Presentation

14
Legal Tools for a Digital Media World

Transcript of Presentation

Page 1: Presentation

Legal Tools for aDigital Media World

Page 2: Presentation

Defining Digital ForensicsWho Knew What, When & How

Digital Forensics is a scientific process that

utilizes specialized tools and forensic

techniques to recover, authenticate,

analyze and report on Electronically Stored

Information (ESI).

ESI is used to reconstruct events, track

patterns & assemble an investigative

profile focused on digital media based

activities.

Who Knew What, When & How

Almost everyone use devices such as cell

phones, laptops and tablets that generate

ESI & digital evidence that can be used to

establish facts

Deleting a file just removes the pointers but

the data remains in unallocated space.

Evidentiary

Weight

Digital evidence can

cement and or give

credibility to a legal

theory or theme in a way

that circumstantial

evidence cannot.

Page 3: Presentation

Digital Forensics LaboratoryState of the Art Facility

State-of-the-Art architecture & technology

for scalable, high–powered processing.

Latest versions of industry leading,

forensic analysis & eDiscovery toolsets.

External Perimeter & Internal Security

layers via auditable card access, Biometric

Access Controls and IR video surveillance.

Quality Controls

Documented Policies & Standard Operating

Procedures govern laboratory operations from

Chain of Custody through Evidence Disposition.

Certified Forensics Team

All Forensic Analysts have earned the leading

industry certifications.

Page 4: Presentation

Core Forensic Services

eDiscovery

Mobile Device Forensics

System Forensics

Integrity Services

Page 5: Presentation

System ForensicseMail/eDocuments

Stored in proprietary and

complex file formats

Digital Photos

Images are created in

several file formats and

could be stored anywhere

Unallocated Space

Gaps present on a digital

drive often contain hidden

data

Registry

Contains stored system

&user configuration

settings as well as typed

URLs

Web Browsing

Data stored in proprietary

formats specific to each

browser; Internet Explorer,

Firefox, etc.

Storage

If it stores ESI, it can be

analyzed

SYSTEM FORENSICS

Page 6: Presentation

eDiscovery

Extreme Care

ESI must be skillfully extracted,

processed & analyzed while

maintaining evidentiary integrity

Massive

Even in smaller cases, the

amount of ESI can be

overwhelming

Out of Court

Expertly performed,

eDiscovery often leads to

pre-trial settlements

eDISCOVERY

Specialized Training & Tools

In-depth knowledge of File

Systems, Directory Structures &

Forensic toolsets

Scientific Evidence

Time and Date Metadata is

extremely accurate

Page 7: Presentation

Mobile Device Forensics

MOBILE DEVICE FORENSICS

Page 8: Presentation

Integrity Services

INTEGRITYSERVICES

Analysis of departing employee’s

Electronically Stored Information

for indication of IP theft,

Customer List theft, slander

Forensic Capture and

Retention of departing

employees ESI for future

litigation / analysis

Random analysis of ESI for key

personnel (Similar to random

drug screening)

Ensuring employee compliance.

(HIPAA, HITECH, Meaningful USE,

FISMA, FFIEC, GLBA, PCI DSS,

etc)

Page 9: Presentation

Active Case ExamplesMedical Malpractice

SYSTEM FORENSIC INVESTIGATION

EMR Record Manipulation, Extensive &

Deliberate Destruction of Evidence

1st of 5 arbitrations resulted in a swift

settlement

Medical Malpractice

eDISCOVERY

Large hospital system preparing for

litigation specific to unnecessary coronary

procedures

Ongoing eMail and eDocument processing

& analysis

Intellectual Property Theft

CORPORATE eDISCOVERY

International Transportation company

seeks to protect its proprietary data

Harassment

MOBILE DEVICE FORENSICS

Recovered SMS text messages which

provided proof of intent to harm

Child Custody

SYSTEM FORENSIC INVESTIGATION

Internet activity profiling & usage timeline

Page 10: Presentation

Questions & Discussion

Page 11: Presentation

Case Process Flow

Post-Case Processing

CaseReporting

CaseDocumentation

Forensic Analysis

Imaging + Hashing

Collection

CaseInitiation

START FINISH

Page 12: Presentation

Active Case ExamplesEnron

Recovered email & eDocument files played

a key role in the investigation and

conviction

SYSTEM FORENSICS

Deepwater Horizon

Recovered emails and Cell phone text

messages regarding spoliation

SYSTEM FORENSICS

eDISCOVERY

eDISCOVERY

MOBILE FORENSICS

Page 13: Presentation

Active Case Examples (cont’d)

Medical Malpractice

Recovered email & eDocument files played

a key role in the investigation and

conviction

SYSTEM FORENSICS

Central Penn Women's Health

Corporate Sabotage/Intellectual Property

Theft

Evidence authentication & event timelines

were validated with System Forensics

SYSTEM FORENSICS

eDISCOVERY

eDISCOVERY

MOBILE FORENSICS

Page 14: Presentation

WWW.OPTiMO-IT.COM | 877-564-8552 (OPTION 3)