2 Forensic Information in Digital Objects (FIDO)

Slides:



Advertisements
Similar presentations
Common Core Standards (What this means in computer class)
Advertisements

1 of 16 Information Access The External Information Providers © FAO 2005 IMARK Investing in Information for Development Information Access The External.
The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
Downloading and Document Delivery Accessing and using resources.
E-Resource Use and the Role of the University Library.
To print your results, click on the printer icon. Choose from the printing options suggested. You can choose to remove items from folder after printing.
In the Format section, we have activated the Bibliographic style drop down menu. From this page, you can choose a specific journal or format (e.g. BMC.
HINARI – Accessing Articles: Problems and Solutions.
Watching the Detectives Forensic Information in Digital Objects (FIDO)
Metadata workshop, June The Workshop Workshop Timetable introduction to the Go-Geo! project metadata overview Go-Geo! portal hands on session.
1 Division of Aging and Adult Services (DAAS) Knowledge Management and Transfer Project 7/30/12.
Welcome to the Virtual Historian Getting started with the VH 2.0 Go to virtualhistorian.ca Select language of usevirtualhistorian.ca 2 Note: For.
CCE GUIDELINES FOR CLASSES 6 TO 8
1 Increasing Access to Dissertations: A Case Study ETD 2003 Conference Austin McLean, ProQuest / UMI Brian Surratt, Texas A&M.
Module 2.4 Workforce Transition Planning and Tool March
Powerpoint Jeopardy Category 1Category 2Category 3Category 4Category
Lokman I. Meho, Ph.D. University Librarian Associate Professor of Political Science February 8, 2012 AUB Libraries: New Faculty Orientation Fall 2011.
IT-Forensic Investigations (in Sweden) Computers Sebastian Leclerc
March 2002 DEVELOPING SERVICES IN AN EVOLVING TECHNOLOGICAL AND POLITICAL ERA: CASE STUDY Fred Guy Director of ICT National Library of Scotland.
LEARNING CONTRACT. A) Student curriculum: Studies Personal interest in physical therapy/ area of practice Activities/ sports/ hobbies Rumours regarding.
Online Sources for Historians Seeley Historical Library 19 October 2010.
Welcome to P.A.S.S. People Advantage Self Service March 1, 2007.
Effective Discovery Techniques In Computer Crime Cases.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
The art of effective persuasion - drafting a deposit agreement that covers born-digital material Simon Wilson, Acting University Archivist.
Context Map Hands-On Session April 2007 David Millard Learning Societies Lab University of Southampton Kate Dickens, Ann Jeffery, Julie Watson, Kate Borthwick.
Management is not a Natural Act Megan Winget - Co-Project Manager Managing the Digital University Desktop: Introduction and Preliminary Findings.
Welcome to the Turnitin.com Student Quickstart Tutorial! This brief tour will take you through the basic steps students new to Turnitin.com will need.
TUTORIAL NO. 24 Create Alerts and files in EBSCO.
ARCHIVING DATA Research Data Management. Archive - a place where public records or other historical documents are kept. An extensive record or collection.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
Questions of Location, Ownership and Interpretation Funded by a grant from
RDA Data Foundation and Terminology (DFT) IG: Introduction Prepared for RDA Plenary San Diego, March 9, 2015 Gary Berg-Cross, Raphael Ritz, Co-Chairs DFT.
Passing It On: An Estate Planning Resource for Farmers and Ranchers Cole Ehmke Extension Specialist Department of Agricultural and Applied Economics 17.
Overview of Knowledge Acquisition, Organization, Use and Dissemination Techniques Laura Larsson Cedar Collaboration November 6, 2004.
PAIMAS in Action Kari R. Smith Institute Archives and Special Collections MIT Libraries You Want to Take My What? 1 Kari R. Smith for SAA Research Forum.
Information guide.
RDA Data Foundation and Terminology (DFT) IG: Introduction Prepared for RDA Plenary San Diego, March 9, 2015 Gary Berg-Cross, Raphael Ritz, Co-Chairs DFT.
Plagiarism in the Economics Profession Walter Enders and Gary A. Hoover University of Alabama Department of Economics, Finance, and Legal Studies.
By Edward Lim 8.7.  What?  Today we started the Cornerstone Piece and we were given a few tasks to complete. The tasks were to watch the Kurt Fearnly.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Special Collections Keys to History Research. Databases.
Section 4 – Computer Networks Setting up a small network.
The Legislative Library of Ontario’s Ontario Documents Repository Road to Partnership.
DIGITAL FORENSICS Forensic Toolkit: a tool to process born digital records Emma Jolley Curator of Digital Archives.
LTM Project: Case Study Community Services & Health Mentor: Julie Goodburn Mentees: Leon Earle, Colleen Phillips.
INFO 6850 Archives II Week Three THE DONATION PROCESS What documents do you create.
Journalism & Media Studies Graduate Student Culminating Work : Steps for Submitting to the Campus Digital Archive at USFSP November 21, 2011 by Carol Hixson.
Questions of Location, Ownership and Interpretation Funded by a grant from
Research Services Ten top things researchers need to know about research data management Slides provided by DaMaRO Project, University of Oxford.
Government Recordkeeping Update March 2010 Patrick Power Manager Government Recordkeeping Programme.
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
HINARI – Accessing Articles: Problems and Solutions (Appendix 1)
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Corporation For National Research Initiatives Technical Issues in Electronic Publishing Corporation for National Research Initiatives William Y. Arms.
1/16/2016I. Revels Digital Imaging Workshop 1 Selection Considerations For Digital Imaging Projects.
Digital Archives You Can Do It! The Collective - March 2016 Paul Kelly - Digital Archivist - The Catholic University of America.
Electronic Evidence Seizure
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Digital Forensics and Hand Held Devices Robert Trimble COSC
LEARNING TECHNOLOGY TOOLS Dininne Grady Ashford University EDU671: Fundamentals of Educational Research Instructor: Kathleen Pierce-Freedman July 3, 2015.
Mendeley: a tool for organizing references and an aid to research
Working with personal digital archives Susan Thomas Project Manager & Digital Archivist project Manuscripts Matter, Electronica panel London, October.
Crime Scene Sketches.
Creighton Barrett Dalhousie University Archives
SFU Open Access Policy Endorsed by Senate January 9, 2017
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Forensics Week 2.
Presentation transcript:

2 Forensic Information in Digital Objects (FIDO)

3 Session overview 1. Overview and terminologyLindsay & Kate Introduction to tools and processesGareth Hands on sessionLindsay & Gareth Break Group discussions of given scenariosAll Feedback and summaryLindsay & Gareth

4 JISC FIDO Project 6 month project from Feb 2011 – July 2011 Investigation of tools to aid data acquisition, file identification & process documentation Case study to report findings & lessons learnt Mapping of forensic terms to archival terms Address ethical issues of the approach Establish suitable computer hardware and tools to assist in newly defined digital acquisition process

5 Why Digital Forensics? Forensic investigation is an emerging profession developing tools that map user activity to legal admissibility standards Digital collections can be large and difficult to appraise – forensic tools can provide analysis of file characteristics and document what is done & when Forensic tools can provide contextual information such as a timeline or file types for initial appraisal Authenticity – Archivists need to capture authentic digital collections - forensic tools can support this process

6 Digital forensics vs Digital appraisal Different language – terms mean different things to each practitioner Confidence & skills – Digital archive skills are much closer to forensics or IT than traditional skills Forensics are dealing with potential crime scene – archivists work with the co-operation of the depositor Forensics want all available information including deleted documents & browser history whereas archivists may only have consent to take files defined by the donor

7 Scenario 1 An eminent retired KCL professor wishes to deposit her lifetimes work, because she is about to emigrate to New Zealand to be near her grandchildren. There are seven filing cabinets of papers, and three PCs, two of which she no longer uses. The older PCs have also been used in the past by other family members

8 Scenario 2 The literary executors of a military historian want to place his archive in an appropriate repository. He died eight months ago, leaving four shoe boxes full of disks and a PC, plus extensive printed proofs, off- prints of journal articles and assorted press cuttings. The executors are also in negotiation with a publisher with regard to the historians last, unpublished work.

9 Scenario 3 A colleague of a recently departed senior KCL manager in the Estates department gets in touch: she is concerned that there may be much useful information, and perhaps important documents, held only within his system, which will be deleted in a few weeks.

10 Scenario 4 The daughter of a retired Lieutenant General thinks he may have had the text of a draft memoir on his laptop. There may also be s relating to his service with NATO forces in Kosovo, 1999, and subsequent war crimes trials, some of which are still on-going. She isnt sure of anything, hasnt looked at anything herself, and doesnt know any passwords, but is anxious to find out if there is anything of significance and to see it safely preserved.