SlideShare una empresa de Scribd logo
1 de 62
The Cybercrime Trial Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
What’s Different about a Cybercrime Trial ,[object Object],[object Object]
As With Any Trial, Keys Are: ,[object Object],[object Object],[object Object]
Understanding Your Case ,[object Object],[object Object],[object Object],[object Object]
Understanding Your Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Your Case ,[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Your Case ,[object Object],[object Object],[object Object],[object Object]
Understanding Your Case ,[object Object]
Preparing Your Case ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case ,[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Education ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Education ,[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Education We're using age old methods of reasoning trying to evaluate an unfamiliar situation by finding analogy to a familiar one. But applied to the web the analogies get so complex that the familiar turns into the unfamiliar.  To make the situation accurate you have to make it so weird that it doesn't help us figure things out.  David Weinberger , Commentator on All Things Considered
Preparing Your Case - Expert Witness ,[object Object]
Preparing Your Case - Expert Witness ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Expert Witness ,[object Object],[object Object]
Preparing Your Case - Expert Witness ,[object Object],[object Object],[object Object]
Preparing Your Case - Expert Witness ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Expert Witness ,[object Object],[object Object],[object Object]
Preparing Your Case - Scientific Method ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Expert/Scientific Method ,[object Object],[object Object]
Preparing Your Case - Expert Witness ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object],[object Object],[object Object]
June 30, 1999 - 8 Minutes Later ,[object Object],[object Object],[object Object],destory
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing Your Case - Problem Areas ,[object Object],[object Object]
Preparing Your Case - Jury Instructions ,[object Object],[object Object],[object Object]
Presenting Your Case ,[object Object],[object Object],[object Object],[object Object]
Presenting Your Case-Voir Dire ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Presenting Your Case-Voir Dire
[object Object],[object Object],[object Object],[object Object],Presenting Your Case-Voir Dire
[object Object],[object Object],[object Object],[object Object],Presenting Your Case-Voir Dire What Jury Do You Want
Presenting Your Case-Voir Dire   Not All Cybercases Are the Same ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Voir Dire – Child Exploits/Porn ,[object Object],[object Object],[object Object],[object Object]
Voir Dire – Fraud/Identity Theft  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Voir Dire – Hacking/Intrusion ,[object Object],[object Object],[object Object],[object Object],[object Object]
Voir Dire - Piracy ,[object Object],[object Object],[object Object],[object Object]
Voir Dire – Trade Secrets ,[object Object],[object Object],[object Object],[object Object]
Presenting Your Case - Complicated/Technical Issues 1. Have a very simple analogy 2. Have a uncomplicated correct definition 3. Find/develop a picture/drawing of what your technology “looks like”. 4. Have a credible expert explain technology using all above #1, #2, #3. 5. Have your expert use that picture/drawing.
[object Object],[object Object],[object Object],[object Object],[object Object],Presenting Your Case - Complicated/Technical Issues
[object Object],Presenting Your Case - Presentation Tools
[object Object],Presenting Your Case - Presentation Tools
[object Object],[object Object],Presenting Your Case - Presentation Tools
Hard Drive File Allocation Table Storage Area CLUSTER 1 Unallocated FILE STORAGE CLUSTER 2 Unallocated CLUSTER 3 Unallocated CLUSTER 1 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
Hard Drive File Allocation Table Storage Area FILE   DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated
Hard Drive File Allocation Table Storage Area FILE   DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated CLUSTER 1 Unallocated CLUSTER 2 Unallocated ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
INFO Hard Drive ownload DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ecycle INFO (ownloadmage.jpg) DELETE RECYCLE BIN DELETE ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m.
Hard Drive ownload DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO (ownloadmage.jpg) ecycle RECOVER RECYCLE BIN RECOVER ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ? C01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO
[object Object],[object Object],Presenting Your Case - Presentation Tools
[object Object],[object Object],Presenting Your Case - Presentation Tools
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Presenting Your Case - Presentation Tools
[object Object],[object Object],Presenting Your Case -  Digital Evidence Admissibility
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Presenting Your Case -  Digital Evidence Admissibility: In General
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Presenting Your Case -  Digital Evidence Admissibility: In General
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sweet Home Alabama (or wherever)

Más contenido relacionado

Destacado

「わかりにくいダイバーシティ・インクルージョン」も大切
「わかりにくいダイバーシティ・インクルージョン」も大切「わかりにくいダイバーシティ・インクルージョン」も大切
「わかりにくいダイバーシティ・インクルージョン」も大切Ayumu Kohiyama
 
Arthritis.gout
Arthritis.goutArthritis.gout
Arthritis.goutRomaLouise
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
1 5 inverse functions
1 5 inverse functions1 5 inverse functions
1 5 inverse functionsLomasPreCalc
 
Proporcionalidad y repartos proporcionales
Proporcionalidad y repartos proporcionalesProporcionalidad y repartos proporcionales
Proporcionalidad y repartos proporcionalesJose Castellar
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware LabDigit Oktavianto
 
Business transformation and business value drivers
Business transformation and business value driversBusiness transformation and business value drivers
Business transformation and business value driversJohn A. Bova
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attackrajakhurram
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 

Destacado (13)

「わかりにくいダイバーシティ・インクルージョン」も大切
「わかりにくいダイバーシティ・インクルージョン」も大切「わかりにくいダイバーシティ・インクルージョン」も大切
「わかりにくいダイバーシティ・インクルージョン」も大切
 
Arthritis.gout
Arthritis.goutArthritis.gout
Arthritis.gout
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
1 5 inverse functions
1 5 inverse functions1 5 inverse functions
1 5 inverse functions
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
Proporcionalidad y repartos proporcionales
Proporcionalidad y repartos proporcionalesProporcionalidad y repartos proporcionales
Proporcionalidad y repartos proporcionales
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware Lab
 
Phonology
PhonologyPhonology
Phonology
 
Business transformation and business value drivers
Business transformation and business value driversBusiness transformation and business value drivers
Business transformation and business value drivers
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Mision, mision , valores. unab
Mision, mision , valores.  unabMision, mision , valores.  unab
Mision, mision , valores. unab
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 

Similar a CyberCrime

Discussion Board Unit4   Proof Requirements and Sentencing Due.docx
Discussion Board Unit4   Proof Requirements and Sentencing Due.docxDiscussion Board Unit4   Proof Requirements and Sentencing Due.docx
Discussion Board Unit4   Proof Requirements and Sentencing Due.docxelinoraudley582231
 
Thesis Statement For American Dream Essay
Thesis Statement For American Dream EssayThesis Statement For American Dream Essay
Thesis Statement For American Dream EssayAmanda Cote
 
Digital Trial Impact, LLC Travis V.Smalls Marketing
Digital Trial Impact, LLC Travis V.Smalls MarketingDigital Trial Impact, LLC Travis V.Smalls Marketing
Digital Trial Impact, LLC Travis V.Smalls MarketingTravis_Smalls
 
Assignment Reflection You looked quite critically at the US Co.docx
Assignment  Reflection You looked quite critically at the US Co.docxAssignment  Reflection You looked quite critically at the US Co.docx
Assignment Reflection You looked quite critically at the US Co.docxfredharris32
 
Auto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to FinishAuto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to FinishWoodrow Glass
 
Auto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to Finish Auto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to Finish Woodrow Glass
 
Pirate-Writing-Paper-01-BW - TimS Printables
Pirate-Writing-Paper-01-BW - TimS PrintablesPirate-Writing-Paper-01-BW - TimS Printables
Pirate-Writing-Paper-01-BW - TimS PrintablesNaomi Hansen
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics WorkshopTim Fletcher
 
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxFINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxtjane3
 
i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docxwrite4
 
Write In The Rain With This Waterproof Paper - Brit Co
Write In The Rain With This Waterproof Paper - Brit CoWrite In The Rain With This Waterproof Paper - Brit Co
Write In The Rain With This Waterproof Paper - Brit CoAparna Harrison
 
Using research to inform service design
Using research to inform service design Using research to inform service design
Using research to inform service design Ana Cecilia Santos
 
Forensic Expert Cross Examination
Forensic Expert Cross ExaminationForensic Expert Cross Examination
Forensic Expert Cross Examinationivneetsingh
 

Similar a CyberCrime (17)

Cyber
CyberCyber
Cyber
 
Discussion Board Unit4   Proof Requirements and Sentencing Due.docx
Discussion Board Unit4   Proof Requirements and Sentencing Due.docxDiscussion Board Unit4   Proof Requirements and Sentencing Due.docx
Discussion Board Unit4   Proof Requirements and Sentencing Due.docx
 
Forensic Engineering 09
Forensic Engineering 09Forensic Engineering 09
Forensic Engineering 09
 
Thesis Statement For American Dream Essay
Thesis Statement For American Dream EssayThesis Statement For American Dream Essay
Thesis Statement For American Dream Essay
 
Digital Trial Impact, LLC Travis V.Smalls Marketing
Digital Trial Impact, LLC Travis V.Smalls MarketingDigital Trial Impact, LLC Travis V.Smalls Marketing
Digital Trial Impact, LLC Travis V.Smalls Marketing
 
A2L_Storytelling_for_Litigators_3rd_Ed
A2L_Storytelling_for_Litigators_3rd_EdA2L_Storytelling_for_Litigators_3rd_Ed
A2L_Storytelling_for_Litigators_3rd_Ed
 
Assignment Reflection You looked quite critically at the US Co.docx
Assignment  Reflection You looked quite critically at the US Co.docxAssignment  Reflection You looked quite critically at the US Co.docx
Assignment Reflection You looked quite critically at the US Co.docx
 
Auto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to FinishAuto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to Finish
 
Auto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to Finish Auto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to Finish
 
Final Forensics Project
Final Forensics Project Final Forensics Project
Final Forensics Project
 
Pirate-Writing-Paper-01-BW - TimS Printables
Pirate-Writing-Paper-01-BW - TimS PrintablesPirate-Writing-Paper-01-BW - TimS Printables
Pirate-Writing-Paper-01-BW - TimS Printables
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxFINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
 
i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docx
 
Write In The Rain With This Waterproof Paper - Brit Co
Write In The Rain With This Waterproof Paper - Brit CoWrite In The Rain With This Waterproof Paper - Brit Co
Write In The Rain With This Waterproof Paper - Brit Co
 
Using research to inform service design
Using research to inform service design Using research to inform service design
Using research to inform service design
 
Forensic Expert Cross Examination
Forensic Expert Cross ExaminationForensic Expert Cross Examination
Forensic Expert Cross Examination
 

Más de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking OverviewCTIN
 
M Compevid
M CompevidM Compevid
M CompevidCTIN
 

Más de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Raidprep
RaidprepRaidprep
Raidprep
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

CyberCrime

  • 1. The Cybercrime Trial Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Preparing Your Case - Education We're using age old methods of reasoning trying to evaluate an unfamiliar situation by finding analogy to a familiar one. But applied to the web the analogies get so complex that the familiar turns into the unfamiliar. To make the situation accurate you have to make it so weird that it doesn't help us figure things out. David Weinberger , Commentator on All Things Considered
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. Presenting Your Case - Complicated/Technical Issues 1. Have a very simple analogy 2. Have a uncomplicated correct definition 3. Find/develop a picture/drawing of what your technology “looks like”. 4. Have a credible expert explain technology using all above #1, #2, #3. 5. Have your expert use that picture/drawing.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Hard Drive File Allocation Table Storage Area CLUSTER 1 Unallocated FILE STORAGE CLUSTER 2 Unallocated CLUSTER 3 Unallocated CLUSTER 1 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
  • 52. Hard Drive File Allocation Table Storage Area FILE DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated
  • 53. Hard Drive File Allocation Table Storage Area FILE DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated CLUSTER 1 Unallocated CLUSTER 2 Unallocated ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
  • 54. INFO Hard Drive ownload DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ecycle INFO (ownloadmage.jpg) DELETE RECYCLE BIN DELETE ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m.
  • 55. Hard Drive ownload DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO (ownloadmage.jpg) ecycle RECOVER RECYCLE BIN RECOVER ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ? C01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.