SlideShare ist ein Scribd-Unternehmen logo
1 von 17
High Tech Case Management Life Cycle

●   SADFE & CTIN
●   Bell Harbor International Conference Center
    –   Seattle, Washington, USA
●   A tutorial on technical case management
●   Presented by:
    –   Computer Technology Investigations Network
SADFE 2007

●   High Tech Case Management Life Cycle
    –   Goals & Objectives
    –   Introductions
SADFE 2007

●   Goals & Objectives
    –   Introduction to Computer Forensics
    –   Process flows in hi-tech investigations
    –   Professional development and contacts
●   Who are you?
    –   Employer?
    –   Career (current & future)
    –   Forensics experiences
    –   Case experiences
SADFE 2007

●   Introductions
    –   Who we are
         ●   CTIN
         ●   Corporate
         ●   Government
SADFE 2007

●   Tutorial
    –   Data collection
    –   Data analysis
    –   Cross link analysis
    –   Legal analysis & case construction
    –   Case presentation
    –   Case critique
SADFE 2007

●   Data collection
    –   Evidence seizure and control
    –   Disk acquisitions
    –   PDA acquisitions
    –   Cell phone acquisition
SADFE 2007

●   Evidence seizure and control
    –   Types of evidence
         ●   Hardware
         ●   Software
         ●   Other
    –   Types of controls
         ●   Criminal investigation
         ●   Civil investigations
SADFE 2007

●   Disk acquisitions
    –   Commercial software tools
         ●   Guidance Software EnCase
         ●   AccessData FTK Imager
         ●   Technology Pathways ProDiscover
         ●   NTI SafeBack
         ●   Etc. (SMART...)
    –   Commercial hardware tools
         ●   Logicube
         ●   Voom Technologies HardCopy II
SADFE 2007

●   Disk acquisitions
    –   Freeware software tools
         ●   UNIX/Linux dd
         ●   UNIX/Linux dcfldd
         ●   FIRST DiskImager
    –   Write-blockers
         ●   Tableau
         ●   Technology Pathways NoWrite FPU
         ●   Image MASSter Drive Lock
SADFE 2007

●   PDA acquisition
SADFE 2007

●   Cell phone acquisition
SADFE 2007

●   Data Analysis
    –   Proceeding with an analysis
         ●   Manual search methods
         ●   Automated search tools
              –   Live search
              –   Index search
    –   Working case practical
         ●   Hands-on
    –   Report generators
SADFE 2007

●   Cross-link analysis
    –   Cataloging data using office application tools
    –   Practical loading data into applications
         ●   Hands-on
    –   Practical comparative analysis
         ●   Hands-on
SADFE 2007

●   Legal analysis & case construction
    –   Presenting findings
         ●   Formal reports
         ●   Informal reports
    –   Practical report presentation
         ●   Best practices for displaying technical data
    –   Identifying elements to support case
         ●   Criminal case
         ●   Civil case
    –   Examination planning
SADFE 2007

●   Case presentation
    –   Courtroom display considerations
         ●   Determine the audience
         ●   Facility considerations
    –   Video projection
         ●   Time lapse activity
         ●   Office application presentation tools
    –   Telling a story
SADFE 2007

●   Critique the case
    –   Why critique the case?
    –   Is the customer happy with the product?
    –   Maintaining a professional journal
SADFE 2007

●   Summation
        –   Data collection
        –   Data Analysis
        –   Cross-link analysis
        –   Case construction
        –   Case Presentation
        –   Critique
●   Questions and interests?
    

Weitere ähnliche Inhalte

Andere mochten auch

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKING
Eduardo Chavarro
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
CTIN
 

Andere mochten auch (19)

Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Netcat cheat sheet
Netcat cheat sheetNetcat cheat sheet
Netcat cheat sheet
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKING
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Raidprep
RaidprepRaidprep
Raidprep
 
File carving tools
File carving toolsFile carving tools
File carving tools
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Cheatsheet of msdos
Cheatsheet of msdosCheatsheet of msdos
Cheatsheet of msdos
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
 
File Management Presentation
File Management PresentationFile Management Presentation
File Management Presentation
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 

Ähnlich wie Sadfe2007

Orange Legal Technologies Considering Meet And Confer I L T A Prod...
Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
Rob Robinson
 
Nick Martin Resume Estimator
Nick Martin   Resume EstimatorNick Martin   Resume Estimator
Nick Martin Resume Estimator
nm3343
 

Ähnlich wie Sadfe2007 (20)

Usage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsUsage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics tools
 
Technology Threat Prediction
Technology Threat PredictionTechnology Threat Prediction
Technology Threat Prediction
 
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
Static Analysis Techniques For Testing Application Security - Houston Tech FestStatic Analysis Techniques For Testing Application Security - Houston Tech Fest
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
 
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
 
LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
 
PCDW For Owners
PCDW For OwnersPCDW For Owners
PCDW For Owners
 
IDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
IDC Portugal | Como Libertar os Seus Dados com Virtualização de DadosIDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
IDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
AI in the Enterprise
AI in the EnterpriseAI in the Enterprise
AI in the Enterprise
 
IIAGaming_JG
IIAGaming_JGIIAGaming_JG
IIAGaming_JG
 
Nick Martin Resume Estimator
Nick Martin   Resume EstimatorNick Martin   Resume Estimator
Nick Martin Resume Estimator
 
Achievo ATK, an Open Source project
Achievo ATK, an Open Source projectAchievo ATK, an Open Source project
Achievo ATK, an Open Source project
 
Big Data for Testing - Heading for Post Process and Analytics
Big Data for Testing - Heading for Post Process and AnalyticsBig Data for Testing - Heading for Post Process and Analytics
Big Data for Testing - Heading for Post Process and Analytics
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
 
Right-sized Architecture: Integrity for Emerging Designs
Right-sized Architecture: Integrity for Emerging DesignsRight-sized Architecture: Integrity for Emerging Designs
Right-sized Architecture: Integrity for Emerging Designs
 
Creating Practical Security Test-Cases for Web Applications
Creating Practical Security Test-Cases for Web ApplicationsCreating Practical Security Test-Cases for Web Applications
Creating Practical Security Test-Cases for Web Applications
 
SEASR Overview
SEASR OverviewSEASR Overview
SEASR Overview
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Analytics in Your Enterprise
Analytics in Your EnterpriseAnalytics in Your Enterprise
Analytics in Your Enterprise
 

Mehr von CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
CTIN
 
M Compevid
M CompevidM Compevid
M Compevid
CTIN
 
L Scope
L ScopeL Scope
L Scope
CTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
CTIN
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
CTIN
 

Mehr von CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 
L Scope
L ScopeL Scope
L Scope
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Sadfe2007

  • 1. High Tech Case Management Life Cycle ● SADFE & CTIN ● Bell Harbor International Conference Center – Seattle, Washington, USA ● A tutorial on technical case management ● Presented by: – Computer Technology Investigations Network
  • 2. SADFE 2007 ● High Tech Case Management Life Cycle – Goals & Objectives – Introductions
  • 3. SADFE 2007 ● Goals & Objectives – Introduction to Computer Forensics – Process flows in hi-tech investigations – Professional development and contacts ● Who are you? – Employer? – Career (current & future) – Forensics experiences – Case experiences
  • 4. SADFE 2007 ● Introductions – Who we are ● CTIN ● Corporate ● Government
  • 5. SADFE 2007 ● Tutorial – Data collection – Data analysis – Cross link analysis – Legal analysis & case construction – Case presentation – Case critique
  • 6. SADFE 2007 ● Data collection – Evidence seizure and control – Disk acquisitions – PDA acquisitions – Cell phone acquisition
  • 7. SADFE 2007 ● Evidence seizure and control – Types of evidence ● Hardware ● Software ● Other – Types of controls ● Criminal investigation ● Civil investigations
  • 8. SADFE 2007 ● Disk acquisitions – Commercial software tools ● Guidance Software EnCase ● AccessData FTK Imager ● Technology Pathways ProDiscover ● NTI SafeBack ● Etc. (SMART...) – Commercial hardware tools ● Logicube ● Voom Technologies HardCopy II
  • 9. SADFE 2007 ● Disk acquisitions – Freeware software tools ● UNIX/Linux dd ● UNIX/Linux dcfldd ● FIRST DiskImager – Write-blockers ● Tableau ● Technology Pathways NoWrite FPU ● Image MASSter Drive Lock
  • 10. SADFE 2007 ● PDA acquisition
  • 11. SADFE 2007 ● Cell phone acquisition
  • 12. SADFE 2007 ● Data Analysis – Proceeding with an analysis ● Manual search methods ● Automated search tools – Live search – Index search – Working case practical ● Hands-on – Report generators
  • 13. SADFE 2007 ● Cross-link analysis – Cataloging data using office application tools – Practical loading data into applications ● Hands-on – Practical comparative analysis ● Hands-on
  • 14. SADFE 2007 ● Legal analysis & case construction – Presenting findings ● Formal reports ● Informal reports – Practical report presentation ● Best practices for displaying technical data – Identifying elements to support case ● Criminal case ● Civil case – Examination planning
  • 15. SADFE 2007 ● Case presentation – Courtroom display considerations ● Determine the audience ● Facility considerations – Video projection ● Time lapse activity ● Office application presentation tools – Telling a story
  • 16. SADFE 2007 ● Critique the case – Why critique the case? – Is the customer happy with the product? – Maintaining a professional journal
  • 17. SADFE 2007 ● Summation – Data collection – Data Analysis – Cross-link analysis – Case construction – Case Presentation – Critique ● Questions and interests? 