SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Forensic Computer Techniques
How to Identify Useful Data and Secure a
Chain of Custody

Frederick S. Lane
NASDTEC/Professional Practices Institute
Boise, ID
24 October 2013
www.FrederickLane.com

www.ComputerForensicsDigest.com
Background and Expertise
• Attorney and Author of 7
Books
• Computer Forensics
Expert -- 15 years
• Over 100 criminal cases
• Lecturer on ComputerRelated Topics – 20+
years
• Computer user
(midframes, desktops,
laptops) – 35+ years
• 10 yrs on Burlington VT
School Board
From VT to Brooklyn
Current Projects
• Cybertraps for Educators (2014)
• Safe Student and School Employee
Relationships (2014)
• Cybertraps.wordpress.com
• CPCaseDigest.com
• MessageSafe.com
• Informational Web Sites:
• www.FrederickLane.com
• www.ComputerForensicsDigest.com
• www.CybertrapsfortheYoung.com
Lecture Overview
Pre-Incident Preparation
Common Types of Incidents
Electronic Evidence Is Everywhere
Response to Civil Litigation
Response to Criminal Activity
Risks for Administrators and
Teachers
• A Quick Intro to Computer
Forensics
•
•
•
•
•
•
Pre-Incident Preparation
• Policies and Procedures
•
•
•

District Decisions re Access, Services, Storage
AUPs for Staff and Students
Data Handling and Response Protocols

• Professional Development for Teachers
and Staff
•
•
•

Typically First Responders
Potential Legal Risks
Technology Is Continually Changing

• Student Education
•

Critical Component of K-12 Curricula
Common Types of Incidents
• Employment Issues
• Harassment/Hostile Work Environment
• Disciplinary Issues

• Student Misconduct
• Cyberbullying & Cyberharassment
• Sexting

• Teacher/Student Misconduct
• Student Attacks on Teachers
• Inappropriate Relationships
E-Evidence Is Everywhere
• Inventory Possible Devices
•
•
•

Computers (Desktops, Laptops, Servers)
Mobile Devices (Phones, Tablets)
Peripherals (USBs, CDs, external drives, etc.)

• Inventory Possible Types of Data
•
•
•
•
•
•

Communication (E-Mail, IMs, Texts, etc.)
Social Media (Facebook, Twitter, etc.)
Web Activity (URLs, cookies, bookmarks, etc.)
Network Logs and Access Data
Cloud Storage (Dropbox, Flickr, Boxy, etc.)
Deleted Data
Whose Data Is It Anyway?
• Where Did the Incident Occur?
•
•

On-Campus vs. Off-Campus
Zone of District Responsibility Is Growing

• Who Owns and Uses the Device?
•
•

Misconduct Using School-Owned Equipment
Misconduct Using Privately-Owned Equipment

• Who Runs the Service?
•
•
•

Evidence Hosted by District
Evidence Created by Teachers/Students
Evidence Hosted by 3rd Parties
Response to Civil Litigation
• Preservation of Potentially
Relevant Evidence
• Adherence to Established Policies for
Handling Data
• Notice of Litigation or Reasonable
Anticipation of Litigation

• Discovery Requests
• Privacy Concerns
• Burdensomeness of Requests
• Production of Data Held by 3rd Parties
Response to Criminal Activity
• Anticipate Prosecution and/or
Disciplinary Proceedings
• Adherence to Policy/Process Is Critical
• Involve Law Enforcement ASAP

• Protect and Preserve Data
• Restrict Access to Potentially Relevant
Data
• Hire a Computer Forensics Expert?
• Some Evidence Is Radioactive
Risks for Admins. & Teachers
• Good Intentions, Bad Outcome
• “Sherlock Holmes” Syndrome
• Forwarding Content for Advice

• The Cover-Up Is Always Worse
• Trying to Protect Colleagues and Friends
• Desire to Protect District by Handling InHouse
• “Delete” Is a Myth
A Cautionary Tale
• Ting-Yi Oei, now 64
• Assistant Principal at
Freedom HS in So. Riding,
VA (Loudoun County)
• Told to investigate rumors
of sexting at HS
• “Inappropriate” image
was forwarded to Oei’s
cellphone, then computer
• Charged with “failure to
report,” then contributing
to delinquency of a minor
• Charges ultimately
dismissed
Computer Forensics 101
• Field Previews
• Acquisition & Mirror Images
• Some Data Are More Fragile Than
Others
• Speed Is Of the Essence
• Powerful Forensics Tools
• Data Recovery and Analysis
• IP Addresses Link to Real World
• 4th Amendment and Privacy
Concerns
Forensic Computer Techniques
How to Identify Useful Data and Secure a
Chain of Custody

Frederick S. Lane
NASDTEC/Professional Practices Institute
Boise, ID
24 October 2013
www.FrederickLane.com

www.ComputerForensicsDigest.com

Weitere ähnliche Inhalte

Andere mochten auch

American Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested RightAmerican Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested RightFrederick Lane
 
Values, Ethics, Beliefs, Morality: Leading a Full Life - Ian F Lewis FRSA FI...
Values, Ethics, Beliefs, Morality: Leading a Full Life -  Ian F Lewis FRSA FI...Values, Ethics, Beliefs, Morality: Leading a Full Life -  Ian F Lewis FRSA FI...
Values, Ethics, Beliefs, Morality: Leading a Full Life - Ian F Lewis FRSA FI...Ian Lewis FRSA FInstLM
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Beliefs, attitudes, and behavior
Beliefs, attitudes, and behaviorBeliefs, attitudes, and behavior
Beliefs, attitudes, and behaviorDieu-Donne Bitoyi
 

Andere mochten auch (6)

American Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested RightAmerican Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested Right
 
Values, Ethics, Beliefs, Morality: Leading a Full Life - Ian F Lewis FRSA FI...
Values, Ethics, Beliefs, Morality: Leading a Full Life -  Ian F Lewis FRSA FI...Values, Ethics, Beliefs, Morality: Leading a Full Life -  Ian F Lewis FRSA FI...
Values, Ethics, Beliefs, Morality: Leading a Full Life - Ian F Lewis FRSA FI...
 
Hierarchy of ethics
Hierarchy of ethicsHierarchy of ethics
Hierarchy of ethics
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Beliefs, attitudes, and behavior
Beliefs, attitudes, and behaviorBeliefs, attitudes, and behavior
Beliefs, attitudes, and behavior
 
Beliefs,values and attitudes
Beliefs,values and attitudesBeliefs,values and attitudes
Beliefs,values and attitudes
 

Ähnlich wie Forensic Computer Techniques

2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and DistrictsFrederick Lane
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for EducatorsFrederick Lane
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for EducatorsFrederick Lane
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for SchoolsBrett Napier, MBA
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...Frederick Lane
 
Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersFrederick Lane
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kittrtkaren
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Abigail Mizera
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and TeachersFrederick Lane
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the YoungFrederick Lane
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for EducatorsFrederick Lane
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentationJisc
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxJCGonzaga1
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the YoungFrederick Lane
 

Ähnlich wie Forensic Computer Techniques (20)

Avoiding Cybertraps
Avoiding CybertrapsAvoiding Cybertraps
Avoiding Cybertraps
 
2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for Educators
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
Avoiding Cybertraps
Avoiding CybertrapsAvoiding Cybertraps
Avoiding Cybertraps
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for Schools
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
 
Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and Teachers
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 

Mehr von Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

Mehr von Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Forensic Computer Techniques

  • 1. Forensic Computer Techniques How to Identify Useful Data and Secure a Chain of Custody Frederick S. Lane NASDTEC/Professional Practices Institute Boise, ID 24 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com
  • 2. Background and Expertise • Attorney and Author of 7 Books • Computer Forensics Expert -- 15 years • Over 100 criminal cases • Lecturer on ComputerRelated Topics – 20+ years • Computer user (midframes, desktops, laptops) – 35+ years • 10 yrs on Burlington VT School Board
  • 3. From VT to Brooklyn
  • 4. Current Projects • Cybertraps for Educators (2014) • Safe Student and School Employee Relationships (2014) • Cybertraps.wordpress.com • CPCaseDigest.com • MessageSafe.com • Informational Web Sites: • www.FrederickLane.com • www.ComputerForensicsDigest.com • www.CybertrapsfortheYoung.com
  • 5. Lecture Overview Pre-Incident Preparation Common Types of Incidents Electronic Evidence Is Everywhere Response to Civil Litigation Response to Criminal Activity Risks for Administrators and Teachers • A Quick Intro to Computer Forensics • • • • • •
  • 6. Pre-Incident Preparation • Policies and Procedures • • • District Decisions re Access, Services, Storage AUPs for Staff and Students Data Handling and Response Protocols • Professional Development for Teachers and Staff • • • Typically First Responders Potential Legal Risks Technology Is Continually Changing • Student Education • Critical Component of K-12 Curricula
  • 7. Common Types of Incidents • Employment Issues • Harassment/Hostile Work Environment • Disciplinary Issues • Student Misconduct • Cyberbullying & Cyberharassment • Sexting • Teacher/Student Misconduct • Student Attacks on Teachers • Inappropriate Relationships
  • 8. E-Evidence Is Everywhere • Inventory Possible Devices • • • Computers (Desktops, Laptops, Servers) Mobile Devices (Phones, Tablets) Peripherals (USBs, CDs, external drives, etc.) • Inventory Possible Types of Data • • • • • • Communication (E-Mail, IMs, Texts, etc.) Social Media (Facebook, Twitter, etc.) Web Activity (URLs, cookies, bookmarks, etc.) Network Logs and Access Data Cloud Storage (Dropbox, Flickr, Boxy, etc.) Deleted Data
  • 9. Whose Data Is It Anyway? • Where Did the Incident Occur? • • On-Campus vs. Off-Campus Zone of District Responsibility Is Growing • Who Owns and Uses the Device? • • Misconduct Using School-Owned Equipment Misconduct Using Privately-Owned Equipment • Who Runs the Service? • • • Evidence Hosted by District Evidence Created by Teachers/Students Evidence Hosted by 3rd Parties
  • 10. Response to Civil Litigation • Preservation of Potentially Relevant Evidence • Adherence to Established Policies for Handling Data • Notice of Litigation or Reasonable Anticipation of Litigation • Discovery Requests • Privacy Concerns • Burdensomeness of Requests • Production of Data Held by 3rd Parties
  • 11. Response to Criminal Activity • Anticipate Prosecution and/or Disciplinary Proceedings • Adherence to Policy/Process Is Critical • Involve Law Enforcement ASAP • Protect and Preserve Data • Restrict Access to Potentially Relevant Data • Hire a Computer Forensics Expert? • Some Evidence Is Radioactive
  • 12. Risks for Admins. & Teachers • Good Intentions, Bad Outcome • “Sherlock Holmes” Syndrome • Forwarding Content for Advice • The Cover-Up Is Always Worse • Trying to Protect Colleagues and Friends • Desire to Protect District by Handling InHouse • “Delete” Is a Myth
  • 13. A Cautionary Tale • Ting-Yi Oei, now 64 • Assistant Principal at Freedom HS in So. Riding, VA (Loudoun County) • Told to investigate rumors of sexting at HS • “Inappropriate” image was forwarded to Oei’s cellphone, then computer • Charged with “failure to report,” then contributing to delinquency of a minor • Charges ultimately dismissed
  • 14. Computer Forensics 101 • Field Previews • Acquisition & Mirror Images • Some Data Are More Fragile Than Others • Speed Is Of the Essence • Powerful Forensics Tools • Data Recovery and Analysis • IP Addresses Link to Real World • 4th Amendment and Privacy Concerns
  • 15. Forensic Computer Techniques How to Identify Useful Data and Secure a Chain of Custody Frederick S. Lane NASDTEC/Professional Practices Institute Boise, ID 24 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com