Workshop Title:

Building a Digital Forensics Lab

Date:

February 17th, 2023 (CST)

Organizer:

ITM Department, Illinois Institute of Technology

Keywords:

  • Forensics Lab
  • FTK Imager
  • Forensics Workstation
  • Physical Security Lab
  • Chain of Custody

Workshop Chair:

Dr.Marwan Omar

Dr. Marwan Omar

Associate Professor in Illinois Institute of Technology

Personal Bio:

Dr. Omar's Academic career has consistently focused on applied, industry-relevant cyber security, Data Analytics, machine learning, application of AI to cyber security and digital forensics research and education that delivers real-world results. He brings a unique combination of industry experience as well as teaching experience gained from teaching across different cultures and parts of the world. He has an established self-supporting program in machine learning application to cyber security. He has established a respectable research record in AI and cyber security exemplified in the dozens of published papers and book chapters that have gained recognition among researchers and practitioners (more than 272 Google scholar citations thus far). He is actively involved in graduate as well as undergraduate machine learning education including curriculum development and assessment.

Dr. Omar has recently published two books with Springer on Machine Learning and Cyber Security and has also published research with IEEE conference on Sematic Computing. Additionally, Dr. Omar holds numerous industry certifications including Comptia Sec+, ISACA CDPSE, EC-Council Certified Ethical Hacker, and SANS Advanced Smartphone Forensics Analyst.

Dr. Omar has been very active and productive in both academia as well as the industry and he is currently serving as an associate professor of cyber security at Illinois Institute of Technology.

Workshop Description:

Background:

Digital forensics is the process of identifying, collecting, analyzing, and preserving digital evidence that can be used in legal investigations. With the rise of cybercrime, the need for digital forensics labs has become increasingly important. A digital forensics lab is a facility that provides a controlled environment for the examination of digital devices and data storage media to identify, preserve, and analyze digital evidence.

Building a digital forensics lab requires careful planning and consideration of various factors. One of the most important considerations is the physical security of the lab. A digital forensics lab should be located in a secure area, preferably in a restricted access building or room. Access to the lab should be restricted to authorized personnel, and visitors should be carefully screened to prevent the risk of contamination or theft of evidence.

Another key factor in building a digital forensics lab is the selection of appropriate equipment and software. The lab should be equipped with specialized hardware and software tools that are capable of acquiring, preserving, and analyzing digital evidence. This includes forensic workstations, write blockers, evidence bags, network forensic tools, and other specialized tools.

In addition to hardware and software, the lab should also be staffed with trained and experienced forensic investigators. These investigators should be familiar with the latest forensic techniques and tools and should be able to handle a wide range of digital devices, including computers, mobile phones, and other digital storage media.

Finally, the lab should have a well-defined set of procedures and protocols for handling digital evidence. These procedures should be designed to ensure the integrity of the evidence and to minimize the risk of contamination or tampering. They should also be in compliance with legal and regulatory requirements for handling and preserving digital evidence.

In summary, building a digital forensics lab requires careful planning, attention to physical security, appropriate equipment and software, experienced staff, and well-defined procedures and protocols. By investing in a well-designed digital forensics lab, organizations can help protect themselves from the increasing threat of cybercrime and ensure that digital evidence is properly handled and preserved.

Goal / Rationale:

The goal of presenting a workshop on how to build a digital forensics lab is to provide attendees with the knowledge and skills necessary to design, build, and operate a digital forensics lab. The workshop should cover a wide range of topics, including the physical security of the lab, the selection of appropriate equipment and software, the hiring and training of staff, and the development of procedures and protocols for handling digital evidence.

By attending the workshop, participants will learn how to design and build a digital forensics lab that is capable of acquiring, preserving, and analyzing digital evidence. They will gain a deep understanding of the specialized tools and techniques used in digital forensics, including forensic workstations, write blockers, and network forensic tools. They will also learn how to develop and implement procedures and protocols for handling digital evidence, including best practices for evidence collection, storage, and analysis.

Ultimately, the goal of the workshop is to empower attendees with the knowledge and skills necessary to build and operate a successful digital forensics lab. By doing so, they can help protect their organizations from the threat of cybercrime and ensure that digital evidence is properly handled and preserved. The workshop should provide participants with a solid foundation in digital forensics that they can build upon as they continue to develop their expertise in this important field.

Scope and Information for Participants:

  1. Overview of digital forensics - Introduction to digital forensics, its history, and its importance in modern-day investigations.
  2. Physical security - Discussion of the physical security requirements for a digital forensics lab, including the location of the lab, access control measures, and environmental controls.
  3. Equipment and software - Overview of the hardware and software tools required to build a digital forensics lab, including forensic workstations, write blockers, imaging tools, and network forensic tools.
  4. Staffing and training - Discussion of the skills and qualifications required for personnel working in a digital forensics lab, as well as training and certification programs available to forensic investigators.
  5. Procedures and protocols - Development and implementation of procedures and protocols for handling digital evidence, including evidence collection, storage, analysis, and reporting.

Highlights:

A workshop on how to build a digital forensics lab is designed to provide attendees with a comprehensive understanding of the process of designing, building, and operating a digital forensics lab. The workshop would typically cover a wide range of topics, including the physical security of the lab, the selection of appropriate equipment and software, the hiring and training of staff, and the development of procedures and protocols for handling digital evidence.

The workshop would begin with an overview of digital forensics, its history, and its importance in modern-day investigations. The instructors would then discuss the physical security requirements for a digital forensics lab, including the location of the lab, access control measures, and environmental controls.

Next, the workshop would cover the hardware and software tools required to build a digital forensics lab, including forensic workstations, write blockers, imaging tools, and network forensic tools. The instructors would provide guidance on selecting the appropriate equipment and software based on the specific needs of the organization.

The workshop would then move on to a discussion of the skills and qualifications required for personnel working in a digital forensics lab, as well as training and certification programs available to forensic investigators. Participants would learn about the importance of ongoing training and professional development to stay up-to-date with the latest developments in digital forensics.

Access to Workshop:

CONF-SPML 2023 Workshop: Building a Digital Forensics Lab - YouTube

Venue:

Illinois Institute of Technology, 10 W 35th St, Chicago, IL 60616

Visa:


https://travel.state.gov/content/travel/en/us-visas.html/

In order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countires has different rules for the visa application. It is always a good idea to check the latest regulations in your country. You should confirm details with your local Consular Office. This page just gave some general information of the visa application.

USA Visa Information

The B-1/B-2 visitor visa is for people traveling to the United States temporarily for business (B-1) or for pleasure or medical treatment (B-2). Generally, the B-1 visa is for travelers consulting with business associates; attending scientific, educational, professional, or business conventions/conferences; settling an estate; or negotiating contracts. The B-2 visa is for travel that is recreational in nature, including tourism; visits with friends or relatives; medical treatment; and activities of a fraternal, social, or service nature. Often, the B-1 and B-2 visas are combined and issued as one visa: the B-1/B-2.

Application Items

If you apply for a business/tourist visa, you must pay your $160 application fee and submit the following:

  • A Nonimmigrant Visa Electronic Application (DS-160) Form. Visit the DS-160 web page for more information about the DS-160.
  • A passport valid for travel to the United States with a validity date at least six months beyond your intended period of stay in the United States (unless country-specific agreements provide exemptions). If more than one person is included in your passport, each person desiring a visa must submit an application.
  • One (1) 2 x 2 inches (51 x 51 mm) photograph taken within the last six months.
  • If a visa is issued, there may be an additional visa issuance reciprocity fee, depending on your nationality.

In addition to these items, you must present an interview appointment letter confirming that you booked an appointment through this service. You may also bring whatever supporting documents you believe support the information provided to the consular officer.

Supporting Documents

  • Invitation letter from business or school.
  • Detailed CV or resume including a list of publications.
  • Complete itinerary, including all meetings, conferences, and visits; include names, addresses, and telephone numbers of your hosts.
  • For other materials, please refer to the U.S. Embassy or Consulate website.

NOTICE:

Should your application be denied, the organizing committee cannot change the decision of visa officer, nor will CONF-SPML engage in discussion or correspondence with the visa application center on behalf of the applicant. The registration fee CANNOT be refunded when the VISA application of individual being denied.