SlideShare uma empresa Scribd logo
1 de 14
Legal Tools for a
Digital Media World
Defining Digital Forensics
Who Knew What, When & How
Digital Forensics is a scientific process that
utilizes specialized tools and forensic techniques
to recover, authenticate, analyze and report on
Electronically Stored Information (ESI).
ESI is used to reconstruct events, track patterns
& assemble an investigative profile focused on
digital media based activities.
Who Knew What, When & How
Almost everyone use devices such as cell phones,
laptops and tablets that generate ESI & digital
evidence that can be used to establish facts
Deleting a file just removes the pointers but the
data remains in unallocated space.
Evidentiary Weight
Digital evidence can cement
and or give credibility to a
legal theory or theme in a
way that circumstantial
evidence cannot.
Digital Forensics Laboratory
State of the Art Facility
State-of-the-Art architecture & technology for
scalable, high–powered processing.
Latest versions of industry leading, forensic
analysis & eDiscovery toolsets.
External Perimeter & Internal Security layers via
auditable card access, Biometric Access Controls
and IR video surveillance.
Quality Controls
Documented Policies & Standard Operating
Procedures govern laboratory operations from Chain
of Custody through Evidence Disposition.
Certified Forensics Team
All Forensic Analysts have earned the leading
industry certifications.
Core Forensic Services
eDiscovery
Mobile Device Forensics
System Forensics
Integrity Services
System Forensics
eMail/eDocuments
Stored in proprietary and
complex file formats
Digital Photos
Images are created in several
file formats and could be
stored anywhere
Unallocated Space
Gaps present on a digital drive
often contain hidden data
Registry
Contains stored system &user
configuration settings as well
as typed URLs
Web Browsing
Data stored in proprietary
formats specific to each
browser; Internet Explorer,
Firefox, etc.
Storage
If it stores ESI, it can be
analyzed
SYSTEM
FORENSICS
eDiscovery
Extreme Care
ESI must be skillfully extracted,
processed & analyzed while maintaining
evidentiary integrity
Massive
Even in smaller cases, the
amount of ESI can be
overwhelming
Out of Court
Expertly performed, eDiscovery
often leads to pre-trial
settlements
eDISCOVERY
Specialized Training & Tools
In-depth knowledge of File Systems,
Directory Structures & Forensic
toolsets
Scientific Evidence
Time and Date Metadata is
extremely accurate
Mobile Device Forensics
MOBILE DEVICE
FORENSICS
Integrity Services
INTEGRITY
SERVICES
Analysis of departing employee’s
Electronically Stored Information for
indication of IP theft, Customer List
theft, slander
Forensic Capture and
Retention of departing employees
ESI for future litigation / analysis
Random analysis of ESI for key
personnel (Similar to random
drug screening)
Ensuring employee compliance.
(HIPAA, HITECH, Meaningful USE,
FISMA, FFIEC, GLBA, PCI DSS, etc)
Active Case Examples
Medical Malpractice
SYSTEM FORENSIC INVESTIGATION
EMR Record Manipulation, Extensive &
Deliberate Destruction of Evidence
1st of 5 arbitrations resulted in a swift
settlement
Medical Malpractice
eDISCOVERY
Large hospital system preparing for litigation
specific to unnecessary coronary procedures
Ongoing eMail and eDocument processing &
analysis
Intellectual Property Theft
CORPORATE eDISCOVERY
International Transportation company seeks to
protect its proprietary data
Harassment
MOBILE DEVICE FORENSICS
Recovered SMS text messages which provided
proof of intent to harm
Child Custody
SYSTEM FORENSIC INVESTIGATION
Internet activity profiling & usage timeline
Questions & Discussion
Case Process Flow
Post-Case
Processing
Case
Reporting
Case
Documentation
Forensic
Analysis
Imaging +
Hashing
Collection
Case
Initiation
START FINISH
Active Case Examples
Enron
Recovered email & eDocument files played a key
role in the investigation and conviction
SYSTEM
FORENSICS
Deepwater Horizon
Recovered emails and Cell phone text messages
regarding spoliation
SYSTEM
FORENSICSeDISCOVERY eDISCOVERY
MOBILE
FORENSICS
Active Case Examples (cont’d)
Medical Malpractice
Recovered email & eDocument files played a key
role in the investigation and conviction
SYSTEM
FORENSICS
Central Penn Women's Health
Corporate Sabotage/Intellectual Property Theft
Evidence authentication & event timelines were
validated with System Forensics
SYSTEM
FORENSICSeDISCOVERY eDISCOVERY
MOBILE
FORENSICS
WWW.OPTiMO-IT.COM | 877-564-8552 (OPTION 3)

Mais conteúdo relacionado

Mais procurados

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Securing_Medical_Devices_v5
Securing_Medical_Devices_v5Securing_Medical_Devices_v5
Securing_Medical_Devices_v5
Steve Markey
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
j9lai
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 

Mais procurados (14)

Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready? Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready?
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
Biometric security
Biometric securityBiometric security
Biometric security
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
 
Securing_Medical_Devices_v5
Securing_Medical_Devices_v5Securing_Medical_Devices_v5
Securing_Medical_Devices_v5
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 

Semelhante a Presentation

Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
j9lai
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626
j9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
j9lai
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
j9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
j9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
j9lai
 

Semelhante a Presentation (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Presentation

  • 1. Legal Tools for a Digital Media World
  • 2. Defining Digital Forensics Who Knew What, When & How Digital Forensics is a scientific process that utilizes specialized tools and forensic techniques to recover, authenticate, analyze and report on Electronically Stored Information (ESI). ESI is used to reconstruct events, track patterns & assemble an investigative profile focused on digital media based activities. Who Knew What, When & How Almost everyone use devices such as cell phones, laptops and tablets that generate ESI & digital evidence that can be used to establish facts Deleting a file just removes the pointers but the data remains in unallocated space. Evidentiary Weight Digital evidence can cement and or give credibility to a legal theory or theme in a way that circumstantial evidence cannot.
  • 3. Digital Forensics Laboratory State of the Art Facility State-of-the-Art architecture & technology for scalable, high–powered processing. Latest versions of industry leading, forensic analysis & eDiscovery toolsets. External Perimeter & Internal Security layers via auditable card access, Biometric Access Controls and IR video surveillance. Quality Controls Documented Policies & Standard Operating Procedures govern laboratory operations from Chain of Custody through Evidence Disposition. Certified Forensics Team All Forensic Analysts have earned the leading industry certifications.
  • 4. Core Forensic Services eDiscovery Mobile Device Forensics System Forensics Integrity Services
  • 5. System Forensics eMail/eDocuments Stored in proprietary and complex file formats Digital Photos Images are created in several file formats and could be stored anywhere Unallocated Space Gaps present on a digital drive often contain hidden data Registry Contains stored system &user configuration settings as well as typed URLs Web Browsing Data stored in proprietary formats specific to each browser; Internet Explorer, Firefox, etc. Storage If it stores ESI, it can be analyzed SYSTEM FORENSICS
  • 6. eDiscovery Extreme Care ESI must be skillfully extracted, processed & analyzed while maintaining evidentiary integrity Massive Even in smaller cases, the amount of ESI can be overwhelming Out of Court Expertly performed, eDiscovery often leads to pre-trial settlements eDISCOVERY Specialized Training & Tools In-depth knowledge of File Systems, Directory Structures & Forensic toolsets Scientific Evidence Time and Date Metadata is extremely accurate
  • 8. Integrity Services INTEGRITY SERVICES Analysis of departing employee’s Electronically Stored Information for indication of IP theft, Customer List theft, slander Forensic Capture and Retention of departing employees ESI for future litigation / analysis Random analysis of ESI for key personnel (Similar to random drug screening) Ensuring employee compliance. (HIPAA, HITECH, Meaningful USE, FISMA, FFIEC, GLBA, PCI DSS, etc)
  • 9. Active Case Examples Medical Malpractice SYSTEM FORENSIC INVESTIGATION EMR Record Manipulation, Extensive & Deliberate Destruction of Evidence 1st of 5 arbitrations resulted in a swift settlement Medical Malpractice eDISCOVERY Large hospital system preparing for litigation specific to unnecessary coronary procedures Ongoing eMail and eDocument processing & analysis Intellectual Property Theft CORPORATE eDISCOVERY International Transportation company seeks to protect its proprietary data Harassment MOBILE DEVICE FORENSICS Recovered SMS text messages which provided proof of intent to harm Child Custody SYSTEM FORENSIC INVESTIGATION Internet activity profiling & usage timeline
  • 12. Active Case Examples Enron Recovered email & eDocument files played a key role in the investigation and conviction SYSTEM FORENSICS Deepwater Horizon Recovered emails and Cell phone text messages regarding spoliation SYSTEM FORENSICSeDISCOVERY eDISCOVERY MOBILE FORENSICS
  • 13. Active Case Examples (cont’d) Medical Malpractice Recovered email & eDocument files played a key role in the investigation and conviction SYSTEM FORENSICS Central Penn Women's Health Corporate Sabotage/Intellectual Property Theft Evidence authentication & event timelines were validated with System Forensics SYSTEM FORENSICSeDISCOVERY eDISCOVERY MOBILE FORENSICS