SlideShare a Scribd company logo
1 of 24
Identifying and Preserving
Digital Evidence
Andrew Neal, Regional Director
TransPerfect Legal Solutions
Forensic Technology and Consulting
Andrew Neal, CISM, CRISC, CIFI, DABFE, ACE, AME
Andrew Neal has more than 30 years of experience working in
technology, computer security, trade security and investigations.
He holds professional certifications in forensics and security, and is
licensed as a private investigator and security consultant in
multiple states. Andrew has authored articles for several trade
publications including Inside Homeland Security and Managing
Security Today, and has presented at numerous national and
international conferences and seminars. He is an active member of
several professional and community organizations, and often
serves as an instructor or at the board level. He is also a Visiting
Assistant Professor at the University of Texas at El Paso, teaching
digital forensics for the Computer Science Department.
Andrew Neal 214-744-4200
aneal@transperfect.com
Agenda
• The When & Why of Digital Forensics
• Terms and Concepts
• Sources of Digital Evidence
• Keys to Digital Evidence Preservation
• Tips for Collection and Analysis
• When to Call for Help
Andrew Neal 214-744-4200
aneal@transperfect.com
Why Digital Forensics?
3.8 Billion Email Accounts
120 Emails per Day
2.4 Billion IM Accounts
91% Cell Phone Saturation (2013)
1.2 Billion Mobile Email Users
2 Billion PCs
Andrew Neal 214-744-4200
aneal@transperfect.com
Why Digital Forensics?
Today’s Evidence is Found
and Processed
in Digital Format!
Andrew Neal 214-744-4200
aneal@transperfect.com
Definitions
Digital Forensics
The Popular Misconceptions
• Access subject device on site.
• Search for data by using the device.
• Gigabytes of data searched in seconds.
• Forensic analysis complete in an hour.
• Only safeguard required is surgical gloves.
Andrew Neal 214-744-4200
aneal@transperfect.com
Definitions
Digital Forensics
The acquisition and analysis of data from a digital device or source
using tools and procedures that insure the integrity of the data and
the analysis.
• Data is verifiably protected from change.
• Analysis results are reproducible by a variety of tools.
• Context & purpose determines licensing or legal implications.
Andrew Neal 214-744-4200
aneal@transperfect.com
Terms and Concepts
Forensic
Andrew Neal 214-744-4200
aneal@transperfect.com
Terms and Concepts
MetaData
Andrew Neal 214-744-4200
aneal@transperfect.com
Terms and Concepts
Defensibility
Andrew Neal 214-744-4200
aneal@transperfect.com
Terms and Concepts
Data Abstraction
Andrew Neal 214-744-4200
aneal@transperfect.com
Terms and Concepts
Hash Value
Andrew Neal 214-744-4200
aneal@transperfect.com
Sources of Digital Data
• Computer hard drives
• Backup media
• Portable devices
• Vehicles
• Other gadgets
Andrew Neal 214-744-4200
aneal@transperfect.com
Sources of Digital Data
• Webmail
• Social Media
• Chat and IM Services
• Cloud Storage
• Cloud Software Services
Andrew Neal 214-744-4200
aneal@transperfect.com
Sources of Digital Data
Andrew Neal 214-744-4200
aneal@transperfect.com
Sources of Digital Data
Andrew Neal 214-744-4200
aneal@transperfect.com
Key to Evidence Preservation
• Document everything
• Understand the environment
• Use protection
• Validate your tool or process
• Multiple verified copies
Andrew Neal 214-744-4200
aneal@transperfect.com
Collection Tips
• 4 Step Process
o Scope
o Plan
o Prepare
o Collect
• You rarely get second chances
• Slow is better than wrong
Andrew Neal 214-744-4200
aneal@transperfect.com
Processing and Analysis Tips
• Document everything
• Understand the environment
• Set time expectations
• You can’t prove negatives
• Fact vs. Opinion
• Who was driving?
Andrew Neal 214-744-4200
aneal@transperfect.com
Professional Help?
You may not have the tools.
Andrew Neal 214-744-4200
aneal@transperfect.com
Professional Help?
You may not have the capacity.
Andrew Neal 214-744-4200
aneal@transperfect.com
Professional Help?
• If the work exceeds your training
• If the timeline is tight
• If the stakes are high
• If you are conflicted out
• If you are unsure of how to proceed
Andrew Neal 214-744-4200
aneal@transperfect.com
Steps You Can Take
• Pick a specific focus
• Purchase tools
• Get trained & practice often
• Network with other professionals
• Reach out if you need help
Andrew Neal 214-744-4200
aneal@transperfect.com
Thank-you for participating
If you have any questions, please feel free
to email them to:
Andrew Neal, Regional Director, TransPerfect Legal Solutions
Forensic Technology and Consulting
ANeal@TransPerfect.com
Joe Gerard, Vice President Marketing and Sales
j.gerard@i-sight.com
Andrew Neal 214-744-4200
aneal@transperfect.com

More Related Content

What's hot

Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...Damir Delija
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations Damir Delija
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...AngelinaJacobs2
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...EC-Council
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 

What's hot (20)

Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 

Viewers also liked

Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Evidence based policy
Evidence based policy Evidence based policy
Evidence based policy pasicUganda
 
What Is Evidence?
What Is Evidence?What Is Evidence?
What Is Evidence?nikkiec89
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 
BDO Digital Forensic
BDO Digital ForensicBDO Digital Forensic
BDO Digital ForensicBDO Indonesia
 
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009ClubHack
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 

Viewers also liked (12)

Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Evidence based policy
Evidence based policy Evidence based policy
Evidence based policy
 
What Is Evidence?
What Is Evidence?What Is Evidence?
What Is Evidence?
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
BDO Digital Forensic
BDO Digital ForensicBDO Digital Forensic
BDO Digital Forensic
 
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Similar to Identifying and Collecting Digital Evidence Webinar

Preparing a Next Generation IT Strategy
Preparing a Next Generation IT StrategyPreparing a Next Generation IT Strategy
Preparing a Next Generation IT StrategyBishop Fox
 
DFG Demo
DFG DemoDFG Demo
DFG Demodfgroup
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...Shawn Wells
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Implementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentImplementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentPerficient, Inc.
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Software
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftDamir Delija
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsUlf Mattsson
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark webVeriato
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"OCTF Industry Engagement
 
Ransomware: The Impact is Real
Ransomware: The Impact is RealRansomware: The Impact is Real
Ransomware: The Impact is RealNICSA
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 

Similar to Identifying and Collecting Digital Evidence Webinar (20)

TAP IntroDeck_06012015_Final PDF
TAP IntroDeck_06012015_Final PDFTAP IntroDeck_06012015_Final PDF
TAP IntroDeck_06012015_Final PDF
 
White paper
White paperWhite paper
White paper
 
Preparing a Next Generation IT Strategy
Preparing a Next Generation IT StrategyPreparing a Next Generation IT Strategy
Preparing a Next Generation IT Strategy
 
DFG Demo
DFG DemoDFG Demo
DFG Demo
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Implementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentImplementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated Environment
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Ransomware: The Impact is Real
Ransomware: The Impact is RealRansomware: The Impact is Real
Ransomware: The Impact is Real
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Correcthorsebatterystaple dwsg 07 09-13
Correcthorsebatterystaple dwsg 07 09-13Correcthorsebatterystaple dwsg 07 09-13
Correcthorsebatterystaple dwsg 07 09-13
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 

More from Case IQ

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskCase IQ
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...Case IQ
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Case IQ
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsCase IQ
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxCase IQ
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work CultureCase IQ
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceCase IQ
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Case IQ
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer IncidentsCase IQ
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Case IQ
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Case IQ
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...Case IQ
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?Case IQ
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Case IQ
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingCase IQ
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceCase IQ
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsCase IQ
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Case IQ
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk Case IQ
 

More from Case IQ (20)

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate Investigators
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptx
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of Compliance
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and Training
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplace
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace Investigators
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 

Identifying and Collecting Digital Evidence Webinar

  • 1. Identifying and Preserving Digital Evidence Andrew Neal, Regional Director TransPerfect Legal Solutions Forensic Technology and Consulting
  • 2. Andrew Neal, CISM, CRISC, CIFI, DABFE, ACE, AME Andrew Neal has more than 30 years of experience working in technology, computer security, trade security and investigations. He holds professional certifications in forensics and security, and is licensed as a private investigator and security consultant in multiple states. Andrew has authored articles for several trade publications including Inside Homeland Security and Managing Security Today, and has presented at numerous national and international conferences and seminars. He is an active member of several professional and community organizations, and often serves as an instructor or at the board level. He is also a Visiting Assistant Professor at the University of Texas at El Paso, teaching digital forensics for the Computer Science Department. Andrew Neal 214-744-4200 aneal@transperfect.com
  • 3. Agenda • The When & Why of Digital Forensics • Terms and Concepts • Sources of Digital Evidence • Keys to Digital Evidence Preservation • Tips for Collection and Analysis • When to Call for Help Andrew Neal 214-744-4200 aneal@transperfect.com
  • 4. Why Digital Forensics? 3.8 Billion Email Accounts 120 Emails per Day 2.4 Billion IM Accounts 91% Cell Phone Saturation (2013) 1.2 Billion Mobile Email Users 2 Billion PCs Andrew Neal 214-744-4200 aneal@transperfect.com
  • 5. Why Digital Forensics? Today’s Evidence is Found and Processed in Digital Format! Andrew Neal 214-744-4200 aneal@transperfect.com
  • 6. Definitions Digital Forensics The Popular Misconceptions • Access subject device on site. • Search for data by using the device. • Gigabytes of data searched in seconds. • Forensic analysis complete in an hour. • Only safeguard required is surgical gloves. Andrew Neal 214-744-4200 aneal@transperfect.com
  • 7. Definitions Digital Forensics The acquisition and analysis of data from a digital device or source using tools and procedures that insure the integrity of the data and the analysis. • Data is verifiably protected from change. • Analysis results are reproducible by a variety of tools. • Context & purpose determines licensing or legal implications. Andrew Neal 214-744-4200 aneal@transperfect.com
  • 8. Terms and Concepts Forensic Andrew Neal 214-744-4200 aneal@transperfect.com
  • 9. Terms and Concepts MetaData Andrew Neal 214-744-4200 aneal@transperfect.com
  • 10. Terms and Concepts Defensibility Andrew Neal 214-744-4200 aneal@transperfect.com
  • 11. Terms and Concepts Data Abstraction Andrew Neal 214-744-4200 aneal@transperfect.com
  • 12. Terms and Concepts Hash Value Andrew Neal 214-744-4200 aneal@transperfect.com
  • 13. Sources of Digital Data • Computer hard drives • Backup media • Portable devices • Vehicles • Other gadgets Andrew Neal 214-744-4200 aneal@transperfect.com
  • 14. Sources of Digital Data • Webmail • Social Media • Chat and IM Services • Cloud Storage • Cloud Software Services Andrew Neal 214-744-4200 aneal@transperfect.com
  • 15. Sources of Digital Data Andrew Neal 214-744-4200 aneal@transperfect.com
  • 16. Sources of Digital Data Andrew Neal 214-744-4200 aneal@transperfect.com
  • 17. Key to Evidence Preservation • Document everything • Understand the environment • Use protection • Validate your tool or process • Multiple verified copies Andrew Neal 214-744-4200 aneal@transperfect.com
  • 18. Collection Tips • 4 Step Process o Scope o Plan o Prepare o Collect • You rarely get second chances • Slow is better than wrong Andrew Neal 214-744-4200 aneal@transperfect.com
  • 19. Processing and Analysis Tips • Document everything • Understand the environment • Set time expectations • You can’t prove negatives • Fact vs. Opinion • Who was driving? Andrew Neal 214-744-4200 aneal@transperfect.com
  • 20. Professional Help? You may not have the tools. Andrew Neal 214-744-4200 aneal@transperfect.com
  • 21. Professional Help? You may not have the capacity. Andrew Neal 214-744-4200 aneal@transperfect.com
  • 22. Professional Help? • If the work exceeds your training • If the timeline is tight • If the stakes are high • If you are conflicted out • If you are unsure of how to proceed Andrew Neal 214-744-4200 aneal@transperfect.com
  • 23. Steps You Can Take • Pick a specific focus • Purchase tools • Get trained & practice often • Network with other professionals • Reach out if you need help Andrew Neal 214-744-4200 aneal@transperfect.com
  • 24. Thank-you for participating If you have any questions, please feel free to email them to: Andrew Neal, Regional Director, TransPerfect Legal Solutions Forensic Technology and Consulting ANeal@TransPerfect.com Joe Gerard, Vice President Marketing and Sales j.gerard@i-sight.com Andrew Neal 214-744-4200 aneal@transperfect.com