24.12.2012 Views

Download - PFIC - Paraben's Forensic Innovations Conference

Download - PFIC - Paraben's Forensic Innovations Conference

Download - PFIC - Paraben's Forensic Innovations Conference

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Time: Sunday, 2:00 PM – 3:30 PM<br />

Track: <strong>Innovations</strong> Track<br />

Room: Davos<br />

Presenter: James Weibe, CRU DataPort/Weibe Tech<br />

Title: Hiding Information on Hard Drives in Ways Your Standard <strong>Forensic</strong> Software will Never Find<br />

In this presentation, James Wiebe will present some new thoughts on how data may be hidden on hard<br />

drives. Covering old concepts fi rst, (such as Host Protected Areas), James will also present alternative methods<br />

for hiding information on hard drives, such as in supervisory areas. These areas are never visible through<br />

standard drive commands, and are also are not visible to any operating system. Also discussed will be hypothetical<br />

examples of how drives may be ‘tampered’ by sophisticated bad guys in order to provide facade<br />

characteristics to a forensic investigator.<br />

Time: Sunday, 4:00 PM – 5:30 PM<br />

Track: <strong>Innovations</strong> Track<br />

Room: Davos<br />

Presenters: Chet Hosmer & Mike Raggo, Authors of Data Hiding<br />

Title: Data Hiding & Steganography - An Update on the Latest <strong>Innovations</strong> in 2012<br />

If the newswire is any indication, corporate espionage, covert communications, and evidence concealment<br />

continue to plague corporations, investigators, and the military. Use of steganographic techniques by Russian<br />

Spies for covert communications is the latest in a series of incidents involving data hiding.<br />

This presentation will highlight some of the latest research of the 21st century involving data hiding techniques<br />

over the network and with data-at-rest. The highlights will demonstrate new techniques for hiding<br />

data on mobile devices, VOIP, virtualimages, social networks, and other dominating technologies in today’s<br />

world.<br />

Having demonstrated the latest data hiding techniques, we will propose detailed analytical methods for<br />

discovering hidden data, as well as jamming methods for disrupting data hiding operations. These examples<br />

of warfare include image, multimedia, and network protocol jamming.<br />

We will then consider emerging technologies and attack methods, including cloud considerations, parallel<br />

processing attack methods, privacy protection, and derivative datahiding and detection theories.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!