Forensics Journal - Stevenson University 2015 | Page 6

STEVENSON UNIVERSITY Ask the Forensic Expert: Michael Robinson or later than what is displayed to the user. As a result, a file can be hidden and made to look like it was installed a long time ago, e.g., when the operating system was originally installed. On the surface, timestomping may look efficient, but most file systems store dozens of artifacts associated with each file, and when timestamps are analyzed across all of this metadata, timestomping typically stands out. MICHAEL ROBINSON Michael Robinson is a computer forensic examiner and cyber threat analyst for a large international company. He has performed computer and cell phone exploitation and analysis for customers in both the U.S. Intelligence Community and the private sector. Michael has performed computer forensic examinations for the FBI’s Investigative Analysis Unit, where he assisted special agents with counter-intelligence and criminal cases. Michael is the former CIO of the U.S. Department of Defense’s Business Transformation Agency, where he oversaw all information technology and information assurance operations for the agency, including overseeing all incident response and forensic investigations. WHEN I NEED TO DISCARD MY CURRENT SMART PHONE FOR A NEW ONE, WHAT SHOULD I DO TO ENSURE THAT MY OLD DATA HAS BEEN DELETED? When discarding a smartphone, one of the safest ways to ensure that old user data, such as text messages, call logs, or Internet history, is deleted is to complete a three-part process. This includes: 1. enabling encryption on the phone, 2. disabling cloud backups, and then 3. performing a factory reset of the phone. Resetting the smartphone will delete the encryption key and render the old user data unrecoverable. For older feature, i.e. dumb phones, the phone should be physically destroyed to ensure the chips holding data are non-usable. This may mean destroying more than just the screen and keyboard, which are often repairable. Michael is the Program Coordinator and an Adjunct Professor for Stevenson University’s Master of Science in Cyber Forensics. At Stevenson, he was the recipient of the Rose Dawson Award in 2013. He teaches courses in mobile device forensics, intrusion analysis, and cyber warfare. Michael holds a Bachelor of Science in Chemical Engineering, a Master of Science in Information Assurance, a Master of Science in Forensic Studies (concentratin