Lab 3

.docx

School

Victoria University *

*We aren’t endorsed by this school

Course

NIT2141

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by shivnag

Lab 3 Write a report by doing your own research to answer the following questions: 1- In a drug case, you suspect there has been communication between two suspected ringleaders, as both know about the delivery and pickup. The lawful interception has not seen any direct communication between these suspects: no SMS, calls, or direct data streams. You suspect they have used their smartphones to communicate. a) What do you think you can find on their phones? If there's suspicion of communication between two suspects in a drug case, despite the absence of direct communication via calls, SMS, or data streams intercepted through lawful means, there are still several avenues to explore on their smartphones: Messaging Apps Cloud Storage Location History Internet Browser History Photos and Videos Third Party Apps It's important to note that accessing this information may require appropriate legal authorization, such as a warrant, and should be conducted in agreement with applicable laws and regulations. b) How would you start looking for their communication? When facing with the challenge of investigating suspected communication between two individuals in a drug case, despite the lack of direct evidence from lawful interception, there are several steps to start looking for their communication on their smartphones: Digital Forensic Analysis Network Analysis Application Analysis Deleted Data Recovery Collaboration with Tech Experts Interviews Surveillance and Monitoring By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can effectively uncover evidence of communication between suspected ringleaders in a drug case. c) Anything you can do before the suspects are brought in? Before bringing the suspects in for questioning or further investigation, there are several steps you can take to gather preliminary evidence and build a case: Surveillance Data Analysis Witness Interviews Search Warrants Informant Cooperation By taking these proactive steps before bringing the suspects in, law enforcement agencies can gather additional evidence, identify potential communication methods, and strengthen the case against the suspected ringleaders in the drug operation.
d) How would you acquire the data from the phones? Acquiring data from the smartphones of suspected ringleaders in a drug case can be a complicated process, requiring law and guidelines. Here's how you might proceed to gain access to the data: Obtain Legal Authorization Secure the Devices Use Forensic Tools Cloud Data Extraction Backup Extraction Analyze the Data By following these steps and following law and guidelines, law enforcement agencies can gain access to the data from the smartphones of suspected ringleaders in a drug case to gather evidence and build a stronger case. e) And how would you search for traces? If there is direct communication between the suspected ringleaders in a drug case hasn't been detected through lawful capture methods such as SMS, calls, or direct data streams, but there is a suspicion that they've used their smartphones to communicate, there are several methods to search for traces of communication: App Usage Analysis Deleted Data Recovery Network Traffic Analysis Digital Footprint Analysis Location Tracking Content Hiding Techniques Informant Help By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can search for traces of communication between suspected ringleaders in a drug case. 2- The handling of evidence is an important consideration. The crime scene investigator has found a phone on the scene of crime, and suspects that there is crucial evidence in the phone. The phone seems to have some droplets inside the cracked screen. He hands you the phone and says that due to the importance of the digital evidence, you should acquire the data first, and then the other forensic experts will look for fingerprints and biological traces after you are finished. A) How should you handle the device? Handling the device properly is crucial to maintain the integrity of the digital evidence. Here's how I would handle the device in this scenario: Secure the Device Secure Storage Prevent Further Damage Acquire Data First Use Forensic Tools Coordinate with Other Experts
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help