SlideShare a Scribd company logo
1 of 32
Download to read offline
Community Supervision in the 21st Century
Prepared By: Mathew J. Shelby, Correctional Probation Senior Officer & UCF Student Examiner
Program Purpose:
The purpose of a Digital Forensics Lab within the Florida Department of Corrections is to
provide officers with essential information needed to support best practice supervision plans for
offenders. The Internet provides anonymity for offenders and gives them the ability to hide
volumes of information on computers, cell phones, laptops and other electronic storage devices
placing officers at a disadvantage when this information cannot be discovered and shared.
Officers without knowledge and proper training in computers and digital forensics can
compromise cases in Court when non-forensic methods of discovery are used. The lab will
provide scientifically sound forensic services for recovery of electronic evidence so supervising
officers can more effectively determine an offender’s activities, thereby maximizing corrections
resources, enhancing public safety and ensuring the highest rates of successful outcomes.
Personal Statement & Vision:
This project was undertaken because this student examiner and Correctional Probation
Senior Officer wanted to take a more active role in the supervision of sex offenders and cyber
criminals as a result of my advanced coursework at the University of Central Florida in digital
forensics. I have been employed with the State of Florida since graduating from Florida State
University in 2003 with a Bachelor of Science in Criminology and a Minor Specialization in
Sociology. During my employment with the State of Florida, I have worked as a Child Protective
Investigator and a Correctional Probation Officer. As a Child Protective Investigator I have
witnessed firsthand damages caused by sexual abuse through interviews with child victims and
identified a personal need to take action. In 2011-2013, I completed general information security
coursework at Pasco Hernando Community College including coursework in Computer
Concepts, Managing Information Technology, Microcomputer Applications, Introduction to
Networking, Microcomputer Software Essentials, Principles of Information Security, Webpage
Design and Business Communications. In 2013, I enrolled in the Masters of Science Program in
Digital Forensics under the leadership of Dr. Sheau-Dong Lang, an educator who has spent many
nights answering my countless questions! My coursework at the University of Central Florida
has included Computer Forensics I, Computer Forensics II, Topics in Forensic Science, The
Practice of Digital Forensics, Operating Systems and File System Forensics, The Nature of
Crime, Incident Response Technologies and Electronic Discovery for Digital Forensic
Professionals. I have maintained a 4.0 GPA throughout my coursework in Information Security
and Digital Forensics. I have spent the last two years of my life devoted to learning the skills
necessary to conduct forensic digital examinations using industry software and hardware. In
2014, I was recommended by my former supervisor, Lisa Payne, for the prestigious Community
Corrections Employee of the Year and received this award on May 7, 2014. I was also classified
as a subject matter expert by the Florida Department of Law Enforcement in the subjects of
Intake and Orientation, Case Management, and Offender Supervision in August 2014. Later that
month, I was recognized by my director, Dr. Sheau-Dong Lang with the UCF Provost Merit
Scholarship for my studies in Digital Forensics at the University of Central Florida. I have
learned best practices to ensure examinations are conducted in a sound forensic manner that are
defensible in a Court of law. Due to graduate in Summer 2015, I want to put this knowledge to
use at the Florida Department of Corrections! It is my hope and dream that this report resonates
with the right staff at my agency who agree that Community Supervision in the 21st century
involves Digital Forensics and other advances discussed herein. My inspiration for this project
was a news article and subsequent conversation had with Mrs. Christi Winters, a probation and
parole officer with the Multnomah County Department of Community Justice in the state of
Oregon who helped develop and run a computer forensics lab for her agency.
Expected Outcomes & 2013-2016 Strategic Plan:
This pilot project is designed with several goals of the 2013-2016 Strategic Plan for the
Florida Department of Corrections in mind. First, Goal 3 states, "Enhance public safety through
effective supervision of offenders in the community." In support of achieving this goal, this
officer recommends reclassification of several Correctional Probation Specialist caseloads to
Cyber Specialist designation. Initially, this examiner recommends one Specialist and one backup
in the Tampa Circuit while the pilot project is being conducted. An existing Correctional
Probation Specialist may be used if they are found to possess the unique knowledge, skills and
abilities discussed elsewhere in this report; or in the alternative, a statewide survey of
Department of Corrections staff may be utilized to identify prospective candidates. The Tampa
Circuit was chosen because of its proximity to one of two Digital Forensics laboratories in
operation by Florida Department of Law Enforcement. The other Digital Forensics laboratory is
located in Tallahassee, Florida where the pilot may be expanded if the initial phases are
successful. It is envisioned that a working relationship would be developed between staff at
FDLE and Department of Corrections to make use of existing training opportunities and
resources shared by the State and to minimize expenses. Capitalizing on partnerships such as
these to continue to improve the quality of life in Florida is one of the missions of the Florida
Department of Corrections. It also complies with Objective 2.4.5 of the 2013-2016 Strategic Plan
whose focus is to "establish collaborative partnerships with local law enforcement, community
service providers, businesses, and other appropriate entities."
The Cyber Specialist [and their backup] would be responsible for conducting all forensic
searches of sex offenders supervised in the assigned Circuit. The Specialist would work in
conjunction with the existing Correctional Probation Specialists to conduct quarterly computer
searches of supervised sex offenders and identified cyber criminals where technology was
instrumental in the commission of their crime. Although this paper focuses on sex offenders
many of the same evidence-based practices apply to cyber criminals since the Computer and
Internet are instruments that can be used in their respective criminal activities. This examiner
envisions that the Cyber Specialist would be a search team member responsible for the forensic
computer search while the physical search of the residence is conducted by the assigned officer
and other search team members. In addition, the Cyber Specialist would be responsible for
monitoring computer activities of selected sex offenders and cyber criminals who have
monitoring software installed on their computers. If a violation is discovered, the Cyber
Specialist would staff the case with the assigned officer and complete the Violation Paperwork
due to their advanced knowledge of the alleged non-compliance. The Cyber Specialist, based on
their knowledge and experience, would then testify in Court to any actions taken in the offender's
case.
In consideration of Strategy 3.4, which states "Enhance stakeholder awareness of the
role, importance, and long-range outcomes of successful community supervision," this
examiner believes that the implementation of a Digital Forensics program within the Florida
Department of Corrections will have a positive impact on our "branding platform" to the general
public and our law enforcement partners. This also ties into our core values of ensuring Trust,
Respect, Accountability, Integrity and Leadership (TRAIL) because the general public and our
law enforcement partners can trust that we are holding offenders accountable for their actions.
Next, Goal 4 of the 2013-2016 Strategic Plan for the Florida Department of Corrections
states, "Optimize organizational performance." The selected Cyber Specialist will help reduce
the burden of some of the tasks assigned to Correctional Probation Specialists by doing their
computer searches, computer activities monitoring and associated Violation paperwork on cases
they were involved in. This will not only optimize organizational performance but allow for
increased supervision and collaboration among staff. The end result is increased efficiency and
the perception to the offender that he or she is being "watched" more closely. In reclassifying an
existing position, there is no additional personnel cost to implement the Digital Forensics
program. Grant-funded organizations such as the National White Collar Crime Center have a
variety of free training courses available to agency partners and grants may available through
resources such as the Edward Byrne Memorial Justice Assistance Grant and Internet Crimes
Against Children Task Force for the purchase of equipment and software.
Strategy 4.4 of the 2013-2016 Strategic Plan includes the objective to "enhance the
relevance of job-related training throughout the Department" (Objective 4.4.3) in an effort to
"increase employee recruitment and retention efforts." (Objectives 4.4.1 and 4.4.2) This type
of training offered to Department staff who are technically inclined will provide another level of
job satisfaction that will increase the likelihood of employees remaining with the Department.
By expanding the pilot statewide into other regions such as Tallahassee where the second FDLE
Computer Forensics Lab is located, the Department will be "developing an agency-wide
succession plan for technical and specialty positions." (Objective 4.4.4)
Strategy 4.5 of the 2013-2016 Strategic Plan states the goal to "increase the efficiency of
Department operations through enhanced information technology" A digital forensics lab
would increase the efficiency of Department operations by using specialized resources to address
specialized offenders according to evidence-based practices. If the Department can obtain grants
to fund the purchase of software and forensic workstations, then this will also meet Objective
4.5.2 whose goal is to "refresh or update individual computing devices of Department staff" at
minimal expense to the taxpayers of the State of Florida.
Strategy 4.7 of the 2013-2016 Strategic Plan states the goal to "foster partnerships to
enhance the accomplishment of the Department's mission". If the pilot project is implemented
in the Tampa Circuit as intended, then a working relationship with the forensics lab at the Florida
Department of Law Enforcement can be implemented to share resources and training. The
Department could also meet Objective 4.7.1 whose goal is to "reinforce partnerships with
Florida's colleges and universities for the provision of research in the area of corrections" if a
partnership was established with the recently opened Florida Center for Cyber Security at the
University of South Florida located in Tampa, Florida. Joining local task forces and working
with the resources already available in this area, would also meet Objective 4.7.3 whose goal is
to "continue to encourage the development of local criminal justice partnerships."
Target Market:
There are several target markets that would benefit from the implementation of Digital
Forensics capabilities at the Florida Department of Corrections. First and foremost, our 2013-
2016 Strategic Plan indicates our goal is to "Change Lives to Ensure a Safer Florida." As an
agency, we have a responsibility to protect the citizens of the State of Florida through enhanced
supervision activities. When new technologies arise, it is our responsibility to investigate and
implement these activities to ensure that offenders on supervision are properly supervised
commensurate with the risk they pose to the public. Digital forensic capabilities can augment
community supervision and give us new insights into criminals who continue to re-offend. In this
regard, Digital Forensics would allow probation officers to investigate new criminal activity in
conjunction with law enforcement. Utilizing the intelligence obtained during computer
searches, mobile device analysis, and other activities, we can bring community supervision into
the 21st century and improve existing relations with our law enforcement partners.
The next target market that would benefit from the implementation of Digital Forensics
capabilities is the Sentencing Authority and Florida Commission on Offender Review (FCOR),
formerly known as the Parole Commission. Both entities could be assured that we are using
every tool in our arsenal to hold offenders accountable for their actions. When an offender is
sentenced to probation or conditional release and has restrictions about what material they can
access on computers, Internet or other electronic devices, we can use digital forensics to ensure
the offender remains in compliance. These capabilities will also allow us to enforce no contact
clauses in cases that are victim-sensitive. We can extract data from offender's cell phones and
other electronic devices to determine if they are initiating or maintaining contact with victims, in
violation of their supervision orders.
Another target market that would benefit from the implementation of Digital Forensics
capabilities at the Florida Department of Corrections is Human Resources and the Office of
Inspector General (OIG). Nearly all the work created by Department employees involves a
computer or electronic device. Staff use desktop computers, laptops, cellular phones and VOIP
desk phones which are connected to the Internet. When a Department employee is accused of
misconduct, digital forensics can play a key role in obtaining evidence of policy violations
and/or criminal conduct. These capabilities, and strong policies regarding employee use of
Department-owned equipment and Internet use, allow the Department to be proactive in
investigating cases where employee misconduct is reported. A forensic examiner can use the
Windows registry to ascertain whether a Department employee is using a personal thumb drive
on a work computer in violation of company policies. An Internet history cache search will also
reveal computer use for non-work purposes. Digital forensics is an extremely valuable tool in
internal investigations.
Digital forensics is also relevant on the Institution side at the Florida Department of
Corrections. Probation and Parole, commonly referred to as P&P, is always trying to improve
existing relations with the Institution staff and our shared resources. When contraband cell
phones or other electronic devices are recovered by corrections officers or Inspectors, they can
be given to a Certified Digital Forensics Examiner for analysis and intelligence gathering.
Examiners would be outfitted with a mobile forensic workstation kit so they could drive to the
Institution and perform on-site analysis or Inspectors can meet forensics examiners at the Lab
located in Tampa, Florida. This reduces the time constraints and expense of having to send this
material to Florida Department of Law Enforcement and allows intelligence to be disseminated
more quickly, ensuring the safety of other inmates and staff on the compound. Contraband cell
phones and other electronic devices may contain information about drugs, gangs, and other
violent activities in and outside of the institution. In this respect, probation and parole and
institution can work together to increase safety for staff and inmates throughout the State of
Florida.
Job Duties for Computer Forensics Examiners:
Job duties for computer forensics investigators include recovering data from computer
hard drives, including those that have been damaged or erased. They analyze data for clues and
evidence, and may trace hacks or gauge the effects of malware on an information system.
Additional duties for computer forensics investigators can include:
 Taking custody of equipment used in crimes, including computers, thumb drives, CDs
and DVDs, backup tapes, smart phones and digital cameras
 Using imaging software to copy data and disks
 Using file recovery programs to search for and restore deleted data
 Maintaining the chain of custody for evidence
 Writing reports and documenting procedures
 Testifying in court
Required Training and Experience:
Computer forensics investigators require a deep knowledge of computer hardware,
software and operating systems, and employees chosen for this pilot project should have a strong
technical background. This officer recommends a statewide survey of current Florida
Department of Corrections staff to determine interest in the project and whether candidates
possess the required educational background or experience to perform digital forensics analysis.
For legal reasons, certified staff (as opposed to civilian DOC personnel) should be utilized to
ensure evidence is admissible in a Court of law.
Selected personnel should also be expected to have a broad range of attributes and
abilities, including:
 Strong analytical and investigative skills
 Solid decision-making skills
 Clear written and oral communication skills
 Self-discipline and focus
 Innovative problem-solving
 Attention to detail
Scope of the Problem
According to an article written by Dr. Jim Tanner, Ph.D., computer use and Internet
access poses a risk to the proper treatment and containment of sex offenders without being
managed. Search engines estimate there are more than 60 million pages of sexually related
content on the Internet and this number grows daily. This aggregate amount does not include
information available on the Deep Web or Dark Net. The Internet not only allows offenders to
access sexually explicit material, it can also connect them with potential victims. More than 90%
of children ages 5 to 17 now have access to a computer and two thirds of kids aged 10 to 17
regularly use the Internet. (Source) One in five children reported receiving an unwanted sexual
solicitation over the Internet during the previous year. Tanner writes that, on average, 60% of the
sex offenders convicted are placed on probation in the community. Community Corrections
agencies across the nation are tasked with managing their criminal conduct and protecting the
public. As the number of sex offenders and victim-sensitive cases grow each year, local forensics
labs cannot handle the current volume of monitoring tasks presented by the current caseloads of
Correctional Probation Specialists within the Florida Department of Corrections, yet alone the
projected volumes in years to come. The Florida Department of Corrections should take action
now to manage the Internet use of sex offenders and cyber criminals on our caseloads.
The Solution (as presented by Jim Tanner, Ph. D.)
Until recently, computer forensics on sex offender's computers was only performed by
law enforcement. The main focus of law enforcement is in determining whether the suspect's
computer contains child pornography since adult pornography is not illegal to possess. Once an
offender is convicted, the focus of our examinations must shift. We must take a broader approach
to what constitutes contraband and what activities are unacceptable while being supervised.
There are three primary targets of a computer exam on a convicted sex offender: Internet History
Records (URL records), Image and media searches, and text searches. URL records are the best
source of information since they contain a record any time an offender visits a webpage. The
record will show the text that was typed by the offender to access a specific webpage or keyword
in a search engine. The examiner can determine the date/time the offender visited the page and
this information can be stored indefinitely [unless altered by the offender, although it may still be
recoverable]. Secondly, image and media searches are important to the Cyber Specialist because
we can examine their legal sexual content to help us determine the offender's sexual interests
such as:
 Do the images or media reflect an interest in a specific sex act?
 Do they reflect a preference in "partners" (e.g. age, gender, hair color, size, etc)?
 Do they reflect any other themes (e.g. exhibitionism, BDSM, etc)?
It is equally important for examiners to look for major themes that are non-sexual in nature, even
if they are not specifically related to the instant offense. These themes may turn out to be triggers
for the offender that are exposed during subsequent sex offender treatment. Some examples of
these may include:
 Children’s web sites (e.g. Nickelodeon, Sesame Street) .
 Travel or Mapping sites.
 Farm equipment sites.
 Images of women and/or
 children (non-sexual).
 On-line clothing catalogues.
 Model train sites.
 Personal Ad (dating) sites.
 Genealogy research sites.
 Health information sites.
 Gaming sites.
 E-Bay®
 Netflix®
The third main target of any computer search should be text-based searches. Many
offenders deviate from image-based pornography since it is more easily recognizable by law
enforcement and probation officers. Some sex offenders switch to text based fantasy instead of
audio/video and examinations may uncover erotic literature or hits for chats on sexually explicit
websites. Many erotic literature regarding children is stored in other languages on the internet to
avoid detection, however there are many online language converters available at no cost, making
this contraband easily accessible to offenders. Research has shown that keyword searches for
"pussy" and "cock" will identify approximately 95% of all sexual content in a forensic
examination and should be included in any computer search, at a minimum.
Dr. Tanner proposes a five part solution for the effective management of community
based sex offender [and cyber criminal]'s computers:
1) Understand the reasons for computer management
Three reasons: gather evidence for prosecutorial goals, provide supervision and
containment of the offenders; and assist the treatment agency in understanding the
offender.
2) Establish clear conditions that are computer specific
Conditions should be carefully worded to avoid violations of the rights afforded to
offenders under the Constitution and the Electronic Communications Privacy Act.
Conditions should include: offender permission for unannounced examination of
the system, offender responsibility for all data found on the system, and offender
permission for seizure of the equipment in violation. Offenders should also be
prohibited from:
 Use of the Internet to access sexual content of any nature and in any form
 Use of web based email programs which provide anonymity.
 Possession or use of programs or systems which allow the device to be booted
into a RAM kernel.
 Use of encryption and/or password protection of data
 Destroying or altering computer use records - including deleting Internet History
Records and restoring operating systems.
 Cleaning or wiping hard drives.
 Use of anti-forensic software or processes.
 Obtaining or retaining “trophy material”.
 Visiting sites which focus on the culture of potential victims.
3) Conduct an Intake early in supervision
Goals: determine the extent and type of sexual interests, deletion of inappropriate
images and text to help eliminate the existing library of sexually explicit materials
(if not previously conducted by law enforcement), and preparation of the hard
drive for future examinations.
It is imperative that any material found on the initial search be shared with the
treatment provider to gauge honesty of the offender and establish a baseline for
the offender's sexual interests during treatment. The psychological effect of
knowing all computer activity is monitored cannot be understated.
4) Install monitoring software
Monitoring software is both a time- and cost-effective solution to monitoring
offender compliance. Community supervision officers cannot seize offenders’
work computers for simple monitoring purposes, nor can they routinely remove
computers from offenders’ homes. Monitoring software can reveal the contents of
items that offenders have viewed, but not printed, and creates a clear trail of the
offender's actions. Tech-savvy offenders who try to employ anti-forensics on their
computer would be captured by monitoring software. Officers should review the
offender's computer activities, either remotely or during a field visit, at least
monthly and the process takes about 10-15 minutes. Some programs can even
forward usage reports to officer's emails where they can view information about
screenshots, email, chat room participation, Internet activity and keystrokes typed.
5) Monitor the computer frequently
One of the goals of computer management is the perception of being "watched".
If computer activities are not reviewed at least monthly [or more depending on the
offender risk assessment], then this defeats the purpose of having software
installed and may lead the offender to deviate. Some jurisdictions require
offenders to bring their computer with them to office visits.
Policy and Procedure Discussion
It is this examiner's opinion that the Department's existing computer search policy
remains valid, with some provisions added based on my knowledge and experience as a digital
forensics student and my overall experience as a Correctional Probation Senior Officer. The
Sentencing Authority (also known as the Court or, in some cases, the Florida Commission on
Offender Review (formerly known as the Florida Parole Commission) specifies the terms and
conditions of probation when an offender is sentenced. Standard conditions of supervision do
not require oral pronouncement by the Court. One such condition "permits such supervisors
[Probation Officers] to visit him or her [Probationer's] at his or her home or elsewhere." (F.S.
948.03(1)(b)). Obviously one of the first requisite steps in searching an Probationer's computer
is to be legally authorized to gain access to the location where the computer or electronic device
may be stored and this statue covers the Probation Officer's presence in the home or other
location. As authorized in Florida Statutes, the Sentencing Authority is also permitted to order
any special conditions of supervision. Florida Statute 948.039 specifies that:
"The court may determine any special terms and conditions of probation or community
control. The terms and conditions should be reasonably related to the circumstances of
the offense committed and appropriate for the Probationer. The court shall impose the
special terms and conditions by oral pronouncement at sentencing and include the terms
and conditions in the written sentencing order."
If the Court were to impose a special condition for Computer Searches on a Sexual Offender,
Sexual Predator or other Probationer where the use of a computer or electronic devices was a
part of the crime, then this would qualify under Florida Statutes as "reasonably related to the
circumstances of the offense." In cases where the use of a computer or electronic device was not
utilized by a Sexual Offender or Sexual Predator in the commission of their underlying offense,
the Legislature has determined that it is still "appropriate" to place restrictions on these
individuals' access to computers and the Internet, as specified in Florida Statutes 948.30(5)(h),
which states that:
"Effective for probationers and community controlees whose crime is committed on or
after July 1, 2005, a prohibition on accessing the Internet or other computer services
until a qualified practitioner in the Probationer’s sex offender treatment program, after
a risk assessment is completed, approves and implements a safety plan for the
Probationer’s accessing or using the Internet or other computer services."
In arriving at the determination that this condition is "appropriate", the Florida Legislature has
authorized the restriction of Internet access and computer search condition as a standard
condition (e.g. does not require oral pronouncement) for all probationers convicted and placed on
supervision for violations of chapter 794 [Sexual Battery], s. 800.04 [Lewdness/Indecent
Exposure], s. 827.071 [Sexual Abuse of Children], s. 847.0135(5) [Computer Pornography,
Prohibited Computer Usage, Traveling to Meet a Minor], or s. 847.0145 [Selling or Buying of
Minors (e.g. Human Trafficking)]. The Florida Legislature further authorizes in Florida Statute
948.30(5)(k) that probationers convicted of the above offenses and placed on supervision are
required to:
(k)Submission to a warrantless search by the community control or probation officer of
the probationer’s or community controlee's person, residence, or vehicle."
It is at this juncture where I believe moving forward it is important for the Florida Legislature to
further specify "computers or electronic devices" in this sub-section or clarify that a search of the
residence can include a search of computers or electronic devices. My version of the revised
statute would read:
(k)Submission to a warrantless search by the community control or probation officer of
the probationer’s or community controlee's person, residence, vehicle or computers and
electronic devices."
I would also like to see the Florida Statutes revised to include this provision for all probationers
on Community Supervision, regardless of the offense committed. Although this may seem far-
reaching, having the condition in place allows for the examination should the need arise.
Practically speaking, personnel and budget resources would limit how many computer searches
can be completed, however having the statutory authority to conduct a computer search when
there is reasonable suspicion would give probation officers more tools "in their virtual tool belt"
to ensure offender compliance. Having the computer search condition imposed as a standard
conditions of supervision would allow Probation Officers to investigate proactively if there is
reasonable suspicion to conduct a computer search. How many times has a police officer
conducted a traffic stop and found an Probationer in possession of drugs or other contraband
material? A probation officer may be supervising an Probationer for a burglary and stumble upon
a large child pornography ring that may have otherwise gone undetected.
If the Florida Legislature accepted the above statute revisions, or similar wording, then
agency policy could be revised to include "computers and electronic devices" in the definition of
Warrantless Planned Search as noted below:
Warrantless Planned Search
Refers to the unannounced search of an Probationer’s clothing; person; vehicle (any
vehicle driven, leased, or owned by the Probationer regardless of its location); computers
and electronic devices (owned or accessed by the Probationer, regardless of location)
living quarters (including common areas shared by the Probationer and other occupants
of the dwelling [i.e., kitchen, bathrooms, family room, den, living room, basement, attic,
utility room, and garage] and areas occupied solely by the Probationer [i.e., Probationer’s
bedroom or den/office]); surrounding property (including the front and back yards,
storage shed, or property surrounding the residence); or other possessions by a
Correctional Probation Officer without a warrant and will be used to ensure the
Probationer’s compliance with court orders. This type of search can occur with or
without a “search” condition of supervision.
The State of Wisconsin makes a broad stroke in defining what is subject to search.
Wisconsin Administrative Code 328.044(3)(k) specifies that offenders must:
Make himself or herself available for searches ordered by the agent, including but not
limited to body contents searches as defined in s. DOC 328.21 (4) (a), or search of the
client’s residence or any property under the client’ s control"
This would appear to encapsulate computers and electronic devices and may be a more
appropriate way of essentially saying the same thing without major revisions in Florida Statutes
or Administrative Policies.
Now that we have established that a Probation Officer has the legal authority to supervise
a Probationer on community supervision (e.g. Probation), has the ability to enforce standard and
special conditions imposed by the Sentencing Authority, has the authority the conduct home
visits, walk through visual inspections and warrantless planned searches, let's examine how an
actual computer search is conducted. The officer will utilize the forensic software in conducting
the computer search according to Departmental policy and procedures. If any data is recovered
that would constitute a violation of supervision, the data will be saved on a removable storage
device. There is no mention in the procedure of using any hardware or software write blocking
devices or forensically wiping the removable storage device prior to its use. Since we are not
working with encapsulated evidence files using this type of software, it is important for the Court
to distinguish that no data from a previous computer search could be left on the reusable USB
thumb drive. For brevity purposes, I will not copy the entire policy I have previously written on
the subject of media sanitization, however it is important to note that this is an important step for
chain of custody purposes if the recovered evidence were to be challenged in Court.
It is my opinion based on training and experience that these two additions to the policy
would help to ensure its validation. For reference purposes, the Summary of Method is listed
below because it is relevant in this procedure:
Media sanitization is the process of overwriting or removing data from a hard drive and
other electronic media at the end of the data's life cycle, or when the drive is to be used for an
alternate purpose where the previously stored data should be rendered unrecoverable. Low level
formatting is the process of writing all zeroes to a hard disk, causing any previously stored data
on the drive to be unrecoverable, even with forensic data recovery utilities. In this procedure, the
examiner will attach the hard disk to the forensic workstation via the appropriate USB, SATA or
IDE connector or docking station, if appropriate. The examiner will initiate the Lowvel
application and select the target hard drive from the dropdown menu. If a drive is currently in
use, the application will report that it is "locked". This does not mean that the application cannot
overwrite the drive but results are not guaranteed when the drive is locked according to the
provided documentation. This is most often the case involving system drives which are actively
running an operating system. Once the drive has been selected, the examiner will click "Start" to
initiate the data overwriting process. Depending on the size of the drive, this process may take a
few minutes or a few hours. As an example, a 4GB USB thumb drive took around 3.5
minutes to complete the format. After the process has completed, the status bar at the bottom will
indicate "100%" and whether any bad sectors were found. In order to validate the results from
the Lowvel application, the examiner will utilize a second application, HxD, to verify no data
remains on the target drive. The examiner will analyze the disk and compute a CRC checksum
which should read "0" if the process was successful. If the desired results are not achieved, the
examiner will redo the process, paying special attention to the procedures in this document and
note any technical issues to be forwarded to the Policy Review team.
Case Law
This examiner was surprised to discover that there is not a lot of case law attributed to
computer searches of those convicted of felony offenses. A web search revealed an interesting
2014 case out of the state of Wisconsin Supreme Court State v. Jeremiah Purtell which reversed
an unpublished 2013 Court of Appeals decision. Jeremiah Purtell was placed on probation for
animal cruelty charges and a special condition of supervision was "computer access only for
school or work". During a conversation with the offender, he admitted to having a computer. The
probation agent seized the computer and located images of young females engaged in sexual acts
with animals. Authorities got a search warrant and found other photos of child pornography on
the computer. The issue in the case was whether the probation officer had a right to search the
computer. In the case, the trial court originally rejected the defendant's position that Purtell's
conditions of probation didn’t expressly prohibit him from possessing such images and because
there were no reason to believe the computer contained some other kind of contraband and found
the search "reasonable". The Supreme Court of Wisconsin subsequently reversed that decision,
concluding that:
"A probationer’s possession of a computer in violation of a rule or condition of probation
makes the computer “contraband” that can be searched as contraband, without regard
to whether the agent has reasonable grounds to believe the computer itself
contains (i.e., has stored on it) other contraband or evidence of other rule violations"
(Source)
In a related case, United States vs. Skinner, Courts have declined to "recognize a
‘legitimate’ expectation of privacy in contraband and other items the possession of which are
themselves illegal, such as drugs and stolen property.” In this case, the Government used data
from a prepaid cell phone to track the whereabouts of the defendant, Melvin Skinner, as he
trafficked in drugs between Arizona and Tennessee. The Court rejected the defendants' motion to
suppress the cell phone data based on violation of 4th Amendment search and seizure
prohibitions because it was used as part of a criminal scheme and was used on public
thoroughfares. According to the opinion in the case, the law cannot be that a criminal is entitled
to rely on the expected untrackability of his tools. Similarly to the prior case, Jeremiah Purtell
had a reduced expectation of privacy because he was on probation and also because the computer
was considered a "contraband" item he was prohibited from possessing in the first place.
Another case out of the State of Illinois People v. Clayton Thornburg revolved around a
state Court's appeal of a Circuit Court decision to suppress evidence in a Violation of Probation
case where probation officers' searched the offender's desk and pornographic DVDs and then
searched the computer and discovered child pornography. The state argues that (1) the officers
had a reasonable suspicion to search defendant's bedroom and computer since defendant was
already on probation, and (2) defendant consented to the searches. The Appellate Court
acknowledged that "probationers have a reduced expectation of privacy compared to ordinary
citizens, because they are criminal offenders," but also concluded that "a search of his home
remains a significant intrusion on his privacy and a search without any reasonable suspicion
would be constitutionally unreasonable." In this case, officer admitted they had no reasonable
suspicion to search before arriving at the home and locating the pornographic DVDs (which did
not violate his supervision conditions). The defendant was required to allow his probation
officers to visit his residence. He was also required to submit to a search of his “person, home.
residence, papers, automobile and/or effects” when officers had a reasonable suspicion to require
it. Thus, defendant could refuse without consequence a request to search his dresser or desk
drawers when requested without any reasonable suspicion. The Appellate Court also found that
the Computer Use Agreement signed by the offender at the onset of supervision was valid and
therefore the computer search was permitted regardless of whether reasonable suspicion existed.
It provided that defendant was subject to:  “unannounced examinations of his computer, software
and other electronic devices to which [he had] access,” the installation of equipment or software
to monitor his computer use, “examination[s] at any time,” and seizure if any prohibited
materials were found. The offender was ultimately found to have violated the conditions of his
supervision when child pornography was located on his computer.
Recent estimates show that nearly three fourths of Americans are online. If that sample is
representative of our offender population, then we can presume as much, if not more, of our
probationers and inmates want or desire access to the Internet. Denying probationers and
parolees access to computers and the Internet is no longer justifiable in other than the most
severe circumstances. Some case law reveals that Courts agree sex offenders cannot be denied
access to the Internet although the Legislature in Florida has taken a more conservative approach
and withheld Internet access for offenders convicted of certain crimes subject to review by the
treatment provider.
Based on the case law I reviewed, the current status of computer searches appear to be
supported for use in Florida. It would be "best practice" to develop and sign a "Computer Use
Agreement" with the offender at the onset of supervision which will further detail his/her
requirements under the law and compliment those conditions imposed by the Sentencing
Authority.
Digital Forensics Software Recommendations:
In attempting to research products and services for a Digital Forensics Lab at the Florida
Department of Corrections, there are a lot of factors to be considered during the Planning Phase.
The first order of business is to complete a Needs Assessment. This will document user and
facility needs (both current and projected future needs), evaluates the existing facility, define
space requirements, and provides project cost data. Since no budget is provided, my goal is to
provide budget conscious solutions where available but still feature capable and which would
support growth as the company expands.
In my opinion, it is important not to place all of your eggs in one basket, so where
feasible, I will recommend a tool and a backup. I considered open source tools for this project,
however ultimately decided on commercial (paid) products for the primary tool due to the
likelihood of ongoing updates to the software, whereas open source tools are not guaranteed
updates as the forensics landscape changes.
In this case, a sample Needs Assessment revealed that we would need the capability to
serve the following:
 Computer workstations at multiple facilities covering three regions throughout the State
of Florida including the following:
 Central Office
 Institutional Facilities (including seven privately run facilities)
 Regional Business Offices
 Re-Entry Centers
 Work Camps, Forestry Camps and Road Prisons
 Community Release Centers
 Probation Offices
 Servers both remotely located at facilities and at the Shared Resource Center located in
Tallahassee, Florida
 Remote access forensic capabilities on all user workstations
 A need for E-Discovery capability on user workstations and servers
 A need for digital forensics capability of user workstations and servers
 A need to support incident response and forensics pertaining to intrusions, APT and
malware infections
 A need for digital forensics capability to search computer workstations, electronic
devices and mobile phones possessed by offenders on felony probation
 A need for Internet and Computer Activities Monitoring of Convicted Sexual Offenders
and Identified Cyber Criminals on felony probation
 A need for digital forensics capability to search contraband cell phones and other
electronic storage devices recovered from inmates incarcerated in correctional facilities
located throughout the State of Florida
Questions Considered in Choosing Software:
 Is the product open or closed source?
 Does the software support encryption?
 Does the software have remote access/acquisition capabilities?
 Does the software require software on client PCs to function as intended? If so, can the
client software be hidden so that it is no recognizable to the end-user?
 What are the licensing requirements? Are site licenses available or per-user workstations?
 Do the selected products support our current hardware infrastructure? What new
purchases will be needed for implementation?
 Is training and software support included or at additional cost? Are there published
failure rates?
 How well-maintained and supported is the software by the vendor?
 Has the tool/software been validated and acceptable for legal purposes (e.g. use in
Court)?
 Will the software in use cause any disruption in company operations?
 Does the tool have case management/reporting built-in or can it be merged within our
existing framework?
Digital Forensics Capability
Selected Product: EnCase Enterprise
Selected Vendor: Guidance Software (Links to an external site.); Founded in 1997
I chose EnCase Enterprise (closed source) to be the primary backbone for the company's
needs because it is a full-featured solution which will support remote investigations (Internal
Employee/HR) and ongoing case management. Case management features include allowing
other investigators and external parties access to the evidence for parallel investigations. In
addition to remote investigations, data collection can be setup on interval schedules which will
reduce personnel costs. It has a thorough on demand training library, some available at no cost
for licensed users, which will save the company money in ongoing support costs. There are
multiple training options available: onsite, on-demand, webinar for additional costs and training
can be tailored to the specific company needs. The Enterprise version of EnCase has the ability
to support all user workstations and servers currently in use and meets current hardware
configuration requirements. The software features EnScripts, which allow custom scripts to be
used to increase efficiency by automating routine investigative tasks. The software also supports
smart phone and tablet acquisition without having to pay for additional vendor software,
licensing and training. Software also can be translated to multiple languages should the need
arise since the company's offices are spread throughout the United States. The Enterprise version
of the EnCase software gives the company expandability for the future if the needs arises for
mobile data collection in the field at no additional cost using EnCase Portable. The software also
supports evidence triage, which allows for preview while the evidence is still being processed.
This will reduce disruption to company operations, thereby saving the company money.
Software Cost: Initial Purchase: $3995.00; Yearly Maintenance: $1918.00
Backup Tool: FTK The Forensic Toolkit is another very powerful tool used by a good number of
forensic investigators. It comes with essential features including powerful file filtering, full text
indexing, advanced searching, deleted file recovery, data-carving, email and graphics analysis,
hashing, advanced search functionality and many more. A package of FTK includes FTK
Imager; Hash Library- Known File Filter (KFF); and Registry Viewer; it may also include
Password Recovery Toolkit (PRTK)
Internet Monitoring Software
Selected Product: Spector CNE Investigator
Selected Vendor: SpectorSoft
Cost: $90.00 (in Volume Discounts of 10-25 purchased at one time)
Founded in 1998
I chose this company because it is headquartered in Vero Beach, Florida and has been a trusted
solution for computer management of sex offenders throughout the nation. The software is
currently used by 36,000 corporate customers and over 900,000 home users. This software
allows the Cyber Specialist to receive instant alerts when keywords or phrases are typed or
contained in an email, chat message or website. There is proactive web filtering which will
prevented web access to sites that are inappropriate to the offender's specific conditions of
supervision. Screen playback allows officers to review computer activities as if you were sitting
right next to the offender. It also captures website visits, searches performed and social media
activity. The software records a complete copy of both sides of chat and instant messaging
conversations for later review. Spector CNE watches for printed files, documents edited on
network and external devices. It records application and network activity and can record all
incoming and outgoing activity on the offender's computer.
E-Discovery capability
Selected Product: Nuix Director Suite (including Network Collector)
Selected Vendor: Nuix (Links to an external site.)
In Business Since: 2000
I chose Nuix as the E-Discovery platform for this company mainly because of its remote
access capabilities that allow for remote collection of evidence across network shares and
because it supports all the operating systems in use at the company. The program is template-
driven or custom scripts can be written or imported in Ruby, XML, Python and JavaScript. There
are versions of the software that are web-based so client software does not need to be installed.
The platform contains case management and reporting and includes the ability for the project
manager to send collection links via email to their constituents with all the collection parameters
pre-selected so that the client user can click on the link to begin collection process and upload
the data back to where the project manager has specified. There are portable version of the E-
Discovery product in the event the circumstances dictates on-site collection. The software splits
the collection of evidence into two routines: survey and collection. A project manager can
complete a survey prior to collection to see if there is any evidence discovered which would save
on personnel costs or the software can do both at the same time. Software can import data from
common evidence files (Encase, E01) formats as well as integration with Windows Shadow
Copy which will allow for collection of open or locked files). De-duplication and de-nisting can
be completed at the time of collection (longer collection time) or afterwards. The documentation
also reports integration with Symantec Enterprise Vault for file storage. The software provides
secure remote access and graphical reports of data for staff, clients and reviewers. Nuix Director
Suite also has a Legal Hold component which allows for the company's legal departments to
send, track and receive data from opposing companies in civil cases.
Cost: Unknown; scalability via site user licenses
Backup Tool: Harvester Portable & Harvester Server Pinpoint Labs (Links to an external site.); I
liked this product because it had the capability for jobs to be remotely launched and monitored
while a client is still working. It also offered self-collection kits which can be installed on
portable hard drives and mailed to satellite offices. I ultimately chose Nuix because it seemed to
be a more robust suite that integrated with Legal Holds and Case Management.
Incident response and forensics pertaining to intrusions, APT and malware infections
Selected Product: FireEye Security Suite (Central Management, Malware Analysis,
Endpoint Security)
Selected Vendor: FireEye (Links to an external site.)
Founded in 2004
I chose this company and product because it seemed to be the best option for supporting
this fairly large company. It allows for software to be remotely updated from a centralized
management standpoint and doesn't rely on the end-user. It protects is designed as a Malware
Protection system for web security, email security, file security, and malware analysis. The
software crowd sources threat intelligence so that if an emerging threat is detected in another
company running the software, you will be notified and updates are ongoing. The software can
be installed as a service so that it can work on all systems and servers deployed in the company
or as a program pre-deployed on company workstations. In 2013, the company bought
Mandiant (Links to an external site.), which was another highly rates security suite and in 2014
bought nPulse which allows for network forensics and investigation on enterprise levels as
needed in our company. I liked that the software had real-time indexing which gave the ability to
enable packet search and retrieval in minutes because time is crucial in responding to intrusions.
I chose a Security Suite as opposed to a hodge podge of individual applications because I felt
that this would provide better all-around protection, especially with its ability to run as a service.
Resources:
Best Practices for Seizing Electronic Evidence
https://www.fletc.gov/sites/default/files/imported_files/training/programs/legal-
division/downloads-articles-and-faqs/downloads/other/bestpractices.pdf
Managing Sex Offenders’ Computer Use http://www.kbsolutions.com/forensicclass.pdf
Determining Need for Internet Monitoring: Internet Behavior and Risk for Contact Offenses
http://www.kbsolutions.com/monitorgrid.pdf
Sample Computer Use Agreement for Sex Offenders
http://www.kbsolutions.com/socompcnt.pdf
Suspicionless Searches in Probation and Parole in Light of Samson v. California
http://www.marcharrold.com/documents/Suspicionless_Searches_Samson_v_California.PDF
Monitoring Probationer Internet Habits
http://www.marcharrold.com/documents/Monitoring_Probationer_Internet_Habits.PDF
Virtual Home Visits
http://www.olemiss.edu/depts/ncjrl/pdf/05-HARRO.pdf
The Search and Seizure of Computers and Electronic Evidence (contains video)
http://www.olemiss.edu/depts/ncjrl/FourthAmendment/fai_2005symposia.html
Microsoft COFEE (free software)
COFEE means the Computer Online Forensic Evidence Extractor tool that fits on a USB
drive and automates the execution of commands for data extraction and related
documentation. Distribution is limited to law enforcement agencies. Access to the
COFEE product requires verification of employment with a law enforcement agency and
agreement to the terms and conditions of the Microsoft/NW3C Sublicense Agreement.
Building a Low Cost Forensic Workstation
http://www.sans.org/reading-room/whitepapers/incident/building-cost-forensics-workstation-895
Selected Freeware Field Examination Packages
 Field Search published by www.justnet.org/fieldsearch
 Helix published by www.e-fense.com/helix
 SPADA published by www.cops.org
Popular Internet Monitoring Software
 Spector Professional published by www.spectorsoft.com
 Spector Professional for Macintosh published by www.spectorsoft.com
 E-Blaster published by www.spectorsoft.com
 CSWeb published by www.securitysoft.com
 ActMon published by www.iopus.com
 Impulse Control published by www.InetPPC.com
 Cyber Sentinel published by www.trueactive.com
 Desktop Surveillance published by www.toolsthatwork.com
Remote Monitoring Applications
 CSWeb published by www.securitysoft.com
 Impulse Control published by www.InetPPC.com

More Related Content

What's hot

Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper HellerKyle Heller
 
Achieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress ReportAchieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress ReportGov BizCouncil
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...IJCNCJournal
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALJoseph White MPA CPM
 
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...ijaia
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...gerogepatton
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET Journal
 
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...IJECEIAES
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery UpdateGareth Evans
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Ben B
 
Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow  Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow IJECEIAES
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp PosterTurner Sparks
 
Studying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sectorStudying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sectorAFRINIC
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisZhongLI28
 
The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...TELKOMNIKA JOURNAL
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 

What's hot (19)

Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
 
Achieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress ReportAchieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress Report
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
 
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016
 
Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow  Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp Poster
 
Studying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sectorStudying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sector
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
 
Capsm twitter study 2010
Capsm twitter study 2010Capsm twitter study 2010
Capsm twitter study 2010
 
The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 

Viewers also liked

Intro to Digitization Projects
Intro to Digitization ProjectsIntro to Digitization Projects
Intro to Digitization Projectszsrlibrary
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics OverviewMathew Shelby
 
Book Index With Reviews
Book Index With ReviewsBook Index With Reviews
Book Index With Reviewssnardelli
 
Barriers and challenges to accessing subscription e-content on mobile devices
Barriers and challenges to accessing subscription e-content on mobile devicesBarriers and challenges to accessing subscription e-content on mobile devices
Barriers and challenges to accessing subscription e-content on mobile devicesAlison McNab
 
Painless Document Scanning and Indexing with Alfresco
Painless Document Scanning and Indexing with AlfrescoPainless Document Scanning and Indexing with Alfresco
Painless Document Scanning and Indexing with AlfrescoBlueFishTX
 
Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...
Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...
Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...Marc Holtman
 
Caro: What You Need to Know About Starting a Digitization Project
Caro: What You Need to Know About Starting a Digitization ProjectCaro: What You Need to Know About Starting a Digitization Project
Caro: What You Need to Know About Starting a Digitization ProjectALATechSource
 
IES "Falla de seguridad en iPhone 4, 5 y iPad 2"
IES "Falla de seguridad en iPhone 4, 5 y iPad 2"IES "Falla de seguridad en iPhone 4, 5 y iPad 2"
IES "Falla de seguridad en iPhone 4, 5 y iPad 2"Rodrigo GC
 
Curso de linux para novatos, brutos y extremadamente torpes
Curso de linux para novatos, brutos y extremadamente torpesCurso de linux para novatos, brutos y extremadamente torpes
Curso de linux para novatos, brutos y extremadamente torpesIsrael Hernandez
 
Lcp Consulting White Paper New Normal
Lcp Consulting White Paper New NormalLcp Consulting White Paper New Normal
Lcp Consulting White Paper New NormalLindsay Pedersen
 
#SinLugar: Internet sin Copyright
#SinLugar: Internet sin Copyright#SinLugar: Internet sin Copyright
#SinLugar: Internet sin CopyrightSinLugar
 
Retailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGE
Retailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGERetailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGE
Retailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGEKunle Campbell
 
The Social Media Ecosystem Report by IAB
The Social Media Ecosystem Report by IABThe Social Media Ecosystem Report by IAB
The Social Media Ecosystem Report by IABGenaro Bardy
 
Magali perez rodriguez y sandy thomas.docx
Magali perez rodriguez y sandy thomas.docxMagali perez rodriguez y sandy thomas.docx
Magali perez rodriguez y sandy thomas.docxmagali2013
 
3CX Phone Admin Manual for Version 12
3CX Phone Admin Manual for Version 123CX Phone Admin Manual for Version 12
3CX Phone Admin Manual for Version 12Dave Norris
 
From Facebook to Safari to Email
From Facebook to Safari to EmailFrom Facebook to Safari to Email
From Facebook to Safari to EmailChris Shade
 

Viewers also liked (20)

Intro to Digitization Projects
Intro to Digitization ProjectsIntro to Digitization Projects
Intro to Digitization Projects
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics Overview
 
Book Index With Reviews
Book Index With ReviewsBook Index With Reviews
Book Index With Reviews
 
Barriers and challenges to accessing subscription e-content on mobile devices
Barriers and challenges to accessing subscription e-content on mobile devicesBarriers and challenges to accessing subscription e-content on mobile devices
Barriers and challenges to accessing subscription e-content on mobile devices
 
Book indexing
Book indexing Book indexing
Book indexing
 
Painless Document Scanning and Indexing with Alfresco
Painless Document Scanning and Indexing with AlfrescoPainless Document Scanning and Indexing with Alfresco
Painless Document Scanning and Indexing with Alfresco
 
Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...
Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...
Prioritizing Digitization by Marc Holtman (City Archives Amsterdam), British ...
 
Caro: What You Need to Know About Starting a Digitization Project
Caro: What You Need to Know About Starting a Digitization ProjectCaro: What You Need to Know About Starting a Digitization Project
Caro: What You Need to Know About Starting a Digitization Project
 
IES "Falla de seguridad en iPhone 4, 5 y iPad 2"
IES "Falla de seguridad en iPhone 4, 5 y iPad 2"IES "Falla de seguridad en iPhone 4, 5 y iPad 2"
IES "Falla de seguridad en iPhone 4, 5 y iPad 2"
 
Curso de linux para novatos, brutos y extremadamente torpes
Curso de linux para novatos, brutos y extremadamente torpesCurso de linux para novatos, brutos y extremadamente torpes
Curso de linux para novatos, brutos y extremadamente torpes
 
CVEn
CVEnCVEn
CVEn
 
Lcp Consulting White Paper New Normal
Lcp Consulting White Paper New NormalLcp Consulting White Paper New Normal
Lcp Consulting White Paper New Normal
 
Cobra Auto Guns
Cobra Auto GunsCobra Auto Guns
Cobra Auto Guns
 
#SinLugar: Internet sin Copyright
#SinLugar: Internet sin Copyright#SinLugar: Internet sin Copyright
#SinLugar: Internet sin Copyright
 
Retailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGE
Retailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGERetailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGE
Retailers' Guide to Context Marketing in the EVERYWHERE GOOGLE AGE
 
HMC UNIDAD DIDÁCTICA 5
HMC UNIDAD DIDÁCTICA 5HMC UNIDAD DIDÁCTICA 5
HMC UNIDAD DIDÁCTICA 5
 
The Social Media Ecosystem Report by IAB
The Social Media Ecosystem Report by IABThe Social Media Ecosystem Report by IAB
The Social Media Ecosystem Report by IAB
 
Magali perez rodriguez y sandy thomas.docx
Magali perez rodriguez y sandy thomas.docxMagali perez rodriguez y sandy thomas.docx
Magali perez rodriguez y sandy thomas.docx
 
3CX Phone Admin Manual for Version 12
3CX Phone Admin Manual for Version 123CX Phone Admin Manual for Version 12
3CX Phone Admin Manual for Version 12
 
From Facebook to Safari to Email
From Facebook to Safari to EmailFrom Facebook to Safari to Email
From Facebook to Safari to Email
 

Similar to Community Supervision in the 21st Century

Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
Resource Guide for Enhancing Community Relationships and Protecting Privacy a...Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
Resource Guide for Enhancing Community Relationships and Protecting Privacy a...Dawn Dawson
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010Twittercrisis
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxwilcockiris
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Ivans Kigwana
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramAimee Brown
 
Running head Collegiate degrees vs high school 1Collegiate deg.docx
Running head Collegiate degrees vs high school 1Collegiate deg.docxRunning head Collegiate degrees vs high school 1Collegiate deg.docx
Running head Collegiate degrees vs high school 1Collegiate deg.docxhealdkathaleen
 
Smart policing and technology applications presentation
Smart policing and technology applications presentationSmart policing and technology applications presentation
Smart policing and technology applications presentationRoel Palmaers
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNIDavid Sweigert
 
Policy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docxPolicy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docxharrisonhoward80223
 
Utah Interactive 2014 Report
Utah Interactive 2014 ReportUtah Interactive 2014 Report
Utah Interactive 2014 ReportNIC Inc | EGOV
 
IACP 2015 Poster Session -Police Interpretation of Citizen-Police Contacts
IACP 2015 Poster Session -Police Interpretation of Citizen-Police ContactsIACP 2015 Poster Session -Police Interpretation of Citizen-Police Contacts
IACP 2015 Poster Session -Police Interpretation of Citizen-Police ContactsDonal Hardin, Ph.D.
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Florida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxFlorida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxclydes2
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxhealdkathaleen
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxtodd271
 
The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingMelissa Dudas
 

Similar to Community Supervision in the 21st Century (20)

Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
Resource Guide for Enhancing Community Relationships and Protecting Privacy a...Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer Program
 
Running head Collegiate degrees vs high school 1Collegiate deg.docx
Running head Collegiate degrees vs high school 1Collegiate deg.docxRunning head Collegiate degrees vs high school 1Collegiate deg.docx
Running head Collegiate degrees vs high school 1Collegiate deg.docx
 
Smart policing and technology applications presentation
Smart policing and technology applications presentationSmart policing and technology applications presentation
Smart policing and technology applications presentation
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNI
 
Policy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docxPolicy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docx
 
Criminal Justice Technology power point
Criminal Justice Technology power pointCriminal Justice Technology power point
Criminal Justice Technology power point
 
Utah Interactive 2014 Report
Utah Interactive 2014 ReportUtah Interactive 2014 Report
Utah Interactive 2014 Report
 
IACP 2015 Poster Session -Police Interpretation of Citizen-Police Contacts
IACP 2015 Poster Session -Police Interpretation of Citizen-Police ContactsIACP 2015 Poster Session -Police Interpretation of Citizen-Police Contacts
IACP 2015 Poster Session -Police Interpretation of Citizen-Police Contacts
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Florida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxFlorida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led Policing
 

Community Supervision in the 21st Century

  • 1. Community Supervision in the 21st Century Prepared By: Mathew J. Shelby, Correctional Probation Senior Officer & UCF Student Examiner Program Purpose: The purpose of a Digital Forensics Lab within the Florida Department of Corrections is to provide officers with essential information needed to support best practice supervision plans for offenders. The Internet provides anonymity for offenders and gives them the ability to hide volumes of information on computers, cell phones, laptops and other electronic storage devices placing officers at a disadvantage when this information cannot be discovered and shared. Officers without knowledge and proper training in computers and digital forensics can compromise cases in Court when non-forensic methods of discovery are used. The lab will provide scientifically sound forensic services for recovery of electronic evidence so supervising officers can more effectively determine an offender’s activities, thereby maximizing corrections resources, enhancing public safety and ensuring the highest rates of successful outcomes. Personal Statement & Vision: This project was undertaken because this student examiner and Correctional Probation Senior Officer wanted to take a more active role in the supervision of sex offenders and cyber criminals as a result of my advanced coursework at the University of Central Florida in digital forensics. I have been employed with the State of Florida since graduating from Florida State University in 2003 with a Bachelor of Science in Criminology and a Minor Specialization in Sociology. During my employment with the State of Florida, I have worked as a Child Protective Investigator and a Correctional Probation Officer. As a Child Protective Investigator I have witnessed firsthand damages caused by sexual abuse through interviews with child victims and
  • 2. identified a personal need to take action. In 2011-2013, I completed general information security coursework at Pasco Hernando Community College including coursework in Computer Concepts, Managing Information Technology, Microcomputer Applications, Introduction to Networking, Microcomputer Software Essentials, Principles of Information Security, Webpage Design and Business Communications. In 2013, I enrolled in the Masters of Science Program in Digital Forensics under the leadership of Dr. Sheau-Dong Lang, an educator who has spent many nights answering my countless questions! My coursework at the University of Central Florida has included Computer Forensics I, Computer Forensics II, Topics in Forensic Science, The Practice of Digital Forensics, Operating Systems and File System Forensics, The Nature of Crime, Incident Response Technologies and Electronic Discovery for Digital Forensic Professionals. I have maintained a 4.0 GPA throughout my coursework in Information Security and Digital Forensics. I have spent the last two years of my life devoted to learning the skills necessary to conduct forensic digital examinations using industry software and hardware. In 2014, I was recommended by my former supervisor, Lisa Payne, for the prestigious Community Corrections Employee of the Year and received this award on May 7, 2014. I was also classified as a subject matter expert by the Florida Department of Law Enforcement in the subjects of Intake and Orientation, Case Management, and Offender Supervision in August 2014. Later that month, I was recognized by my director, Dr. Sheau-Dong Lang with the UCF Provost Merit Scholarship for my studies in Digital Forensics at the University of Central Florida. I have learned best practices to ensure examinations are conducted in a sound forensic manner that are defensible in a Court of law. Due to graduate in Summer 2015, I want to put this knowledge to use at the Florida Department of Corrections! It is my hope and dream that this report resonates with the right staff at my agency who agree that Community Supervision in the 21st century
  • 3. involves Digital Forensics and other advances discussed herein. My inspiration for this project was a news article and subsequent conversation had with Mrs. Christi Winters, a probation and parole officer with the Multnomah County Department of Community Justice in the state of Oregon who helped develop and run a computer forensics lab for her agency. Expected Outcomes & 2013-2016 Strategic Plan: This pilot project is designed with several goals of the 2013-2016 Strategic Plan for the Florida Department of Corrections in mind. First, Goal 3 states, "Enhance public safety through effective supervision of offenders in the community." In support of achieving this goal, this officer recommends reclassification of several Correctional Probation Specialist caseloads to Cyber Specialist designation. Initially, this examiner recommends one Specialist and one backup in the Tampa Circuit while the pilot project is being conducted. An existing Correctional Probation Specialist may be used if they are found to possess the unique knowledge, skills and abilities discussed elsewhere in this report; or in the alternative, a statewide survey of Department of Corrections staff may be utilized to identify prospective candidates. The Tampa Circuit was chosen because of its proximity to one of two Digital Forensics laboratories in operation by Florida Department of Law Enforcement. The other Digital Forensics laboratory is located in Tallahassee, Florida where the pilot may be expanded if the initial phases are successful. It is envisioned that a working relationship would be developed between staff at FDLE and Department of Corrections to make use of existing training opportunities and resources shared by the State and to minimize expenses. Capitalizing on partnerships such as these to continue to improve the quality of life in Florida is one of the missions of the Florida
  • 4. Department of Corrections. It also complies with Objective 2.4.5 of the 2013-2016 Strategic Plan whose focus is to "establish collaborative partnerships with local law enforcement, community service providers, businesses, and other appropriate entities." The Cyber Specialist [and their backup] would be responsible for conducting all forensic searches of sex offenders supervised in the assigned Circuit. The Specialist would work in conjunction with the existing Correctional Probation Specialists to conduct quarterly computer searches of supervised sex offenders and identified cyber criminals where technology was instrumental in the commission of their crime. Although this paper focuses on sex offenders many of the same evidence-based practices apply to cyber criminals since the Computer and Internet are instruments that can be used in their respective criminal activities. This examiner envisions that the Cyber Specialist would be a search team member responsible for the forensic computer search while the physical search of the residence is conducted by the assigned officer and other search team members. In addition, the Cyber Specialist would be responsible for monitoring computer activities of selected sex offenders and cyber criminals who have monitoring software installed on their computers. If a violation is discovered, the Cyber Specialist would staff the case with the assigned officer and complete the Violation Paperwork due to their advanced knowledge of the alleged non-compliance. The Cyber Specialist, based on their knowledge and experience, would then testify in Court to any actions taken in the offender's case. In consideration of Strategy 3.4, which states "Enhance stakeholder awareness of the role, importance, and long-range outcomes of successful community supervision," this examiner believes that the implementation of a Digital Forensics program within the Florida Department of Corrections will have a positive impact on our "branding platform" to the general
  • 5. public and our law enforcement partners. This also ties into our core values of ensuring Trust, Respect, Accountability, Integrity and Leadership (TRAIL) because the general public and our law enforcement partners can trust that we are holding offenders accountable for their actions. Next, Goal 4 of the 2013-2016 Strategic Plan for the Florida Department of Corrections states, "Optimize organizational performance." The selected Cyber Specialist will help reduce the burden of some of the tasks assigned to Correctional Probation Specialists by doing their computer searches, computer activities monitoring and associated Violation paperwork on cases they were involved in. This will not only optimize organizational performance but allow for increased supervision and collaboration among staff. The end result is increased efficiency and the perception to the offender that he or she is being "watched" more closely. In reclassifying an existing position, there is no additional personnel cost to implement the Digital Forensics program. Grant-funded organizations such as the National White Collar Crime Center have a variety of free training courses available to agency partners and grants may available through resources such as the Edward Byrne Memorial Justice Assistance Grant and Internet Crimes Against Children Task Force for the purchase of equipment and software. Strategy 4.4 of the 2013-2016 Strategic Plan includes the objective to "enhance the relevance of job-related training throughout the Department" (Objective 4.4.3) in an effort to "increase employee recruitment and retention efforts." (Objectives 4.4.1 and 4.4.2) This type of training offered to Department staff who are technically inclined will provide another level of job satisfaction that will increase the likelihood of employees remaining with the Department. By expanding the pilot statewide into other regions such as Tallahassee where the second FDLE Computer Forensics Lab is located, the Department will be "developing an agency-wide succession plan for technical and specialty positions." (Objective 4.4.4)
  • 6. Strategy 4.5 of the 2013-2016 Strategic Plan states the goal to "increase the efficiency of Department operations through enhanced information technology" A digital forensics lab would increase the efficiency of Department operations by using specialized resources to address specialized offenders according to evidence-based practices. If the Department can obtain grants to fund the purchase of software and forensic workstations, then this will also meet Objective 4.5.2 whose goal is to "refresh or update individual computing devices of Department staff" at minimal expense to the taxpayers of the State of Florida. Strategy 4.7 of the 2013-2016 Strategic Plan states the goal to "foster partnerships to enhance the accomplishment of the Department's mission". If the pilot project is implemented in the Tampa Circuit as intended, then a working relationship with the forensics lab at the Florida Department of Law Enforcement can be implemented to share resources and training. The Department could also meet Objective 4.7.1 whose goal is to "reinforce partnerships with Florida's colleges and universities for the provision of research in the area of corrections" if a partnership was established with the recently opened Florida Center for Cyber Security at the University of South Florida located in Tampa, Florida. Joining local task forces and working with the resources already available in this area, would also meet Objective 4.7.3 whose goal is to "continue to encourage the development of local criminal justice partnerships." Target Market: There are several target markets that would benefit from the implementation of Digital Forensics capabilities at the Florida Department of Corrections. First and foremost, our 2013- 2016 Strategic Plan indicates our goal is to "Change Lives to Ensure a Safer Florida." As an
  • 7. agency, we have a responsibility to protect the citizens of the State of Florida through enhanced supervision activities. When new technologies arise, it is our responsibility to investigate and implement these activities to ensure that offenders on supervision are properly supervised commensurate with the risk they pose to the public. Digital forensic capabilities can augment community supervision and give us new insights into criminals who continue to re-offend. In this regard, Digital Forensics would allow probation officers to investigate new criminal activity in conjunction with law enforcement. Utilizing the intelligence obtained during computer searches, mobile device analysis, and other activities, we can bring community supervision into the 21st century and improve existing relations with our law enforcement partners. The next target market that would benefit from the implementation of Digital Forensics capabilities is the Sentencing Authority and Florida Commission on Offender Review (FCOR), formerly known as the Parole Commission. Both entities could be assured that we are using every tool in our arsenal to hold offenders accountable for their actions. When an offender is sentenced to probation or conditional release and has restrictions about what material they can access on computers, Internet or other electronic devices, we can use digital forensics to ensure the offender remains in compliance. These capabilities will also allow us to enforce no contact clauses in cases that are victim-sensitive. We can extract data from offender's cell phones and other electronic devices to determine if they are initiating or maintaining contact with victims, in violation of their supervision orders. Another target market that would benefit from the implementation of Digital Forensics capabilities at the Florida Department of Corrections is Human Resources and the Office of Inspector General (OIG). Nearly all the work created by Department employees involves a computer or electronic device. Staff use desktop computers, laptops, cellular phones and VOIP
  • 8. desk phones which are connected to the Internet. When a Department employee is accused of misconduct, digital forensics can play a key role in obtaining evidence of policy violations and/or criminal conduct. These capabilities, and strong policies regarding employee use of Department-owned equipment and Internet use, allow the Department to be proactive in investigating cases where employee misconduct is reported. A forensic examiner can use the Windows registry to ascertain whether a Department employee is using a personal thumb drive on a work computer in violation of company policies. An Internet history cache search will also reveal computer use for non-work purposes. Digital forensics is an extremely valuable tool in internal investigations. Digital forensics is also relevant on the Institution side at the Florida Department of Corrections. Probation and Parole, commonly referred to as P&P, is always trying to improve existing relations with the Institution staff and our shared resources. When contraband cell phones or other electronic devices are recovered by corrections officers or Inspectors, they can be given to a Certified Digital Forensics Examiner for analysis and intelligence gathering. Examiners would be outfitted with a mobile forensic workstation kit so they could drive to the Institution and perform on-site analysis or Inspectors can meet forensics examiners at the Lab located in Tampa, Florida. This reduces the time constraints and expense of having to send this material to Florida Department of Law Enforcement and allows intelligence to be disseminated more quickly, ensuring the safety of other inmates and staff on the compound. Contraband cell phones and other electronic devices may contain information about drugs, gangs, and other violent activities in and outside of the institution. In this respect, probation and parole and institution can work together to increase safety for staff and inmates throughout the State of Florida.
  • 9. Job Duties for Computer Forensics Examiners: Job duties for computer forensics investigators include recovering data from computer hard drives, including those that have been damaged or erased. They analyze data for clues and evidence, and may trace hacks or gauge the effects of malware on an information system. Additional duties for computer forensics investigators can include:  Taking custody of equipment used in crimes, including computers, thumb drives, CDs and DVDs, backup tapes, smart phones and digital cameras  Using imaging software to copy data and disks  Using file recovery programs to search for and restore deleted data  Maintaining the chain of custody for evidence  Writing reports and documenting procedures  Testifying in court Required Training and Experience: Computer forensics investigators require a deep knowledge of computer hardware, software and operating systems, and employees chosen for this pilot project should have a strong technical background. This officer recommends a statewide survey of current Florida Department of Corrections staff to determine interest in the project and whether candidates possess the required educational background or experience to perform digital forensics analysis. For legal reasons, certified staff (as opposed to civilian DOC personnel) should be utilized to ensure evidence is admissible in a Court of law.
  • 10. Selected personnel should also be expected to have a broad range of attributes and abilities, including:  Strong analytical and investigative skills  Solid decision-making skills  Clear written and oral communication skills  Self-discipline and focus  Innovative problem-solving  Attention to detail Scope of the Problem According to an article written by Dr. Jim Tanner, Ph.D., computer use and Internet access poses a risk to the proper treatment and containment of sex offenders without being managed. Search engines estimate there are more than 60 million pages of sexually related content on the Internet and this number grows daily. This aggregate amount does not include information available on the Deep Web or Dark Net. The Internet not only allows offenders to access sexually explicit material, it can also connect them with potential victims. More than 90% of children ages 5 to 17 now have access to a computer and two thirds of kids aged 10 to 17 regularly use the Internet. (Source) One in five children reported receiving an unwanted sexual solicitation over the Internet during the previous year. Tanner writes that, on average, 60% of the sex offenders convicted are placed on probation in the community. Community Corrections agencies across the nation are tasked with managing their criminal conduct and protecting the public. As the number of sex offenders and victim-sensitive cases grow each year, local forensics
  • 11. labs cannot handle the current volume of monitoring tasks presented by the current caseloads of Correctional Probation Specialists within the Florida Department of Corrections, yet alone the projected volumes in years to come. The Florida Department of Corrections should take action now to manage the Internet use of sex offenders and cyber criminals on our caseloads. The Solution (as presented by Jim Tanner, Ph. D.) Until recently, computer forensics on sex offender's computers was only performed by law enforcement. The main focus of law enforcement is in determining whether the suspect's computer contains child pornography since adult pornography is not illegal to possess. Once an offender is convicted, the focus of our examinations must shift. We must take a broader approach to what constitutes contraband and what activities are unacceptable while being supervised. There are three primary targets of a computer exam on a convicted sex offender: Internet History Records (URL records), Image and media searches, and text searches. URL records are the best source of information since they contain a record any time an offender visits a webpage. The record will show the text that was typed by the offender to access a specific webpage or keyword in a search engine. The examiner can determine the date/time the offender visited the page and this information can be stored indefinitely [unless altered by the offender, although it may still be recoverable]. Secondly, image and media searches are important to the Cyber Specialist because we can examine their legal sexual content to help us determine the offender's sexual interests such as:  Do the images or media reflect an interest in a specific sex act?  Do they reflect a preference in "partners" (e.g. age, gender, hair color, size, etc)?  Do they reflect any other themes (e.g. exhibitionism, BDSM, etc)?
  • 12. It is equally important for examiners to look for major themes that are non-sexual in nature, even if they are not specifically related to the instant offense. These themes may turn out to be triggers for the offender that are exposed during subsequent sex offender treatment. Some examples of these may include:  Children’s web sites (e.g. Nickelodeon, Sesame Street) .  Travel or Mapping sites.  Farm equipment sites.  Images of women and/or  children (non-sexual).  On-line clothing catalogues.  Model train sites.  Personal Ad (dating) sites.  Genealogy research sites.  Health information sites.  Gaming sites.  E-Bay®  Netflix® The third main target of any computer search should be text-based searches. Many offenders deviate from image-based pornography since it is more easily recognizable by law enforcement and probation officers. Some sex offenders switch to text based fantasy instead of audio/video and examinations may uncover erotic literature or hits for chats on sexually explicit websites. Many erotic literature regarding children is stored in other languages on the internet to avoid detection, however there are many online language converters available at no cost, making this contraband easily accessible to offenders. Research has shown that keyword searches for "pussy" and "cock" will identify approximately 95% of all sexual content in a forensic examination and should be included in any computer search, at a minimum. Dr. Tanner proposes a five part solution for the effective management of community based sex offender [and cyber criminal]'s computers:
  • 13. 1) Understand the reasons for computer management Three reasons: gather evidence for prosecutorial goals, provide supervision and containment of the offenders; and assist the treatment agency in understanding the offender. 2) Establish clear conditions that are computer specific Conditions should be carefully worded to avoid violations of the rights afforded to offenders under the Constitution and the Electronic Communications Privacy Act. Conditions should include: offender permission for unannounced examination of the system, offender responsibility for all data found on the system, and offender permission for seizure of the equipment in violation. Offenders should also be prohibited from:  Use of the Internet to access sexual content of any nature and in any form  Use of web based email programs which provide anonymity.  Possession or use of programs or systems which allow the device to be booted into a RAM kernel.  Use of encryption and/or password protection of data  Destroying or altering computer use records - including deleting Internet History Records and restoring operating systems.  Cleaning or wiping hard drives.  Use of anti-forensic software or processes.  Obtaining or retaining “trophy material”.  Visiting sites which focus on the culture of potential victims. 3) Conduct an Intake early in supervision Goals: determine the extent and type of sexual interests, deletion of inappropriate images and text to help eliminate the existing library of sexually explicit materials
  • 14. (if not previously conducted by law enforcement), and preparation of the hard drive for future examinations. It is imperative that any material found on the initial search be shared with the treatment provider to gauge honesty of the offender and establish a baseline for the offender's sexual interests during treatment. The psychological effect of knowing all computer activity is monitored cannot be understated. 4) Install monitoring software Monitoring software is both a time- and cost-effective solution to monitoring offender compliance. Community supervision officers cannot seize offenders’ work computers for simple monitoring purposes, nor can they routinely remove computers from offenders’ homes. Monitoring software can reveal the contents of items that offenders have viewed, but not printed, and creates a clear trail of the offender's actions. Tech-savvy offenders who try to employ anti-forensics on their computer would be captured by monitoring software. Officers should review the offender's computer activities, either remotely or during a field visit, at least monthly and the process takes about 10-15 minutes. Some programs can even forward usage reports to officer's emails where they can view information about screenshots, email, chat room participation, Internet activity and keystrokes typed. 5) Monitor the computer frequently One of the goals of computer management is the perception of being "watched". If computer activities are not reviewed at least monthly [or more depending on the offender risk assessment], then this defeats the purpose of having software
  • 15. installed and may lead the offender to deviate. Some jurisdictions require offenders to bring their computer with them to office visits. Policy and Procedure Discussion It is this examiner's opinion that the Department's existing computer search policy remains valid, with some provisions added based on my knowledge and experience as a digital forensics student and my overall experience as a Correctional Probation Senior Officer. The Sentencing Authority (also known as the Court or, in some cases, the Florida Commission on Offender Review (formerly known as the Florida Parole Commission) specifies the terms and conditions of probation when an offender is sentenced. Standard conditions of supervision do not require oral pronouncement by the Court. One such condition "permits such supervisors [Probation Officers] to visit him or her [Probationer's] at his or her home or elsewhere." (F.S. 948.03(1)(b)). Obviously one of the first requisite steps in searching an Probationer's computer is to be legally authorized to gain access to the location where the computer or electronic device may be stored and this statue covers the Probation Officer's presence in the home or other location. As authorized in Florida Statutes, the Sentencing Authority is also permitted to order any special conditions of supervision. Florida Statute 948.039 specifies that: "The court may determine any special terms and conditions of probation or community control. The terms and conditions should be reasonably related to the circumstances of the offense committed and appropriate for the Probationer. The court shall impose the special terms and conditions by oral pronouncement at sentencing and include the terms and conditions in the written sentencing order."
  • 16. If the Court were to impose a special condition for Computer Searches on a Sexual Offender, Sexual Predator or other Probationer where the use of a computer or electronic devices was a part of the crime, then this would qualify under Florida Statutes as "reasonably related to the circumstances of the offense." In cases where the use of a computer or electronic device was not utilized by a Sexual Offender or Sexual Predator in the commission of their underlying offense, the Legislature has determined that it is still "appropriate" to place restrictions on these individuals' access to computers and the Internet, as specified in Florida Statutes 948.30(5)(h), which states that: "Effective for probationers and community controlees whose crime is committed on or after July 1, 2005, a prohibition on accessing the Internet or other computer services until a qualified practitioner in the Probationer’s sex offender treatment program, after a risk assessment is completed, approves and implements a safety plan for the Probationer’s accessing or using the Internet or other computer services." In arriving at the determination that this condition is "appropriate", the Florida Legislature has authorized the restriction of Internet access and computer search condition as a standard condition (e.g. does not require oral pronouncement) for all probationers convicted and placed on supervision for violations of chapter 794 [Sexual Battery], s. 800.04 [Lewdness/Indecent Exposure], s. 827.071 [Sexual Abuse of Children], s. 847.0135(5) [Computer Pornography, Prohibited Computer Usage, Traveling to Meet a Minor], or s. 847.0145 [Selling or Buying of Minors (e.g. Human Trafficking)]. The Florida Legislature further authorizes in Florida Statute 948.30(5)(k) that probationers convicted of the above offenses and placed on supervision are required to:
  • 17. (k)Submission to a warrantless search by the community control or probation officer of the probationer’s or community controlee's person, residence, or vehicle." It is at this juncture where I believe moving forward it is important for the Florida Legislature to further specify "computers or electronic devices" in this sub-section or clarify that a search of the residence can include a search of computers or electronic devices. My version of the revised statute would read: (k)Submission to a warrantless search by the community control or probation officer of the probationer’s or community controlee's person, residence, vehicle or computers and electronic devices." I would also like to see the Florida Statutes revised to include this provision for all probationers on Community Supervision, regardless of the offense committed. Although this may seem far- reaching, having the condition in place allows for the examination should the need arise. Practically speaking, personnel and budget resources would limit how many computer searches can be completed, however having the statutory authority to conduct a computer search when there is reasonable suspicion would give probation officers more tools "in their virtual tool belt" to ensure offender compliance. Having the computer search condition imposed as a standard conditions of supervision would allow Probation Officers to investigate proactively if there is reasonable suspicion to conduct a computer search. How many times has a police officer conducted a traffic stop and found an Probationer in possession of drugs or other contraband material? A probation officer may be supervising an Probationer for a burglary and stumble upon a large child pornography ring that may have otherwise gone undetected.
  • 18. If the Florida Legislature accepted the above statute revisions, or similar wording, then agency policy could be revised to include "computers and electronic devices" in the definition of Warrantless Planned Search as noted below: Warrantless Planned Search Refers to the unannounced search of an Probationer’s clothing; person; vehicle (any vehicle driven, leased, or owned by the Probationer regardless of its location); computers and electronic devices (owned or accessed by the Probationer, regardless of location) living quarters (including common areas shared by the Probationer and other occupants of the dwelling [i.e., kitchen, bathrooms, family room, den, living room, basement, attic, utility room, and garage] and areas occupied solely by the Probationer [i.e., Probationer’s bedroom or den/office]); surrounding property (including the front and back yards, storage shed, or property surrounding the residence); or other possessions by a Correctional Probation Officer without a warrant and will be used to ensure the Probationer’s compliance with court orders. This type of search can occur with or without a “search” condition of supervision. The State of Wisconsin makes a broad stroke in defining what is subject to search. Wisconsin Administrative Code 328.044(3)(k) specifies that offenders must: Make himself or herself available for searches ordered by the agent, including but not limited to body contents searches as defined in s. DOC 328.21 (4) (a), or search of the client’s residence or any property under the client’ s control"
  • 19. This would appear to encapsulate computers and electronic devices and may be a more appropriate way of essentially saying the same thing without major revisions in Florida Statutes or Administrative Policies. Now that we have established that a Probation Officer has the legal authority to supervise a Probationer on community supervision (e.g. Probation), has the ability to enforce standard and special conditions imposed by the Sentencing Authority, has the authority the conduct home visits, walk through visual inspections and warrantless planned searches, let's examine how an actual computer search is conducted. The officer will utilize the forensic software in conducting the computer search according to Departmental policy and procedures. If any data is recovered that would constitute a violation of supervision, the data will be saved on a removable storage device. There is no mention in the procedure of using any hardware or software write blocking devices or forensically wiping the removable storage device prior to its use. Since we are not working with encapsulated evidence files using this type of software, it is important for the Court to distinguish that no data from a previous computer search could be left on the reusable USB thumb drive. For brevity purposes, I will not copy the entire policy I have previously written on the subject of media sanitization, however it is important to note that this is an important step for chain of custody purposes if the recovered evidence were to be challenged in Court. It is my opinion based on training and experience that these two additions to the policy would help to ensure its validation. For reference purposes, the Summary of Method is listed below because it is relevant in this procedure: Media sanitization is the process of overwriting or removing data from a hard drive and other electronic media at the end of the data's life cycle, or when the drive is to be used for an
  • 20. alternate purpose where the previously stored data should be rendered unrecoverable. Low level formatting is the process of writing all zeroes to a hard disk, causing any previously stored data on the drive to be unrecoverable, even with forensic data recovery utilities. In this procedure, the examiner will attach the hard disk to the forensic workstation via the appropriate USB, SATA or IDE connector or docking station, if appropriate. The examiner will initiate the Lowvel application and select the target hard drive from the dropdown menu. If a drive is currently in use, the application will report that it is "locked". This does not mean that the application cannot overwrite the drive but results are not guaranteed when the drive is locked according to the provided documentation. This is most often the case involving system drives which are actively running an operating system. Once the drive has been selected, the examiner will click "Start" to initiate the data overwriting process. Depending on the size of the drive, this process may take a few minutes or a few hours. As an example, a 4GB USB thumb drive took around 3.5 minutes to complete the format. After the process has completed, the status bar at the bottom will indicate "100%" and whether any bad sectors were found. In order to validate the results from the Lowvel application, the examiner will utilize a second application, HxD, to verify no data remains on the target drive. The examiner will analyze the disk and compute a CRC checksum which should read "0" if the process was successful. If the desired results are not achieved, the examiner will redo the process, paying special attention to the procedures in this document and note any technical issues to be forwarded to the Policy Review team.
  • 21. Case Law This examiner was surprised to discover that there is not a lot of case law attributed to computer searches of those convicted of felony offenses. A web search revealed an interesting 2014 case out of the state of Wisconsin Supreme Court State v. Jeremiah Purtell which reversed an unpublished 2013 Court of Appeals decision. Jeremiah Purtell was placed on probation for animal cruelty charges and a special condition of supervision was "computer access only for school or work". During a conversation with the offender, he admitted to having a computer. The probation agent seized the computer and located images of young females engaged in sexual acts with animals. Authorities got a search warrant and found other photos of child pornography on the computer. The issue in the case was whether the probation officer had a right to search the computer. In the case, the trial court originally rejected the defendant's position that Purtell's conditions of probation didn’t expressly prohibit him from possessing such images and because there were no reason to believe the computer contained some other kind of contraband and found the search "reasonable". The Supreme Court of Wisconsin subsequently reversed that decision, concluding that: "A probationer’s possession of a computer in violation of a rule or condition of probation makes the computer “contraband” that can be searched as contraband, without regard to whether the agent has reasonable grounds to believe the computer itself contains (i.e., has stored on it) other contraband or evidence of other rule violations" (Source) In a related case, United States vs. Skinner, Courts have declined to "recognize a ‘legitimate’ expectation of privacy in contraband and other items the possession of which are
  • 22. themselves illegal, such as drugs and stolen property.” In this case, the Government used data from a prepaid cell phone to track the whereabouts of the defendant, Melvin Skinner, as he trafficked in drugs between Arizona and Tennessee. The Court rejected the defendants' motion to suppress the cell phone data based on violation of 4th Amendment search and seizure prohibitions because it was used as part of a criminal scheme and was used on public thoroughfares. According to the opinion in the case, the law cannot be that a criminal is entitled to rely on the expected untrackability of his tools. Similarly to the prior case, Jeremiah Purtell had a reduced expectation of privacy because he was on probation and also because the computer was considered a "contraband" item he was prohibited from possessing in the first place. Another case out of the State of Illinois People v. Clayton Thornburg revolved around a state Court's appeal of a Circuit Court decision to suppress evidence in a Violation of Probation case where probation officers' searched the offender's desk and pornographic DVDs and then searched the computer and discovered child pornography. The state argues that (1) the officers had a reasonable suspicion to search defendant's bedroom and computer since defendant was already on probation, and (2) defendant consented to the searches. The Appellate Court acknowledged that "probationers have a reduced expectation of privacy compared to ordinary citizens, because they are criminal offenders," but also concluded that "a search of his home remains a significant intrusion on his privacy and a search without any reasonable suspicion would be constitutionally unreasonable." In this case, officer admitted they had no reasonable suspicion to search before arriving at the home and locating the pornographic DVDs (which did not violate his supervision conditions). The defendant was required to allow his probation officers to visit his residence. He was also required to submit to a search of his “person, home. residence, papers, automobile and/or effects” when officers had a reasonable suspicion to require
  • 23. it. Thus, defendant could refuse without consequence a request to search his dresser or desk drawers when requested without any reasonable suspicion. The Appellate Court also found that the Computer Use Agreement signed by the offender at the onset of supervision was valid and therefore the computer search was permitted regardless of whether reasonable suspicion existed. It provided that defendant was subject to:  “unannounced examinations of his computer, software and other electronic devices to which [he had] access,” the installation of equipment or software to monitor his computer use, “examination[s] at any time,” and seizure if any prohibited materials were found. The offender was ultimately found to have violated the conditions of his supervision when child pornography was located on his computer. Recent estimates show that nearly three fourths of Americans are online. If that sample is representative of our offender population, then we can presume as much, if not more, of our probationers and inmates want or desire access to the Internet. Denying probationers and parolees access to computers and the Internet is no longer justifiable in other than the most severe circumstances. Some case law reveals that Courts agree sex offenders cannot be denied access to the Internet although the Legislature in Florida has taken a more conservative approach and withheld Internet access for offenders convicted of certain crimes subject to review by the treatment provider. Based on the case law I reviewed, the current status of computer searches appear to be supported for use in Florida. It would be "best practice" to develop and sign a "Computer Use Agreement" with the offender at the onset of supervision which will further detail his/her requirements under the law and compliment those conditions imposed by the Sentencing Authority.
  • 24. Digital Forensics Software Recommendations: In attempting to research products and services for a Digital Forensics Lab at the Florida Department of Corrections, there are a lot of factors to be considered during the Planning Phase. The first order of business is to complete a Needs Assessment. This will document user and facility needs (both current and projected future needs), evaluates the existing facility, define space requirements, and provides project cost data. Since no budget is provided, my goal is to provide budget conscious solutions where available but still feature capable and which would support growth as the company expands. In my opinion, it is important not to place all of your eggs in one basket, so where feasible, I will recommend a tool and a backup. I considered open source tools for this project, however ultimately decided on commercial (paid) products for the primary tool due to the likelihood of ongoing updates to the software, whereas open source tools are not guaranteed updates as the forensics landscape changes. In this case, a sample Needs Assessment revealed that we would need the capability to serve the following:  Computer workstations at multiple facilities covering three regions throughout the State of Florida including the following:  Central Office  Institutional Facilities (including seven privately run facilities)  Regional Business Offices  Re-Entry Centers
  • 25.  Work Camps, Forestry Camps and Road Prisons  Community Release Centers  Probation Offices  Servers both remotely located at facilities and at the Shared Resource Center located in Tallahassee, Florida  Remote access forensic capabilities on all user workstations  A need for E-Discovery capability on user workstations and servers  A need for digital forensics capability of user workstations and servers  A need to support incident response and forensics pertaining to intrusions, APT and malware infections  A need for digital forensics capability to search computer workstations, electronic devices and mobile phones possessed by offenders on felony probation  A need for Internet and Computer Activities Monitoring of Convicted Sexual Offenders and Identified Cyber Criminals on felony probation  A need for digital forensics capability to search contraband cell phones and other electronic storage devices recovered from inmates incarcerated in correctional facilities located throughout the State of Florida Questions Considered in Choosing Software:  Is the product open or closed source?  Does the software support encryption?  Does the software have remote access/acquisition capabilities?
  • 26.  Does the software require software on client PCs to function as intended? If so, can the client software be hidden so that it is no recognizable to the end-user?  What are the licensing requirements? Are site licenses available or per-user workstations?  Do the selected products support our current hardware infrastructure? What new purchases will be needed for implementation?  Is training and software support included or at additional cost? Are there published failure rates?  How well-maintained and supported is the software by the vendor?  Has the tool/software been validated and acceptable for legal purposes (e.g. use in Court)?  Will the software in use cause any disruption in company operations?  Does the tool have case management/reporting built-in or can it be merged within our existing framework? Digital Forensics Capability Selected Product: EnCase Enterprise Selected Vendor: Guidance Software (Links to an external site.); Founded in 1997 I chose EnCase Enterprise (closed source) to be the primary backbone for the company's needs because it is a full-featured solution which will support remote investigations (Internal Employee/HR) and ongoing case management. Case management features include allowing other investigators and external parties access to the evidence for parallel investigations. In addition to remote investigations, data collection can be setup on interval schedules which will reduce personnel costs. It has a thorough on demand training library, some available at no cost for licensed users, which will save the company money in ongoing support costs. There are
  • 27. multiple training options available: onsite, on-demand, webinar for additional costs and training can be tailored to the specific company needs. The Enterprise version of EnCase has the ability to support all user workstations and servers currently in use and meets current hardware configuration requirements. The software features EnScripts, which allow custom scripts to be used to increase efficiency by automating routine investigative tasks. The software also supports smart phone and tablet acquisition without having to pay for additional vendor software, licensing and training. Software also can be translated to multiple languages should the need arise since the company's offices are spread throughout the United States. The Enterprise version of the EnCase software gives the company expandability for the future if the needs arises for mobile data collection in the field at no additional cost using EnCase Portable. The software also supports evidence triage, which allows for preview while the evidence is still being processed. This will reduce disruption to company operations, thereby saving the company money. Software Cost: Initial Purchase: $3995.00; Yearly Maintenance: $1918.00 Backup Tool: FTK The Forensic Toolkit is another very powerful tool used by a good number of forensic investigators. It comes with essential features including powerful file filtering, full text indexing, advanced searching, deleted file recovery, data-carving, email and graphics analysis, hashing, advanced search functionality and many more. A package of FTK includes FTK Imager; Hash Library- Known File Filter (KFF); and Registry Viewer; it may also include Password Recovery Toolkit (PRTK) Internet Monitoring Software Selected Product: Spector CNE Investigator Selected Vendor: SpectorSoft
  • 28. Cost: $90.00 (in Volume Discounts of 10-25 purchased at one time) Founded in 1998 I chose this company because it is headquartered in Vero Beach, Florida and has been a trusted solution for computer management of sex offenders throughout the nation. The software is currently used by 36,000 corporate customers and over 900,000 home users. This software allows the Cyber Specialist to receive instant alerts when keywords or phrases are typed or contained in an email, chat message or website. There is proactive web filtering which will prevented web access to sites that are inappropriate to the offender's specific conditions of supervision. Screen playback allows officers to review computer activities as if you were sitting right next to the offender. It also captures website visits, searches performed and social media activity. The software records a complete copy of both sides of chat and instant messaging conversations for later review. Spector CNE watches for printed files, documents edited on network and external devices. It records application and network activity and can record all incoming and outgoing activity on the offender's computer. E-Discovery capability Selected Product: Nuix Director Suite (including Network Collector) Selected Vendor: Nuix (Links to an external site.) In Business Since: 2000 I chose Nuix as the E-Discovery platform for this company mainly because of its remote access capabilities that allow for remote collection of evidence across network shares and because it supports all the operating systems in use at the company. The program is template- driven or custom scripts can be written or imported in Ruby, XML, Python and JavaScript. There are versions of the software that are web-based so client software does not need to be installed.
  • 29. The platform contains case management and reporting and includes the ability for the project manager to send collection links via email to their constituents with all the collection parameters pre-selected so that the client user can click on the link to begin collection process and upload the data back to where the project manager has specified. There are portable version of the E- Discovery product in the event the circumstances dictates on-site collection. The software splits the collection of evidence into two routines: survey and collection. A project manager can complete a survey prior to collection to see if there is any evidence discovered which would save on personnel costs or the software can do both at the same time. Software can import data from common evidence files (Encase, E01) formats as well as integration with Windows Shadow Copy which will allow for collection of open or locked files). De-duplication and de-nisting can be completed at the time of collection (longer collection time) or afterwards. The documentation also reports integration with Symantec Enterprise Vault for file storage. The software provides secure remote access and graphical reports of data for staff, clients and reviewers. Nuix Director Suite also has a Legal Hold component which allows for the company's legal departments to send, track and receive data from opposing companies in civil cases. Cost: Unknown; scalability via site user licenses Backup Tool: Harvester Portable & Harvester Server Pinpoint Labs (Links to an external site.); I liked this product because it had the capability for jobs to be remotely launched and monitored while a client is still working. It also offered self-collection kits which can be installed on portable hard drives and mailed to satellite offices. I ultimately chose Nuix because it seemed to be a more robust suite that integrated with Legal Holds and Case Management.
  • 30. Incident response and forensics pertaining to intrusions, APT and malware infections Selected Product: FireEye Security Suite (Central Management, Malware Analysis, Endpoint Security) Selected Vendor: FireEye (Links to an external site.) Founded in 2004 I chose this company and product because it seemed to be the best option for supporting this fairly large company. It allows for software to be remotely updated from a centralized management standpoint and doesn't rely on the end-user. It protects is designed as a Malware Protection system for web security, email security, file security, and malware analysis. The software crowd sources threat intelligence so that if an emerging threat is detected in another company running the software, you will be notified and updates are ongoing. The software can be installed as a service so that it can work on all systems and servers deployed in the company or as a program pre-deployed on company workstations. In 2013, the company bought Mandiant (Links to an external site.), which was another highly rates security suite and in 2014 bought nPulse which allows for network forensics and investigation on enterprise levels as needed in our company. I liked that the software had real-time indexing which gave the ability to enable packet search and retrieval in minutes because time is crucial in responding to intrusions. I chose a Security Suite as opposed to a hodge podge of individual applications because I felt that this would provide better all-around protection, especially with its ability to run as a service.
  • 31. Resources: Best Practices for Seizing Electronic Evidence https://www.fletc.gov/sites/default/files/imported_files/training/programs/legal- division/downloads-articles-and-faqs/downloads/other/bestpractices.pdf Managing Sex Offenders’ Computer Use http://www.kbsolutions.com/forensicclass.pdf Determining Need for Internet Monitoring: Internet Behavior and Risk for Contact Offenses http://www.kbsolutions.com/monitorgrid.pdf Sample Computer Use Agreement for Sex Offenders http://www.kbsolutions.com/socompcnt.pdf Suspicionless Searches in Probation and Parole in Light of Samson v. California http://www.marcharrold.com/documents/Suspicionless_Searches_Samson_v_California.PDF Monitoring Probationer Internet Habits http://www.marcharrold.com/documents/Monitoring_Probationer_Internet_Habits.PDF Virtual Home Visits http://www.olemiss.edu/depts/ncjrl/pdf/05-HARRO.pdf The Search and Seizure of Computers and Electronic Evidence (contains video) http://www.olemiss.edu/depts/ncjrl/FourthAmendment/fai_2005symposia.html Microsoft COFEE (free software) COFEE means the Computer Online Forensic Evidence Extractor tool that fits on a USB drive and automates the execution of commands for data extraction and related documentation. Distribution is limited to law enforcement agencies. Access to the COFEE product requires verification of employment with a law enforcement agency and agreement to the terms and conditions of the Microsoft/NW3C Sublicense Agreement. Building a Low Cost Forensic Workstation http://www.sans.org/reading-room/whitepapers/incident/building-cost-forensics-workstation-895 Selected Freeware Field Examination Packages  Field Search published by www.justnet.org/fieldsearch  Helix published by www.e-fense.com/helix  SPADA published by www.cops.org
  • 32. Popular Internet Monitoring Software  Spector Professional published by www.spectorsoft.com  Spector Professional for Macintosh published by www.spectorsoft.com  E-Blaster published by www.spectorsoft.com  CSWeb published by www.securitysoft.com  ActMon published by www.iopus.com  Impulse Control published by www.InetPPC.com  Cyber Sentinel published by www.trueactive.com  Desktop Surveillance published by www.toolsthatwork.com Remote Monitoring Applications  CSWeb published by www.securitysoft.com  Impulse Control published by www.InetPPC.com