Digital Evidence for the Domestic Practitioner

Size: px
Start display at page:

Download "Digital Evidence for the Domestic Practitioner"

Transcription

1 Digital Evidence for the Domestic Practitioner Presented by: Simon Ragona III, EnCE, CCE, ACE, Director Kyle Poppenwimer, CCE, ACE, Senior Digital Forensic Examiner T&M Protection Resources, LLC 230 Park Avenue, Suite 440 New York, NY 10169

2 Why Be Concerned with Digital Evidence? 1. PRACTICAL Pervasive and important in every litigated matter especially Matrimonial Cases 2. ETHICAL Duty of competence Duty to stay abreast of emerging technology 3. LEGAL NYS Court Rules require consideration of ESI 2

3 PRACTICAL - The Volume of Data Over 95% of information in the world created or stored digitally Change is Qualitative as well as Quantitative , Texting and Social Media have replaced telephone as primary mode of communication resulting in a record of the SUBSTANCE of the communication often being available as evidence! 3

4 The Digital Data Explosion 280 EXABYTES of data created, stored or replicated digitally in K Petabytes in 2013 (1PB = 1 Million GB) Estimated to increase to 1 ZETTABYTE by

5 So How Big is a ZETTABYTE? 1 ZETTABYTE = (approx.) 1.1 BILLION TERABYTES ONE TERABYTE CAN STORE: One Hundred Million Pages of TEXT 17,000 Hours of Digital Music 310,000 Digital Photos 1000 hours (about 42 Days) of Digital Video 5

6 The Numbers in Context U.S. Library of Congress Contains 158 million items on 838 miles of shelves All of which = 3000 TERABYTES 6

7 THE DIGITAL DATA EXPLOSION The Digital Information Created In 2015 alone will be 366,666 times the current information in the Library of Congress 7

8 PRACTICAL: The Staggering Volume of ESI This is NOT the volume of Digital Data out there in the world already it is merely the volume of Digital Information ( ESI ) being created in a SINGLE YEAR! The Volume of Digital Data in the World is Exponentially GREATER!! 8

9 Why Be Concerned with Digital Evidence? All This Information is Potential evidence! Where to Find it How to Get it How to get it in (as evidence) How NOT to GET IT How to Challenge it 9

10 Key Terminology & Concepts Electronic, Digital & ESI Electronic: Devices that operate by controlling the flow of electronically charged particles - Devices are Electronic not Digital but they may store digital information Digital: Information which is stored using numerical values to represent the information - Information can be Digital it cannot be Electronic Electronically Stored Information ( ESI ) is the terminology adopted by Federal and New York State Courts to refer to digital evidence 10

11 META DATA Created by the computer system to provide additional information about user created files Date Created, Accessed, Modified Author, Machine Name, Version Number Dates and times that are difficult (but NOT impossible) to alter 11

12 Microsoft Word Metadata 12

13 Microsoft Word Metadata 13

14 Microsoft Word Metadata 14

15 Key Terminology & Concepts Native Format Format in which ESI was originally created and stored Critical for proper forensic evaluation of ESI or even simple evaluation based on Metadata Examples: Digital Video Files (.avi;.mpeg;.mov) Digital Audio (.wav;,mp3;.aiff) Digital Photos (.jpg;.gif) Documents (.doc;.docx;.wpd;.pdf) 15

16 FOUNDATIONS OF ADMISSIBILITY Forensically Sound = Admissible Properly Collected + Digitally Authenticated + Appropriate Chain of Custody Digital Information on a Hard Disk or other Media is difficult to destroy or eliminate entirely, but is EASILY tampered with or corrupted! 16

17 PROPERLY COLLECTED Imaging & Cloning Clone = Physical (working) duplicate of the original media Image or Bit Stream Image = single data file (or group of sequential files) containing a bit for bit copy of the entire sequence of digital information on a hard disk or other storage medium Both forensically sound But Not the Same. MUST SPECIFY IN ORDERS / STIPULATIONS 17

18 Digital Authentication Hashing Use of a Cryptographic Algorithm to calculate unique value for HDD, FILE, or DATA VOLUME More unique than DNA Profile Accepted Hash Methods: Md-5 Algorithm Hash SHA-1 Hash Insist that all collected / preserved ESI be HASHED! 18

19 RECOVERY OF DELETED DATA OS is built for speed; erasing requires overwriting = time and resource intensive Deletion = Removal of Markers from Index not actual erasure of data from the drive DELETED DOES NOT MEAN ERASED 19

20 WHEN DOES DELETED = ERASED? WHEN DELETED DATA IS OVERWRITTEN THEN IT IS ERASED and NO LONGER RECOVERABLE BY ANY COMMERCIALLY AVAILABLE FORENSIC MEANS! Overwriting occurs through: Ordinary Continued Use of Device MAJOR Preservation Issue ESI deleted prior to a provable duty to preserve may be overwritten and become unrecoverable through normal, continued use of the device in question! Wiping (Overwriting On Purpose ) Can t get back what s been wiped (i.e. overwritten) but we CAN prove what s been done! = SPOILATION SANCTIONS 20

21 Sources of Evidence Electronic Communications: IM (Instant Messaging) Forums, Bulletin Boards, Blogs Social Networking Sites TEXT Messages (SMS) Skype / Facetime (streaming video/ audio) 21

22 Obtaining Communications Evidence Content vs. Account Information ECPA Only applies to Providers! Spoofing & the Importance of HEADERS Web Mail vs. Resident / Client Based FIND OUT Affects where copies may exist Affects potential recovery Affects ability to subpoena Affects Retention 22

23 HEADERS The IMPORTANT Part of the 23

24 Sources of Evidence WEB BASED Recovery From Devices Varies by Device and User Retention Policies vary but much longer than SMS (SEE CHART) Preservation Letter (SEE CHART) Need Court Order / Authorization 24

25 WHERE TO SEND PRESERVATION LETTERS & LEGAL PROCESS 25

26 WHO STORES WHAT, FOR HOW LONG? 26

27 S: Foundation for Admissibility Once you we have an How do you get it admitted as Evidence? Similar to other Documents but Subject to Special Challenges Challenges to authenticity based on ease of spoofing are commonplace! Notice to Admit Sponsoring Witness who sent or received MAY be sufficient Forensic Testimony to Authenticate will support admissibility and add to weight! 27

28 Evidence from Social Networking Sites Screen Shots / Photos Pro: Simple, effective, admissible same foundation as a photograph Con: Assumes access to pages; ignores history Content = electronic communication under ECPA Best practice = Preserve available ESI, Send preservation letter, Seek court order / authorization 28

29 Communications Evidence SMS SMS Data (Text Messages) Short Messages (up to 160 characters) Device vs. Carrier as a Source Carrier Retention of SMS Very Short or Non Existent (See Below) Active SMS Data Readily Retrievable from a Device Recovery of DELETED SMS data from Device - more difficult and affected by many variables BEST PRACTICE to ENSURE ADMISSIBILITY: Content from the Sending / Receiving Device Forensically Corroboration by Carrier s Bill 29

30 Communications Evidence Text Messages: Carriers that DO NOT Store SMS Data: AT&T Sprint / Nextel T-Mobile Cricket Boost Mobile 30

31 Communications Evidence SMS Data (Text Messages): Carriers NOT listed above (i.e. Verizon) do log SMS Data: BUT FOR VERY SHORT TIME: Usually 3 to 7 days If user deletes will delete on server in 24 hours or less SMS Content Covered By ECPA SEND Preservation Letter IMMEDIATELY by FAX and Mail 31

32 Sources of Evidence Mobile Devices iphones, Androids, Blackberry Tens of Millions active in U.S. Robust Operating Systems with database structures = tons of data available for recovery Tens of Thousands of Applications Available Skype Social Networking Apps Spoofing Apps to mask voice / caller ID GPS Navigation 32

33 Sources of Evidence Mobile Devices Mobile Device Data beyond / SMS: Photos taken with camera EXIF data (GPS coordinates where photo taken) Google Maps searches / routes Skype / Facetime calls produce NO third party record but proof of calls exists within the device Raw GPS Data to prove where phone has been Call Histories Calendars / Address Books (with photos!) 33

34 Sources of Evidence Mobile Device Mobile Device Backup Files Backup files generated by computer software such as Apple itunes or Blackberry Desktop Manager Store a great wealth of data including SMS, MMS, Photos, Call Logs, Contacts, Calendar, etc. Computer systems should ALWAYS be searched for mobile device backup files. 34

35 Sources of Evidence Mobile Backups -Audio Files -Applications -Bluetooth Devices -Calendar -Call Log -Chat -Contacts -Photographs -Multimedia Messages -Notes -Text Messages -User Dictionary -Videos -Voic -Web Bookmarks -Web History -Wireless Networks 35

36 Sources of Evidence Direct / Indirect Primary / Direct Evidence: (Created by the user) s Word Documents, Spreadsheets etc. Native Format Critical but still not ENOUGH! Secondary / Indirect Evidence (Created by System or Application) Internet Temporary Files Application Temporary Files System Logs Registry Files Need system / drive to analyze beyond the four corners and beyond the Meta Data! 36

37 Sources of Evidence Meta Data Analysis Meta Data dates and times ( MAC dates) based on Windows internal clock. This can be manipulated. Manipulation leaves extrinsic evidence, but you must have access to (or an image of) the system that created the ESI to prove that! 37

38 Sources of Evidence Meta Data THE MOST IMPORTANT THING TO KNOW ABOUT META DATA: WITHOUT AN ITEM IN ITS NATIVE FORMAT, RELEVANT META DATA IS NOT AVAILABLE! WITHOUT THE SYSTEM THAT CREATED THE ESI; indirect and potentially critical evidence is unavailable, including the ability to validate accuracy of Metadata 38

39 Collection and Preservation The hard disk / internal memory inside a Desktop, Laptop, Server, Tablet or Smartphone is the most common and most productive source of Digital Evidence (ESI) 40 GB HDD can hold the equivalent of 3.5 million pages of printed data 1 TB HDD = 25 Times or 87.5 million pages 39

40 Sources of Evidence Removable Media: Evidence of use is often, but not always, left on system in Registry Files or elsewhere 40

41 Sources of Evidence THE CLOUD Multiple Devices Accessing a Central Repository of Data the concept is not new the term is Cloud Computing is a Misnomer the DATA is not in a cloud, it is on A HARD DRIVE SOMEWHERE JUST NOT IN THE SUBJECT S PHYSICAL POSSESSION. We need to identify where the drive(s) are and / or how they are accessed. To do this we need the user s system 41

42 Sources of Evidence Video Security Systems (Homes & Businesses) Electronic Access Control Systems GPS Devices: Vehicle Based Portable Incorporated into Cell Phones 42

43 Digital Evidence What Forensic Analysis can show that Non Forensic Review of Electronic Documents / s may not: The best reason to fight for the genuine article Deleted Items Changed or Altered Items Hidden or Encrypted Items Fragments of Files Altered Dates and Times (meta data) User Logs / System Information Existence of third party backups and / or cloud based files Use of Removable Media 43

44 Use in Court Admissibility of ESI requires proof of: Proper Collection and Preservation Chain of Custody Authentication - Digital Verification or Hashing 44

45 Challenges Questions to Sponsoring Witness: Collection and Preservation Methods Logs, screenshots (or photos) of all forensic processes Written Standard Operating Procedures Qualifications of ALL Persons Collecting, Handling, Analyzing NOT just the person in Court! 45

46 Challenges Hardware / Software Utilized: VALIDATED? Log of Validation / Testing Custom Apps specific challenges LAB Conditions: Security / Access Control? LOGS of Entry? 46

47 Challenges THE TOUGHEST QUESTION. WHO WAS AT THE KEYBOARD? Tendency to over emphasize forensic proof of WHAT HAPPENED It is very difficult for forensic investigation / digital evidence to prove WHO was at the KEYBOARD - 47

48 Self Help Recovery vs. Interception Surreptitious Retrieval of ESI MAY be OK outside of formal discovery (e.g. Byrne v. Byrne Scenario) BUT interception of electronic communications absent consent is criminal and results are inadmissible by statute Wrongful Interception of data in transit may be criminal and inadmissble in a court of law. 48

49 Case Study 49

50 Meet John and Jane 50

51 John utilizes icloud to sync his data to each of his Apple devices. 51

52 Meet John s girlfriend Jamie. 52

53 Jamie Sexting John 53

54 Jane using John s Macbook

55 What John Forgot

56 A Very Angry Jane

57 For More Information Contact: Simon Ragona III, EnCE, CCE, ACE Kyle Poppenwimer, CCE, ACE T&M Protection Resources, LLC (908)

DIGITAL EVIDENCE TOOL BOX

DIGITAL EVIDENCE TOOL BOX DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital

More information

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.

More information

MOBILE DEVICE FORENSICS

MOBILE DEVICE FORENSICS MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

Southington Public Schools

Southington Public Schools 3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction

More information

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information

More information

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher BlackLight is a multi-platform forensic analysis tool that allows examiners to quickly and intuitively analyze digital forensic media. BlackLight is capable of analyzing data from Mac OS X computers, ios

More information

A forensically robust method for acquisition of icloud data. Kurt Oestreicher Champlain College

A forensically robust method for acquisition of icloud data. Kurt Oestreicher Champlain College A forensically robust method for acquisition of icloud data Kurt Oestreicher Champlain College Background Data stored on cloud services increasingly important to forensic investigations As of June 2013:

More information

Manual Copy Paste Macbook Air To External Hard Drive

Manual Copy Paste Macbook Air To External Hard Drive Manual Copy Paste Macbook Air To External Hard Drive Mar 13, 2015. I'm looking for a device to move all my pics and video to as my MacBook Air is Second if so what device will work as a wireless external

More information

VIEVU Solution App User Guide

VIEVU Solution App User Guide VIEVU Solution App User Guide INTRODUCTION VIEVU Solution is the next generation, fully-hosted, cloud evidence management system. This guide describes how to operate the VIEVU Solution. Additional support

More information

Snap Inc. Law Enforcement Guide

Snap Inc. Law Enforcement Guide Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow Digital Forensics with ios Devices COMP116 Final Project Shuyan Guo Shuyan.guo@tufts.edu Advisor: Ming Chow Abstract This project focuses on ios device forensics. The study provides a general overview

More information

A Lawyer s Guide to ediscovery Processing

A Lawyer s Guide to ediscovery Processing A Lawyer s Guide to ediscovery Processing What You Should Know to Competently Handle Your Case Christian DeTrude Lexbe ediscovery Webinar Series About our Webinars If you have technical issues or questions,

More information

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The

More information

Paraben s DS 7.5 Release Notes

Paraben s DS 7.5 Release Notes Paraben s DS 7.5 Release Notes Welcome to Paraben s DS Mobile Forensic Solution! DS is designed to allow investigators to acquire the data contained on mobile phones, smartphones, tablets, GPS, and PDA

More information

Gathering Technology Abuse Evidence in Protection Order Cases

Gathering Technology Abuse Evidence in Protection Order Cases Gathering Technology Abuse Evidence in Protection Order Cases NCPOFFC webinar Sept 26, 2018, 12 1:30pm CDT Ian Harris, JD, MA, Technology Safety Legal Manager, National Network to End Domestic Violence

More information

Digital Forensics for Attorneys

Digital Forensics for Attorneys Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital

More information

Mobile Device Support. Jeff Dove February

Mobile Device Support. Jeff Dove February Mobile Device Support Jeff Dove February 18 2017 Apple is a vertical company. Apple and IOS Control of type and design of hardware components Control over phone operating system and updates Control over

More information

Cian Kinsella CEO, Digiprove

Cian Kinsella CEO, Digiprove Cian Kinsella CEO, Digiprove cian.kinsella@digiprove.com Malaga 7 th June 2013 Been developing software since 1972 Commercial and Freelance Co-founder of 3 Software Product Companies Have had many different

More information

DATA RECOVERY FROM PROPRIETARY- FORMATTED CCTV HARD DISKS

DATA RECOVERY FROM PROPRIETARY- FORMATTED CCTV HARD DISKS Chapter 15 DATA RECOVERY FROM PROPRIETARY- FORMATTED CCTV HARD DISKS Aswami Ariffin, Jill Slay and Kim-Kwang Choo Abstract Digital video recorders (DVRs) for closed-circuit television (CCTV) commonly have

More information

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators 25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.

More information

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer

More information

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without

More information

Digital Forensics. Also known as. General definition: Computer forensics or network forensics

Digital Forensics. Also known as. General definition: Computer forensics or network forensics TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 3 Jan 29, 2014 Introduction ti to Digital Forensics Digital Forensics Also known as Computer forensics or network forensics General

More information

G, William James. The smartphone & tablet have changed the course of real estate

G, William James.   The smartphone & tablet have changed the course of real estate Mobile Office Solutions For REALTORS : Must-Have Tools For The Agent s Mobile Office A mobile professional s guide to knowing Which wireless technologies work for you G. William James Handheld Computer

More information

Understanding Computer Forensics

Understanding Computer Forensics Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

iphone & ipad Essentials

iphone & ipad Essentials iphone & ipad Essentials iphone & ipad Essentials January 24, 31: The Basics. February 7: WiFi, Carrier Networks & Syncing & Backups Bob Newcomb February 14: February 21: February 28: Phone Calls Email

More information

Planning a Backup Strategy. 18/06/2018 Garran Whitley for SeniorNet Eden-Roskill Inc. 1

Planning a Backup Strategy. 18/06/2018 Garran Whitley for SeniorNet Eden-Roskill Inc. 1 Planning a Backup Strategy 18/06/2018 Garran Whitley for SeniorNet Eden-Roskill Inc. 1 Data Storage Devices 18/06/2018 Garran Whitley for SeniorNet Eden-Roskill Inc. 2 A closer look at HDD and SDD 18/06/2018

More information

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing

More information

Applications for Preservation and Production in our Digital World

Applications for Preservation and Production in our Digital World Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background

More information

PhoneView Product Manual

PhoneView Product Manual PhoneView Product Manual PhoneView is a Mac application for accessing iphone, ipad or ipod touch imessages, SMS/MMS, WhatsApp messages, recent calls, contacts, voicemails, shared app data, Safari web bookmarks

More information

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might

More information

Instructions I Lost My Iphone Contacts After. Update >>>CLICK HERE<<<

Instructions I Lost My Iphone Contacts After. Update >>>CLICK HERE<<< Instructions I Lost My Iphone Contacts After Update "Lost My Contact List on iphone after ios 8 Upgrade" have icloud backup files, try this method to recover iphone contacts from icloud after ios 8 installation.

More information

The UNIX file system! A gentle introduction"

The UNIX file system! A gentle introduction ISA 785 Research in Digital Forensics The UNIX file system! A gentle introduction" ISA 785! Angelos Stavrou, George Mason University! File System Basics 2! Readings from the Textbook! Unix / EXT3! FAT/NTFS!

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without

More information

iphone & ipad Essentials

iphone & ipad Essentials iphone & ipad Essentials iphone & ipad Essentials January 17, 24: The Basics January 31: WiFi, Carrier Networks & Syncing & Backups Bob Newcomb February 7: February 14: Phone Calls, Email & Texting Surfing

More information

iphone & ipad Essentials

iphone & ipad Essentials iphone & ipad Essentials iphone & ipad Essentials September 13, 20: The Basics September 27: WiFi, Carrier Networks & Syncing & Backups October 4: Phone Calls and IOS 12 Bob Newcomb October 11: Email &

More information

Instructions On How To Use The Ipad 2 Facetime Between

Instructions On How To Use The Ipad 2 Facetime Between Instructions On How To Use The Ipad 2 Facetime Between Continuity lets you seamlessly move between your iphone, ipad, and Mac, or use them You can use your ipad or Mac to make and receive phone calls through

More information

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

8/28/2017. What Is a Federal Record? What is Records Management?

8/28/2017. What Is a Federal Record? What is Records Management? Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical

More information

Forensic Analysis of ios Device Backups

Forensic Analysis of ios Device Backups Forensic Analysis of ios Device Backups ios Apple s mobile operating system Originally known as iphone OS Unveiled in 2007 Current version is 8.3, released April 8, 2015 ios Runs on: iphone ipod Touch

More information

Instructions On How To Use An Ipad 2 Facetime Between

Instructions On How To Use An Ipad 2 Facetime Between Instructions On How To Use An Ipad 2 Facetime Between Continuity lets you seamlessly move between your iphone, ipad, and Mac, All devices must be signed in to FaceTime using the same icloud account. This

More information

SAMPLE LITIGATION HOLD NOTICES

SAMPLE LITIGATION HOLD NOTICES Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization. Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,

More information

VIEVU Solution App User Guide

VIEVU Solution App User Guide VIEVU Solution App User Guide Contact Us If you need assistance or have any questions, please visit www.vievu.com/vievu-solutionsupport, contact us by phone at 888-285-4548, or email support@vievu.com.

More information

Technology to help Mature Adults navigate smartphones / tablets / computers. John Cheng 10/21/2017

Technology to help Mature Adults navigate smartphones / tablets / computers. John Cheng 10/21/2017 Technology to help Mature Adults navigate smartphones / tablets / computers John Cheng 10/21/2017 Cell Phones Cell phone plans: Contract (discount on phones), unlock phones, individual / family plans /

More information

GOOGLE VAULT AND SPANNING BACKUP

GOOGLE VAULT AND SPANNING BACKUP Understanding the difference between GOOGLE VAULT AND SPANNING BACKUP SPANNING BACKUP VS. Many people concerned about data loss in G Suite wonder if Google Vault is the solution to their problems. It s

More information

Android Forensics: Simplifying Cell Phone Examinations

Android Forensics: Simplifying Cell Phone Examinations Android Forensics: Simplifying Cell Phone Examinations Jeff Lessard, Gary Kessler 2010 Presented By: Manaf Bin Yahya Outlines Introduction Mobile Forensics Physical analysis Logical analysis CelleBrite

More information

Airplane mode Android app application Back key bandwidth

Airplane mode Android app application Back key bandwidth 1G First-generation analog wireless telephone technology. 2G Second-generation wireless technology, the first digital generation and the first to include data services. 3G Third-generation wireless telephone

More information

How To Setup Bluetooth Iphone 4s Ringtones On Windows >>>CLICK HERE<<<

How To Setup Bluetooth Iphone 4s Ringtones On Windows >>>CLICK HERE<<< How To Setup Bluetooth Iphone 4s Ringtones On Windows (iphone 4s) to connect iphone to your computer to sync and charge. Apple USB power adapter and Voice Memos are played, even if the Ring/Silent switch

More information

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

Terminology, Types of Computers & Computer Hardware

Terminology, Types of Computers & Computer Hardware Terminology, Types of Computers & Computer Hardware Basic Terminology 1.Computer A device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.

More information

CEO Position starts January 2012

CEO Position starts January 2012 CEO Position starts January 2012 Peter Hirsch It is a Cell Phone (of course) It is a Video Conferencing Phone It is a Digital HD Camera (Photos and Videos) It is a MP3 Player (Music Player) It is a Digital

More information

Mobile Devices. Objectives. Types of Devices 4/25/2012

Mobile Devices. Objectives. Types of Devices 4/25/2012 Mobile Devices Objectives Identify mobile devices Learn how mobile devices obtain and transmit information Identify potential evidence that may be obtained from mobile devices Learn where data is stored

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

How To Transfer Contacts From Blackberry To Iphone 5 Without Using Google Sync

How To Transfer Contacts From Blackberry To Iphone 5 Without Using Google Sync How To Transfer Contacts From Blackberry To Iphone 5 Without Using Google Sync You can transfer contacts using Google Sync or Blackberry desktop app on your to transfer contacts to your iphone 6 or 6 plus

More information

ipads for Productivity 7

ipads for Productivity 7 Contents Contents 4 ipads for Productivity 7 Why ipad for Work 8 ipads vs Laptops 9 About the ipad Pro 0 ipad Accessories ipad Essentials Setting Up icloud 4 Touch ID and Passcode 6 Find My ipad 8 Network

More information

Instructions I Lost My Iphone Contacts After Sync >>>CLICK HERE<<<

Instructions I Lost My Iphone Contacts After Sync >>>CLICK HERE<<< Instructions I Lost My Iphone Contacts After Sync My If you turn off Mail, Contacts, Calendars, Notes, Reminders, icloud Photo Library, The copied information isn't kept in sync with icloud. On your ios

More information

Verizon Backup Assistant Failed To Sync Error Code 5

Verizon Backup Assistant Failed To Sync Error Code 5 Verizon Backup Assistant Failed To Sync Error Code 5 Learn how to get and use Backup Assistant for backing up contacts on a basic phone Backup Assistant is a service that saves a copy of your device's

More information

2.5.1 Using Blockchain technology Verifying file authenticity Manual verification of a file's authenticity...

2.5.1 Using Blockchain technology Verifying file authenticity Manual verification of a file's authenticity... USER'S GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image?... 4 1.2 System requirements... 4 1.3 Install, update, or remove Acronis True Image 2018... 5 1.4 Activating Acronis True

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Google Now, Google Play,

More information

Mobile Apps Webinar. Welcome to the continuing webinar series provided by BusinessCreator, Inc.

Mobile Apps Webinar. Welcome to the continuing webinar series provided by BusinessCreator, Inc. Mobile Apps Webinar Welcome to the continuing webinar series provided by BusinessCreator, Inc. We are pleased to present Daniel S. Rosemark, Esq. as our guest speaker for this week s presentation on mobile

More information

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au

More information

PrintMe Mobile 3.0 User s Guide

PrintMe Mobile 3.0 User s Guide PrintMe Mobile 3.0 User s Guide Overview of contents About PrintMe Mobile System Requirements Printing Troubleshooting About PrintMe Mobile PrintMe Mobile is an enterprise solution that enables mobile

More information

MOBILE LOCATION-BASED SERVICES

MOBILE LOCATION-BASED SERVICES MOBILE LOCATION-BASED SERVICES INDEX Index Table of Contents Table of Contents... i List of Figures... vi Executive summary...1 1 Introduction to location-based services...3 1.1 Definition of mobile location-based

More information

Mobile Device Investigations: From Android to iphone and Back. February 2017

Mobile Device Investigations: From Android to iphone and Back. February 2017 Mobile Device Investigations: From Android to iphone and Back February 2017 1 Agenda Introduction to Mobile Forensics Mobile device 101 Different types of mobile devices Preservation of data on mobile

More information

National Digital Literacy Mission Module 1: Power in Your Hands

National Digital Literacy Mission Module 1: Power in Your Hands National Digital Literacy Mission Module 1: Power in Your Hands 2 Lesson Plan Lesson Plan of Module 1 1. Overview and introduction to digital devices 2. Know the computer (Components, Functions and Applications)

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

Mobile Device Investigations: From Android to iphone and Back

Mobile Device Investigations: From Android to iphone and Back Mobile Device Investigations: From Android to iphone and Back Jason Bergerson Director, Consulting Operations, LT Consulting November 16, 2016 1 Jason Bergerson Director, Consulting Operations, Kroll Ontrack

More information

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline

More information

From the Lab to the Boardroom; Forensics goes mainstream

From the Lab to the Boardroom; Forensics goes mainstream From the Lab to the Boardroom; Forensics goes mainstream Jim Butterworth, EWC USN (Ret.), EnCE & GCIA, Director of Incident Response, Guidance Software Definition: P A G E 1 Computer Forensics The Scientific

More information

Syncios Manager User Guide

Syncios Manager User Guide Syncios Manager User Guide Overview Tutorials Introduction Transfer Data Between Devices and Key Features PC System Requirements Make Ringtones and Download Videos GIF Maker One-Click Backup and Restore

More information

What is computer forensics? VTLA

What is computer forensics? VTLA PRESENTERS: Michael C. Maschke, CEO Sensei Enterprises, Inc. VTLA March 28, 2014 The Homestead Definition is morphing Used to mean primarily the retrieval of deleted data Now intertwined with forensic

More information

AccessData offers a broad array of training options.

AccessData offers a broad array of training options. Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass

More information

Electronic Surveillance & Constitutional/Legislative Protections

Electronic Surveillance & Constitutional/Legislative Protections Electronic Surveillance & Constitutional/Legislative Protections Eric Vos Federal Defender District of Puerto Rico Eric_Vos@ao.uscourts.gov What is Electronic Surveillance? Not? What We Will Cover Cell

More information

Electronic Evidence and Discovery

Electronic Evidence and Discovery Electronic Evidence and Discovery Increasingly family law practitioners face the challenge of retrieving, authenticating, admitting and preserving electronic evidence. Since surfing the web always leaves

More information

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Test Results for Mobile Device Acquisition Tool: Zdziarski s Method October 2010 37 38 38 October 2010

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

NUIT Student Tech Talk

NUIT Student Tech Talk NUIT Student Tech Talk Go Mobile at NU Smartphones March 1, 2012 Presented by NUIT Support Center Lead Consultants: Manu Anjanappa Shamyle Ghazali Introduction Taking the next step after Angry Birds and

More information

MOBILedit Forensic Express

MOBILedit Forensic Express MOBILedit Forensic Express All-in-one phone forensic tool from pioneers in the field MOBILedit Forensic Express is a phone and cloud extractor, data analyzer and report generator all in one solution. A

More information

Pinpoint Labs ESI Collection Tools

Pinpoint Labs ESI Collection Tools Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

How To Changing Album Name On Macbook Pro Home Folder

How To Changing Album Name On Macbook Pro Home Folder How To Changing Album Name On Macbook Pro Home Folder One or more iphoto album names are not listed in the Photos tab in itunes. Check to see if you've accidentally moved your iphoto Library file to another

More information

Report For Algonquin Township Highway Department

Report For Algonquin Township Highway Department Report For Algonquin Township Highway Department Prepared For: Prepared By: Robert Hanlon Attorney at Law robert@robhanlonlaw.com Andy Garrett Garrett Discovery Inc agarrett@garrettdiscovery.com Date:

More information

MOBILE LOCATION-BASED SERVICES

MOBILE LOCATION-BASED SERVICES Index Table of Contents Table of Contents... i List of Figures... vi Executive summary... 1 1 Introduction to location-based services... 3 1.1 Definition of mobile location-based services... 3 1.2 Mobile

More information

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals Appendix A A Comprehensive Guide to IC 3 IC3 - Module 1: Computing Fundamentals Standardized Coding Number Objective 1.1 Objectives & Abbreviated Skill Sets Page Identify types of computers, how they process

More information

Safeguarding Attorney-Client Privilege in a Wireless World

Safeguarding Attorney-Client Privilege in a Wireless World Safeguarding Attorney-Client Privilege in a Wireless World What to consider when communicating with your clients Marc S. Martin, Partner 202-778-9859 mmartin@klng.com www.klng.com Attorney Treatment of

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: iphone users that use a Windows

More information

How to Transfer Your Contact Information Into Microsoft Outlook 2010

How to Transfer Your Contact Information Into Microsoft Outlook 2010 How to Transfer Your Contact Information Into Microsoft Outlook 2010 Your Contacts Exported To an Excel Spreadsheet (CSV Format ) Now Located on a Device or Computer Then To Outlook 2010 on an L&F Computer

More information

Insignia Flex Tablet (NS-14T004) FAQ. February 2014

Insignia Flex Tablet (NS-14T004) FAQ. February 2014 Insignia Flex Tablet (NS-14T004) FAQ February 2014 Setup... 2 Question 1: How do I set up my tablet for the first time?... 2 Android... 2 Question 2: What is Android Jelly Bean?... 2 Question 3: How are

More information

Intro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events, s, passwords, deleted data, and much more.

Intro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events,  s, passwords, deleted data, and much more. FAQ Intro Thank you for purchasing MOBILedit Forensic Express. This tool preforms mobile phone content extractions and is used by professionals in law enforcement, military as well as the corporate and

More information

The Cloud Meeting Company

The Cloud Meeting Company The Cloud Meeting Company Cloud Meetings 2015 Cloud Meetings 1980 s 1990 s 2000 s Cloud Video Conferencing Telephone Conferencing Hardware Video Conferencing Online Meetings Group Messaging Simple Online

More information

Introductory Visualizing Technology

Introductory Visualizing Technology Introductory Visualizing Technology Seventh Edition Chapter 6 Digital Devices and Multimedia Learning Objectives 6.1 Explain the Features of Digital Cameras 6.2 Compare Methods for Transferring Images

More information

NEED MORE HELP? GLENCOE PUBLIC LIBRARY. Glencoe Library Guidebooks: Mac Basics. Connect with us on social media!

NEED MORE HELP? GLENCOE PUBLIC LIBRARY. Glencoe Library Guidebooks: Mac Basics. Connect with us on social media! NEED MORE HELP? BOOK A LIBRARIAN Book a Librarian is a free service to Glencoe Public Library patrons. Patrons may make an appointment for individual assistance and instruction on how to use library resources

More information

Instruction How To Use Wifi Without Password Iphone 5

Instruction How To Use Wifi Without Password Iphone 5 Instruction How To Use Wifi Without Password Iphone 5 Jan 2, 2015. I had also tried to turn the control center but it asks me the password, again. ipod touch, ios 6.1.5 What to Do If You've Forgotten Your

More information