SRA Memory Grabber Product Description.

Slides:



Advertisements
Similar presentations
 Mac vs PC By: Mau Maulupe. What computer brand do you prefer?  According to Mautumua Porotesano Macs are much better than PCs because they don’t get.
Advertisements

Quick Overview of Virtual PC Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Design & Developed by: EATL
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computers They're Not Magic! (for the most part)‏ Adapted from Ryan Moore.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
How to discover ephemeral evidence with Live RAM analysis.
USB Flash Card Writer Using ST92163 By Microcontroller DivisionVersion 1.2 / November 2000.
MetaMorph Installation. 2 MetaMorph Overview Imaging Toolbox What MetaMorph can do oAcquisition oDevice Control oVisualization oProcessing oAnalysis oPresentation.
Information and Communication Technology Fundamentals Credits Hours: 2+1 Instructor: Ayesha Bint Saleem.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
The PC The PC is a standard computing platform, built around a EISA bus (1988) –IBM compatible –“Intel Architecture” from Intel or AMD or other companies.
1 ITSK 2611 Welcome. 2 Operating System 3 What is an OS Resource Manager –Disk –Memory –CPU Device Manager –Printers –Video Card –Sound Card Utility.
Basic Computer Components. What’s inside your computer?
Hard Drive Overview: The UltraMax Plus, MiniMax and eGo Firewire+ Drives Erik Collett Chinese Product Launch IOMEGA CONFIDENTIAL.
IPAD LIKE-TOUCH SCREEN $35. Introduction The prototype of an iPod look-alike touch-screen laptop device has been revealed in India. This device is targeted.
Chapter 2 – Software Part A. Definition Computer is made up of two components Hardware Physical components Software Instructions for the computer Two.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
VirtualBox What you need to know to build a Virtual Machine.
1 Chapter 7 Operating System & Utility Programs.  consists of the programs that control or maintain the operations of the computer and its devices. It.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Copyright©2008 N.AlJaffan®KSU1 Chapter 7 Operating System and Utility Programs.
Module 2 Part I Introduction To Windows Operating Systems Intro & History Introduction To Windows Operating Systems Intro & History.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Introduction TO Network Administration
Hands-On Virtual Computing
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Digital Literacy: Computer Basics
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Virtual Machines. A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though.
Computer Systems Unit 2. Download the unit specification from moodle or the BTEC website Or alternatively visit ahmedictlecturer.wikispaces.com.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
“Candidates were not advantaged by defining every type of operating system provided as examples in the explanatory notes of the standard. Candidates who.
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
Website:
System Software (1) The Operating System
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
COMPUTER SCIENCE AND THE FOUNDATION OF KNOWLEDGE NURSING INFORMATICS CHAPTER 5 1.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
PCs ENVIRONMENT and PERIPHERALS Lecture 5. Computer Maintenance software: Operating System: Define: - An operating system (OS) is a collection of software.
System SOFTWARE.
Using Virtualization in the Classroom
By Ganesan Alagu Ganesh Feb 26, 2008
Operating System and Utility Programs
Chapter Objectives In this chapter, you will learn:
ControlLogix Portfolio
Mobile Interactive Student (MIS) Pilot
Lecture 1-Part 2: Operating-System Structures
Guide to Linux Installation and Administration, 2e
By Ganesan Alagu Ganesh Feb 21, 2008
Software: Systems and Application Software
INTRODUCTION TO COMPUTING
Computer System Laboratory
Computer Basics Section 2.1 YOU WILL LEARN TO… Identify hardware
Virtual Machines.
Solutions: Backup & Restore
Chapter 3: Windows7 Part 1.
How to Install Quicken Software
Ambir nSign Presentation Synopsis
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Information Technology Ms. Abeer Helwa
Presenter : Mr Yong Jong Shyan
Overview 1. Inside a PC 2. The Motherboard 3. RAM the 'brains' 4. ROM
1.00 Examine the role of hardware and software.
PLANNING A SECURE BASELINE INSTALLATION
The bios.
The Hacking Suite For Governmental Interception
Presentation transcript:

SRA Memory Grabber Product Description

Agenda Memory Grabber Product Description Integrated Value Proposition Operational Need Hardware and Software Architecture Tethered and Un-Tethered operation Interfaces and Target Environment Integrated Value Proposition Partner Business Scenarios Next Steps

Memory Grabber Operational Need Currently, when law enforcement agents or Special Operations personnel seize a running laptop that is password protected, they have no way of capturing the potential valuable information resident in memory. Typically, they will power down the laptop and take it back to the rear or to a lab to perform forensic analysis on the hard drive losing all information associated with the current state of the machine (e.g. partially constructed documents or emails, web history, or any other information that gets permanently deleted upon power down). Law enforcement agents and Special Operations personnel need a tool that provides memory access to a running laptop in the field enabling the timely capture of volatile information.

System Concept The Memory Grabber system provides direct memory access to a running laptop via a small PC card (i.e. Memory Grabber device) that can be inserted into the external PCMCIA slot, similar to commercially-available external broadband network cards. The target laptop can be screen-locked and password-protected. The Memory Grabber system can be used in either tethered or un-tethered modes.

System Architecture

Specifications Parameter Express Card Card Bus Target Laptop OS Windows Linux Mac OS (32 bit and 64 bit versions) Operational Mode Tethered (USB) Un-Tethered (micro SD card) Data Integrity Available Yes Data Acquisition Speed (nominal) 8 Mbytes per sec 2 Mbytes per sec

Integrated Value Proposition HBGary Responder - Lowest Memory Footprint in the marketplace With SRA Memory Grabber – Even Lower (zero memory footprint, no software installed on target) Field and Lab versions with same toolset Lab: HBGary Responder Professional, SRA Memory Grabber (Express Card and Card Bus devices) Field: HBGary Responder Field, SRA Memory Grabber (Express Card and Card Bus devices) Provides quick look analysis in field as well as capability for very specific information acquisition missions

Target Environment Coverage HBGary Responder SRA Memory Grabber Windows Yes Linux No MacOS Future integration could provide market discriminating coverage of non-windows platforms.

Integrated Market Value Assume a law enforcement agency wishes to supply it’s forensic team with a memory forensic capability for use in the lab and in the field, including one lab facility and 1000 field personnel.

Next Steps Technical discussion on integration details Product exchange for evaluation / integration Data formatting to improve integration Candidate responder functionality to port to memory grabber device Business partnering discussion