SlideShare a Scribd company logo
1 of 74
Corporate High Technology Investigations building bridges between  Corporate  Security and Law Enforcement Presented by Computer Technology Investigators Northwest Presentation Prepared By Christopher Steuart, The Boeing Company Bill Nelson, The Boeing Company Brian Palmer, King County Sheriff’s Office
Introduction  ,[object Object],[object Object]
Summary of Course ,[object Object],[object Object]
Presentation Objectives ,[object Object],[object Object]
Who is in Attendance? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Topics ,[object Object],[object Object],[object Object],[object Object],[object Object]
Overview  ,[object Object]
Connections  ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Systems Analysis Defined ,[object Object],[object Object]
Systems Analysis Applied to Audit or Investigations The Life Cycle ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preliminary to Audit or  Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preliminary Audit or Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Systems Analysis ,[object Object],[object Object],[object Object],[object Object]
Systems Development ,[object Object],[object Object],[object Object],[object Object],[object Object]
Systems Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario ,[object Object],[object Object],[object Object]
Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integrating Systems Analysis into the Audit or Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integrating Systems Analysis into the Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integrating Systems Analysis into the Audit or Investigation ,[object Object],[object Object],[object Object],[object Object]
The Audit or Investigation  as a Project ,[object Object],[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object],[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object],[object Object]
The Integrated Investigation ,[object Object],[object Object],[object Object]
1. Start  preliminary investigation ID  crime 2. Evaluate crime 3. What needs to be done? 4. Draft report Go to 55 55. Start systems analysis 56. 56.1 list items needed 56.2 get items needed 56.3 imple- ment items 57. Brian- storm 58. 71. Select  analysis Notify manage- ment Review initial findings Review planning Establish commun- cations methods PERT CHART
The Integrated Investigation ,[object Object],[object Object]
Gantt Chart
The Integrated Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HiTech, Inc.  Intranet Internet WWW, Email, etc.   HiTech Proxy Servers HiTech  Firewall Seattle So. CA. St. Louis Phil. Coco  Beach Users Users Users Users Users Users Mesa Witchita HiTech, Inc. Intranet and Internet  T3 line
HiTech Intranet Internet WWW, Email, etc.   HiTech Proxy Servers * HiTech Firewall Suspect  Users here IP:111.222.333.444 Realtime Internet Monitor Process Investigation Proxy Server  - suspect Internet data is collected here. Both  sent & received data is  collected as it occurs. Normal access flow * Utility called Proxy.Pac is updated to tell the Network to  sendsuspects Internet activity to Investigation Proxy Server. (http://proxy-support.boeing.com:31060/proxy.pac) Suspect is automatically rerouted  to Investigation Proxy Server. to the Internet T3 line
The Corporate High Technology Affidavit ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object],[object Object]
RCW 5.45.020. Business records as evidence ,[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Corporate High  Technology Affidavit ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why an Affidavit and Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Corporate View ,[object Object],[object Object],[object Object]
The Law Enforcement View ,[object Object],[object Object],[object Object],[object Object]
The Suspect’s Attorney’s View ,[object Object],[object Object],[object Object]
The Prosecutor’s View ,[object Object],[object Object],[object Object],[object Object],[object Object]
USA v Rouse,U.S.Ct.App 8th Cir. 1998 ,[object Object]
Agent of Law Enforcement? ,[object Object],[object Object]
Agent of Law Enforcement? ,[object Object],[object Object],[object Object]
Agent of Law Enforcement? ,[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Where to get more  information or help ,[object Object],[object Object],[object Object]
Corporate Training Needs ,[object Object],[object Object],[object Object],[object Object]
Corporate Training Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Corporate Training Needs ,[object Object],[object Object],[object Object],[object Object]
Corporate Training Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Law Enforcement Training Needs ,[object Object],[object Object],[object Object],[object Object]
Law Enforcement Training Needs ,[object Object],[object Object],[object Object]
Law Enforcement Training Needs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prosecutor’s Training Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prosecutor’s Training Needs ,[object Object]
Professional Organizations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Consultants  ,[object Object],[object Object],[object Object],[object Object]
Investigators ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
Octogence
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
Isaiah Edem
 

What's hot (18)

Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Penetration Testing Services, Penetration Testing
Penetration Testing Services, Penetration TestingPenetration Testing Services, Penetration Testing
Penetration Testing Services, Penetration Testing
 
Penentration testing
Penentration testingPenentration testing
Penentration testing
 
GDPR & Forensics Readiness -English
GDPR & Forensics Readiness -EnglishGDPR & Forensics Readiness -English
GDPR & Forensics Readiness -English
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Penetration testing overview
Penetration testing overviewPenetration testing overview
Penetration testing overview
 
Nii sample pt_report
Nii sample pt_reportNii sample pt_report
Nii sample pt_report
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
 
Csec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comCsec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.com
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance Guide
 
KoryTWright Resume
KoryTWright ResumeKoryTWright Resume
KoryTWright Resume
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
 

Viewers also liked

Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Basis Technology
 
July132000
July132000July132000
July132000
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
CTIN
 
Nra
NraNra
Nra
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 

Viewers also liked (20)

Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
July132000
July132000July132000
July132000
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Nra
NraNra
Nra
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 

Similar to Corporate Public Investigations

IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
Mark Milburn
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
Mordecai Kraushar
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
christiandean12115
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docx
lmelaine
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdf
noelbuddy
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
grimesjo
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
grimesjo
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 

Similar to Corporate Public Investigations (20)

Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
Nimbus IP10 CJ Workshop
Nimbus IP10 CJ WorkshopNimbus IP10 CJ Workshop
Nimbus IP10 CJ Workshop
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docx
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdf
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 

More from CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
CTIN
 
M Compevid
M CompevidM Compevid
M Compevid
CTIN
 

More from CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Raidprep
RaidprepRaidprep
Raidprep
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Corporate Public Investigations

  • 1. Corporate High Technology Investigations building bridges between Corporate Security and Law Enforcement Presented by Computer Technology Investigators Northwest Presentation Prepared By Christopher Steuart, The Boeing Company Bill Nelson, The Boeing Company Brian Palmer, King County Sheriff’s Office
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. 1. Start preliminary investigation ID crime 2. Evaluate crime 3. What needs to be done? 4. Draft report Go to 55 55. Start systems analysis 56. 56.1 list items needed 56.2 get items needed 56.3 imple- ment items 57. Brian- storm 58. 71. Select analysis Notify manage- ment Review initial findings Review planning Establish commun- cations methods PERT CHART
  • 36.
  • 38.
  • 39. HiTech, Inc. Intranet Internet WWW, Email, etc. HiTech Proxy Servers HiTech Firewall Seattle So. CA. St. Louis Phil. Coco Beach Users Users Users Users Users Users Mesa Witchita HiTech, Inc. Intranet and Internet T3 line
  • 40. HiTech Intranet Internet WWW, Email, etc. HiTech Proxy Servers * HiTech Firewall Suspect Users here IP:111.222.333.444 Realtime Internet Monitor Process Investigation Proxy Server - suspect Internet data is collected here. Both sent & received data is collected as it occurs. Normal access flow * Utility called Proxy.Pac is updated to tell the Network to sendsuspects Internet activity to Investigation Proxy Server. (http://proxy-support.boeing.com:31060/proxy.pac) Suspect is automatically rerouted to Investigation Proxy Server. to the Internet T3 line
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.