Download - PFIC - Paraben's Forensic Innovations Conference
Download - PFIC - Paraben's Forensic Innovations Conference
Download - PFIC - Paraben's Forensic Innovations Conference
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Time: Sunday, 2:00 PM – 3:30 PM<br />
Track: <strong>Innovations</strong> Track<br />
Room: Davos<br />
Presenter: James Weibe, CRU DataPort/Weibe Tech<br />
Title: Hiding Information on Hard Drives in Ways Your Standard <strong>Forensic</strong> Software will Never Find<br />
In this presentation, James Wiebe will present some new thoughts on how data may be hidden on hard<br />
drives. Covering old concepts fi rst, (such as Host Protected Areas), James will also present alternative methods<br />
for hiding information on hard drives, such as in supervisory areas. These areas are never visible through<br />
standard drive commands, and are also are not visible to any operating system. Also discussed will be hypothetical<br />
examples of how drives may be ‘tampered’ by sophisticated bad guys in order to provide facade<br />
characteristics to a forensic investigator.<br />
Time: Sunday, 4:00 PM – 5:30 PM<br />
Track: <strong>Innovations</strong> Track<br />
Room: Davos<br />
Presenters: Chet Hosmer & Mike Raggo, Authors of Data Hiding<br />
Title: Data Hiding & Steganography - An Update on the Latest <strong>Innovations</strong> in 2012<br />
If the newswire is any indication, corporate espionage, covert communications, and evidence concealment<br />
continue to plague corporations, investigators, and the military. Use of steganographic techniques by Russian<br />
Spies for covert communications is the latest in a series of incidents involving data hiding.<br />
This presentation will highlight some of the latest research of the 21st century involving data hiding techniques<br />
over the network and with data-at-rest. The highlights will demonstrate new techniques for hiding<br />
data on mobile devices, VOIP, virtualimages, social networks, and other dominating technologies in today’s<br />
world.<br />
Having demonstrated the latest data hiding techniques, we will propose detailed analytical methods for<br />
discovering hidden data, as well as jamming methods for disrupting data hiding operations. These examples<br />
of warfare include image, multimedia, and network protocol jamming.<br />
We will then consider emerging technologies and attack methods, including cloud considerations, parallel<br />
processing attack methods, privacy protection, and derivative datahiding and detection theories.