Press & News

April 1, 2016
01 Apr 2016

2016 AIDE Conference Schedule (Digital Forensics)

 

 

Monday

18 April

Tuesday

19 April

Wednesday

20 April

Thursday

21 April

Friday

22 April

8:45

Welcome

Welcome

Welcome

Welcome

Welcome

9:00-9:50

Cell Phone Mapping & Analysis

Jeremiah Johnson
NW3C

 

High School

Do You Want Educated Users? Because This is How You Get Educated Users.

Tess Schrodinger

Tack 2 – Physical Security Penetration TestingKeith Pachulski

9:50-10:00

 Break

Break

Break

Break

Break

10:00-10:50

Cell Phone Mapping & Analysis

Jeremiah Johnson
NW3C

 

High School

Are you a Scientist
or an Investigator?

Mark M. Pollitt, Ph.D.
President Digital Evidence Professional Services, Inc.

——–

Don’t blame that checklist for your crappy security program

Branden Miller

 

Track 1 – Network Implants: It’s more than just Meterpreter

Elliott Cutright

Track 2 – Physical Security Penetration Testing

Keith Pachulski

10:50-11:00

Break

Break

Break

Break

Break

11:00-11:50

Cell Phone Mapping & Analysis

Jeremiah Johnson
NW3C

 

High School

Predictive
Model of Hacker Behaviors by Individual Differences and Techniques of Neutralizations

Dr. Kathryn Seigfried-Spellar
Assistant Professor
Purdue University
Department of Computer & Information Technology

——-

Shooting Phish in a Barrel

Amanda Berlin

Track 1 – Hacking Web Apps 

Brent White and Tim Roberts

Track 2 – Physical Security Penetration Testing

Keith Pachulski

 

12:00-1:00

Lunch

Lunch

Lunch

 

Lunch

Lunch

1:00-1:50

Building
Digital Citizens: Skills for Tomorrow

Jason Jackson
CommonSense.org

 

High School

Cyber
threats and working with Law Enforcement

Michelle Pirtle
Special Agent,
FBI Pittsburgh

Track 2 – Physical Security Penetration TestingKeith Pachulski

1:50-2:00

Break

Break

Break

Break

Break

2:00-2:50

Building
Digital Citizens: Skills for Tomorrow

Jason Jackson
CommonSense.org

 

 

High School

TBA

Dr. Marc Rogers
Dept. of Computer & Information Technology, Purdue

Track 2 – Physical Security Penetration Testing

Keith Pachulski

2:50-3:00

Break

Break

Break

Break

Break

3:00-3:50

Building
Digital Citizens: Skills for Tomorrow

Jason Jackson
CommonSense.org

 

High School

Peggy Brown, J.D
Professor
Marshall University

 

3:50-4:00

 

Break

Break

Break

Break

Break

4:00-4:50

 

 

 

 

 

 

 

 

 

 

 

March 13, 2015
13 Mar 2015

2015 AIDE Conference Schedule (Information Security)

Click the link below to view information concerning the Information Security conference.

Information Security Speakers Schedule

January 16, 2015
16 Jan 2015

Cyber Safety Summit

Cyber Summit

January 11, 2015
11 Jan 2015

2015 Electronic Discovery Schedule

Appalachian Institute of Digital Evidence

e-Discovery Programming

21 April 2015

2015 aide discovery conference

January 11, 2015
11 Jan 2015

2015 AIDE Conference Schedule (Digital Forensics)

 

Monday
20 April

Tuesday
21 April

Wednesday
22 April

Thursday
23 April

Friday
24 April

8:45

Welcome

Welcome

Welcome

Welcome

Welcome

9:00
9:50

Advanced
Wireless Network Investigations

Jeremiah Johnson
NW3C

High School

Windows 10 Updates: What’s New in Windows OS Forensics

Rob Attoe,
Head of Global Training
Nuix

[Annex Bldg]

“Tools
and Methods for Analyzing Windows Mobile Artifacts”.
 

Joe Duke
Senior Manager of Training Operations at Cellebrite

[Main bldg.: WW1]

Cyber
Sextortion: A Case Study in Cyber Behavioral and Open Source Analysis

Crane Hassold, Crime Analyst FBI’s Behavioral Analysis Cyber Behavioral
Analysis Center (CBAC)

[Main bldg.: WW1 & WW2]

9:50
10:00

 Break

Break

Break

Break

Break

10:00
10:50

Advanced
Wireless Network Investigations

High School

A Brief Description of the Prosecution and Defense Function in the Digital
Information Age

John Flannery, Esq.

[Annex Bldg]

“Tools and Methods for Analyzing Windows Mobile Artifacts”

Joe Duke
Senior Manager of Training Operations at Cellebrite

[Main bldg.: WW1]

Cyber Sextortion: A Case Study in Cyber Behavioral and Open Source Analysis

 [Main bldg.: WW1 & WW2]

10:50
11:00

Break

Break

Break

Break

Break

11:00
11:50

Advanced
Wireless Network Investigations

 

High School

Error, Uncertainty and Bias in Digital Forensic Science

Dr. Marc Rogers Director Cyber Forensics & Security Purdue University

[Skype]

Trains,
Planes and Automobiles plus Your Kitchen Stove

Dr. Terry Fenger , Director Marshall University Forensic Science Center

[Main bldg.: WW1]

Cyber Sextortion: A Case Study in Cyber Behavioral and Open Source Analysis

[Main bldg.: WW1 & WW2]

 

12:00
1:00

Lunch

Lunch

Lunch

Lunch

Lunch

1:00
1:50

Advanced
Wireless Network Investigations

 

High
School

Macintosh Forensics

Michael Nelson
Senior Forensic Examiner
eTERA Consulting, LLC

 [Annex Bldg]

Lone Actor Cyberterror

Dr. Gary Kessler, Embry- Riddle Aeronautical University

[Main Bldg.: WW1]

Courtroom Testimony

Phillip Morrison
Director, WV Prosecuting Attorney’s Institute

 [Main Bldg.: WW1]

1:50
2:00

Break

Break

Break

Break

Break

2:00
2:50

Advanced
Wireless Network Investigations

 

High
School

Analysis: the Next Generation of Digital Forensic

Dr. Mark Pollitt
Digital Evidence
Professional Services, Inc

 [Annex Bldg]

Digital Forensic Myths

Dr. Gary Kessler, Embry- Riddle Aeronautical University

[Main Bldg.: WW1]

 

2:50
3:00

Break

Break

Break

Break

Break

3:00
3:50

Advanced
Wireless Network Investigations

 

High
School

Overcoming Anti-Forensics:  Finding the Evidence a Suspect Tried to Hide

Ryan Duquette
Magnet Forensics

[Annex Bldg]

Overcoming
Anti-Forensics:  Finding the Evidence a Suspect Tried to Hide

Ryan Duquette
Magnet Forensics

 [Main Bldg.: WW1]

 

3:50
4:00

 

Break

Break

Break

Break

Break

4:00
4:50

Advanced Wireless  Network Investigations

High
School

Open

Source Android Artifact Parser Framework

Preston Miller
Chapin Bryce

 [Annex Bldg]

 

TBA

Josh Brunty
Assistant Professor

[Main Bldg:  WW1]

 

April 15, 2014
15 Apr 2014

2014 AIDE Conference Schedule (E-Discovery)

 

Please click here to view the pdf of E-Discovery AIDE Conference Schedule.

 

 

March 12, 2014
12 Mar 2014

Appalachian Institute of Digital Evidence

The Appalachian Institute of Digital Evidence (AIDE) was founded in 2010 by legal and information technology (IT) professionals in West Virginia who recognized the impact of the digitalization of communication and commerce on the legal profession and law enforcement.  At its inception, three related but unique areas were identified as the focus of AIDE’s work: (1) electronic discovery; (2) digital forensics; and (3) information security.  Since 2010, each of these practice groups has continuously sought to serve as a resource to practitioners in West Virginia and neighboring states on how to predict, prepare for, manage and resolve the unique issues presented by this digital age.  This article offers a brief glimpse into some of AIDE’s work.

 

Click here to view the rest of this article.

March 6, 2014
06 Mar 2014

2014 AIDE Conference Schedule (Digital Forensics and Information Security)

Digital Forensics track is highlighted in Blue

Information Security track is highlighted in Green

Monday April 21st 2014
8:00 – 8:45 Registration
8:45 – 9:00 Welcome
9:00 – 9:50 “First Responder:Digital” First Responder: Digital Evidence” AIDE Staff
9:50 – 10:00 Break
10:00 – 10:50 “First Responder: Digital Evidence” AIDE Staff
10:50 – 11:00 Break
11:00 – 11:50 “First Responder: Digital Evidence” AIDE Staff
12:00 – 1:00 Lunch
1:00 – 1:50 “Digital Evidence for Investigators Part 1: Using DE to Connect the Dots”
1:50 – 2:00 Break
2:00 – 2:50 “Digital Evidence for Investigators Part 2: Suspect Behind the Keyboard”
2:50 – 3:00 Break
3:00 – 3:50 “Digital Evidence for Investigators Part 3: Legal” Peggy Brown, Assistant Prosecutor, Cabell County, WV
3:50 – 4:00 Break
4:00 – 4:50 “Digital Evidence for Investigators Part 4: Interview and Interrogation of Tech Suspect”
Tuesday April 22nd 2014
8:00 – 8:45 Registration
8:45 – 9:00 Welcome
9:00 – 9:50 “Social Media as an Intelligence Tool: Practical, Legal, and Ethical Considerations” Dave Abbruzzino, Director, Open Source Intelligence Exchange (OSIX) Fairmont State University
9:50 – 10:00 Break
10:00 – 10:50 “Operational Security for Social Media Research” OSIX-FSU Staff
10:50 – 11:00 Break
11:00 – 11:50 “Social Media Research Techniques” OSIX-FSU Staff
12:00 – 1:00 Lunch
1:00 – 1:50 “Social Media and Disaster Response” OSIX-FSU Staff)
1:50 – 2:00 Break
2:00 – 2:50
“Fusion Liaison Officer Program” West Virginia Intelligence Fusion Center
2:50 – 3:00 Break
3:00 – 3:50 LM WISDOM Demonstration – Lockheed Martin Corporation
3:50 – 4:00 Break
4:00 – 4:50
Wednesday April 23rd 2014
8:00 – 8:45
8:45 – 9:00
9:00 – 9:50
9:50 – 10:00 Break
10:00 – 10:50
10:50 – 11:00 Break
11:00 – 11:50
12:00 – 1:00 Lunch
1:00 – 1:50
1:50 – 2:00 Break
2:00 – 2:50
2:50 – 3:00 Break
3:00 – 3:50
3:50 – 4:00 Break
4:00 – 4:50
Thursday April 24th 2014
8:00 – 8:45 Registration
8:45 – 9:00 Welcome
9:00 – 9:50 “Cyber Crime Sentencing: Is it really out of “Whack”? Dr. Marc Rogers, Purdue University
9:00 – 9:50 “Perspectives on IT Security in Health Care” Mike McCarthy, Marshall University School of Medicine CIO
9:50 – 10:00 Break
10:00 – 10:50 “App Attack.” Christopher Vance, WV State Police
“Katana: A Live Flash Drive for Forensics and More” JP Dunning
10:50 – 11:00 Break
11:00 – 11:50
“PrOSINT-Practical Open Source Intelligence” Calvin Britton
12:00 – 1:00 Lunch
1:00 – 1:50 Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University
“Clear and Present Danger: Current Research on Insider Threat” Tess Schrodinger
1:50 – 2:00 Break
2:00 – 2:50 Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University
“Intro to Penetration Testing” Bill Gardner, Assistant Professor, Marshall University
2:50 – 3:00 Break
3:00 – 3:50 Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University
“Intro to Penetration Testing” Bill Gardner, Assistant Professor, Marshall University
3:50 – 4:00 Break
4:00 – 4:50 Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University
“Intro to Penetration Testing” Bill Gardner, Assistant Professor, Marshall University
Friday April 25th 2014
8:00 – 8:45 Registration
8:45 – 9:00 Welcome
9:00 – 9:50 “Overview of Cryptography” Dr. Gary Kessler, Embry-Riddle Aeronautical University
“Fundamentals of Linux Privilege Escalation” Elliott Cutright
9:50 – 10:00 Break
10:00 – 10:50 “Overview of Cryptography” Part 2. Dr. Gary Kessler, Embry-Riddle Aeronautical University
“Another Log to Analyze- Utilizing DNS to Discover Malware in Your Network” Nathan Magniez
10:50 – 11:00 Break
11:00 – 11:50 “Mobile Forensics Fixes.” Christopher Vance, WV State Police
“Step On In, The Water’s Fine! – An Introduction to Security Testing Within A Virtualized Environment” Tom Moore
12:00 – 1:00 Lunch
1:00 – 1:50 “Writing a Digital Forensics Report.” Dr. Gary Kessler, Embry-Riddle Aeronautical University
Keynote – Moving the Industry Forward – The Purple Team– Dave Kennedy
1:50 – 2:00 Break
2:00 – 2:50 “Writing a Digital Forensics Report” Part 2. Dr. Gary Kessler, Embry-Riddle Aeronautical University“How Hackers for Charity (Possibly) Saved Me a LOT of Money” Branden and Emily Miller
2:50 – 3:00 Break
3:00 – 3:50 “Windows 8 Surface PC and Office 365 artifacts.” Rob Attoe, Senior Vice President of Investigations Training and Services NUIX
3:50 – 4:00 Break
4:00 – 4:50 “Cloud Forensics.” Rob Attoe, Senior Vice President of Investigations Training and Services NUIX
February 27, 2014
27 Feb 2014

Latest CSS

Parents telling their kids to not talk to strangers is a staple of early learning, but the rules for staying safe online can be more complex.

That’s why Marshall University, along with its Department of Integrated Science & Technology, the FBI and the Appalachian Institute of Digital Evidence sponsored a free cyber safety summit Tuesday at the St. Mary’s Medical Center for Education.

Click here to read more…

February 27, 2014
27 Feb 2014

The Article in the WV Executive

Protecting your digital footprint.

Click here to read more…