SlideShare a Scribd company logo
Computer Forensics: What Every
Lawyer Needs to Know
Shannon Murphy
Dave Freskos
Raj Laud
Presenters
Shannon Murphy
White Collar, Regulatory Defense &
Investigation
Winston & Strawn LLP - Chicago, IL
stmurphy@winston.com
• Member of the firm’s Global Privacy
and Data Security Task Force.
• Handles litigation, investigations, and
advisory services, with a focus on data
security and theft of trade secrets.
• Received a certificate for passing the
Rochester Institute of Technology’s
Computer Forensics program
and is CompTIA IT Fundamentals
Certified
Dave Freskos
Senior Director, Digital Forensics &
Investigations
FTI Consulting, Inc. - Chicago, IL
David.freskos@fticonsulting.com
• Certified EnCase Examiner and
Cellebrite Physical Analyst
• Leads Chicago based forensics team
that specializes in uncovering IP theft
and supporting other high stakes
investigations.
• Regularly provides expert testimony
and written affidavits in support of
litigation matters.
Raj Laud
Deputy Chief, National Security and
Cybercrimes
Chicago, IL
rajnath.laud@usdoj.gov
• Supervises national security, cyber,
and intellectual property crimes cases
in the U.S. Attorney’s Office for the
Northern District of Illinois
• Opinions expressed are his own, not
those of the U.S. Attorney’s Office or
Department of Justice
Why Digital Forensics?
What Is Digital Forensics?
• Obtaining evidence from digital media in a defensible manner
• Proper preservation
• Carefully documented use of a variety of different techniques.
• No one, singular log provides all the answers
• Analysis of processes designed with the intent to help a device run more
efficiently, not produce evidence.
• Collection of seemingly non-related artifacts allow for examiners to build a
narrative around user activity.
Traditional Document Searches Forensic Analyses
• User-created documents
• Microsoft Suite, PDF, etc.
• Corporate Email
• File Shares
• Paper Documents
• USB Devices
• Internet History
• Event Logs
• Social Media
• Cloud Services
• Mobile Devices/Applications
• Volume Shadow Copies/Backups
• Personal Webmail
• Unallocated Disk Space
• Program Execution History
A Different Approach
5
10 Things Every Lawyer
Should Know
Collect Broadly
• Where might evidence be located?
• Email
• Computers
• Phones
• External hard drives
• Security camera footage
• Keycard access logs
• Printer logs
• Server/database logs
• Extranet access logs
7
Maintain and Document Chain of
Custody
• Document collect
• Make, model, serial number
• When collected
• By whom
• From whom/from where
• Store securely
• Document any change in custody
8
Image the Device Before Any Review
• Do not take any steps to review a
device until a copy has been made
• Train “well-intentioned” IT personnel
9
What is a Device Image?
• Bit-for-bit copy of the
entire hard drive
• Hash value is generated as
the image is created
• Allows for integrity of the
image to be verified
• Ghost or similar enterprise IT
tools do not create a forensic
image.
10
Consider Whether to Turn a Device
On/Off
• Turning on or off a device can lose
or alter data, including potentially
key date/time stamps
• BUT, in some instances, turning off
the computer is the better option,
even though some data will be lost
11
“Deleted” Does Not Mean Nonexistent
• In-tact deleted files vs Overwritten
files.
• Ease of recoverability depends on file
state
• Forensic software can identify deleted
files and recover metadata associated
with the once active file
• Carving of unallocated space
• May allow of snippets of relevant data to
be recovered.
12
Deleted File States
13
Part of your hard drive is a file
system that lists where files are on
this track – here is where this track
starts and ends, etc.
File System: File System:
file001
file002
file003
Deleted, but data is
not removed from
the track
Upon deletion, space is only
marked as available. Data is
not removed from the track.
Data can still be pulled out.
File System:
file001
file002
file003
Data is physically
removed from
the track
Space is marked as available.
Data is removed from the track.
Active Files Deleting Files Wiping Files
file001
file002
file003
Computers Do Not Track Files Moved
to Other Devices
• Computers do not create a log of
files moved or copied
• “Artifacts” may be created
• Software programs can be used to
generate a list of files on external
storage (e.g. USB devices)
14
File Usage Artifacts
15
Link Files:
Link files are shortcuts to files you opened. They get
created by Windows and applications for a variety of
reasons, including to show you which files you opened
recently. Link files include information about where a file
was opened from (e.g. a USB device) and the file’s
metadata.
File Usage Artifacts
16
Jump Lists:
Metadata stored about folders and files that have
been recently accessed – including the most recent
time each file was opened and the file’s access,
creation, and modification date.
A List of External Devices Can Be
Created
• For Windows devices – a list of
every device plugged in with first
and last connection dates
• For Mac devices – a list of devices
plugged in within the last 30 days
17
Date/Time Stamps Are Not Gospel
• Documents have date time stamps
of certain events (created,
modified, last accessed)
• Computers keep many logs that
have dates and times of certain
events
• Dates/times are keyed off of the
internal clock – which can be
changed
• Intentional changes
• Changes due to lack of battery
18
Give Your Forensic Expert Case Details
• Computer forensic work is an
art
• Your computer forensic expert
needs background facts to
investigate
• How/where company stores data
• Key names and dates
• File naming conventions
• Information about remote access
19
Preventative Measures are available
• Use Data Loss Prevention
software
• Educate legal and IT teams to
communicate
• Data Governance
• Know where your valuable IP
resides and use managed
resources to secure
20
Hiring a Digital Forensics Expert
21
Complex analysis required, such as
showing misappropriation of corporate
data
May file a TRO or lawsuit
May need an affidavit
May refer matter to law enforcement
Need to ensure complete and
defensible preservation
Considerations
Counsel should engage to protect
privilege
Discuss and define the scope of work
But, realize the scope may change
Not all experts are the same
Engage as soon as possible
When
Questions?
22

More Related Content

What's hot

Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
Tim Fletcher
 
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityLecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Alchemist095
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Vikas Jain
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
00heights
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
Online
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
Damir Delija
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
Damir Delija
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
GarethKnight
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
jahanzebmunawar
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 

What's hot (20)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityLecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 

Similar to Computer Forensics – What Every Lawyer Needs to Know

Latest presentation
Latest presentationLatest presentation
Latest presentation
Adetunji Adeoje
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
Novizul Evendi
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
libinp
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
Rahul Badekar
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Muzzammil Wani
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONAmina Baha
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
gagan deep
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
primeteacher32
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
Ambuj Kumar
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
BoyarMiller
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
Sreekanth Narendran
 

Similar to Computer Forensics – What Every Lawyer Needs to Know (20)

Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
CF.ppt
CF.pptCF.ppt
CF.ppt
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
3871778
38717783871778
3871778
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATION
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 

More from Winston & Strawn LLP

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law Landmines
Winston & Strawn LLP
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Winston & Strawn LLP
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Winston & Strawn LLP
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) Guidance
Winston & Strawn LLP
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Winston & Strawn LLP
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement Plans
Winston & Strawn LLP
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Winston & Strawn LLP
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Winston & Strawn LLP
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions Program
Winston & Strawn LLP
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Winston & Strawn LLP
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Winston & Strawn LLP
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Winston & Strawn LLP
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical Devices
Winston & Strawn LLP
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and Implications
Winston & Strawn LLP
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRB
Winston & Strawn LLP
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
Winston & Strawn LLP
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
Winston & Strawn LLP
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To Prepare
Winston & Strawn LLP
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
Winston & Strawn LLP
 
The Current M&A Environment
The Current M&A EnvironmentThe Current M&A Environment
The Current M&A Environment
Winston & Strawn LLP
 

More from Winston & Strawn LLP (20)

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law Landmines
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) Guidance
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement Plans
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions Program
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical Devices
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and Implications
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRB
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To Prepare
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
 
The Current M&A Environment
The Current M&A EnvironmentThe Current M&A Environment
The Current M&A Environment
 

Recently uploaded

Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 

Recently uploaded (20)

Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 

Computer Forensics – What Every Lawyer Needs to Know

  • 1. Computer Forensics: What Every Lawyer Needs to Know Shannon Murphy Dave Freskos Raj Laud
  • 2. Presenters Shannon Murphy White Collar, Regulatory Defense & Investigation Winston & Strawn LLP - Chicago, IL stmurphy@winston.com • Member of the firm’s Global Privacy and Data Security Task Force. • Handles litigation, investigations, and advisory services, with a focus on data security and theft of trade secrets. • Received a certificate for passing the Rochester Institute of Technology’s Computer Forensics program and is CompTIA IT Fundamentals Certified Dave Freskos Senior Director, Digital Forensics & Investigations FTI Consulting, Inc. - Chicago, IL David.freskos@fticonsulting.com • Certified EnCase Examiner and Cellebrite Physical Analyst • Leads Chicago based forensics team that specializes in uncovering IP theft and supporting other high stakes investigations. • Regularly provides expert testimony and written affidavits in support of litigation matters. Raj Laud Deputy Chief, National Security and Cybercrimes Chicago, IL rajnath.laud@usdoj.gov • Supervises national security, cyber, and intellectual property crimes cases in the U.S. Attorney’s Office for the Northern District of Illinois • Opinions expressed are his own, not those of the U.S. Attorney’s Office or Department of Justice
  • 4. What Is Digital Forensics? • Obtaining evidence from digital media in a defensible manner • Proper preservation • Carefully documented use of a variety of different techniques. • No one, singular log provides all the answers • Analysis of processes designed with the intent to help a device run more efficiently, not produce evidence. • Collection of seemingly non-related artifacts allow for examiners to build a narrative around user activity.
  • 5. Traditional Document Searches Forensic Analyses • User-created documents • Microsoft Suite, PDF, etc. • Corporate Email • File Shares • Paper Documents • USB Devices • Internet History • Event Logs • Social Media • Cloud Services • Mobile Devices/Applications • Volume Shadow Copies/Backups • Personal Webmail • Unallocated Disk Space • Program Execution History A Different Approach 5
  • 6. 10 Things Every Lawyer Should Know
  • 7. Collect Broadly • Where might evidence be located? • Email • Computers • Phones • External hard drives • Security camera footage • Keycard access logs • Printer logs • Server/database logs • Extranet access logs 7
  • 8. Maintain and Document Chain of Custody • Document collect • Make, model, serial number • When collected • By whom • From whom/from where • Store securely • Document any change in custody 8
  • 9. Image the Device Before Any Review • Do not take any steps to review a device until a copy has been made • Train “well-intentioned” IT personnel 9
  • 10. What is a Device Image? • Bit-for-bit copy of the entire hard drive • Hash value is generated as the image is created • Allows for integrity of the image to be verified • Ghost or similar enterprise IT tools do not create a forensic image. 10
  • 11. Consider Whether to Turn a Device On/Off • Turning on or off a device can lose or alter data, including potentially key date/time stamps • BUT, in some instances, turning off the computer is the better option, even though some data will be lost 11
  • 12. “Deleted” Does Not Mean Nonexistent • In-tact deleted files vs Overwritten files. • Ease of recoverability depends on file state • Forensic software can identify deleted files and recover metadata associated with the once active file • Carving of unallocated space • May allow of snippets of relevant data to be recovered. 12
  • 13. Deleted File States 13 Part of your hard drive is a file system that lists where files are on this track – here is where this track starts and ends, etc. File System: File System: file001 file002 file003 Deleted, but data is not removed from the track Upon deletion, space is only marked as available. Data is not removed from the track. Data can still be pulled out. File System: file001 file002 file003 Data is physically removed from the track Space is marked as available. Data is removed from the track. Active Files Deleting Files Wiping Files file001 file002 file003
  • 14. Computers Do Not Track Files Moved to Other Devices • Computers do not create a log of files moved or copied • “Artifacts” may be created • Software programs can be used to generate a list of files on external storage (e.g. USB devices) 14
  • 15. File Usage Artifacts 15 Link Files: Link files are shortcuts to files you opened. They get created by Windows and applications for a variety of reasons, including to show you which files you opened recently. Link files include information about where a file was opened from (e.g. a USB device) and the file’s metadata.
  • 16. File Usage Artifacts 16 Jump Lists: Metadata stored about folders and files that have been recently accessed – including the most recent time each file was opened and the file’s access, creation, and modification date.
  • 17. A List of External Devices Can Be Created • For Windows devices – a list of every device plugged in with first and last connection dates • For Mac devices – a list of devices plugged in within the last 30 days 17
  • 18. Date/Time Stamps Are Not Gospel • Documents have date time stamps of certain events (created, modified, last accessed) • Computers keep many logs that have dates and times of certain events • Dates/times are keyed off of the internal clock – which can be changed • Intentional changes • Changes due to lack of battery 18
  • 19. Give Your Forensic Expert Case Details • Computer forensic work is an art • Your computer forensic expert needs background facts to investigate • How/where company stores data • Key names and dates • File naming conventions • Information about remote access 19
  • 20. Preventative Measures are available • Use Data Loss Prevention software • Educate legal and IT teams to communicate • Data Governance • Know where your valuable IP resides and use managed resources to secure 20
  • 21. Hiring a Digital Forensics Expert 21 Complex analysis required, such as showing misappropriation of corporate data May file a TRO or lawsuit May need an affidavit May refer matter to law enforcement Need to ensure complete and defensible preservation Considerations Counsel should engage to protect privilege Discuss and define the scope of work But, realize the scope may change Not all experts are the same Engage as soon as possible When