SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
The TASA Group Presents:
The “Internet of Evidence ™”
Little Brother is Watching You –
And He’s Taking Notes
This presentation will be audio
broadcast into your computer speakers.
Please make sure that your speakers are
turned “ON” and the volume is set to a
comfortable level.
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
This Webinar Will Cover
• Mr. Norris will discuss how sensor data and its connectivity – what
he has come to call “The Internet of Evidence ™” can support:
• Determination of time lines
• Identities of actors/alibis
• Intentions of actors
• External and environmental conditions
• Who knew what, and when they knew it
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
About the Presenter
Mr. Wayne B. Norris is a corporate and technical management
consultant, software engineer, sales and marketing executive,
financial analyst, business plan author, and physicist. He has 45
years of professional experience and 55 years of experience
writing computer software, beginning in 1959 at the age of 12.
He is a former Chief Scientist in the counterterrorism community
and also in the environmental/oil spill community, holds five
patents in nuclear sensing technology, and acts as a patent
advisor.
Mr. Norris has been an expert witness for issues in software,
technology, intellectual property, technology industry
compensation, and conduct of corporate officers in Federal and
State courts.
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
CLE Credit Passcode Information
For any state that requires a “passcode” for
CLE credit, today’s passcode is Evidence.
Thank you,
The TASA Group
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
The “Internet of Evidence™”
Little Brother Is Watching You – And
He’s Taking Notes!
Wayne B. Norris
2534 Murrell Road, Santa Barbara, CA 93109-1859
805-962-7703 Voice 805-456-2169 FAX
Wayne@WayneBNorris.com http://wayneBNorris.com
Using the Vast and Ever-Growing Array of
Sensors and Data recorders to Assist in
Establishing Truth, Justice, and the
American Way
Sensors Are Devices That Detect
[and often record] Data
 Modern digital cameras record time, date, and often GPS
coordinates INSIDE picture files, in what is known as the Exif
Header: http://en.wikipedia.org/wiki/Exchangeable_image_file_format
 In addition, that data is written to the file system of the camera
 Mobile phones report their location to the carrier several times
per minute: http://en.wikipedia.org/wiki/Mobile_phone_tracking
 Computer browsers such as Chrome and IE report multiple data
back to Google and Microsoft frequently
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
6
Sensors Are Devices That Detect
[and often record] Data (cont.)
 Cars have Event Data Recorders [EDRs] that even record items
including SEAT POSITION: http://media.mgnetwork.com/blackbox/
 Sensor data can be stored locally or in distributed fashion
 “Smart” appliances such as refrigerators, microwave ovens,
door locks, and HVAC systems report data to servers.
 Servers from iTunes to Amazon to Cox to Comcast to Facebook
preserve data sent and received on computers and mobile
devices.
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
7
The Net Effect Is That Sensor Data
Is Exploding
 No less a player than IBM is paying great attention to this
phenomenon, in a 1-hour Webcast, “Solving the Big Data
Challenge of Sensor Data”
http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=ST&htmlfid=IMV14323USEN
 The phenomenon will only grow larger with time. Thought
leaders refer to this as the “Internet Of Things” [“IOT”]
http://en.wikipedia.org/wiki/Internet_of_Things or even…
 The “Internet of Everything”: http://www.qualcomm.com/solutions/ioe
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
8
The Net Effect Is That Sensor Data
Is Exploding (cont.)
 The legal system has no choice but to incorporate this flood
of sensor data into its practice.
 We now truly have the “Internet of Evidence™”
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
9
The Internet of Evidence Is As Profound
as Fingerprinting or DNA!
 The sensor data and the Internet of Evidence™ support:
 Determination of time lines
 Identities of actors / alibis
 Intent of actors
 External and environmental conditions
 Who knew what, and when they knew it
4/21/2014
The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
10
The Internet of Evidence Is As Profound
as Fingerprinting or DNA! (cont.)
 Just as with physical evidence, Internet of Evidence™ is subject
to:
 Requirements for discovery, seizure, chain of custody, and accurate
transcription
 Possible tampering, forgery, and counterfeiting, and
 Intentional or inadvertent destruction.
4/21/2014
The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
11
Case Study Number 1 – The Data
Collection That Didn’t Happen
 <Case name withheld pending OK by subject attorneys>
 California Criminal case – molestation of underage female
victims by 17-year-old male, July 2011
 A family event with parents, defendant, two younger brothers,
older married sister, two nieces [6 and 8], and a family friend [11]
 Defendant was professionally employed as a paparazzi
photographer
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
12
Case Study Number 1 – The Data
Collection That Didn’t Happen (cont.)
 While sister [nieces’ mom] went shopping, Defendant was
asked to:
 Take paparazzi photos of 3 girls using Canon EOS 60D DSLR
 Download music from iTunes to sister’s laptop
 “RIP” some music CDs to sister’s laptop
 Sister was gone for 45 minutes
 Family barbecue went on as planned
 11-year-old reported molestation to girlfriend after starting 7th
Grade in September
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
13
Internet of Evidence™ Involvement
 Alibi consisted of testimony that the Defendant was too busy
doing digital tasks to have committed any crime
 Victim interviews done by male investigator with no specialized
training in this area. Psychological evidence not discussed in this
Webinar
 Zero physical evidence was preserved, at the discretion of the
investigator. Investigator testified there would be nothing of
value.
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
14
Internet of Evidence™ Involvement
(cont.)
 Internet of Evidence™ consisted of:
 Laptop hard drive
 Time / Date stamps of all relevant files
 Non-File Area [NFA] data from potential deleted files
 Canon memory card
 File system data
 Exif header data
 iTunes transaction data, with time tags
 Potential Internet Service Provider packet data
 Potential geo-reference data from any cell phones
 Other data?
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
15
Resolution
 Trial lasted for about 15 days
 14 counts = Life Without Parole, due to age of alleged victims and
multiple victim enhancement
 Family split – sister on one side, parents siding with Defendant
 Nieces recanted testimony
 Acquittal on 6 charges; Hung jury on 8 charges; DA deciding
whether to re-file
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
16
About the Presenter
Mr. Wayne B. Norris is a corporate and technical management
consultant, software engineer, sales and marketing executive,
financial analyst, business plan author, and physicist. He has 45
years of professional experience and 55 years of experience
writing computer software, beginning in 1959 at the age of 12.
He is a former Chief Scientist in the counterterrorism community
and also in the environmental/oil spill community, holds five
patents in nuclear sensing technology, and acts as a patent
advisor.
Mr. Norris has been an expert witness for issues in software,
technology, intellectual property, technology industry
compensation, and conduct of corporate officers in Federal and
State courts.
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
Questions?
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
18
Case Study Number 2 – The Text
Message from Who Knows Where
 <Case name withheld pending OK by subject attorneys>
 California Criminal contempt case – Wife received text messages
on her cell phone with husband’s cell number as callback, in
violation of no-contact order
 Husband is a business owner, wife is a divorce attorney, disputed
custody of 6-year-old daughter
 Husband alleged wife knew his cell phone provider password;
she or a co-conspirator could have logged into the web
account and forged husband’s identity in sending of message
 Husband took voluntary polygraph test, registered NDI
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
19
Analysis
 Internet of Evidence™ issue: If such a forgery were perpetrated via
a Web login instead of an actual cell phone, is such a forgery
detectable from either the receiving cell phone or from the web
record?
 Interestingly, no. Text message formats do not retain path data.
 Cell phone provider records will tell and can be subpoenaed, but
are retained for only 10 days, and then are erased. Actions came
TOO LATE
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
20
Resolution
 Text message charge dropped.
 What should have been done:
 Impound all Internet of Evidence™ data immediately
 Create perfect copies using NIJ-approved passive copy apparatus
 Subpoena relevant records from cell phone provider before
destruction date
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
21
Summary
 The Internet of Evidence™ is potentially as significant to
jurisprudence as fingerprinting and DNA analysis were in their
day.
 Internet of Evidence™ information exists literally everywhere in
many contemporary legal matters
 It is not magic, and may not exist. Or it may not have probative
value.
 The safest course is to:
 Impound all Internet of Evidence™ data immediately
 Create perfect copies using NIJ-approved passive copy apparatus
 Subpoena relevant records from Internet Service Provider and/or
vendors while it is still available
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
22
Summary (cont.)
 Once Internet of Evidence™ data is secure, THEN determine if
data has probative value
 If probative value cannot be ruled out, analyze data using
qualified experts
 If no experts are on staff, LOOK ON THE INTERNET! There are
specialists all over.
 The field is so large that no one individual can be an expert on
all areas.
 Individual specialists may need to research highly case-specific
questions.
 For large or complex cases, one expert may need to function as
a Lead Investigator.
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
23
Final Words
 The Internet of Evidence™ has only recently arrived, but it is
here to stay
 There were, literally, ZERO cell phone photos or movies from
inside the Twin Towers. Such devices are now the most
common platforms for watching NFL games, after TV!
 When a new fleet of helicopters arrived with an aviation unit
at a base in Iraq, some soldiers took pictures on the flight
line... From the photos that were uploaded to the Internet,
the enemy was able to determine the exact location of the
helicopters inside the compound and conduct a mortar
attack, destroying four of the AH-64 Apaches.
http://www.army.mil/article/75165/Geotagging_poses_security_risks/
4/21/2014
The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
24
Final Words (cont.)
 During Israel’s 2006 war in southern Lebanon with Iranian-
backed… Hezbollah, Iranian SIGINT professionals tracked signals
coming from personal cell phones of Israeli soldiers to identify
assembly points of Israeli troops that may have telegraphed the
points of offensive thrusts into Lebanon.
http://defensetech.org/2012/03/15/insurgents-used-cell-phone-geotags-to-destroy-ah-64s-in-iraq/
 http://petapixel.com/2012/12/03/exif-data-may-have-revealed-location-of-fugitive-billionaire-
john-mcafee/
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
25
CLE Credit Passcode Information
For any state that requires a “passcode” for
CLE credit, today’s passcode is Evidence.
Thank you,
The TASA Group
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
QUESTIONS?
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
27
THANK YOU!
4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes!
28
CLE Information
This webinar is eligible for CLE credit in CA, IL, MN, MO,
NJ, PA, and TX. To ensure you receive your CLE credit,
please complete the survey at the end of the
presentation.
Thank you,
The TASA Group
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
The TASA Group
In addition to being your best source for testifying and
consulting experts, TASA also offers:
E-Discovery and Document Management
Solutions
Free, Interactive Webinars
Research Reports on Expert Witnesses:
— Challenge History Report 2.0 (CHR2.0)
— Professional Sanction Search (PSS)
— Expert Profile 360 (EP360)
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319
THANK YOU!
We will be sending out the a link to an archived
recording of this webinar tomorrow morning. The
archived recording will also be posted in the
Knowledge Center on TASA’s website.
If you have any follow-up questions or comments,
please email Carol Kowalewski at
ckowalewski@tasanet.com.
© 2014 The TASA Group, Inc.
www.tasanet.com
Technical Advisory Service for Attorneys
(800) 523-2319

Weitere ähnliche Inhalte

Was ist angesagt?

Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 

Was ist angesagt? (20)

Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
File000154
File000154File000154
File000154
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Cybercrime Inc. v2.2
Cybercrime Inc. v2.2Cybercrime Inc. v2.2
Cybercrime Inc. v2.2
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Media piracy
Media piracyMedia piracy
Media piracy
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 

Andere mochten auch

Mother's Day 2016 Gifts Less Ordinary
Mother's Day 2016 Gifts Less OrdinaryMother's Day 2016 Gifts Less Ordinary
Mother's Day 2016 Gifts Less OrdinaryGifts Less Ordinary
 
카지노를털어라『SX797』『СOM』온라인바카라
카지노를털어라『SX797』『СOM』온라인바카라카지노를털어라『SX797』『СOM』온라인바카라
카지노를털어라『SX797』『СOM』온라인바카라hedrfgherj
 
모바일스포츠북 『OX600』。『COM』슬롯추천 사이트
모바일스포츠북  『OX600』。『COM』슬롯추천 사이트모바일스포츠북  『OX600』。『COM』슬롯추천 사이트
모바일스포츠북 『OX600』。『COM』슬롯추천 사이트hedrfgherj
 
Computadores para educar aprendo y meidentifico con mis antepasados
Computadores para educar aprendo y meidentifico con mis antepasadosComputadores para educar aprendo y meidentifico con mis antepasados
Computadores para educar aprendo y meidentifico con mis antepasadosyami040677
 
Affiche présentation démarche éco-conception SAVOYE Bourgogne
Affiche présentation démarche éco-conception SAVOYE BourgogneAffiche présentation démarche éco-conception SAVOYE Bourgogne
Affiche présentation démarche éco-conception SAVOYE BourgogneCCI Alsace Eurométropole
 
Marzenia
MarzeniaMarzenia
MarzeniaSylviq
 
Cartas a los reyes magos para leer
Cartas a los reyes magos para leerCartas a los reyes magos para leer
Cartas a los reyes magos para leerEllen Ericson
 
Why Do Customers Choose Vision33?
Why Do Customers Choose Vision33?Why Do Customers Choose Vision33?
Why Do Customers Choose Vision33?Vision33
 
Evaluación por competencias
Evaluación por competenciasEvaluación por competencias
Evaluación por competenciasSandraUDG
 
Happy birthday to our angel
Happy birthday to our angelHappy birthday to our angel
Happy birthday to our angelLyne Hebert
 
Scrivimi qualcosa che ho voglia di leggere #BTO2014
Scrivimi qualcosa che ho voglia di leggere #BTO2014Scrivimi qualcosa che ho voglia di leggere #BTO2014
Scrivimi qualcosa che ho voglia di leggere #BTO2014Alessandra Farabegoli
 

Andere mochten auch (14)

Mother's Day 2016 Gifts Less Ordinary
Mother's Day 2016 Gifts Less OrdinaryMother's Day 2016 Gifts Less Ordinary
Mother's Day 2016 Gifts Less Ordinary
 
12 04-2016
12 04-201612 04-2016
12 04-2016
 
카지노를털어라『SX797』『СOM』온라인바카라
카지노를털어라『SX797』『СOM』온라인바카라카지노를털어라『SX797』『СOM』온라인바카라
카지노를털어라『SX797』『СOM』온라인바카라
 
모바일스포츠북 『OX600』。『COM』슬롯추천 사이트
모바일스포츠북  『OX600』。『COM』슬롯추천 사이트모바일스포츠북  『OX600』。『COM』슬롯추천 사이트
모바일스포츠북 『OX600』。『COM』슬롯추천 사이트
 
Examen adaptado
Examen adaptadoExamen adaptado
Examen adaptado
 
Examen sin adaptar
Examen sin adaptarExamen sin adaptar
Examen sin adaptar
 
Computadores para educar aprendo y meidentifico con mis antepasados
Computadores para educar aprendo y meidentifico con mis antepasadosComputadores para educar aprendo y meidentifico con mis antepasados
Computadores para educar aprendo y meidentifico con mis antepasados
 
Affiche présentation démarche éco-conception SAVOYE Bourgogne
Affiche présentation démarche éco-conception SAVOYE BourgogneAffiche présentation démarche éco-conception SAVOYE Bourgogne
Affiche présentation démarche éco-conception SAVOYE Bourgogne
 
Marzenia
MarzeniaMarzenia
Marzenia
 
Cartas a los reyes magos para leer
Cartas a los reyes magos para leerCartas a los reyes magos para leer
Cartas a los reyes magos para leer
 
Why Do Customers Choose Vision33?
Why Do Customers Choose Vision33?Why Do Customers Choose Vision33?
Why Do Customers Choose Vision33?
 
Evaluación por competencias
Evaluación por competenciasEvaluación por competencias
Evaluación por competencias
 
Happy birthday to our angel
Happy birthday to our angelHappy birthday to our angel
Happy birthday to our angel
 
Scrivimi qualcosa che ho voglia di leggere #BTO2014
Scrivimi qualcosa che ho voglia di leggere #BTO2014Scrivimi qualcosa che ho voglia di leggere #BTO2014
Scrivimi qualcosa che ho voglia di leggere #BTO2014
 

Ähnlich wie TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!

Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceCase IQ
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to KnowRaffa Learning Community
 

Ähnlich wie TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes! (20)

Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 

Mehr von Wayne Norris

Mehr von Wayne Norris (10)

www.sec.gov_Archives_edgar_data_1094750_000093980204001158_form10sb112304
www.sec.gov_Archives_edgar_data_1094750_000093980204001158_form10sb112304www.sec.gov_Archives_edgar_data_1094750_000093980204001158_form10sb112304
www.sec.gov_Archives_edgar_data_1094750_000093980204001158_form10sb112304
 
ChevronFisheriesHandbook
ChevronFisheriesHandbookChevronFisheriesHandbook
ChevronFisheriesHandbook
 
SEDS-3-Fold-1-UPDATED
SEDS-3-Fold-1-UPDATEDSEDS-3-Fold-1-UPDATED
SEDS-3-Fold-1-UPDATED
 
SEDS
SEDSSEDS
SEDS
 
US8785864
US8785864US8785864
US8785864
 
US8410451
US8410451US8410451
US8410451
 
US8357910
US8357910US8357910
US8357910
 
US8288734
US8288734US8288734
US8288734
 
US8080808
US8080808US8080808
US8080808
 
US7573044
US7573044US7573044
US7573044
 

TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!

  • 1. The TASA Group Presents: The “Internet of Evidence ™” Little Brother is Watching You – And He’s Taking Notes This presentation will be audio broadcast into your computer speakers. Please make sure that your speakers are turned “ON” and the volume is set to a comfortable level. © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 2. This Webinar Will Cover • Mr. Norris will discuss how sensor data and its connectivity – what he has come to call “The Internet of Evidence ™” can support: • Determination of time lines • Identities of actors/alibis • Intentions of actors • External and environmental conditions • Who knew what, and when they knew it © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 3. About the Presenter Mr. Wayne B. Norris is a corporate and technical management consultant, software engineer, sales and marketing executive, financial analyst, business plan author, and physicist. He has 45 years of professional experience and 55 years of experience writing computer software, beginning in 1959 at the age of 12. He is a former Chief Scientist in the counterterrorism community and also in the environmental/oil spill community, holds five patents in nuclear sensing technology, and acts as a patent advisor. Mr. Norris has been an expert witness for issues in software, technology, intellectual property, technology industry compensation, and conduct of corporate officers in Federal and State courts. © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 4. CLE Credit Passcode Information For any state that requires a “passcode” for CLE credit, today’s passcode is Evidence. Thank you, The TASA Group © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 5. The “Internet of Evidence™” Little Brother Is Watching You – And He’s Taking Notes! Wayne B. Norris 2534 Murrell Road, Santa Barbara, CA 93109-1859 805-962-7703 Voice 805-456-2169 FAX Wayne@WayneBNorris.com http://wayneBNorris.com Using the Vast and Ever-Growing Array of Sensors and Data recorders to Assist in Establishing Truth, Justice, and the American Way
  • 6. Sensors Are Devices That Detect [and often record] Data  Modern digital cameras record time, date, and often GPS coordinates INSIDE picture files, in what is known as the Exif Header: http://en.wikipedia.org/wiki/Exchangeable_image_file_format  In addition, that data is written to the file system of the camera  Mobile phones report their location to the carrier several times per minute: http://en.wikipedia.org/wiki/Mobile_phone_tracking  Computer browsers such as Chrome and IE report multiple data back to Google and Microsoft frequently 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 6
  • 7. Sensors Are Devices That Detect [and often record] Data (cont.)  Cars have Event Data Recorders [EDRs] that even record items including SEAT POSITION: http://media.mgnetwork.com/blackbox/  Sensor data can be stored locally or in distributed fashion  “Smart” appliances such as refrigerators, microwave ovens, door locks, and HVAC systems report data to servers.  Servers from iTunes to Amazon to Cox to Comcast to Facebook preserve data sent and received on computers and mobile devices. 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 7
  • 8. The Net Effect Is That Sensor Data Is Exploding  No less a player than IBM is paying great attention to this phenomenon, in a 1-hour Webcast, “Solving the Big Data Challenge of Sensor Data” http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=ST&htmlfid=IMV14323USEN  The phenomenon will only grow larger with time. Thought leaders refer to this as the “Internet Of Things” [“IOT”] http://en.wikipedia.org/wiki/Internet_of_Things or even…  The “Internet of Everything”: http://www.qualcomm.com/solutions/ioe 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 8
  • 9. The Net Effect Is That Sensor Data Is Exploding (cont.)  The legal system has no choice but to incorporate this flood of sensor data into its practice.  We now truly have the “Internet of Evidence™” 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 9
  • 10. The Internet of Evidence Is As Profound as Fingerprinting or DNA!  The sensor data and the Internet of Evidence™ support:  Determination of time lines  Identities of actors / alibis  Intent of actors  External and environmental conditions  Who knew what, and when they knew it 4/21/2014 The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 10
  • 11. The Internet of Evidence Is As Profound as Fingerprinting or DNA! (cont.)  Just as with physical evidence, Internet of Evidence™ is subject to:  Requirements for discovery, seizure, chain of custody, and accurate transcription  Possible tampering, forgery, and counterfeiting, and  Intentional or inadvertent destruction. 4/21/2014 The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 11
  • 12. Case Study Number 1 – The Data Collection That Didn’t Happen  <Case name withheld pending OK by subject attorneys>  California Criminal case – molestation of underage female victims by 17-year-old male, July 2011  A family event with parents, defendant, two younger brothers, older married sister, two nieces [6 and 8], and a family friend [11]  Defendant was professionally employed as a paparazzi photographer 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 12
  • 13. Case Study Number 1 – The Data Collection That Didn’t Happen (cont.)  While sister [nieces’ mom] went shopping, Defendant was asked to:  Take paparazzi photos of 3 girls using Canon EOS 60D DSLR  Download music from iTunes to sister’s laptop  “RIP” some music CDs to sister’s laptop  Sister was gone for 45 minutes  Family barbecue went on as planned  11-year-old reported molestation to girlfriend after starting 7th Grade in September 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 13
  • 14. Internet of Evidence™ Involvement  Alibi consisted of testimony that the Defendant was too busy doing digital tasks to have committed any crime  Victim interviews done by male investigator with no specialized training in this area. Psychological evidence not discussed in this Webinar  Zero physical evidence was preserved, at the discretion of the investigator. Investigator testified there would be nothing of value. 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 14
  • 15. Internet of Evidence™ Involvement (cont.)  Internet of Evidence™ consisted of:  Laptop hard drive  Time / Date stamps of all relevant files  Non-File Area [NFA] data from potential deleted files  Canon memory card  File system data  Exif header data  iTunes transaction data, with time tags  Potential Internet Service Provider packet data  Potential geo-reference data from any cell phones  Other data? 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 15
  • 16. Resolution  Trial lasted for about 15 days  14 counts = Life Without Parole, due to age of alleged victims and multiple victim enhancement  Family split – sister on one side, parents siding with Defendant  Nieces recanted testimony  Acquittal on 6 charges; Hung jury on 8 charges; DA deciding whether to re-file 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 16
  • 17. About the Presenter Mr. Wayne B. Norris is a corporate and technical management consultant, software engineer, sales and marketing executive, financial analyst, business plan author, and physicist. He has 45 years of professional experience and 55 years of experience writing computer software, beginning in 1959 at the age of 12. He is a former Chief Scientist in the counterterrorism community and also in the environmental/oil spill community, holds five patents in nuclear sensing technology, and acts as a patent advisor. Mr. Norris has been an expert witness for issues in software, technology, intellectual property, technology industry compensation, and conduct of corporate officers in Federal and State courts. © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 18. Questions? 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 18
  • 19. Case Study Number 2 – The Text Message from Who Knows Where  <Case name withheld pending OK by subject attorneys>  California Criminal contempt case – Wife received text messages on her cell phone with husband’s cell number as callback, in violation of no-contact order  Husband is a business owner, wife is a divorce attorney, disputed custody of 6-year-old daughter  Husband alleged wife knew his cell phone provider password; she or a co-conspirator could have logged into the web account and forged husband’s identity in sending of message  Husband took voluntary polygraph test, registered NDI 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 19
  • 20. Analysis  Internet of Evidence™ issue: If such a forgery were perpetrated via a Web login instead of an actual cell phone, is such a forgery detectable from either the receiving cell phone or from the web record?  Interestingly, no. Text message formats do not retain path data.  Cell phone provider records will tell and can be subpoenaed, but are retained for only 10 days, and then are erased. Actions came TOO LATE 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 20
  • 21. Resolution  Text message charge dropped.  What should have been done:  Impound all Internet of Evidence™ data immediately  Create perfect copies using NIJ-approved passive copy apparatus  Subpoena relevant records from cell phone provider before destruction date 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 21
  • 22. Summary  The Internet of Evidence™ is potentially as significant to jurisprudence as fingerprinting and DNA analysis were in their day.  Internet of Evidence™ information exists literally everywhere in many contemporary legal matters  It is not magic, and may not exist. Or it may not have probative value.  The safest course is to:  Impound all Internet of Evidence™ data immediately  Create perfect copies using NIJ-approved passive copy apparatus  Subpoena relevant records from Internet Service Provider and/or vendors while it is still available 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 22
  • 23. Summary (cont.)  Once Internet of Evidence™ data is secure, THEN determine if data has probative value  If probative value cannot be ruled out, analyze data using qualified experts  If no experts are on staff, LOOK ON THE INTERNET! There are specialists all over.  The field is so large that no one individual can be an expert on all areas.  Individual specialists may need to research highly case-specific questions.  For large or complex cases, one expert may need to function as a Lead Investigator. 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 23
  • 24. Final Words  The Internet of Evidence™ has only recently arrived, but it is here to stay  There were, literally, ZERO cell phone photos or movies from inside the Twin Towers. Such devices are now the most common platforms for watching NFL games, after TV!  When a new fleet of helicopters arrived with an aviation unit at a base in Iraq, some soldiers took pictures on the flight line... From the photos that were uploaded to the Internet, the enemy was able to determine the exact location of the helicopters inside the compound and conduct a mortar attack, destroying four of the AH-64 Apaches. http://www.army.mil/article/75165/Geotagging_poses_security_risks/ 4/21/2014 The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 24
  • 25. Final Words (cont.)  During Israel’s 2006 war in southern Lebanon with Iranian- backed… Hezbollah, Iranian SIGINT professionals tracked signals coming from personal cell phones of Israeli soldiers to identify assembly points of Israeli troops that may have telegraphed the points of offensive thrusts into Lebanon. http://defensetech.org/2012/03/15/insurgents-used-cell-phone-geotags-to-destroy-ah-64s-in-iraq/  http://petapixel.com/2012/12/03/exif-data-may-have-revealed-location-of-fugitive-billionaire- john-mcafee/ 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 25
  • 26. CLE Credit Passcode Information For any state that requires a “passcode” for CLE credit, today’s passcode is Evidence. Thank you, The TASA Group © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 27. QUESTIONS? 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 27
  • 28. THANK YOU! 4/21/2014The Internet of Evidence(tm) - Little Brother Is Watching You – And He’s Taking Notes! 28
  • 29. CLE Information This webinar is eligible for CLE credit in CA, IL, MN, MO, NJ, PA, and TX. To ensure you receive your CLE credit, please complete the survey at the end of the presentation. Thank you, The TASA Group © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 30. The TASA Group In addition to being your best source for testifying and consulting experts, TASA also offers: E-Discovery and Document Management Solutions Free, Interactive Webinars Research Reports on Expert Witnesses: — Challenge History Report 2.0 (CHR2.0) — Professional Sanction Search (PSS) — Expert Profile 360 (EP360) © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319
  • 31. THANK YOU! We will be sending out the a link to an archived recording of this webinar tomorrow morning. The archived recording will also be posted in the Knowledge Center on TASA’s website. If you have any follow-up questions or comments, please email Carol Kowalewski at ckowalewski@tasanet.com. © 2014 The TASA Group, Inc. www.tasanet.com Technical Advisory Service for Attorneys (800) 523-2319