Digital Forensics Lecture 11. Evidence, Reporting, and Action

Size: px
Start display at page:

Download "Digital Forensics Lecture 11. Evidence, Reporting, and Action"

Transcription

1 Digital Forensics Lecture 11 Evidence, Reporting, and Action

2 This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit

3 Next Week s Presentations Cynthia Veitch: Summary of Past Two Years Cases Damen Del Curto: Testifying Tips Vince Urias: Laws - International Cynthia Veitch: Laws - Federal (EC) Lorraine Chavez: Laws - State (New Mexico) Michael Kozloski: Laws - State (California)

4 News Item Nine people in China have received prison sentences for activity related to digital piracy. Four of the people received 13-year sentences for producing and selling bootlegged material. Another individual was sentenced to two years in prison for selling pirated software and DVDs. Fines ranged from 40,000 yuan (US$5,000) to 200,000 yuan ($25,000). An unnamed Swedish man is the first person in his country to be convicted of making copyrighted songs available for sharing over the Internet. USATODAY.COM

5 Lecture Overview Legal/Policy Preparation Collection Analysis Findings/ Evidence Reporting/ Action General Guidelines Corporate Investigations Federal Investigations State and Local Investigations Personal Investigations

6 Module 1 General Guidelines

7 General DF Framework Purpose (society, economic, individual) Risk management Law (public, private, and administrative) With and without case authority Policy Implementation of policy Preparation Process Technology Resources

8 General Goals Influence law Create case authority Prosecute offenders Make injured parties whole Protect assets Maximize profits By seeking the truth and providing evidence/data Who, how, why, where, what, and when

9 General Incident Response (SANS) Preparation policy, logging, banners, training, etc. Identification were you really compromised? Containment balance operations and investigation Eradication address asset-threatvulnerability Recovery restore necessary operations Follow-up refine the above steps

10 General DF Process Acquire the evidence Don t alter or damage original Authenticate the recorded evidence Ensure identical to original Analyze the data Don t modify acquired data Recall that the rigor is based on duty

11 Module 2 Corporate Investigations

12 Corporate Profile Goal: maximize profit Primary beneficiary: shareholders Duty: follow policy Scope: corporate wide, all individuals with cyber presence, network boundary at ISP Stakeholders: corporate officials, law enforcement, judicial system Evidence handling: standard practices Primary decision mechanism: risk management

13 Risk Management Risk measurement (many measures) = f(consequence, p(attack), p(success), p(mitigation)) OR, a combination of threat, vulnerability, and cost Process of characterizing/measuring risks and mitigations Invest in mitigation if the cost of the risk outweighs the cost of the mitigation

14 General Decisions General Process What process should be adopted? Live vs. Dead What are the risks? Seizing Evidence What to seize? How to seize it? Analysis methods Reporting format

15 Broad Strategies Restore operations Allow exploit to continue and monitor/record carefully Remove affected systems from network Unplug affected systems Contact law enforcement (could limit future activities)

16 DF Principles Impossible to measure without effecting Don t rely on tools from affected system Use tested tools Stay cognizant of the overall goal Do not discuss details outside of investigation Establish and respect the ownership of information Know the established standards for

17 Best Practices Follow documented policy Maintain demonstrable objectivity Do not seek to prove, but to understand Media analysis should be performed as we did in the labs (this is the most mature) Exercise reasonable control over data no duty to exercise full chain of custody Use proven tools Avoid detailed records of conclusions

18 Testimony Ensure the technical accuracy of your evidence Thoroughly prepare your testimony with your attorney Make sure your evidence tells a logically consistent story Request a peer review from FBI (or other expert) They have much more experience Clear this with your attorney Do not discuss anything with opposing attorneys without yours present Learn as much about the opposing technical witness as possible Learn about trial procedures Be professional, polite, ask for clarification if necessary

19 Module 3 Federal Investigations

20 Federal Profile Goal: enforce the law (shape the law?) Primary beneficiary: law-abiding public Duty: follow and uphold the law Scope: private, public, and corporate based on interstate commerce provisions, U.S. Code, etc. Stakeholders: individuals, public, corporations Evidence handling: strictly defined (manuals, handbooks, standards, etc.) Primary decision mechanism:

21 Required Practices Based on mostly proven legal standards Well documented Criminal investigations are focused More contemporary investigations have broader scope Media analysis has the most rigorous practices Full chain of custody is required Evidence handling procedures are well understood Not sure about the detail of records

22 DOJ Model Preparation Equipment and Tools for investigation Collection Search for electronic evidence Secure and Evaluate the Scene. Ensure integrity of evidence, identify evidence Document the Scene. Document physical attributes (photos of digital evidence) Evidence Collection. Collect system or copy data Examination Technical review searching for evidence Analysis Review examination results Reporting Notes from the case

23 U.S. Air Force Model Identification Detect 0100 the incident/crime 1011 Preparation Tools, techniques and obtain approval Approach Strategy Maximize collection of evidence, minimize impact on victim Preservation Isolate and secure physical and digital evidence Collection Record physical crime scene and duplicate digital evidence Examination Search for evidence relating to the crime Analysis Develop theory based on evidence found Presentation Summarize and explain final conclusion and theory Return Evidence Return collected evidence to the owner

24 Module 4 State and Local Investigations

25 State and Local Profile Goal: Similar with Federal Primary beneficiary: Same as Federal Duty: Same as Federal Scope: Much more narrow than Federal Stakeholders: Same as Federal Evidence handling: Similar to Federal Primary decision mechanism: Resources

26 Module 5 Personal Investigations

27 Personal Investigations Goal: Primary beneficiary: The individual Duty: Follow the law Scope: Some personal information resources Stakeholders: Users of the personal network Evidence handling: None Primary decision mechanism: Varies

28 Module 6 Problems and Challenges

29 Difficult Problems Rapidly emerging law, lack of case authority Creative and adaptive criminals Very little design-for-forensics Fail-safe evidence handling processes Lack of meaningful borders International investigations add significant complexity Current balance favors privacy/anonymity Difficult to answer the who question Balancing privacy with security Current balance favors privacy/anonymity

30 Questions? After all, you are an investigator

THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK

THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK I. Ademu 1, C. Imafidon 2 1 Postgraduate Student, School of Architecture, Computing and Engineering, University of East London, London, United Kingdom,

More information

Handling Digital Photographs for Use in Criminal Trials V2, March 2008

Handling Digital Photographs for Use in Criminal Trials V2, March 2008 Handling Digital Photographs for Use in Criminal Trials V2, March 2008 This is a DRAFT guide that may, once fully developed, be used by law enforcement to help ensure that digital photographs are admissible

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

the Companies and Intellectual Property Commission of South Africa (CIPC)

the Companies and Intellectual Property Commission of South Africa (CIPC) organized by the Companies and Intellectual Property Commission of South Africa (CIPC) the World Intellectual Property Organization (WIPO) the International Criminal Police Organization (INTERPOL) the

More information

A Comprehensive and Harmonized Digital Forensic Investigation. Process Model

A Comprehensive and Harmonized Digital Forensic Investigation. Process Model 1 A Comprehensive and Harmonized Digital Forensic Investigation Process Model Aleksandar Valjarevic MSc 1, H. S. Venter Ph.D. 1 1 Department of Computer Science, University of Pretoria, Lynnwood Drive,

More information

Digital Forensics. What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB

Digital Forensics. What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB Digital Forensics What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB What we shall look to cover Who am I? What is Digital Forensics? Some basic (but core) Digital Forensic

More information

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense

More information

Practical Guidelines For IP Portfolio Management

Practical Guidelines For IP Portfolio Management For the latest breaking news and analysis on intellectual property legal issues, visit Law today. www.law.com/ip Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law.com Phone: +1 646

More information

REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION OUTLINE

REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION OUTLINE 37th Session, Paris, 2013 inf Information document 37 C/INF.15 6 August 2013 English and French only REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION

More information

Kitsap County Coroner s Office

Kitsap County Coroner s Office Kitsap County Coroner s Office 2014 Annual Report Page 2 Page 2 Mission Statement The mission of the Kitsap County Coroner s Office is to serve the living through the investigation of sudden, unexpected,

More information

This version has been archived. Find the current version at on the Current Documents page. Scientific Working Groups on.

This version has been archived. Find the current version at  on the Current Documents page. Scientific Working Groups on. Scientific Working Groups on Digital Evidence and Imaging Technology SWGDE/SWGIT Guidelines & Recommendations for Training in Digital & Multimedia Evidence Disclaimer: As a condition to the use of this

More information

Justice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland

Justice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland Justice Sub-Committee on Policing Police Scotland s digital data and ICT strategy Written submission from Police Scotland The following information is provided for information of the Justice Sub-Committee.

More information

TechAmerica Europe comments for DAPIX on Pseudonymous Data and Profiling as per 19/12/2013 paper on Specific Issues of Chapters I-IV

TechAmerica Europe comments for DAPIX on Pseudonymous Data and Profiling as per 19/12/2013 paper on Specific Issues of Chapters I-IV Tech EUROPE TechAmerica Europe comments for DAPIX on Pseudonymous Data and Profiling as per 19/12/2013 paper on Specific Issues of Chapters I-IV Brussels, 14 January 2014 TechAmerica Europe represents

More information

DC Core Internet Values discussion paper 2017

DC Core Internet Values discussion paper 2017 DC Core Internet Values discussion paper 2017 Focus on Freedom from Harm Introduction The Internet connects a world of multiple languages, connects people dispersed across cultures, places knowledge dispersed

More information

11th Annual Patent Law Institute

11th Annual Patent Law Institute INTELLECTUAL PROPERTY Course Handbook Series Number G-1316 11th Annual Patent Law Institute Co-Chairs Scott M. Alter Douglas R. Nemec John M. White To order this book, call (800) 260-4PLI or fax us at

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

Exercise: Using ISACS in the Context of Marking, Recordkeeping and Tracing

Exercise: Using ISACS in the Context of Marking, Recordkeeping and Tracing Exercise: Using ISACS in the Context of Marking, Recordkeeping and Tracing SCENARIO Context Country Y is a new state that has recently gained its independence. While the country experienced high levels

More information

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY The Internet is changing the way that individuals launch businesses, established companies function, and

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by PAKISTAN DISCLAIMER: The views presented

More information

DISPOSITION POLICY. This Policy was approved by the Board of Trustees on March 14, 2017.

DISPOSITION POLICY. This Policy was approved by the Board of Trustees on March 14, 2017. DISPOSITION POLICY This Policy was approved by the Board of Trustees on March 14, 2017. Table of Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. POLICY STATEMENT... 3 5. CRITERIA...

More information

Free Online Training

Free Online Training Using DNA and CODIS to Resolve Missing and Unidentified Person Cases B.J. Spamer NamUs Training and Analysis Division Office: 817-735-5473 Cell: 817-964-1879 Email: BJ.Spamer@unthsc.edu Free Online Training

More information

A Framework for Digital Heritage Forensics. Luciana Duranti, The University of British Columbia

A Framework for Digital Heritage Forensics. Luciana Duranti, The University of British Columbia A Framework for Digital Heritage Forensics Luciana Duranti, The University of British Columbia History of the DRF Project Archival concepts are grounded in Roman Law Archives as a place trusted custody

More information

TLC ENGINE. Our complete Digital Change Management platform. Training. Testing. Certification. Compliance. Communication

TLC ENGINE. Our complete Digital Change Management platform. Training. Testing. Certification. Compliance. Communication Our complete Digital Change Management platform Training Testing Certification Compliance Communication What the market says The need for digital change is greater than ever to cope with rapidly changing

More information

1/8/2013. Free Online Training. Using DNA and CODIS to Resolve Missing and Unidentified Person Cases. Click Online Training

1/8/2013. Free Online Training. Using DNA and CODIS to Resolve Missing and Unidentified Person Cases.  Click Online Training Free Online Training Using DNA and CODIS to Resolve Missing and Unidentified Person Cases B.J. Spamer NamUs Training and Analysis Division Office: 817-735-5473 Cell: 817-964-1879 Email: BJ.Spamer@unthsc.edu

More information

The Federal Prosecution of Trade Secret Theft

The Federal Prosecution of Trade Secret Theft Presented to: The Federal Prosecution of Trade Secret Theft June 16, 2016 Presented by: Barak Cohen, Partner barakcohen@perkinscoie.com 202-654-6337 Disclaimer: The information contained herein should

More information

Sioux Falls Police Department Partnering with the community to serve, protect, and promote quality of life!

Sioux Falls Police Department Partnering with the community to serve, protect, and promote quality of life! Sioux Falls Police Department Partnering with the community to serve, protect, and promote quality of life! Policy: Evidence Preservation Related Policies: Section #: 1200 Evidence Policy #: 1201 Effective:

More information

MCPI Annual Conference Tuesday, September 19, 2017

MCPI Annual Conference Tuesday, September 19, 2017 Michigan Council of Professional Investigators MCPI Annual Conference Tuesday, September 19, 2017 Location: Cleary University, 3750 Cleary Drive, Howell, MI 48843 Time 8:45am 9:00am 9:00am 9:45am 9:45am

More information

Key Strategies for Your IP Portfolio

Key Strategies for Your IP Portfolio Key Strategies for Your IP Portfolio Jeremiah B. Frueauf, Partner Where s the value?! Human capital! Physical assets! Contracts, Licenses, Relationships! Intellectual Property Patents o Utility, Design

More information

Wise Up to Counterfeiting

Wise Up to Counterfeiting Wise Up to Counterfeiting A GUIDE FOR POLICE OFFICERS www.bankofcanada.ca/banknotes With the introduction of polymer bank notes in 2011, the Bank of Canada s message is clear it intends to stay ahead of

More information

Briefing for NPSTC DHS SCIENCE AND TECHNOLOGY 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE. September 6, 2017

Briefing for NPSTC DHS SCIENCE AND TECHNOLOGY 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE. September 6, 2017 DHS SCIENCE AND TECHNOLOGY Briefing for NPSTC 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE September 6, 2017 Sridhar Kowdley Program Manager First Responders Group Science and Technology Directorate

More information

Trade Secret Protection of Inventions

Trade Secret Protection of Inventions Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client

More information

Robert Bond Partner, Commercial/IP/IT

Robert Bond Partner, Commercial/IP/IT Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public

More information

University of Massachusetts Amherst Libraries. Digital Preservation Policy, Version 1.3

University of Massachusetts Amherst Libraries. Digital Preservation Policy, Version 1.3 University of Massachusetts Amherst Libraries Digital Preservation Policy, Version 1.3 Purpose: The University of Massachusetts Amherst Libraries Digital Preservation Policy establishes a framework to

More information

USTR NEWS UNITED STATES TRADE REPRESENTATIVE. Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET

USTR NEWS UNITED STATES TRADE REPRESENTATIVE.   Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET USTR NEWS UNITED STATES TRADE REPRESENTATIVE www.ustr.gov Washington, D.C. 20508 202-395-3230 FOR IMMEDIATE RELEASE August 27, 2018 Contact: USTR Public & Media Affairs media@ustr.eop.gov UNITED STATES

More information

IP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018

IP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018 ANNUAL WORK PLAN FOR 2018 IP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018 IP Key South East Asia is an EU Project designed to support the Free Trade Agreement (FTA) talks and Intellectual Property Dialogues

More information

The Internet of Things: an overview

The Internet of Things: an overview The Internet of Things: an overview "Workshop on New Frontiers in Internet of Things Telecommunications/ICT4D Laboratory (T/ICT4D) of the Abdus Salam International Centre for Theoretical Physics (ICTP)

More information

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015)

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) PURPOSE To provide library customers and staff with a statement of philosophy and the key objectives respecting

More information

North Carolina Fire and Rescue Commission. Certified Fire Investigator Board. Course Equivalency Evaluation Document

North Carolina Fire and Rescue Commission. Certified Fire Investigator Board. Course Equivalency Evaluation Document North Carolina Fire and Rescue Commission Certified Fire Investigator Board Course Equivalency Evaluation Document NOTICE This material is to be used to correlate equivalency of outside programs to the

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

At the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene

At the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene FORENSIC SCIENCE - BURKS Crime Scene At the Crime Scene Forensic science begins at the crime scene, which can provide useful information that must be carefully, systematically, scientifically, and legally

More information

A Hybrid Risk Management Process for Interconnected Infrastructures

A Hybrid Risk Management Process for Interconnected Infrastructures A Hybrid Management Process for Interconnected Infrastructures Stefan Schauer Workshop on Novel Approaches in and Security Management for Critical Infrastructures Vienna, 19.09.2017 Contents Motivation

More information

11th Annual Patent Law Institute

11th Annual Patent Law Institute INTELLECTUAL PROPERTY Course Handbook Series Number G-1316 11th Annual Patent Law Institute Co-Chairs Scott M. Alter Douglas R. Nemec John M. White To order this book, call (800) 260-4PLI or fax us at

More information

Unit 2: Understanding NIMS

Unit 2: Understanding NIMS Unit 2: Understanding NIMS This page intentionally left blank. Objectives At the end of this unit, you should be able to describe: The intent of NIMS. Key concepts and principles underlying NIMS. Scope

More information

Batya F. Forsyth Partner

Batya F. Forsyth Partner Batya is the chair of the firm's Litigation Section and co-chair of the Privacy, Data Security and Information Governance group. She is a Certified Information Privacy Professional (US) with the International

More information

The Witness Charter - Looking after Witnesses

The Witness Charter - Looking after Witnesses The Witness Charter - Looking after Witnesses The support you can get and how you should be treated when telling the police about a crime right up to when it is heard in court and afterwards. An EasyRead

More information

A DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS

A DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS A DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS Jock Forrester and Barry Irwin (CISSP) SNRG Department of Computer Science Hamilton Building, Rhodes University, Grahamstown, 6139 Email:

More information

Section 1: Internet Governance Principles

Section 1: Internet Governance Principles Internet Governance Principles and Roadmap for the Further Evolution of the Internet Governance Ecosystem Submission to the NetMundial Global Meeting on the Future of Internet Governance Sao Paolo, Brazil,

More information

What is a collection in digital libraries?

What is a collection in digital libraries? What is a collection in digital libraries? Changing: collection concepts, collection objects, collection management, collection issues Tefko Saracevic, Ph.D. This work is licensed under a Creative Commons

More information

Towards Solving the Identity Challenge Faced by Digital Forensics

Towards Solving the Identity Challenge Faced by Digital Forensics Towards Solving the Identity Challenge Faced by Digital Forensics A. Valjarevic and H. Venter Department of Computer Science, University of Pretoria e-mail: alexander@vlatacom.com Abstract The importance

More information

Wildlife Forensics General Standards

Wildlife Forensics General Standards ASB Standard 019, First Edition 2018 Wildlife Forensics General Standards This document is copyrighted by the AAFS Standards Board, LLC. 2018 All rights are reserved. 410 North 21st Street, Colorado Springs,

More information

STEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS

STEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS Active Shooter Management It s now part of our reality that we must consider what to do if we were to be caught in an active shooter event. Although knowing how to run, hide or fight might be quite useful

More information

A POLICY in REGARDS to INTELLECTUAL PROPERTY. OCTOBER UNIVERSITY for MODERN SCIENCES and ARTS (MSA)

A POLICY in REGARDS to INTELLECTUAL PROPERTY. OCTOBER UNIVERSITY for MODERN SCIENCES and ARTS (MSA) A POLICY in REGARDS to INTELLECTUAL PROPERTY OCTOBER UNIVERSITY for MODERN SCIENCES and ARTS (MSA) OBJECTIVE: The objective of October University for Modern Sciences and Arts (MSA) Intellectual Property

More information

GROUP OF SENIOR OFFICIALS ON GLOBAL RESEARCH INFRASTRUCTURES

GROUP OF SENIOR OFFICIALS ON GLOBAL RESEARCH INFRASTRUCTURES GROUP OF SENIOR OFFICIALS ON GLOBAL RESEARCH INFRASTRUCTURES GSO Framework Presented to the G7 Science Ministers Meeting Turin, 27-28 September 2017 22 ACTIVITIES - GSO FRAMEWORK GSO FRAMEWORK T he GSO

More information

International Forensic Services

International Forensic Services International Forensic Services Right People. Delivering Results. Experienced scientists delivering forensic effectiveness, unquestionable integrity, focused customer service and value for money. Strengthening

More information

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following

More information

4 / GENERAL. Processing minor crime scenes - Patrol Officer:

4 / GENERAL. Processing minor crime scenes - Patrol Officer: Laurel Police Department General Order Section 4/700 Criminal Investigation 4 / 705 Collection / Preservation of Evidence 8/25/98 Rev 3/08/09 Accreditation Standards 1.2.4/43.1.4/61.2.3/83.1.1/83.2.1/83.2.2/

More information

Our Corporate Strategy Digital

Our Corporate Strategy Digital Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital

More information

Digital Forensics: the Need for Integration

Digital Forensics: the Need for Integration Abstract Digital Forensics: the Need for Integration P. Sant and M. Hewling Institute for Research in Applicable Computing University of Bedfordshire, Park Square, Luton, Bedfordshire LU1 3JU, United Kingdom

More information

Trends in. Archives. Practice MODULE 8. Steve Marks. with an Introduction by Bruce Ambacher. Edited by Michael Shallcross

Trends in. Archives. Practice MODULE 8. Steve Marks. with an Introduction by Bruce Ambacher. Edited by Michael Shallcross Trends in Archives Practice MODULE 8 Becoming a Trusted Digital Repository Steve Marks with an Introduction by Bruce Ambacher Edited by Michael Shallcross chicago 60 Becoming a Trusted Digital Repository

More information

Program Automotive Security and Privacy

Program Automotive Security and Privacy FFI BOARD FUNDED PROGRAM Program Automotive Security and Privacy 2015-11-03 Innehållsförteckning 1 Abstract... 3 2 Background... 4 3 Program objectives... 5 4 Program description... 5 5 Program scope...

More information

THE VERY BRIEF HISTORY OF DIGITAL. Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC

THE VERY BRIEF HISTORY OF DIGITAL. Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC THE VERY BRIEF HISTORY OF DIGITAL EVIDENCE STANDARDS Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC Abstract: Key words: This paper will trace

More information

EUROPEAN GNSS APPLICATIONS IN H2020

EUROPEAN GNSS APPLICATIONS IN H2020 EUROPEAN GNSS APPLICATIONS IN H2020 Introduction to Call H2020-Galileo-2014-1 Marta Krywanis-Brzostowska Market Development European GNSS Agency www.gsa.europa.eu/r-d/h2020 Agenda R&D in the European GNSS

More information

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones School of Computing and

More information

Spring Conference of European Data Protection Authorities (Budapest, May 2016)

Spring Conference of European Data Protection Authorities (Budapest, May 2016) Spring Conference of European Data Protection Authorities (Budapest, 26-27 May 2016) Giuseppe Busia Secretary General Italian Data Protection Authority Garante per la protezione dei dati personali Introductory

More information

DIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE

DIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE DIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE CP Grobler, Prof B Louwrens University of Johannesburg, Department of Business IT Nedbank, SA talania@uj.ac.za 011 406 3551 buksl@nedbank.co.za 011 294

More information

Fact Sheet IP specificities in research for the benefit of SMEs

Fact Sheet IP specificities in research for the benefit of SMEs European IPR Helpdesk Fact Sheet IP specificities in research for the benefit of SMEs June 2015 1 Introduction... 1 1. Actions for the benefit of SMEs... 2 1.1 Research for SMEs... 2 1.2 Research for SME-Associations...

More information

2018 Rate Card.

2018 Rate Card. 08 Rate Card https://www.crime-scene-investigator.net We are the top ranking Crime Scene Investigation and Forensic website in the United States (and the world).* USA GLOBAL SITES SITE URL RANK RANK LINKING

More information

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition EXIN Privacy and Data Protection Foundation Preparation Guide Edition 201701 Content 1. Overview 3 2. Exam requirements 5 3. List of Basic Concepts 9 4. Literature 15 2 1. Overview EXIN Privacy and Data

More information

Responsible Data Use Policy Framework

Responsible Data Use Policy Framework 1 May 2018 Sidewalk Toronto is a joint effort by Waterfront Toronto and Sidewalk Labs to create a new kind of complete community on Toronto s waterfront that combines cutting-edge technology and forward-thinking

More information

Exercise 1. Experiment Inventory. Collecting and Processing Evidence. Materials. Labware. (1) Chain of Custody Form. (1) *Scissors

Exercise 1. Experiment Inventory. Collecting and Processing Evidence. Materials. Labware. (1) Chain of Custody Form. (1) *Scissors Exercise 1 Collecting and Processing Evidence Experiment Inventory Materials (1) Chain of Custody Form Labware (1) *Scissors (1) Paper Photomacrographic Scale Crime Scene Scenario (1) Sock (1) Sheet of

More information

ENFSI European Fingerprint Working Group. Best Practice Manual for Fingerprint Examination

ENFSI European Fingerprint Working Group. Best Practice Manual for Fingerprint Examination 2012 ENFSI Monopoly Grant Application to the EC B6 ENFSI European Fingerprint Working Group Best Practice Manual for Fingerprint Examination Maj. Aldo Mattei, PhD RIS Carabinieri, Italy Outline 1 Framework:

More information

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF EXECUTIVE SUMMARY St. Louis Region Emerging Transportation Technology Strategic Plan June 2017 Prepared for East-West Gateway Council of Governments by ICF Introduction 1 ACKNOWLEDGEMENTS This document

More information

HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM)

HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM) Homeland Security & Emergency Management (HSEM) 1 HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM) HSEM 501 CRITICAL ISSUES IN This course reintroduces the homeland security professional to the wicked problems

More information

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe BLOCKCHAIN FOR SOCIAL GOOD November 9, 2017 Dr. Cara LaPointe What is the Blockchain for Social Good project? 3 Building a Framework Around Privacy & Ethics 4 Approach Build Community Understand the Challenges

More information

ServDes Service Design Proof of Concept

ServDes Service Design Proof of Concept ServDes.2018 - Service Design Proof of Concept Call for Papers Politecnico di Milano, Milano 18 th -20 th, June 2018 http://www.servdes.org/ We are pleased to announce that the call for papers for the

More information

FIRE INVESTIGATOR SCENE EXAMINATION

FIRE INVESTIGATOR SCENE EXAMINATION 10 FIRE INVESTIGATOR SCENE EXAMINATION 1. Secure a fire ground/scene so that unauthorized persons can recognize the perimeters of the investigative scene and are kept from restricted areas and evidence

More information

Wildlife DNA Forensics Course

Wildlife DNA Forensics Course Wildlife DNA Forensics Course Lecture A4 Evidence for forensic testing: chain of custody and sample preservation. No: A4 Lecturer: R. McEwing Date: 02/08/2010 Introduction Maintaining the Chain of Custody

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Stephen D. Dellinger. Focus Areas. Overview

Stephen D. Dellinger. Focus Areas. Overview Office Managing Shareholder Bank of America Corporate Center 100 North Tryon Street, Suite 4150 28202 main: (704) 972-7000 direct: (704) 972-7010 fax: (704) 333-4005 sdellinger@littler.com 1320 Main Street

More information

Children s rights in the digital environment: Challenges, tensions and opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April

More information

(EC) ), 11(8) 347/ /2009, (EC)

(EC) ), 11(8) 347/ /2009, (EC) ENTSOs consistent and interlinked electricity and gas model in accordance with Article 11(8) of Regulation (EU) No 347/2013 of the European Parliament and of the Council of 17 April 2013 21 December 2016

More information

Your guide to Inquests

Your guide to Inquests GUIDE TO INQUESTS Your guide to Inquests What is an inquest? An inquest is a legal investigation to establish the circumstances surrounding a person s death including who died, how and when they died and

More information

PRACTICE TIPS FOR TRADEMARK PROSECUTION BEFORE THE USPTO

PRACTICE TIPS FOR TRADEMARK PROSECUTION BEFORE THE USPTO PRACTICE TIPS FOR TRADEMARK PROSECUTION BEFORE THE USPTO HERSHKOVITZ IP GROUP INTA 2012 WASHINGTON, D.C. Presented by Brian Edward Banner www.hershkovitzipgroup.com Who am I? I am an Adjunct Professor

More information

Spectrum for audio PMSE. Use of the 694 to 703 MHz band

Spectrum for audio PMSE. Use of the 694 to 703 MHz band Spectrum for audio PMSE Use of the 694 to 703 MHz band Statement: Publication Date: 24 November 2017 About this document This statement sets out our decision to allow Programme Making and Special Events

More information

THEFUTURERAILWAY THE INDUSTRY S RAIL TECHNICAL STRATEGY 2012 INNOVATION

THEFUTURERAILWAY THE INDUSTRY S RAIL TECHNICAL STRATEGY 2012 INNOVATION 73 INNOVATION 74 VISION A dynamic industry that innovates to evolve, grow and attract the best entrepreneurial talent OBJECTIVES Innovation makes a significant and continuing contribution to rail business

More information

Smart Grid Maturity Model: A Vision for the Future of Smart Grid

Smart Grid Maturity Model: A Vision for the Future of Smart Grid Smart Grid Maturity Model: A Vision for the Future of Smart Grid David W. White Smart Grid Maturity Model Project Manager White is a member of the Resilient Enterprise Management (REM) team in the CERT

More information

Corporate Espionage and Global Security: Protecting Your Business Interests

Corporate Espionage and Global Security: Protecting Your Business Interests Corporate Espionage and Global Security: Protecting Your Business Interests Chicago, Illinois February 25, 2010 Brian L. Whisler - Partner Washington, DC Baker & McKenzie International is a Swiss Verein

More information

ICTen - Invest in Unique ID Schemes and Link CRVS and UHC - a Focus on Concrete Steps and Capacity Building October 29-30, 2015

ICTen - Invest in Unique ID Schemes and Link CRVS and UHC - a Focus on Concrete Steps and Capacity Building October 29-30, 2015 AeHIN Side Meeting ICTen - Invest in Unique ID Schemes and Link CRVS and UHC - a Focus on Concrete Steps and Capacity Building October 29-30, 2015 Background As Asia-Pacific moves into the post-2015 development

More information

Putting the Systems in Security Engineering An Overview of NIST

Putting the Systems in Security Engineering An Overview of NIST Approved for Public Release; Distribution Unlimited. 16-3797 Putting the Systems in Engineering An Overview of NIST 800-160 Systems Engineering Considerations for a multidisciplinary approach for the engineering

More information

Some Regulatory and Political Issues Related to Space Resources Exploration and Exploitation

Some Regulatory and Political Issues Related to Space Resources Exploration and Exploitation 1 Some Regulatory and Political Issues Related to Space Resources Exploration and Exploitation Presentation by Prof. Dr. Ram Jakhu Associate Professor Institute of Air and Space Law McGill University,

More information

SAMPLE DOCUMENT. Date: 2014 USE STATEMENT & COPYRIGHT NOTICE

SAMPLE DOCUMENT. Date: 2014 USE STATEMENT & COPYRIGHT NOTICE SAMPLE DOCUMENT Type of Document: Collections Management Policy Museum Name: Ocean Springs Museum of History Date: 2014 Type: History Museum Budget Size: $250,000 to $999,000 Budget Year: 2015 Governance

More information

The EFPIA Perspective on the GDPR. Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference , Helsinki

The EFPIA Perspective on the GDPR. Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference , Helsinki The EFPIA Perspective on the GDPR Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference 26-27.9.2017, Helsinki 1 Key Benefits of Health Data Improved decision-making Patient self-management CPD

More information

Protection of Privacy Policy

Protection of Privacy Policy Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,

More information

A New Vision for Patent Prosecution as Asset Managers: Optimizing the Value of Intellectual Property

A New Vision for Patent Prosecution as Asset Managers: Optimizing the Value of Intellectual Property A New Vision for Patent Prosecution as Asset Managers: Optimizing the Value of Intellectual Property By Abdul R. Zindani Deputy Assistant General Counsel, Patent Prosecution Conversant Intellectual Property

More information

COAL CREEK COMMUNITY PARK MUSEUM AND COLLECTION POLICY

COAL CREEK COMMUNITY PARK MUSEUM AND COLLECTION POLICY South Gippsland Shire Council COAL CREEK COMMUNITY PARK MUSEUM AND COLLECTION POLICY Policy Number C05 Directorate Development Services Council Item No. E.15 Department Economic Development Tourism and

More information

LAW ON TECHNOLOGY TRANSFER 1998

LAW ON TECHNOLOGY TRANSFER 1998 LAW ON TECHNOLOGY TRANSFER 1998 LAW ON TECHNOLOGY TRANSFER May 7, 1998 Ulaanbaatar city CHAPTER ONE COMMON PROVISIONS Article 1. Purpose of the law The purpose of this law is to regulate relationships

More information

Intellectual Property

Intellectual Property Intellectual Property 1 Overview In a progressively uncertain economy, counterfeit products are becoming more prevalent particularly in Vietnam. Therefore, companies should be increasingly vigilant in

More information

Davina Pujari Partner

Davina Pujari Partner Davina is the co-chair of the Environmental & Natural Resources group at Hanson Bridgett. She is an experienced trial attorney who has practiced environmental and criminal law for more than twenty years,

More information

2009 New Jersey Core Curriculum Content Standards - Technology

2009 New Jersey Core Curriculum Content Standards - Technology P 2009 New Jersey Core Curriculum Content s - 8.1 Educational : All students will use digital tools to access, manage, evaluate, and synthesize information in order to solve problems individually and collaboratively

More information

DESIGN INSTITUTE OF AUSTRALIA ABN GPO Box 355 Melbourne, VIC 3001

DESIGN INSTITUTE OF AUSTRALIA ABN GPO Box 355 Melbourne, VIC 3001 DESIGN INSTITUTE OF AUSTRALIA ABN 12 004 412 613 GPO Box 355 Melbourne, VIC 3001 SUBMISSION TO THE ADVISORY COUNCIL ON INTELLECTUAL PROPERTY'S REVIEW OF THE DESIGNS SYSTEM RESPONSE TO THE OPTIONS PAPER

More information