9:00 am - 10:00 am
Do Not Fear The Dark Web (Keven Hendricks)
This presentation would cover the best investigatory practices for the dark web investigations, understanding evolving trends concerning the different dark nets, new decentralized messaging platforms that threat actors are using, being “undercover” on the dark web and engaging illicit markets, and how to attempt to identify a dark web threat actor in the “real world”.
Expert Witness (Aaron Crews)
Zaza vs. Malicious Code (Lab - Part 1) (Zaza Handy)
Zaza will take participants through tactics and techniques used to uncover elusive malware she encountered. She will discuss and demonstrate tools and methodology used to identify, retrieve, analyse and reverse engineer suspicious code identified during a challenging security incident she handled. During this session, she will discuss challenges encountered and solutions that worked during the investigation will be presented. Zaza will conclude with recommendations for responding and recovering from what she refers to as bad mama jammer resident malware.
Investigating Linux Systems (Lab - Part 1) (Ali Hadi and Miriam Khader)
Linux Forensics is an invaluable skill in the toolkit of any digital forensics investigator, given the widespread adoption of Linux in various IT infrastructures. This field involves more than just identifying illicit activities; it's about understanding the nuances of Linux environments that may have been compromised. Investigators equipped with knowledge in Linux Forensics can adeptly analyze a breached Linux system, discerning the how, when, and why of the attack. The ability to perform forensics on a Linux system means being able to navigate through layers of data and system logs to trace the origins of a breach. Forensic investigators must have the required skills to identify signs of compromise, such as unauthorized access or suspicious user activities. They must know where to look for these indicators within the Linux system, from file systems to application logs, and how to interpret them. Furthermore, Linux Forensics is not just about dealing with the aftermath of a cyber attack; it's also about proactive measures. Investigators skilled in this area can discover potential vulnerabilities on Linux systems, ensuring that they are fortified against possible threats.
10:30 am - 11:30 am
CyberTheft of Trade Secrets and Legal Considerations duing Data Breaches (Herbert Joe)
Trade secrets make up the majority of the value of U.S. public companies' portfolios. Not surprisingly, such secrets are high value theft targets for domestic and foreign competitors. Domestic economic damage attributed to trade secret theft alone – not even accounting for counterfeit goods and software piracy – exceeds $600 billion annually. This presentation explores the world of trade secrets, details some high-profile trade secret theft cases, how trade secrets differ from other intellectual properties, the legal aspects of trade secrets, some recent case law and legislation, and general discovery/legal considerations during a data breach.
Forensics in the New Millenium (Warren Kruse)
Zaza vs. Malicious Code (Lab - Part 2) (Zaza Handy)
Zaza will take participants through tactics and techniques used to uncover elusive malware she encountered. She will discuss and demonstrate tools and methodology used to identify, retrieve, analyse and reverse engineer suspicious code identified during a challenging security incident she handled. During this session, she will discuss challenges encountered and solutions that worked during the investigation will be presented. Zaza will conclude with recommendations for responding and recovering from what she refers to as bad mama jammer resident malware.
Investigating Linux Systems (Lab - Part 2) (Ali Hadi and Miriam Khader)
Linux Forensics is an invaluable skill in the toolkit of any digital forensics investigator, given the widespread adoption of Linux in various IT infrastructures. This field involves more than just identifying illicit activities; it's about understanding the nuances of Linux environments that may have been compromised. Investigators equipped with knowledge in Linux Forensics can adeptly analyze a breached Linux system, discerning the how, when, and why of the attack. The ability to perform forensics on a Linux system means being able to navigate through layers of data and system logs to trace the origins of a breach. Forensic investigators must have the required skills to identify signs of compromise, such as unauthorized access or suspicious user activities. They must know where to look for these indicators within the Linux system, from file systems to application logs, and how to interpret them. Furthermore, Linux Forensics is not just about dealing with the aftermath of a cyber attack; it's also about proactive measures. Investigators skilled in this area can discover potential vulnerabilities on Linux systems, ensuring that they are fortified against possible threats.
12:30 pm - 1:30 pm
Generative AI & Messaging Apps - Taking Digital Investigations by Storm (Julie Lewis)
Generative AI (ChatGPT, Bard, etc.) is an evolutionary technology taking all industries by storm. Most collaboration, social media and messaging apps have or will be embedding this productivity technology is some way. In this session, we will discuss the impact on the explosion of communications, authentication issues and approaches, and data security risks. We will also discuss the impact on digital investigations as we tackle the year of the bots.
Mock Trial (Part 1)
12:30 pm - 2:00 pm
Unlocking Digital Forensics with PALADIN - a Hands-On Workshop (Lab - Part 1 & 2) (Steve Whalen)
Dive into the world of digital forensics with our interactive workshop at the HTCIA International Conference, featuring the powerful tool PALADIN. PALADIN is a versatile and user-friendly forensic suite built on a Ubuntu Linux foundation, renowned for its ability to simplify complex forensic tasks. This workshop is your gateway to mastering both basic and advanced features of PALADIN, including its intuitive graphical user interface, robust imaging capabilities, and the comprehensive PALADIN Toolbox. Our session will guide you through the essentials of using PALADIN for forensic imaging, data triage, and advanced analysis. You’ll learn to navigate its features, from creating forensic copies of data to leveraging the Toolbox for deeper investigations. We’ll explore how PALADIN streamlines the process of acquiring and analyzing digital evidence, making it an invaluable asset for forensic professionals. As a bonus, the first 50 attendees will receive their own PALADIN USB drive to keep, pre-loaded with the latest version of the tool, allowing you to immediately implement your new skills in real-world scenarios. Whether you’re new to PALADIN or looking to deepen your existing knowledge, this workshop offers a hands-on experience to enhance your forensic capabilities. Join us to unlock the full potential of PALADIN in your forensic investigations.
2:00 pm - 3:00 pm
Investigating Online Crypto Investment Fraud (Keven Hendricks)
While cryptocurrency may be a polarizing topic, every day there are people falling victim to scams or fraud with a nexus to crypto. Often viewed as abstruse or something that is beyond the purview of local law enforcement to investigate, this presentation would cover cryptocurrency fundamentals and best investigatory practices.
Prove It! The Future of Synethetic Media (AI) Detection in Justice and Public Safety (Trey Amik, Brandon Epstein, Steve Gemperle)
Tom Cruise performing magic tricks on TikTok, the Pope wearing Balenciaga, foreign leaders declaring acts of war…the prevalence of high-quality synthetic media online has brought a new age of disinformation and distrust to society. While a distinct concern, how does this relate to evidence admissibility in criminal investigations and legal proceedings? What is the true threat to public safety? This presentation will address the real concerns with synthetic media as it pertains to law enforcement and forensic examiners who have to authenticate evidence for court. The presentation will address not only the detection of synthetic or altered media but methods to prove when video files are real. Reliable, explainable, and repeatable techniques for the examination and authentication of video evidence will be introduced. The presentation will also discuss how to deploy these techniques at scale and integrated into an overall digital forensic examination.
Mock Trial (Part 2)