Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center
|
|
- Myrtle Greer
- 5 years ago
- Views:
Transcription
1 Identifying and Seizing Electronic Evidence Tyler Wotring Director of Cyber Forensics National White Collar Crime Center
2 Cyber Forensics How does technology affect forensics? How does technology affect cyber forensics?
3 The Changing Face of Crime How has technology aided in these crimes? ID theft Counterfeit documents Credit card theft Child exploitation Shop-lifting Organized Crime
4 ID Theft Traditional Stolen mail, trash picking/dumpster diving Modern Phishing, stolen devices, malware Data breaches
5 Credit Card Theft Stolen records Physical or electronic Sold on the internet Skimming Device used to swipe and store credit card numbers Restaurants Bars 3 rd party Device overlaid on top of a real one Gas stations ATMs Transfer numbers to a New card
6 Counterfeit Documents Manual creation Mortgage documents Passports Automated Software programs Purchase of documents
7 Child Exploitation Anonymity Facebook Sharing of images/videos Websites Peer to Peer (P2P) Communication Chat rooms Texting Apps Storage Cloud Inexpensive media
8 Organized Crime Intelligence gathering Promoting criminal activity Communication Possibly stored Provoking others Uploaded photos GPS Potential leads
9 Threats and Roadblocks The Going Dark Phenomenon International Data Storage
10 Identifying and Seizing Preparation Preparing for a successful operation Recognition Identifying the devices capable of storing data Variety of shapes and sizes Preservation Preventing contamination/data loss Collection Best practices for handling and storing evidence
11 Pre-Seizure Considerations Gathering intelligence Identifying the tools and resources Legal Considerations
12 Gathering Intelligence Type of crime Type of evidence Tools needed Sophistication of the suspect Assistance on scene Different tools Location Home: animals, cameras, neighbors Business: create an image on scene? Resources Social media, Google, ISPs, utility companies
13 Digital Evidence Any information stored or transmitted in a digital format that can be of evidentiary value in a court proceeding. Photos Videos Documents Logs Etc, etc, etc
14 Roles of Digital Evidence Devices and digital evidence can have many roles in an investigation Target of the crime Tool of the crime Repository of the crime Fruit of the crime
15 Scope of the Problem How many devices are in use? How much data are these devices storing
16 Storage media
17 Internal Storage - Hard Disk Drive (HDD) Traditional internal storage for desktop and laptop computers Multiple connection types IDE SCSI SATA SAS Storage capacity Average Desktop ~1-2 TB Average Laptop ~ 512 GB 1 TB Current Max 12 TB
18 Internal Storage - Solid State Replacing traditional HDDs in laptops and high-end desktops Multiple connection types SATA msata M.2 PCI-Express Storage capacity Average ~ GB Current max 4 TB*
19 External Storage Flash Drives Available in wide variety of shapes, sizes, and colors Multiple connection types USB Micro USB USB-C Lightning Storage capacity Average ~32-64 GB Current max 2 TB
20 External Storage Flash Drives
21 External Storage Memory Cards Used in a wide variety of devices Mobile Phones Tablets Digital Cameras Video Cameras Drones Digital Photo Frames Many different types SD (full size, mini, micro) Compact Flash XQD Memory Stick Look for a Memory Card Reader!
22 External Storage Memory Cards Small or very small in physical size Maximum storage capacity SD GB MicroSD GB XQD GB Compact Flash GB
23 External Storage Portable Hard Drives Traditional HDD or solid state Multiple connection types USB USB-C FireWire Thunderbolt esata Wireless Storage capacity Average ~1 TB Current Max - 8 TB
24 External Storage Optical Media Compact Disc (CD) ~700 MB Digital Versatile Disc (DVD) ~4.7 GB Blu-Ray GB
25 Computing Devices
26 Global Computer Ownership (%) U.S. Russia Venezuela China Malaysia Thailand Average South Africa Philippines India Kenya Source: Spring 2014 Global Attitudes survey. Q148e. PEW RESEARCH CENTER
27 Global Mobile Phone Ownership (%) South Korea Australia Isreal U.S. Malaysia China Average South Africa Kenya Philippines India Source: Spring 2015 Global Attitudes survey. Q71 & Q72. PEW RESEARCH CENTER
28 Desktop Computers Multiple form factors Desktop Tower All-in-One Numerous manufacturers Lenovo HP Dell Apple ASUS Strong Do-It-Yourself (DIY) market
29 Desktop Computers Typical components Random access memory (RAM) Average ~4 8 GB AMD/NVIDIA graphics card Optical Drive (r/w) USB, USB-C ports Built-in card reader Internal storage Average ~1 2 TB
30 Laptop Computers Outselling desktop computers for many years Numerous manufacturers Lenovo HP Dell Apple Google Typical components RAM Average ~2 4 GB USB, USB-C ports Internal storage Average ~ GB
31 Mobile Phones Feature Phones Still holds majority ownership in many nations Standard cellular phone capabilities Calls Text messages Address Book Calendar Camera (maybe) Limited internal storage
32 Mobile Phones Smartphones Expanded capabilities of a feature phone High resolution video/photo camera Global Positioning System (GPS) WiFi connectivity Cloud storage Third party applications Messaging Social media Financial Two main platforms Android ~83% worldwide market share ios ~15% worldwide market share
33 Mobile Phones Smartphones Internal storage Average ~ GB External storage MicroSD Card USB, USB-C, or Lightning flash drives
34 Tablets Hybrid device combining smartphone and laptop functionality Three main platforms ios Microsoft Windows Android Internal storage Average ~ GB External storage External storage MicroSD Card USB, USB-C, or Lightning flash drives
35 Miscellaneous Devices
36 Wearables Various purposes and capabilities Smart Watches Fitness Trackers GPS Health
37 Digital Cameras From Point-and-Shoot to Digital SLR Some may have a small amount of internal storage Most use memory cards to expand storage Optional capabilities Video recording GPS WiFI
38 Video Cameras Some may have a small amount of internal storage External Storage Memory cards Hard drive Magnetic tape Optional capabilities Still shooting GPS WiFI
39 Gaming Devices Three main platforms Sony Playstation Microsoft Xbox Nintendo Switch Not just for gaming anymore Video and text chat Media streaming Web browsing Internal storage Xbox/Playstation ~1 TB Switch ~32 GB
40 Networking Devices Used to connect devices to each other and the Internet May have internal storage Can have logs of interest Connection logs Traffic logs
41 Wireless Surveillance Cameras Actively recording/streaming? Safety concerns Alerting person(s) of interest Storage May have internal storage External storage could be cloud, remote, or removable media
42 Internet of Things
43 Internet of Things (IoT) The network of physical devices, vehicles, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data.
44 IoT Personal Assistant Devices Google Home Amazon Echo Show Amazon Echo Amazon Echo Dot Apple HomePod
45 IoT Home Automation Video Doorbell Connected Detectors Smart Door Lock Connected Lighting Connected Thermostat
46 IoT Smart Televisions Built-in Streaming Boxes
47 What s Next?
48 Preservation
49 Acquire Volatile Data Collect data that may otherwise be lost or no longer available when power is removed Prioritize acquisition based on value, volatility, and/or the effort required to collect the data Be as unobtrusive as possible Document, document, document If on-scene examination is necessary: Performed by an experienced examiner Know what information is needed Know where to find the information
50 Order of Volatility Network connections Login sessions Contents of memory Running processes Open files Network configuration Operating system time
51 Acquire Volatile Data Develop a process/procedure Acquisition will be performed on a live system These actions will modify data Document all actions performed Use trusted tools to collect data Test and validate all tools and procedures
52 Documentation Traditional questions Who, what, where, when, why Ask suspect specific questions Passwords, red flags, hidden devices Photo, video, or sketch Entire scene Before and after Individual evidentiary items
53 Places to Search Don t forget core investigative processes Near the computer Username & passwords Plain sight Within reach Habitual Under the keyboard In the computer
54 Do I collect everything? Manual(s) Software Hardware Cables
55 Storing Electronic Evidence Secure location Limited access Climate controlled environment Prioritize evidence Low battery
56 U.S. National White Collar Crime Center Nearly 40 years of training and technical assistance experience Cybercrime Financial Investigations Intelligence Over 115,000 persons trained, and over 70,000 agencies represented Current offerings include over 30 cybercrime courses Face-to-Face Asynchronous online 24/7 platform Synchronous live virtual classroom capability Long standing history of public and private partnerships including U.S. State,Local, and Federal agencies, Microsoft, Apple, and Symantec
57 Tyler Wotring Director of Cyber Forensics National White Collar Crime Center
Buying a New Computer. Pete Rosendahl
Buying a New Computer Pete Rosendahl CAR vs COMPUTER Compact Mid Size SUV Luxury Economical Lifestyle Premium Ultra / Gamer CAR vs COMPUTER Engine 4, 6, 8 Cyl Horsepower Trunk Console AM / FM Radio CD
More informationWhat is Data Storage?
What is Data Storage? When we talk about storing data, we mean putting the data in a known place. We can later come back to that place and get our data back again. Writing data or saving data are other
More informationEasy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc
EIT, Author Gay Robertson, 2016 Desktop PC Made up of system unit, keyboard, monitor, mouse Relatively cheap but not portable and take up a lot of space Are versatile You can add extras for speed or storage
More information16/06/56. Secondary Storage. Secondary Storage. Secondary Storage The McGraw-Hill Companies, Inc. All rights reserved.
Distinguish between primary and secondary storage. Discuss the important characteristics of secondary storage, including media, capacity, storage devices, and access speed. Describe hard disk platters,
More informationMeasuring the impact of IoT. Alison Robart Director, Client Services
Measuring the impact of IoT Alison Robart Director, Client Services Looking Ahead to the Voice Era July 2017 Alison Robart Director Client Insights comscore, Inc. For info about the proprietary technology
More informationDigital Evidence: I know it s there, how do I get it?
: I know it s there, how do I get it? January 24, 2019 Matthew Rollins Senior Assistant District Attorney Paulding County Judicial Circuit Josh Reed Network Intrusion Forensic Analyst United States Secret
More informationDiscovering Computers Fundamentals, 2011 Edition. Living in a Digital World
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World Objectives Overview Describe the characteristics of an internal hard disk including capacity, platters, read/write heads, cylinders,
More informationWhat computer? Or how do I choose the right computer
What computer? Or how do I choose the right computer First question: what do you want to use a computer for? Read books Browse the internet Online shopping Send / receive emails. Access to government sites
More informationJeff Langford, Principal Solutions Architect
FUTURE TECHNOLOGIES AND THEIR IMPACT ON THE JUSTICE COMMUNITY Jeff Langford, Principal Solutions Architect Operating Systems: Do We Care Anymore? HTML5: Browsers Are the Interface for Everything Search
More informationSECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti
SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external
More informationBacking Up Your Data
Backing Up Your Data Class Description A look at various ways to back up your precious data, whether pictures, videos, music, e-mail, or other documents. The 'Cloud' and online services, as well as do-it-yourself-and-maintain-control
More informationCSC 170 Introduction to Computers and Their Applications. Lecture #5 Storage and Input/Output. Storage Basics
CSC 170 Introduction to Computers and Their Applications Lecture #5 Storage and Input/Output Storage Basics Storage is a term used for the components of a digital device designed to hold data permanently.
More informationUnit 3 Part B. Computer Storage. Computer Technology
Unit 3 Part B Computer Storage Computer Technology Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store) data The
More informationBuying New. Devices. Tech & Tea Seminar By CommuniTech
Buying New Devices Tech & Tea Seminar By CommuniTech OUTLINE Laptops and Desktops Phones and Tablets Key words and phrases Comparison Sites 2 Do you know what kind of computer would suit you best? 3 TYPES
More informationHow technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011
How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized
More informationDigital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma
Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair
More informationITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!
ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : FC0-U51 Title : CompTIA IT Fundamentals Vendor : CompTIA Version : DEMO Get Latest & Valid FC0-U51 Exam's Question
More informationCambridge Nationals R001. Revision help (LO1)
Cambridge Nationals R001 Revision help (LO1) Portable devices These are electronic devices that can be carried easily. Examples include: Laptops Netbooks Mobile phones Tablets (Ipad, Android Tablet) handheld
More informationConnected Consumer Survey
Connected Consumer Survey Source questions for data displayed on www.consumerbarometer.com NB question titles (in bold) are for ease of reading, they were not displayed to respondents Device usage Which,
More informationStoring Data and Pictures in the Cloud for Free
Storing Data and Pictures in the Cloud for Free By Phil Goff Branch 116 November 15, 2012 1 Cloud Storage is the Future 2 Storing Data and Pictures in the Cloud for Free Not Intended as Primary Backup
More informationDuncanPowell RESTRUCTURING TURNAROUND FORENSIC
Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au
More informationvinodsrivastava.wordpress.com
vinodsrivastava.wordpress.com SECTION 3 STORAGE SYSTEM This Section you will learn about: BACK-UP STORAGE NEED OF BACK-UP ACCESSING DATA FROM STORAGE TYPE OF BACKUP(Secondary Storage) Devices o Magnetic-
More informationDefinitions Know What I Mean?
Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their
More informationIntroduction to Amazon Echo and Dot
Introduction to Amazon Echo and Dot Instructors David Kirsch CCHSV Programs Director Mary O Neill CCHSV Webmaster 1 Amazon Echo $179 Release date: November 6, 2014 Dimensions: 9.3 in. x 3.3 in. x 3.3 in.
More informationAVANTUS TRAINING PTE LTD
[ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and
More informationTable of Contents. User Guide
Table of Contents Locate Laptop Laptop Tracking & Data Security 2 Feature: 2 Port Locker Stop Information & File Leaks 3 Feature 3 BitDefender Internet Security Secure Your Every Bit 3 Feature: 3 PROTEGENT
More informationObjectives Overview. Chapter 7 Types of Storage. Instructor: M. Imran Khalil. MSc-IT 1st semester Fall Discovering Computers 2012
Chapter 7 Types of Storage Instructor: M. Imran Khalil MSc-IT 1 st Semester Fall 2016 Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Differentiate between storage
More informationIntroductory Visualizing Technology
Introductory Visualizing Technology Seventh Edition Chapter 6 Digital Devices and Multimedia Learning Objectives 6.1 Explain the Features of Digital Cameras 6.2 Compare Methods for Transferring Images
More informationThe Use of Technology to Enhance Investigation
The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source
More informationIntroduction. See page #6 for device requirements.
W-FI CAMERA USER MANUAL Contents Introduction 4 Camera LED Indicators 5 Wi-Fi Requirements 6 Mobile Device Requirements 6 Download the Momentum App 7 Create an Account 8 Setup 10 Pairing 10 Connecting
More information1. Introduction P Package Contents 1.
1 Contents 1. Introduction ------------------------------------------------------------------------------- P. 3-5 1.1 Package Contents 1.2 Tablet Overview 2. Using the Tablet for the first time ---------------------------------------------------
More informationGrade 5 lesson 2 Computer storage and computer care and you
Grade 5 lesson 2 Computer storage and computer care and you COMPUTER STORAGE 1 Storage is a means to hold and store data to present and future use. All computers have some sort of storage to function properly.
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationWriteProtect. WriteProtect - BAY WriteProtect - DESKTOP
WriteProtect WriteProtect - BAY WriteProtect - DESKTOP Who is Logicube? A leading manufacturer of forensic imaging solutions and hard disk duplication systems established in 1993 Headquarters in Chatsworth,
More informationUnit A: Computer and Internet Basics
Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationIntroducing. Introducing...
Introducing Introducing How PhotoFast EVO Plus is different It s the only flash drive that is cross platform The USB 3.0 is compatible with all USB based computers, and at the other end it works with ipod
More informationCLASSIFYING AND EVALUATING COMPUTERS
CLASSIFYING AND EVALUATING COMPUTERS Objectives: Identify types of personal computers Describe desktop computers Compare laptops and tablets Evaluate smartphones Describe embedded computers Describe servers
More informationProduct Tutorial HD MEDIA PLAYER. HD DIGITAL TV TUNER WITH RECORD FUNCTION SRT MPT
HD MEDIA PLAYER HD DIGITAL TV TUNER WITH RECORD FUNCTION SRT MPT Product Tutorial Dual Core, Android Operating system, Full Web Browserˆ Play HD Movies, music and photos on your HD TV, plays virtually
More informationModule 1 Concepts of Information and Communication Technology (ICT)
Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for
More informationThe best for everyday PC users
The best for everyday PC users 2019 ESET Internet Security delivers rock-solid protection for everyday web users, built on ESET s trademark best mix of detection, speed and usability. Legendary antivirus
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationBACK TO BASICS PART I. Hardware & it s Associated Terminology
BACK TO BASICS PART I Hardware & it s Associated Terminology INTRODUCTION The purpose of this session is to review computer hardware & its associated terminology WHY? Everyone on the same page Better understanding
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationThis appendix provides definitions of terms discussed in this book. Terms are listed in alphabetical order. B. Glossary of Terms
This appendix provides definitions of terms discussed in this book. Terms are listed in alphabetical order. B There are a number of terms listed throughout this book, and if you want to read a list of
More informationUSER MANUAL FOR BODY WORM CAMERA OT-T07
Content Overview... 3 Prompt Sounds:... 3 Status Mini LED... 5 Getting Started... 5 General informaion... 6 Minimum Requirements... 6 CAM MANAGER... 7 Different User Types:... 7 Setup... 8 DEMS Camera/Video
More informationPoint of View SmartTV-500 Center - Android 4.2. General notices for use...2 Disclaimer...2 Box Contents...2
Point of View SmartTV-500 Center - Android 4.2 English Table of Contents General notices for use...2 Disclaimer...2 Box Contents...2 1.0 Product basics...3 1.1 Buttons and connections... 3 1.2 Connecting
More informationMobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014
Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More information1. Introduction P Package Contents 1.
1 Contents 1. Introduction ------------------------------------------------------------------------------- P. 3-5 1.1 Package Contents 1.2 Tablet Overview 2. Using the Tablet for the first time ---------------------------------------------------
More informationFeatures: (no need for QR Code)
The Capp-Sure series brings a revolution in surveillance. Utilising a range of high-quality IP Wireless cameras, Capp-Sure provides stunning video clarity and optional Talk-Back audio over internet via
More informationHome Automation: Survivor Privacy Risks & Strategies
Home Automation: Survivor Privacy Risks & Strategies Our homes, workplaces, and vehicles are rapidly being filled with smart and connected devices that promise to increase convenience, improve energy savings
More informationThinkpad Esata Usb Secure Hard Drive
Thinkpad Esata Usb Secure Hard Drive Instructions ThinkPad esata/usb Secure Hard Drive User Guide. Previous page Lenovo usb cd-rw/dvdrom combo ii drive user's guide (78 pages). Storage Lenovo. We spent
More informationIntroduction to Android Tablets and Smartphones
The name Android describes mobile devices which use the Android operating system developed by Google and used in many brands of Smartphones and Tablets types and models. Such as Samsung, Sony, Aldi, Huawie,
More informationManual For Android Tablet gb Wifi Netbook 4gb
Manual For Android Tablet 4.0 32gb Wifi Netbook 4gb Shop Tablets, Windows Tablets, Android Tablets, Ipad from HP, Samsung, Bluetooth 4.0 (804) 32GB 12.2" 2560 x 1600 Touchscreen Tablet Android 4.4 (KitKat)
More information2014 ISACA IT Risk/Reward Barometer US Consumer Results. October 2014
2014 ISACA IT Risk/Reward Barometer US Consumer Results October 2014 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,
More informationCOMPUTER HACKING Forensic Investigator
COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach
More information1. Introduction. 1.1 Cosmo Specifications
1. Introduction 1.1 Cosmo Specifications Details CPU Memory Storage Operating System Connectivity Sensor Camera Display Video Formats Description Quad Core 1.3 GHz ARM Cortex A7 Processor 512MB RAM 8 GB
More informationTutor Lead Session Image Storage and the Cloud.
Tutor Lead Session Image Storage and the Cloud. Storage There are many different types of storage when it comes to backing up your photos and keeping them safe. This guide will explain a few of the different
More informationFUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER
FUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER Components of a personal computer - Summary Computer Case aluminium casing to store all components. Motherboard Central Processor Unit (CPU) Power supply
More informationSSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia
SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing
More informationMobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter
Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might
More informationEbay used laptops computers for sale
Ebay used laptops computers for sale Search Find great deals on ebay for used laptops for sale and used laptop 17'. Shop with confidence. Find great deals on ebay for Used Laptops in PC Laptops and Netbooks..
More informationThe personal computer system uses the following hardware device types -
EIT, Author Gay Robertson, 2016 The personal computer system uses the following hardware device types - Input devices Input devices Processing devices Storage devices Processing Cycle Processing devices
More informationProtect Yourself From. Identify Theft
Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain
More informationWI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL
WI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL Contents Introduction 4 Product Features 5 Garage Door Controller LED Indicators 6 What s Included 7 Wi-Fi Requirements 8 Mobile Device Requirements
More informationCarDVR-210 WiFi GPS. User Manual
CarDVR-210 WiFi GPS User Manual Names of Parts GPS Receiver Slot Lens Micro HDMI Port Speaker Tripod Mount LCD Panel Mic Status Indicator Micro USB Port microsd Card Slot Power/Menu Button Record Button
More informationFILE // MAGNAVOX BLU RAY PLAYER PRODUCTS MANUAL DOCUMENT
21 December, 2017 FILE // MAGNAVOX BLU RAY PLAYER PRODUCTS MANUAL DOCUMENT Document Filetype: PDF 489.86 KB 0 FILE // MAGNAVOX BLU RAY PLAYER PRODUCTS MANUAL DOCUMENT Shop for Magnavox Blu-Ray Disc Player
More informationChapter 0: IT Essentials Introduction Chapter 1: Introduction to the Personal Computer
Name Date Chapter 0: IT Essentials Introduction Chapter 1: Introduction to the Personal Computer After completion of this chapter, students should be able to: Explain IT industry certifications and technician
More informationUlster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information
More informationDiscount Kaspersky PURE 3.0 internet download software for windows 8 ]
Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social
More informationFor this class we are going to create a file in Microsoft Word. Open Word on the desktop.
File Management Windows 10 What is File Management? As you use your computer and create files you may need some help in storing and retrieving those files. File management shows you how to create, move,
More informationIntroduction. Do you have any difficulty in choosing an ideal mobile phone?
IT Prefects Team Newsletter Vol.1 Introduction Do you have any difficulty in choosing an ideal mobile phone? Nowadays, using Smartphones has become a new trend in our society. Smartphones are not only
More informationDefine each of the following computer terms. 1 Period 7 Lesson Computer Terms 1 Wallpaper 2 URL 3 Mainframe 4 Function Keys 5 Font 6 Paste 7 Paint
1 Period 7 1 Wallpaper 2 URL 3 Mainframe 4 Function Keys 5 Font 6 Paste 7 Paint 8.pcx 9 External hard drive 10 Programmer 11 Power Supply 12 LAN 13 Operating system 14 CAD 15 Crash 16 Power Supply 17 Enable
More informationCopyright 2006 Prentice-Hall. All rights reserved. 1
PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)
More informationLesson 1: Computer Concepts
Lesson 1: Computer Concepts Learning Objectives After studying this lesson, you will be able to: Identify the basic parts of a computer system Describe the difference between random access memory and storage
More informationMOBILE WIRELESS SSD FOR PHOTOGRAPHERS BY PHOTOGRAPHERS. Guide for MPortable
MOBILE WIRELESS SSD FOR PHOTOGRAPHERS BY PHOTOGRAPHERS Guide for MPortable Contents 1 1.1 1.2 2. 2.1 2.2 2.3 3 3.1 3.2 4 5 5.1 5.2. 5.3 6 6.1 6.2 6.3 6.4 6.5 7 8 9 10 Overview What is the MPortable? Product
More informationUser Operating Manual
User Operating Manual Contents 1 Introduction... 1 1.1 Acknowledgements... 1 1.2 Safety Notice... 1 1.3 Abbreviation/term... 2 2 Brief Product Introduction... 3 2.1 Diagram for TABLET... 3 2.2 Introduction
More information7 Touchscreen Tablet Quick Start Guide Model: V7TAB8S
7 Touchscreen Tablet Quick Start Guide Model: V7TAB8S Important Information If you are experiencing a problem with the operation of this Tablet Do not return it to the retailer! Your Touchscreen Tablet
More informationMaking Best Use of Your Tablet. Talk prepared by Angela Briggs February 2018
Making Best Use of Your Tablet Talk prepared by Angela Briggs February 2018 Tablets are good for: Browsing the internet Sending emails Buying online Checking stuff Taking and editing photos Portability
More informationBy Dr. Samaher Hussein Ali
Department of Information Networks The University of Babylon LECTURE NOTES ON Evolving Technology of Laptops By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationVicon VAX SYSTEM OVERVIEW. Web-Based, Power Over the Ethernet (POE) Access Control System.
VAX Access Control VAX Components SYSTEM OVERVIEW Web-Based, Power Over the Ethernet (POE) Access Control System. POE Single Door Controller embedded with request to exit motion detector. POE Two Door
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationCSC1010 Spring 2013 Assignment 3 Chapter 7 and 8 Due: 4/8/2013. Name Student ID
CSC1010 Spring 2013 Assignment 3 Chapter 7 and 8 Due: 4/8/2013 Name Student ID All assignments will be done on an individual basis. Anyone found cheating and/or copying, in the instructor s opinion; will
More information$ $ $999.99
Products & Systems Our Desktop Systems are custom-built locally, maintained locally, and built for YOU! Why buy a custom-built system from Limes Computing? -All systems are custom-built to YOUR specifications.
More informationAll In 1 Hdd Docking Windows 8 Driver >>>CLICK HERE<<<
All In 1 Hdd Docking Windows 8 Driver in general. I have a IB-120CL-U3, which is a Raidsonic Icy Box dock for 2 hdd's in a JBOD - setup. 1 person had this question Download and install drivers: windows.microsoft.com/enus/windows-8/all-drivers
More informationBuilt without compromise for users who want it all
Built without compromise for users who want it all 2019 Enjoy your digital life, secured by ESET s ultimate multilayered antimalware protection for all internet users, built on ESET s trademark best mix
More informationHave a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.
This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. The Learning Objectives summarize the knowledge that learners should have gained by the time they
More informationDeloitte Global Mobile Consumer Survey India data, 2015
Deloitte Global Mobile Consumer Survey India data, 2015 Deloitte Global Mobile Consumer Survey, 2015 1 Global Mobile Consumer Survey 2015: 6 continents, 31 countries, 49,500 respondents Norway Finland
More informationThis guide describes features that are common to most models. Some features may not be available on your tablet.
User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Google Now, Google Play,
More informationIT ESSENTIALS V. 4.1 Module 6 Fundamental Laptops and Portable Devices
IT ESSENTIALS V. 4.1 Module 6 Fundamental Laptops and Portable Devices 6.0 Introduction 1. What was the original laptop used by the Grid Compass 1101 astronauts in space missions in the early 80s? 2. What
More informationCybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )
Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Topics: Antivirus / DSSO/ Email Computer Backups Security On The Go Mobile Safety Your first line of defense
More informationHOME SECURITY KIT. USER MANUAL SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART MOTION SENSOR SMART IP CAM
HOME SECURITY KIT. SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART IP CAM SMART MOTION SENSOR USER MANUAL SL-900100/900111 HOME SECURITY KIT A/B SHORT INSTRUCTION
More informationAdvanced Topics In Hardware
Advanced Topics In Hardware You will learn the inner workings of the hardware components introduced in the previous section. Computer Buses: How Information Is Transmitted Carries information between the
More informationMobile investment toolkit: Device selection considerations
Mobile investment toolkit: Device selection considerations Summary notes There are many mobile devices on the market today and the scope and capabilities of these devices will continue to change and improve
More informationSmart speakers (like the Amazon Echo shown here), appliances, and equipment connect to the Internet, allowing you to access information using voice
Smart speakers (like the Amazon Echo shown here), appliances, and equipment connect to the Internet, allowing you to access information using voice commands, or use your mobile device or computer as a
More informationVISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages
Rev.Confirming Pages VISUAL SUMMARY Information Technology, the Internet, and You INFORMATION SYSTEMS The way to think about a microcomputer is to realize that it is one part of an information system.
More informationICT REVISION WORKSHEET YEAR 9
ICT REVISION WORKSHEET YEAR 9 1. Identify the following device and state whether it is an input/output. Give one use of it. Device Input/output Use 2. Draw four lines on the diagram to match the use to
More informationSt. Benedict s High School. Computing Science. Information Systems Design & Development. (Part 2 Computer Systems) National 5
Computing Science Information Systems Design & Development (Part 2 Computer Systems) National 5 Hardware & software Learning Intentions After studying this topic you should be able to understand and describe:
More informationEMBEDDED SYSTEMS AND MOBILE SYSTEMS
EMBEDDED SYSTEMS AND MOBILE SYSTEMS Embedded systems Sensors, actuators, devices 8-bit uc, sensors, actuators Mobile systems: Portable PC (powerfull, WiFi connected, heavy, cumbersome, about 4h of battery
More information