Data Collection and Forensics February 23, 2009. Complaint Document Acquisition DepositionsReview Discovery Begins Photocopy Discovery Closes Produce.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Computer Forensics.
CAPTURE SOFTWARE Please take a few moments to review the following slides. Please take a few moments to review the following slides. The filing of documents.
CAPTURE SOFTWARE Please take a few moments to review the following slides. Please take a few moments to review the following slides. The filing of documents.
Outline of Topics  Introduction  CPR, law and expectations  IT issues  Disclosure process.
COEN 252 Computer Forensics
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
E-Discovery for System Administrators Russell M. Shumway.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER.
April 11-13, Session Title Presenters {Name} April 11-13, PRESENTED BY THE Managing E-Discovery in Small to.
Defensible Client File Collections 6 Common Roadblocks and Obstacles.
Guide to Computer Forensics and Investigations, Second Edition
BACS 371 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Resource Discovery Module DigiTool Version 3.0. Resource Discovery 2 Deposit Approval Search & Index Dispatcher & Viewers Single & Bulk Web Services DigiTool.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
CGS 1000 Introduction to Computers and Technology.
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Chapter 5 Application Software.
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Get Off of My I-Cloud: Role of Technology in Construction Practice Sanjay Kurian, Esq. Trent Walton, CTO U.S. Legal Support.
Chapter 3 Application Software.
Informer Web Reporting Basic Reporting
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Project 3 File, Document, Folder Management, Windows XP Explorer Windows XP Service Pack 2 Edition Comprehensive Concepts and Techniques.
OCLC Online Computer Library Center CONTENTdm ® Digital Collection Management Software Ron Gardner, OCLC Digital Services Consultant ICOLC Meeting April.
Digital Crime Scene Investigative Process
Automated Process of Electronic Discovery October 19, 2009.
With Windows 7 Introductory© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Windows 7 Introductory Chapter 2 Managing Libraries Folders, Files.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
Automated Process of Electronic Discovery October 4, 2010.
Guide to Computer Forensics and Investigations Fourth Edition
© Paradigm Publishing Inc. 5-1 Chapter 5 Application Software.
Project 6 Advanced File and Web Searching. 2 CHAPTER OBJECTIVES  Begin a new file or folder search, save a search, and find a file using a saved search.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Document Solutions Document Solutions Confidential Property of FileMark Corporation Document Solutions Document Solutions July 2009 Repository for Submission.
ECDL. Word processing Work with documents and save them in different file formats Choose built-in options such as the Help function to enhance productivity.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
The New DRS Introduction. What is DRS? Digital repository for preservation and access – Maintains integrity of deposited content – Preserves content for.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Text2PTO: Modernizing Patent Application Filing A Proposal for Submitting Text Applications to the USPTO.
The Challenges of Digital Preservation in a Changing Environment Andrew Pitt Pfizer eArchive Service Team Global Records Management Services DPC Digital.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Third Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
PDF Recovery Tool Fix Portable Document File Format.
Creighton Barrett Dalhousie University Archives
Wright State University
Computing Fundamentals
Presenter: Karoline Lapko
Ad Hoc Phase Structured Phase Enterprise Phase
Digital Forensics CJ
Presentation transcript:

Data Collection and Forensics February 23, 2009

Complaint Document Acquisition DepositionsReview Discovery Begins Photocopy Discovery Closes Produce & Share 95% Settle Electronic Discovery Trial Coding & Scanning

Electronic Discovery Legal Issues Chain of Custody/Data Integrity –“Chain of Custody” Requires that “the one who offers real evidence…must account for the custody of the evidence from the moment in which it reaches his custody until the moment in which it is offered in evidence.” Black’s Law Dictionary, page 156 (6 th ed. Abr. 1991) –Inexpert handling of electronic media (e.g., open, print, & scan) has serious drawbacks Human error Missing data or inadvertent changes Time to produce No detailed audits

Electronic Discovery Legal Issues Electronic Marginalia –Simple spreadsheets and word processing files contain an array of formatting elements including: comments, headers, hidden rows/columns –Counsel should proactively ensure the process used provides at a minimum: hidden rows and columns uncovered comments exposed and converted passwords broken blank pages eliminated

Electronic Discovery Terms Metadata Media Tape Restoration Text Extraction Forensics/Collection De-duplication Data Culling

Electronic Discovery Process Receive Data Index Reduce Search Convert Package Burn

1 - Receive Data Identify locations of all data and prescribe systematic uniform collection of data Media is sent in many formats –CD –DVD –DLT –DAT Tape Media is signed in and a strict chain of custody process begins

2 - Index Data Extract Unzip Index Copy Rename (uniform fashion – while maintaining data integrity) Capture valuable info. (metadata) Each file is examined to detect any changes to file extension – possible smoking gun/file –another reason why you cannot “just print them”

3 - Reduce the Data Set De-duplication option –Our process ensures accuracy and integrity MD5 Hash – “bit” level count Bit Level most accurate!! Filtering Data –Narrow by a specific “date range” –Uses metadata to eliminate files outside of the discoverable date range

4 - Keyword Searching Select keywords or phrases to narrow your search/discovery Advanced searching using Boolean, proximity, etc. Responsive files are flagged and continue through the process Non-responsive files are still preserved Saves Hours Saves $s

5 - Convert the Data Full Text of files is extracted Hidden information is uncovered –rows, columns, changes (if enabled) –embedded comments exposed –“electronic marginalia” Files converted to Tiff or PDF images

6 - Package the Data Batchload Application Begins Images bundled and a customized load file is created for uploading to client document management system –e.g., Summation, Concordance, etc.

7 - Burn & Return Final (of several) quality checks performed CDs Burned Data Integrity still intact CDs are shipped to client Data remains on system

Key Considerations Automation = Integrity & Speed –Provides Data Integrity – Chain of Custody – Cannot “Just Print Them Out” –Allows De-duping, Filtering, & Searching to Reduce Data Set –Uncovers Hidden & Meaningful Data Examines all files for hidden file types Hidden Rows/Columns Uncovered Comments are Exposed Metadata Uncovered & Searchable Electronic Marginalia

What is Computer Forensics? Forensics: Relating to the use of science or technology in the investigation and establishment of facts or evidence in a court of law. Computer Forensics: The scientific examination and analysis of data held on, or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

What can be found as digital evidence? Correspondence (electronic mail, Instant Messages) Graphic Files (Child pornography, scanned prescriptions) Audio Files (voic , recorded messages) Financial Data (Excel spreadsheets, Access databases) Video Files (home video, web cam, internet videos)

Locations of Digital Evidence Evidence may be found on the Victim’s computer, as well as the Suspect’s computer. May be found at the Internet Service Provider (ISP) server level. The ISP server may be a web server or an server The target server(s) may be located in another state or another country.

How Digital Evidence Is Examined An exact, bit-by-bit, copy of the target media is created After verification, original is placed back into evidence A variety of forensic software is utilized, which is determined by the scope of the search (i.e. mp3 downloads, s, digital photographs)

Areas Searched: Files in directories in which the suspect had access Internet files (TIFs, History,.HTMLs) Registry, which holds programs, names, online links, Operating System And specific files within the scope of search (i.e. Excel spreadsheets, Word documents) Unallocated Space of the media

Erased Files: A file “deleted” or “erased” is not actually removed from the media Recycle Bin: file is only renamed Operating System “sees” the file’s space as available. Pointer to file is removed Data may remain is File Slack for years Often fully or partially recoverable

Allocated Space vs. Unallocated Space Allocated Space: files and data recognized and utilized by the operating system Unallocated Space: area of the media read as “available space” by the operating system

Allocated Space Operating System Directories, programs, files Names, dates and times Easily viewable by most users

Unallocated Space Raw Data No longer has names, dates or times Partial or complete files may be recovered

Forensic Computer Examination Average Volume: 12Gb Gigabyte: 1,073,741,824 bytes Subtotal: 12,884,901,888 bytes Page size: 3000 bytes Pages: 4,294,967 Ream: 500 pages Ream height: 2” Total Height: 17,180” Total Height in feet: 1431’ 8” Sears Tower (Chicago): 1450’

Recovery from Damaged CD/DVDs Before After

Recovery from Fire

Recovery from Submersion

Video Forensics