activity (URLs, cookies, bookmarks, etc.) Network Logs and Access Data Cloud Storage (Dropbox, Flickr, Boxy, etc.) Deleted Data

Whose Data Is It Anyway? Where Did the Incident Occur? On-Campus vs. Off-Campus Zone of District Responsibility Is Growing Who Owns and Uses the Device? Misconduct Using School-Owned Equipment Misconduct Using Privately-Owned Equipment Who Runs the Service? Evidence Hosted by District Evidence Created by Teachers/Students Evidence Hosted by 3rd Parties

Response to Civil Litigation Preservation of Potentially Relevant Evidence Adherence to Established Policies for Handling Data Notice of Litigation or Reasonable Anticipation of Litigation Discovery Requests Privacy Concerns Burdensomeness of Requests Production of Data Held by 3rd Parties

Response to Criminal Activity Anticipate Prosecution and/or Disciplinary Proceedings Adherence to Policy/Process Is Critical Involve Law Enforcement ASAP Protect and Preserve Data Restrict Access to Potentially Relevant Data Hire a Computer Forensics Expert? Some Evidence Is Radioactive

Risks for Admins. & Teachers Good Intentions, Bad Outcome “Sherlock Holmes” Syndrome Forwarding Content for Advice The Cover-Up Is Always Worse Trying to Protect Colleagues and Friends Desire to Protect District by Handling In- House “Delete” Is a Myth

A Cautionary Tale Ting-Yi Oei, now 64 Assistant Principal at Freedom HS in So. Riding, VA (Loudoun County) Told to investigate rumors of sexting at HS “Inappropriate” image was forwarded to Oei’s cellphone, then computer Charged with “failure to report,” then contributing to delinquency of a minor Charges ultimately dismissed

Computer Forensics 101 Field Previews Acquisition & Mirror Images Some Data Are More Fragile Than Others Speed Is Of the Essence Powerful Forensics Tools Data Recovery and Analysis IP Addresses Link to Real World 4th Amendment and Privacy Concerns

Forensic Computer Techniques How to Identify Useful Data and Secure a Chain of Custody Frederick S. Lane NASDTEC/Professional Practices Institute Boise, ID 24 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com