Well, lookee here. Nice e-mail I got from Computer Forensics and Electronic Discovery in Arizona today. Whatever were they thinking? Last year I got a load of job offers from security agencies…. and I’m just not the type. Is anyone else getting emails like this? Have you a clue as to why you have been added to their mailing list?
Looks like a nifty course on computer spying for fun and profit to me.
Computer Forensics and Electronic Discovery in Arizona
ID# 365517
Scottsdale, Arizona
March 23, 2006
Camelback Golf Club
7847 North Mockingbird Lane
Continuing education credit: NALA 0.70, IACET 0.65, AZ CLE 6.50
Faculty
Chief Security Officers
Russell Rowe
Benjamin Stephan
John Riding
——————————————————————————–
Agenda
9:00 a.m. – 9:45 a.m.
I. Overview: What Is Computer Forensics And Why Is It Important?
A. Identity Theft
B. E-Commerce Fraud
C. Intellectual Property
9:45 a.m. – 10:30 a.m.
II. Computer Processing And Concepts
A. Anatomy Of The Machine
1. Hardware And Peripherals
2. Operating System
3. The Boot Up Sequence From Start To Finish
B. Data: It Is All 1’s And 0’s
1. Complex Storage Devices
C. Does Deleting Really Make It Go Away?
10:30 a.m. – 10:45 a.m.
Break
10:45 a.m. – 11:15 a.m.
III. Forensics Tool Bag
A. Software
1. Encase
a. Servlets
2. Forensic Tool Kit
3. Password Crackers
a. Cain And Abel
b. PWL Files
4. Steganography
B. Hardware
1. Write Blockers
a. Fastbloc
2. Boot Disks
11:15 a.m. – 12:15 p.m.
Lunch (On Your Own)
12:15 p.m. – 1:00 p.m.
IV. On The Scene: How To Handle Onsite Investigations From Intro To Acquisition
A. Permission And Privacy
B. Logging And Labeling
1. Computer Connections And Components
2. A Picture Speaks A Thousand Words
C. Don’t Touch It, You’ll Corrupt It
1. Proper Shutdown Sequence
2. BIOS Check And The Boot Sequence
D. Art Of Acquisition
1. Drive To Drive
2. Network Cross Over Cable
E. Onsite Triage
1:00 p.m. – 2:30 p.m.
V. Cyber Evidence: What Tracks Are Left Behind And How Do We Find Them?
A. Partition Recovery
B. File Signature Analysis
C. Hash Sets
D. Recovering Deleted Files And Folders
1. Info2 Records
E. OS Artifacts
1. Link Files
2. Printer Spools
3. Temporary Files And Folders
F. Images
1. Gallery Review
2. Yoya And Image Headers
G. Complex Files
1. Compressed Files
2. Complex Documents
2:30 p.m. – 2:45 p.m.
Break
2:45 p.m. – 3:45 p.m.
VI. Internet Evidence
A. E-Mail Evidence
B. Outlook PST Files
C. Webmail
D. Base64
E. History
F. Cookies
G. Temporary Internet Files
H. Images
3:45 p.m. – 4:30 p.m.
VII. User Profiling
A. Putting The Pieces Together
B. Rebuilding The User
4:30 p.m. – 5:00 p.m.
VIII. Questions And Answers
——————————————————————————–
If you don’t wish to receive any more invitations for Chief Security Offices reply to this email with “Unsubscribe” in the Subject Line
Chief Security Officers
14301 N. 87th Street
Suite 215
Scottsdale, Arizona 85260
888-237-3899
I like that bit about “Rebuilding the User”…. are they talking about Post Traumatic Stress Syndrome?
And while we’re on the topic, anyone who objects to NSA domestic spying on Americans should divest themselves, as far as possible, of AT&T. Go to WORKING ASSETS. Get yourself a long-distance carrier that will work for you and the changes we all seek. (Free credits for Ben & Jerry’s and your chance to apportion 100 points of profit donations towards organizations like the ACLU and Doctors Without Borders.)
Big Business Becoming Big Brother
The Emerging “Surveillance-Industrial Complex”
Big Business Becoming Big Brother
by Kim Zetter
The government is increasingly using corporations to do its surveillance work, allowing it to get around restrictions that protect the privacy and civil liberties of Americans, according to a report released Monday by the American Civil Liberties Union, an organization that works to protect civil liberties.
Data aggregators — companies that aggregate information from numerous private and public databases — and private companies that collect information about their customers are increasingly giving or selling data to the government to augment its surveillance capabilities and help it track the activities of people.
I’m curious – did you unsubscribe? Is it really a job offer, or a seminar for the nosey? I never get interesting email offers, especially ones that offer hash and yoya. Mmm cookies…
It really burns me up when I go to a hot seminar full of intriguing attractive spy-wannabees and I end up eating lunch on my own!
No, it’s a seminar…. towards employment. I just threw it out right away. The ones I got last year were with photos of National Security types….. and didn’t I want to be one….
I have several emails for several different types of accounts… my personal one, my work one, and my resource one. Then there is this one… the least used, and the least trafficked… but I have a friend who is a retired intel op, and another associate who used to work in the intelligence field and now practices investigative journalism… they both use this little email address. That’s the only connection I could figure out.
ATT is getting ready to buy a whole lot of peopledata in this new deal. Back to BigMa Bell.
A new class action lawsuit in Oregon might have a chance of getting more detailed information as to how the surveillance works. It would be nice if we could at least stop them from spying but it doesn’t seem possible anymore.
I’ve always wondered how many computer viruses are manufactured by computer security companies.