Day 1 - Panel Discussion DFRWS 2004 Linthicum, MD.

Slides:



Advertisements
Similar presentations
Day 2 - Panel Discussion DFRWS 2004 Linthicum, MD.
Advertisements

Researching the Practice of Design for Learning: Integrating Cognitive and Social Perspectives Liz Masterman, OUCS 27 th June 2006.
Module One Self Assessment. Take the following conflict management self assessment. If you have computer and internet access it can be found here:
Forecasting Computer Crime Complaints Adnan Omar Ada Kwanbunbumpen David Alijani.
By Eva Freund, The IV&V Group, Inc.
Office of Grants and Sponsored Programs Faculty Orientation.
Crime Scene Investigation Roles 1.0 Describe responsibilities of various personnel involved in crime scene investigations. Examples: police, detectives,
1 Getting Equity Advocacy Results (GEAR) identifying and tracking the essential components of equity advocacy for policy change Knowledge for Equity Conference.
UNCLASSIFIED Shaping the Future of Cybersecurity Education October 2010 NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) Is N.I.C.E.
International Journal of Digital Evidence (IJDE) DFRWS 2002 Syracuse, NY.
Promoting Professionalism in Computer Forensics – who should Accredit ? Alastair Irons Northumbria University.
© Tefko Saracevic, Rutgers University1 digital libraries and human information behavior Tefko Saracevic, Ph.D. School of Communication, Information and.
System Design and Analysis
© Tefko Saracevic, Rutgers University1 digital libraries and human information behavior Tefko Saracevic, Ph.D. School of Communication, Information and.
1 1 Introduction to Multimedia Chapter 9. 2 Objectives Get to know the phases of MM production. Get to know the team members in MM development.
© Tefko Saracevic, Rutgers University1 digital libraries and human information behavior Tefko Saracevic, Ph.D. School of Communication, Information and.
2014 Workshop and Plenary Sandra Hoskins, I.S.P, ITCP, PMP, MBA CIPS – Canada’s IT Professional Organization IIBA – International Institute of Business.
By Drudeisha Madhub Data Protection Commissioner Date:
Our study’s purpose is to understand how groups and teams function in actual organizations. 2.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
The Project AH Computing. Functional Requirements  What the product must do!  Examples attractive welcome screen all options available as clickable.
Literacy Collaborative Achievement for Every Student.
Introduction to Systems Analysis and Design Trisha Cummings.
Assessment.  Understand why we need to assess  The role of assessment in teaching. Lecture’s objective.
Darren A. DeWalt, MD, MPH Division of General Internal Medicine Maihan B. Vu, Dr.PH, MPH Center for Health Promotion and Disease Prevention University.
Chapter 3 – Agile Software Development 1Chapter 3 Agile software development.
Cybersecurity nexus (CSX)
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Best Practices By Gabriel Rodriguez
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 1.
Resources to Support Training Programs for CSIRTs.
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Information Sharing Challenges, Trends and Opportunities
Fundamental Skills The skills needed as a base for further development You will be better prepared to progress in the world of work when you can: Manage.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
Assessment: Demonstrating Your Success. What Retention Efforts Have Been Successful? A Sample Of Our Group’s Responses Mentoring programs have been successful.
Systems Analysis and Design
CHAPTER 12 Descriptive, Program Evaluation, and Advanced Methods.
Barbara F. Schloman, Ph.D., TRAILS Project Director Julie A. Gedeon, Ph.D., TRAILS Assessment Coordinator Kent State University Libraries and Media Services.
National Center for Supercomputing Applications Barbara S. Minsker, Ph.D. Associate Professor National Center for Supercomputing Applications and Department.
Visual 6.1 Unified Command Unit 6: Unified Command.
 Many K-awards are very similar (focus of this talk)  K01 – Mentored Research Scientist Development Award  K23 – Patient-Oriented Research  K07 –
What is CDR? – A Few Examples Water Resources in a Changing Climate – Idaho Climate Change Large CD consortia — not the case that everyone works on everything.
Homeland Security October 20, 2015
Action Research Qualitative Inquiry in Practice AACTE ANNUAL MEETING 2007 New York Dr. Dorothy Valcarcel Craig Ms. Kathyrn.
1 The National Center for Interprofessional Practice and Education is supported by a Health Resources and Services Administration Cooperative Agreement.
Proposals Prof. Z. Lewis.
Digital Data Collections ARL, CNI, CLIR, and DLF Forum October 28, 2005 Washington DC Chris Greer Program Director National Science Foundation.
Priority Action Report Digital Evidence Digital / Multimedia James Darnell 2/1/2016.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Priority Action Report Wildlife Forensics Biology/DNA SAC M. Katherine Moore, Chair Mary K. Burnham-Curtis, Vice Chair February 22, 2016.
Introduction to System Analysis and Design MADE BY: SIR NASEEM AHMED KHAN DOW VOCATIONAL & TECHNICAL TRAINING CENTRE.
1 Web Search How do the various components of the internet work together in order to give you the information you search for each day? 2 Thinking.
Capacity Building Programme on the Economics of Adaptation Supporting National/Sub-National Adaptation Planning and Action Country Support Needs to Mainstream.
8a Certified. About Us  Headquarters in Vienna, VA  Service Disabled Veteran-owned Small Business  SBA 8(a) program participant  Small Disadvantaged.
For Teachers Microsoft Educator Community: Access over 1.5 million educators globally, professional development courses and thousands of inspiring.
Community Partnerships
Delivering Software as a Service
Concepts used for Analysis and Design
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Template Guidelines Please use this template to create your LDRD presentation- we highly recommend that you address all aspects of the proposal as outlined.
America’s Promise Evaluation What is it and what should you expect?
The Department of the Army Historical Summary (DAHSUM)
FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues Eric Ly Basically this is about people who practice DF and only follow.
Lecturette 2: Mining Classroom Data
digital libraries and human information behavior
Support Centre for Sexually Abused Children
Planning a cross- curricular topic
Presentation transcript:

Day 1 - Panel Discussion DFRWS 2004 Linthicum, MD

Day 1 - Panelists Mr. James Christy, SSA; Director, Defense Cyber Crime Institute, Defense Cyber Crime Center (DC 3 ) Mr. Chet Hosmer, Founder and President, Wetstone Technologies, Inc. Mr. Chris Sanft, CFE, Computer Training Specialist SEARCH Group, Inc.

Day 1 - Intro Each question will be posed to all three panelists. Some questions are multi-part Each panelist will have 5-6 minutes to respond Each round will be followed by a 10 minute Q&A session A transcript will be recorded

Day 1- Framework for DF Framework implies structure. Our hope is to define and apply some of this structure generically to digital forensic investigations. Question 1: –In your experience how much of an investigation, digital or otherwise, lies outside the bounds of ‘structure’? Briefly discuss the reliance on the talent of the examiner or analyst, dependence on success from other parts of the investigation (i.e. interviews, interrogations, footwork, other non-digital components) –Can the non-structured ‘art’ of investigation be accommodated in our framework? If so, how might that be accomplished? What features of the overall structure would be affected?

Day 1- Framework for DF It is safe to say that few if any investigations rely solely on digital evidence alone. Sources of evidentiary material usually cover multiple forensic disciplines Question 2: –How can a framework best consider the ‘integration’ of evidence from various sources? –Comment on the mix (or division) of skills required for practitioners who perform tasks at various stages of the process, so that collectively they can effectively ‘integrate’ their findings.

Day 1- Framework for DF The digital forensic community is growing almost exponentially. Our efforts here are only part of any potential solution path Question 3: –What are some recommended private, Federal, DoD, or international organizations that our group should be collaborating with to evolve an accepted digital forensic investigative framework? In your response, consider the investigative utility of having similar frameworks or processes between organizations that work together (e.g. DHS and DoD, DHS and FBI, etc.) Comment briefly on the process through which proposed frameworks would be vetted by the organizations you recommended.

Day 1 – Topics of Consideration Structure Content Dimensions Linear nature Methods Technology Integration (with other disciplines) Execution (flow) Categorization