Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center

Size: px
Start display at page:

Download "Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center"

Transcription

1 Identifying and Seizing Electronic Evidence Tyler Wotring Director of Cyber Forensics National White Collar Crime Center

2 Cyber Forensics How does technology affect forensics? How does technology affect cyber forensics?

3 The Changing Face of Crime How has technology aided in these crimes? ID theft Counterfeit documents Credit card theft Child exploitation Shop-lifting Organized Crime

4 ID Theft Traditional Stolen mail, trash picking/dumpster diving Modern Phishing, stolen devices, malware Data breaches

5 Credit Card Theft Stolen records Physical or electronic Sold on the internet Skimming Device used to swipe and store credit card numbers Restaurants Bars 3 rd party Device overlaid on top of a real one Gas stations ATMs Transfer numbers to a New card

6 Counterfeit Documents Manual creation Mortgage documents Passports Automated Software programs Purchase of documents

7 Child Exploitation Anonymity Facebook Sharing of images/videos Websites Peer to Peer (P2P) Communication Chat rooms Texting Apps Storage Cloud Inexpensive media

8 Organized Crime Intelligence gathering Promoting criminal activity Communication Possibly stored Provoking others Uploaded photos GPS Potential leads

9 Threats and Roadblocks The Going Dark Phenomenon International Data Storage

10 Identifying and Seizing Preparation Preparing for a successful operation Recognition Identifying the devices capable of storing data Variety of shapes and sizes Preservation Preventing contamination/data loss Collection Best practices for handling and storing evidence

11 Pre-Seizure Considerations Gathering intelligence Identifying the tools and resources Legal Considerations

12 Gathering Intelligence Type of crime Type of evidence Tools needed Sophistication of the suspect Assistance on scene Different tools Location Home: animals, cameras, neighbors Business: create an image on scene? Resources Social media, Google, ISPs, utility companies

13 Digital Evidence Any information stored or transmitted in a digital format that can be of evidentiary value in a court proceeding. Photos Videos Documents Logs Etc, etc, etc

14 Roles of Digital Evidence Devices and digital evidence can have many roles in an investigation Target of the crime Tool of the crime Repository of the crime Fruit of the crime

15 Scope of the Problem How many devices are in use? How much data are these devices storing

16 Storage media

17 Internal Storage - Hard Disk Drive (HDD) Traditional internal storage for desktop and laptop computers Multiple connection types IDE SCSI SATA SAS Storage capacity Average Desktop ~1-2 TB Average Laptop ~ 512 GB 1 TB Current Max 12 TB

18 Internal Storage - Solid State Replacing traditional HDDs in laptops and high-end desktops Multiple connection types SATA msata M.2 PCI-Express Storage capacity Average ~ GB Current max 4 TB*

19 External Storage Flash Drives Available in wide variety of shapes, sizes, and colors Multiple connection types USB Micro USB USB-C Lightning Storage capacity Average ~32-64 GB Current max 2 TB

20 External Storage Flash Drives

21 External Storage Memory Cards Used in a wide variety of devices Mobile Phones Tablets Digital Cameras Video Cameras Drones Digital Photo Frames Many different types SD (full size, mini, micro) Compact Flash XQD Memory Stick Look for a Memory Card Reader!

22 External Storage Memory Cards Small or very small in physical size Maximum storage capacity SD GB MicroSD GB XQD GB Compact Flash GB

23 External Storage Portable Hard Drives Traditional HDD or solid state Multiple connection types USB USB-C FireWire Thunderbolt esata Wireless Storage capacity Average ~1 TB Current Max - 8 TB

24 External Storage Optical Media Compact Disc (CD) ~700 MB Digital Versatile Disc (DVD) ~4.7 GB Blu-Ray GB

25 Computing Devices

26 Global Computer Ownership (%) U.S. Russia Venezuela China Malaysia Thailand Average South Africa Philippines India Kenya Source: Spring 2014 Global Attitudes survey. Q148e. PEW RESEARCH CENTER

27 Global Mobile Phone Ownership (%) South Korea Australia Isreal U.S. Malaysia China Average South Africa Kenya Philippines India Source: Spring 2015 Global Attitudes survey. Q71 & Q72. PEW RESEARCH CENTER

28 Desktop Computers Multiple form factors Desktop Tower All-in-One Numerous manufacturers Lenovo HP Dell Apple ASUS Strong Do-It-Yourself (DIY) market

29 Desktop Computers Typical components Random access memory (RAM) Average ~4 8 GB AMD/NVIDIA graphics card Optical Drive (r/w) USB, USB-C ports Built-in card reader Internal storage Average ~1 2 TB

30 Laptop Computers Outselling desktop computers for many years Numerous manufacturers Lenovo HP Dell Apple Google Typical components RAM Average ~2 4 GB USB, USB-C ports Internal storage Average ~ GB

31 Mobile Phones Feature Phones Still holds majority ownership in many nations Standard cellular phone capabilities Calls Text messages Address Book Calendar Camera (maybe) Limited internal storage

32 Mobile Phones Smartphones Expanded capabilities of a feature phone High resolution video/photo camera Global Positioning System (GPS) WiFi connectivity Cloud storage Third party applications Messaging Social media Financial Two main platforms Android ~83% worldwide market share ios ~15% worldwide market share

33 Mobile Phones Smartphones Internal storage Average ~ GB External storage MicroSD Card USB, USB-C, or Lightning flash drives

34 Tablets Hybrid device combining smartphone and laptop functionality Three main platforms ios Microsoft Windows Android Internal storage Average ~ GB External storage External storage MicroSD Card USB, USB-C, or Lightning flash drives

35 Miscellaneous Devices

36 Wearables Various purposes and capabilities Smart Watches Fitness Trackers GPS Health

37 Digital Cameras From Point-and-Shoot to Digital SLR Some may have a small amount of internal storage Most use memory cards to expand storage Optional capabilities Video recording GPS WiFI

38 Video Cameras Some may have a small amount of internal storage External Storage Memory cards Hard drive Magnetic tape Optional capabilities Still shooting GPS WiFI

39 Gaming Devices Three main platforms Sony Playstation Microsoft Xbox Nintendo Switch Not just for gaming anymore Video and text chat Media streaming Web browsing Internal storage Xbox/Playstation ~1 TB Switch ~32 GB

40 Networking Devices Used to connect devices to each other and the Internet May have internal storage Can have logs of interest Connection logs Traffic logs

41 Wireless Surveillance Cameras Actively recording/streaming? Safety concerns Alerting person(s) of interest Storage May have internal storage External storage could be cloud, remote, or removable media

42 Internet of Things

43 Internet of Things (IoT) The network of physical devices, vehicles, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data.

44 IoT Personal Assistant Devices Google Home Amazon Echo Show Amazon Echo Amazon Echo Dot Apple HomePod

45 IoT Home Automation Video Doorbell Connected Detectors Smart Door Lock Connected Lighting Connected Thermostat

46 IoT Smart Televisions Built-in Streaming Boxes

47 What s Next?

48 Preservation

49 Acquire Volatile Data Collect data that may otherwise be lost or no longer available when power is removed Prioritize acquisition based on value, volatility, and/or the effort required to collect the data Be as unobtrusive as possible Document, document, document If on-scene examination is necessary: Performed by an experienced examiner Know what information is needed Know where to find the information

50 Order of Volatility Network connections Login sessions Contents of memory Running processes Open files Network configuration Operating system time

51 Acquire Volatile Data Develop a process/procedure Acquisition will be performed on a live system These actions will modify data Document all actions performed Use trusted tools to collect data Test and validate all tools and procedures

52 Documentation Traditional questions Who, what, where, when, why Ask suspect specific questions Passwords, red flags, hidden devices Photo, video, or sketch Entire scene Before and after Individual evidentiary items

53 Places to Search Don t forget core investigative processes Near the computer Username & passwords Plain sight Within reach Habitual Under the keyboard In the computer

54 Do I collect everything? Manual(s) Software Hardware Cables

55 Storing Electronic Evidence Secure location Limited access Climate controlled environment Prioritize evidence Low battery

56 U.S. National White Collar Crime Center Nearly 40 years of training and technical assistance experience Cybercrime Financial Investigations Intelligence Over 115,000 persons trained, and over 70,000 agencies represented Current offerings include over 30 cybercrime courses Face-to-Face Asynchronous online 24/7 platform Synchronous live virtual classroom capability Long standing history of public and private partnerships including U.S. State,Local, and Federal agencies, Microsoft, Apple, and Symantec

57 Tyler Wotring Director of Cyber Forensics National White Collar Crime Center

Buying a New Computer. Pete Rosendahl

Buying a New Computer. Pete Rosendahl Buying a New Computer Pete Rosendahl CAR vs COMPUTER Compact Mid Size SUV Luxury Economical Lifestyle Premium Ultra / Gamer CAR vs COMPUTER Engine 4, 6, 8 Cyl Horsepower Trunk Console AM / FM Radio CD

More information

What is Data Storage?

What is Data Storage? What is Data Storage? When we talk about storing data, we mean putting the data in a known place. We can later come back to that place and get our data back again. Writing data or saving data are other

More information

Easy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc

Easy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc EIT, Author Gay Robertson, 2016 Desktop PC Made up of system unit, keyboard, monitor, mouse Relatively cheap but not portable and take up a lot of space Are versatile You can add extras for speed or storage

More information

16/06/56. Secondary Storage. Secondary Storage. Secondary Storage The McGraw-Hill Companies, Inc. All rights reserved.

16/06/56. Secondary Storage. Secondary Storage. Secondary Storage The McGraw-Hill Companies, Inc. All rights reserved. Distinguish between primary and secondary storage. Discuss the important characteristics of secondary storage, including media, capacity, storage devices, and access speed. Describe hard disk platters,

More information

Measuring the impact of IoT. Alison Robart Director, Client Services

Measuring the impact of IoT. Alison Robart Director, Client Services Measuring the impact of IoT Alison Robart Director, Client Services Looking Ahead to the Voice Era July 2017 Alison Robart Director Client Insights comscore, Inc. For info about the proprietary technology

More information

Digital Evidence: I know it s there, how do I get it?

Digital Evidence: I know it s there, how do I get it? : I know it s there, how do I get it? January 24, 2019 Matthew Rollins Senior Assistant District Attorney Paulding County Judicial Circuit Josh Reed Network Intrusion Forensic Analyst United States Secret

More information

Discovering Computers Fundamentals, 2011 Edition. Living in a Digital World

Discovering Computers Fundamentals, 2011 Edition. Living in a Digital World Discovering Computers Fundamentals, 2011 Edition Living in a Digital World Objectives Overview Describe the characteristics of an internal hard disk including capacity, platters, read/write heads, cylinders,

More information

What computer? Or how do I choose the right computer

What computer? Or how do I choose the right computer What computer? Or how do I choose the right computer First question: what do you want to use a computer for? Read books Browse the internet Online shopping Send / receive emails. Access to government sites

More information

Jeff Langford, Principal Solutions Architect

Jeff Langford, Principal Solutions Architect FUTURE TECHNOLOGIES AND THEIR IMPACT ON THE JUSTICE COMMUNITY Jeff Langford, Principal Solutions Architect Operating Systems: Do We Care Anymore? HTML5: Browsers Are the Interface for Everything Search

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

Backing Up Your Data

Backing Up Your Data Backing Up Your Data Class Description A look at various ways to back up your precious data, whether pictures, videos, music, e-mail, or other documents. The 'Cloud' and online services, as well as do-it-yourself-and-maintain-control

More information

CSC 170 Introduction to Computers and Their Applications. Lecture #5 Storage and Input/Output. Storage Basics

CSC 170 Introduction to Computers and Their Applications. Lecture #5 Storage and Input/Output. Storage Basics CSC 170 Introduction to Computers and Their Applications Lecture #5 Storage and Input/Output Storage Basics Storage is a term used for the components of a digital device designed to hold data permanently.

More information

Unit 3 Part B. Computer Storage. Computer Technology

Unit 3 Part B. Computer Storage. Computer Technology Unit 3 Part B Computer Storage Computer Technology Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store) data The

More information

Buying New. Devices. Tech & Tea Seminar By CommuniTech

Buying New. Devices. Tech & Tea Seminar By CommuniTech Buying New Devices Tech & Tea Seminar By CommuniTech OUTLINE Laptops and Desktops Phones and Tablets Key words and phrases Comparison Sites 2 Do you know what kind of computer would suit you best? 3 TYPES

More information

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized

More information

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : FC0-U51 Title : CompTIA IT Fundamentals Vendor : CompTIA Version : DEMO Get Latest & Valid FC0-U51 Exam's Question

More information

Cambridge Nationals R001. Revision help (LO1)

Cambridge Nationals R001. Revision help (LO1) Cambridge Nationals R001 Revision help (LO1) Portable devices These are electronic devices that can be carried easily. Examples include: Laptops Netbooks Mobile phones Tablets (Ipad, Android Tablet) handheld

More information

Connected Consumer Survey

Connected Consumer Survey Connected Consumer Survey Source questions for data displayed on www.consumerbarometer.com NB question titles (in bold) are for ease of reading, they were not displayed to respondents Device usage Which,

More information

Storing Data and Pictures in the Cloud for Free

Storing Data and Pictures in the Cloud for Free Storing Data and Pictures in the Cloud for Free By Phil Goff Branch 116 November 15, 2012 1 Cloud Storage is the Future 2 Storing Data and Pictures in the Cloud for Free Not Intended as Primary Backup

More information

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au

More information

vinodsrivastava.wordpress.com

vinodsrivastava.wordpress.com vinodsrivastava.wordpress.com SECTION 3 STORAGE SYSTEM This Section you will learn about: BACK-UP STORAGE NEED OF BACK-UP ACCESSING DATA FROM STORAGE TYPE OF BACKUP(Secondary Storage) Devices o Magnetic-

More information

Definitions Know What I Mean?

Definitions Know What I Mean? Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their

More information

Introduction to Amazon Echo and Dot

Introduction to Amazon Echo and Dot Introduction to Amazon Echo and Dot Instructors David Kirsch CCHSV Programs Director Mary O Neill CCHSV Webmaster 1 Amazon Echo $179 Release date: November 6, 2014 Dimensions: 9.3 in. x 3.3 in. x 3.3 in.

More information

AVANTUS TRAINING PTE LTD

AVANTUS TRAINING PTE LTD [ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and

More information

Table of Contents. User Guide

Table of Contents. User Guide Table of Contents Locate Laptop Laptop Tracking & Data Security 2 Feature: 2 Port Locker Stop Information & File Leaks 3 Feature 3 BitDefender Internet Security Secure Your Every Bit 3 Feature: 3 PROTEGENT

More information

Objectives Overview. Chapter 7 Types of Storage. Instructor: M. Imran Khalil. MSc-IT 1st semester Fall Discovering Computers 2012

Objectives Overview. Chapter 7 Types of Storage. Instructor: M. Imran Khalil. MSc-IT 1st semester Fall Discovering Computers 2012 Chapter 7 Types of Storage Instructor: M. Imran Khalil MSc-IT 1 st Semester Fall 2016 Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Differentiate between storage

More information

Introductory Visualizing Technology

Introductory Visualizing Technology Introductory Visualizing Technology Seventh Edition Chapter 6 Digital Devices and Multimedia Learning Objectives 6.1 Explain the Features of Digital Cameras 6.2 Compare Methods for Transferring Images

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

Introduction. See page #6 for device requirements.

Introduction. See page #6 for device requirements. W-FI CAMERA USER MANUAL Contents Introduction 4 Camera LED Indicators 5 Wi-Fi Requirements 6 Mobile Device Requirements 6 Download the Momentum App 7 Create an Account 8 Setup 10 Pairing 10 Connecting

More information

1. Introduction P Package Contents 1.

1. Introduction P Package Contents 1. 1 Contents 1. Introduction ------------------------------------------------------------------------------- P. 3-5 1.1 Package Contents 1.2 Tablet Overview 2. Using the Tablet for the first time ---------------------------------------------------

More information

Grade 5 lesson 2 Computer storage and computer care and you

Grade 5 lesson 2 Computer storage and computer care and you Grade 5 lesson 2 Computer storage and computer care and you COMPUTER STORAGE 1 Storage is a means to hold and store data to present and future use. All computers have some sort of storage to function properly.

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

WriteProtect. WriteProtect - BAY WriteProtect - DESKTOP

WriteProtect. WriteProtect - BAY WriteProtect - DESKTOP WriteProtect WriteProtect - BAY WriteProtect - DESKTOP Who is Logicube? A leading manufacturer of forensic imaging solutions and hard disk duplication systems established in 1993 Headquarters in Chatsworth,

More information

Unit A: Computer and Internet Basics

Unit A: Computer and Internet Basics Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

Introducing. Introducing...

Introducing. Introducing... Introducing Introducing How PhotoFast EVO Plus is different It s the only flash drive that is cross platform The USB 3.0 is compatible with all USB based computers, and at the other end it works with ipod

More information

CLASSIFYING AND EVALUATING COMPUTERS

CLASSIFYING AND EVALUATING COMPUTERS CLASSIFYING AND EVALUATING COMPUTERS Objectives: Identify types of personal computers Describe desktop computers Compare laptops and tablets Evaluate smartphones Describe embedded computers Describe servers

More information

Product Tutorial HD MEDIA PLAYER. HD DIGITAL TV TUNER WITH RECORD FUNCTION SRT MPT

Product Tutorial HD MEDIA PLAYER.  HD DIGITAL TV TUNER WITH RECORD FUNCTION SRT MPT HD MEDIA PLAYER HD DIGITAL TV TUNER WITH RECORD FUNCTION SRT MPT Product Tutorial Dual Core, Android Operating system, Full Web Browserˆ Play HD Movies, music and photos on your HD TV, plays virtually

More information

Module 1 Concepts of Information and Communication Technology (ICT)

Module 1 Concepts of Information and Communication Technology (ICT) Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for

More information

The best for everyday PC users

The best for everyday PC users The best for everyday PC users 2019 ESET Internet Security delivers rock-solid protection for everyday web users, built on ESET s trademark best mix of detection, speed and usability. Legendary antivirus

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

BACK TO BASICS PART I. Hardware & it s Associated Terminology

BACK TO BASICS PART I. Hardware & it s Associated Terminology BACK TO BASICS PART I Hardware & it s Associated Terminology INTRODUCTION The purpose of this session is to review computer hardware & its associated terminology WHY? Everyone on the same page Better understanding

More information

Make security part of your client systems refresh

Make security part of your client systems refresh Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for

More information

This appendix provides definitions of terms discussed in this book. Terms are listed in alphabetical order. B. Glossary of Terms

This appendix provides definitions of terms discussed in this book. Terms are listed in alphabetical order. B. Glossary of Terms This appendix provides definitions of terms discussed in this book. Terms are listed in alphabetical order. B There are a number of terms listed throughout this book, and if you want to read a list of

More information

USER MANUAL FOR BODY WORM CAMERA OT-T07

USER MANUAL FOR BODY WORM CAMERA OT-T07 Content Overview... 3 Prompt Sounds:... 3 Status Mini LED... 5 Getting Started... 5 General informaion... 6 Minimum Requirements... 6 CAM MANAGER... 7 Different User Types:... 7 Setup... 8 DEMS Camera/Video

More information

Point of View SmartTV-500 Center - Android 4.2. General notices for use...2 Disclaimer...2 Box Contents...2

Point of View SmartTV-500 Center - Android 4.2. General notices for use...2 Disclaimer...2 Box Contents...2 Point of View SmartTV-500 Center - Android 4.2 English Table of Contents General notices for use...2 Disclaimer...2 Box Contents...2 1.0 Product basics...3 1.1 Buttons and connections... 3 1.2 Connecting

More information

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

1. Introduction P Package Contents 1.

1. Introduction P Package Contents 1. 1 Contents 1. Introduction ------------------------------------------------------------------------------- P. 3-5 1.1 Package Contents 1.2 Tablet Overview 2. Using the Tablet for the first time ---------------------------------------------------

More information

Features: (no need for QR Code)

Features: (no need for QR Code) The Capp-Sure series brings a revolution in surveillance. Utilising a range of high-quality IP Wireless cameras, Capp-Sure provides stunning video clarity and optional Talk-Back audio over internet via

More information

Home Automation: Survivor Privacy Risks & Strategies

Home Automation: Survivor Privacy Risks & Strategies Home Automation: Survivor Privacy Risks & Strategies Our homes, workplaces, and vehicles are rapidly being filled with smart and connected devices that promise to increase convenience, improve energy savings

More information

Thinkpad Esata Usb Secure Hard Drive

Thinkpad Esata Usb Secure Hard Drive Thinkpad Esata Usb Secure Hard Drive Instructions ThinkPad esata/usb Secure Hard Drive User Guide. Previous page Lenovo usb cd-rw/dvdrom combo ii drive user's guide (78 pages). Storage Lenovo. We spent

More information

Introduction to Android Tablets and Smartphones

Introduction to Android Tablets and Smartphones The name Android describes mobile devices which use the Android operating system developed by Google and used in many brands of Smartphones and Tablets types and models. Such as Samsung, Sony, Aldi, Huawie,

More information

Manual For Android Tablet gb Wifi Netbook 4gb

Manual For Android Tablet gb Wifi Netbook 4gb Manual For Android Tablet 4.0 32gb Wifi Netbook 4gb Shop Tablets, Windows Tablets, Android Tablets, Ipad from HP, Samsung, Bluetooth 4.0 (804) 32GB 12.2" 2560 x 1600 Touchscreen Tablet Android 4.4 (KitKat)

More information

2014 ISACA IT Risk/Reward Barometer US Consumer Results. October 2014

2014 ISACA IT Risk/Reward Barometer US Consumer Results. October 2014 2014 ISACA IT Risk/Reward Barometer US Consumer Results October 2014 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

1. Introduction. 1.1 Cosmo Specifications

1. Introduction. 1.1 Cosmo Specifications 1. Introduction 1.1 Cosmo Specifications Details CPU Memory Storage Operating System Connectivity Sensor Camera Display Video Formats Description Quad Core 1.3 GHz ARM Cortex A7 Processor 512MB RAM 8 GB

More information

Tutor Lead Session Image Storage and the Cloud.

Tutor Lead Session Image Storage and the Cloud. Tutor Lead Session Image Storage and the Cloud. Storage There are many different types of storage when it comes to backing up your photos and keeping them safe. This guide will explain a few of the different

More information

FUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER

FUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER FUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER Components of a personal computer - Summary Computer Case aluminium casing to store all components. Motherboard Central Processor Unit (CPU) Power supply

More information

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing

More information

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might

More information

Ebay used laptops computers for sale

Ebay used laptops computers for sale Ebay used laptops computers for sale Search Find great deals on ebay for used laptops for sale and used laptop 17'. Shop with confidence. Find great deals on ebay for Used Laptops in PC Laptops and Netbooks..

More information

The personal computer system uses the following hardware device types -

The personal computer system uses the following hardware device types - EIT, Author Gay Robertson, 2016 The personal computer system uses the following hardware device types - Input devices Input devices Processing devices Storage devices Processing Cycle Processing devices

More information

Protect Yourself From. Identify Theft

Protect Yourself From. Identify Theft Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain

More information

WI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL

WI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL WI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL Contents Introduction 4 Product Features 5 Garage Door Controller LED Indicators 6 What s Included 7 Wi-Fi Requirements 8 Mobile Device Requirements

More information

CarDVR-210 WiFi GPS. User Manual

CarDVR-210 WiFi GPS. User Manual CarDVR-210 WiFi GPS User Manual Names of Parts GPS Receiver Slot Lens Micro HDMI Port Speaker Tripod Mount LCD Panel Mic Status Indicator Micro USB Port microsd Card Slot Power/Menu Button Record Button

More information

FILE // MAGNAVOX BLU RAY PLAYER PRODUCTS MANUAL DOCUMENT

FILE // MAGNAVOX BLU RAY PLAYER PRODUCTS MANUAL DOCUMENT 21 December, 2017 FILE // MAGNAVOX BLU RAY PLAYER PRODUCTS MANUAL DOCUMENT Document Filetype: PDF 489.86 KB 0 FILE // MAGNAVOX BLU RAY PLAYER PRODUCTS MANUAL DOCUMENT Shop for Magnavox Blu-Ray Disc Player

More information

Chapter 0: IT Essentials Introduction Chapter 1: Introduction to the Personal Computer

Chapter 0: IT Essentials Introduction Chapter 1: Introduction to the Personal Computer Name Date Chapter 0: IT Essentials Introduction Chapter 1: Introduction to the Personal Computer After completion of this chapter, students should be able to: Explain IT industry certifications and technician

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information

More information

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social

More information

For this class we are going to create a file in Microsoft Word. Open Word on the desktop.

For this class we are going to create a file in Microsoft Word. Open Word on the desktop. File Management Windows 10 What is File Management? As you use your computer and create files you may need some help in storing and retrieving those files. File management shows you how to create, move,

More information

Introduction. Do you have any difficulty in choosing an ideal mobile phone?

Introduction. Do you have any difficulty in choosing an ideal mobile phone? IT Prefects Team Newsletter Vol.1 Introduction Do you have any difficulty in choosing an ideal mobile phone? Nowadays, using Smartphones has become a new trend in our society. Smartphones are not only

More information

Define each of the following computer terms. 1 Period 7 Lesson Computer Terms 1 Wallpaper 2 URL 3 Mainframe 4 Function Keys 5 Font 6 Paste 7 Paint

Define each of the following computer terms. 1 Period 7 Lesson Computer Terms 1 Wallpaper 2 URL 3 Mainframe 4 Function Keys 5 Font 6 Paste 7 Paint 1 Period 7 1 Wallpaper 2 URL 3 Mainframe 4 Function Keys 5 Font 6 Paste 7 Paint 8.pcx 9 External hard drive 10 Programmer 11 Power Supply 12 LAN 13 Operating system 14 CAD 15 Crash 16 Power Supply 17 Enable

More information

Copyright 2006 Prentice-Hall. All rights reserved. 1

Copyright 2006 Prentice-Hall. All rights reserved. 1 PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)

More information

Lesson 1: Computer Concepts

Lesson 1: Computer Concepts Lesson 1: Computer Concepts Learning Objectives After studying this lesson, you will be able to: Identify the basic parts of a computer system Describe the difference between random access memory and storage

More information

MOBILE WIRELESS SSD FOR PHOTOGRAPHERS BY PHOTOGRAPHERS. Guide for MPortable

MOBILE WIRELESS SSD FOR PHOTOGRAPHERS BY PHOTOGRAPHERS. Guide for MPortable MOBILE WIRELESS SSD FOR PHOTOGRAPHERS BY PHOTOGRAPHERS Guide for MPortable Contents 1 1.1 1.2 2. 2.1 2.2 2.3 3 3.1 3.2 4 5 5.1 5.2. 5.3 6 6.1 6.2 6.3 6.4 6.5 7 8 9 10 Overview What is the MPortable? Product

More information

User Operating Manual

User Operating Manual User Operating Manual Contents 1 Introduction... 1 1.1 Acknowledgements... 1 1.2 Safety Notice... 1 1.3 Abbreviation/term... 2 2 Brief Product Introduction... 3 2.1 Diagram for TABLET... 3 2.2 Introduction

More information

7 Touchscreen Tablet Quick Start Guide Model: V7TAB8S

7 Touchscreen Tablet Quick Start Guide Model: V7TAB8S 7 Touchscreen Tablet Quick Start Guide Model: V7TAB8S Important Information If you are experiencing a problem with the operation of this Tablet Do not return it to the retailer! Your Touchscreen Tablet

More information

Making Best Use of Your Tablet. Talk prepared by Angela Briggs February 2018

Making Best Use of Your Tablet. Talk prepared by Angela Briggs February 2018 Making Best Use of Your Tablet Talk prepared by Angela Briggs February 2018 Tablets are good for: Browsing the internet Sending emails Buying online Checking stuff Taking and editing photos Portability

More information

By Dr. Samaher Hussein Ali

By Dr. Samaher Hussein Ali Department of Information Networks The University of Babylon LECTURE NOTES ON Evolving Technology of Laptops By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Vicon VAX SYSTEM OVERVIEW. Web-Based, Power Over the Ethernet (POE) Access Control System.

Vicon VAX SYSTEM OVERVIEW. Web-Based, Power Over the Ethernet (POE) Access Control System. VAX Access Control VAX Components SYSTEM OVERVIEW Web-Based, Power Over the Ethernet (POE) Access Control System. POE Single Door Controller embedded with request to exit motion detector. POE Two Door

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

CSC1010 Spring 2013 Assignment 3 Chapter 7 and 8 Due: 4/8/2013. Name Student ID

CSC1010 Spring 2013 Assignment 3 Chapter 7 and 8 Due: 4/8/2013. Name Student ID CSC1010 Spring 2013 Assignment 3 Chapter 7 and 8 Due: 4/8/2013 Name Student ID All assignments will be done on an individual basis. Anyone found cheating and/or copying, in the instructor s opinion; will

More information

$ $ $999.99

$ $ $999.99 Products & Systems Our Desktop Systems are custom-built locally, maintained locally, and built for YOU! Why buy a custom-built system from Limes Computing? -All systems are custom-built to YOUR specifications.

More information

All In 1 Hdd Docking Windows 8 Driver >>>CLICK HERE<<<

All In 1 Hdd Docking Windows 8 Driver >>>CLICK HERE<<< All In 1 Hdd Docking Windows 8 Driver in general. I have a IB-120CL-U3, which is a Raidsonic Icy Box dock for 2 hdd's in a JBOD - setup. 1 person had this question Download and install drivers: windows.microsoft.com/enus/windows-8/all-drivers

More information

Built without compromise for users who want it all

Built without compromise for users who want it all Built without compromise for users who want it all 2019 Enjoy your digital life, secured by ESET s ultimate multilayered antimalware protection for all internet users, built on ESET s trademark best mix

More information

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. The Learning Objectives summarize the knowledge that learners should have gained by the time they

More information

Deloitte Global Mobile Consumer Survey India data, 2015

Deloitte Global Mobile Consumer Survey India data, 2015 Deloitte Global Mobile Consumer Survey India data, 2015 Deloitte Global Mobile Consumer Survey, 2015 1 Global Mobile Consumer Survey 2015: 6 continents, 31 countries, 49,500 respondents Norway Finland

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Google Now, Google Play,

More information

IT ESSENTIALS V. 4.1 Module 6 Fundamental Laptops and Portable Devices

IT ESSENTIALS V. 4.1 Module 6 Fundamental Laptops and Portable Devices IT ESSENTIALS V. 4.1 Module 6 Fundamental Laptops and Portable Devices 6.0 Introduction 1. What was the original laptop used by the Grid Compass 1101 astronauts in space missions in the early 80s? 2. What

More information

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Topics: Antivirus / DSSO/ Email Computer Backups Security On The Go Mobile Safety Your first line of defense

More information

HOME SECURITY KIT. USER MANUAL SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART MOTION SENSOR SMART IP CAM

HOME SECURITY KIT. USER MANUAL SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART MOTION SENSOR SMART IP CAM HOME SECURITY KIT. SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART IP CAM SMART MOTION SENSOR USER MANUAL SL-900100/900111 HOME SECURITY KIT A/B SHORT INSTRUCTION

More information

Advanced Topics In Hardware

Advanced Topics In Hardware Advanced Topics In Hardware You will learn the inner workings of the hardware components introduced in the previous section. Computer Buses: How Information Is Transmitted Carries information between the

More information

Mobile investment toolkit: Device selection considerations

Mobile investment toolkit: Device selection considerations Mobile investment toolkit: Device selection considerations Summary notes There are many mobile devices on the market today and the scope and capabilities of these devices will continue to change and improve

More information

Smart speakers (like the Amazon Echo shown here), appliances, and equipment connect to the Internet, allowing you to access information using voice

Smart speakers (like the Amazon Echo shown here), appliances, and equipment connect to the Internet, allowing you to access information using voice Smart speakers (like the Amazon Echo shown here), appliances, and equipment connect to the Internet, allowing you to access information using voice commands, or use your mobile device or computer as a

More information

VISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages

VISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages Rev.Confirming Pages VISUAL SUMMARY Information Technology, the Internet, and You INFORMATION SYSTEMS The way to think about a microcomputer is to realize that it is one part of an information system.

More information

ICT REVISION WORKSHEET YEAR 9

ICT REVISION WORKSHEET YEAR 9 ICT REVISION WORKSHEET YEAR 9 1. Identify the following device and state whether it is an input/output. Give one use of it. Device Input/output Use 2. Draw four lines on the diagram to match the use to

More information

St. Benedict s High School. Computing Science. Information Systems Design & Development. (Part 2 Computer Systems) National 5

St. Benedict s High School. Computing Science. Information Systems Design & Development. (Part 2 Computer Systems) National 5 Computing Science Information Systems Design & Development (Part 2 Computer Systems) National 5 Hardware & software Learning Intentions After studying this topic you should be able to understand and describe:

More information

EMBEDDED SYSTEMS AND MOBILE SYSTEMS

EMBEDDED SYSTEMS AND MOBILE SYSTEMS EMBEDDED SYSTEMS AND MOBILE SYSTEMS Embedded systems Sensors, actuators, devices 8-bit uc, sensors, actuators Mobile systems: Portable PC (powerfull, WiFi connected, heavy, cumbersome, about 4h of battery

More information