A joint presentation delivered by Dr. Glenn Lipson and myself at the 2014 Annual Conference of the Association of Threat Assessment Professionals in Anaheim, California.
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
2014-08-15 The Interpretation of Digital Data in Threat Cases
1. The Interpretation of Digital
Data in Threat Cases
Frederick S. Lane, Esq.
Glenn S. Lipson, Ph.D., ABPP
Association of Threat Assessment
Professionals
15 August 2014
2. Lecture Overview
• Introduction
• A Brave New Digital World / Zimbardo Videos
• Left to Their Own Digital Devices
• Not an Exact Science
• Legal and Logistical Challenges
• Cybertraps for Consultants, Attorneys, and Law
Enforcement
• Post-Mortem Digital Investigation
• My Evaluation and Investigation
• Money,YouTube, & World Wide Fame
3. Introduction
• Our Rapidly Changing Digital Age
• Ubiquity of Digital Devices (part. Mobile)
• Vast Array of Apps
• Extensions of Our Personae
• “[Modern cell phones] are now such a
pervasive and insistent part of daily life
that the proverbial visitor from Mars might
conclude they were an important feature
of human anatomy.” -- Chief Justice John
Roberts, Riley v.California.
12. Main Cybertraps Factors
• It’s Fast and Very
Easy
• The Internet
• Porn Chic
• Celebrity
Selfies
• Hormones
13. Left to Their Own Devices
• Younger andYounger Access to
Powerful Mobile Devices
• Mobile OSs Highly Accessible by
Young Children
• Unregulated Experiment in
Exposure to Sex and Violence
• Many Parents Reluctant or Unsure
of How to Supervise
14. Not an Exact Science
• Who Has Access to An Individual’s
Digital Devices?
• Opportunities and Limitations for
Investigators
• The Challenges of Interpreting
Digital Data
• Cyberbullying, Sexual Assault,
and Threats of Physical Violence
15. Legal and Logistical Challenges
• Computer Forensics – Time-
Consuming and Expensive
• … And Likely to Get More So
• The Practical Challenges Posed
by Mobile and Cloud Forensics
• Growing Legal Protections for
Mobile Devices and Cloud
Accounts
16. Cybertraps for Consultants, Attorneys, and
Law Enforcement
• Potential for Constitutional
Violations
• Invasion of Privacy (Civil Liability)
• Inadvertent Damage to or
Destruction of Evidence
• Potential Criminal Charges for
Mishandling of Contraband
17. Post-Mortem Digital Discovery
Jeffrey Weise, (2005)
Red Lake H. S. in MN. 9 killed, 5
injured, commits suicide. Wiese grew
up with a difficult and disrupted life.
At the age of 9 his father committed
suicide, his mother was an alcoholic
and physically and emotionally
abusive,Wiese’s mother later died
after a car wreck, suffering from brain
damage and long term coma.Weise
had effectively lost both parents by
the age of eleven and moved in with a
grandfather and expressed frustration
of living in Red Lake. Weise had an
extensive history of being bullied and
attempted suicide prior to the attack.
27. Money and YouTube
• Google AdWords Is Integrated Into
YouTube
• Each Click Generates a Fraction of a
Cent
• PopularYouTube Videos Can
Generate Large Amounts of Money
• Numerous Videos Showing Kids How
to Set Up Google Adwords, Bank
Accounts, Paypal, etc.
33. The Interpretation of Digital
Data in Threat Cases
Frederick S. Lane, Esq.
Glenn S. Lipson, Ph.D., ABPP
Association of Threat Assessment
Professionals
15 August 2014