Lab 3
.docx
keyboard_arrow_up
School
Victoria University *
*We aren’t endorsed by this school
Course
NIT2141
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by shivnag
Lab 3
Write a report by doing your own research to answer the following questions:
1-
In a drug case, you suspect there has been communication between two suspected ringleaders, as both know about the delivery and pickup. The lawful interception has not seen any direct communication between these suspects: no SMS, calls, or direct data streams. You suspect they have used their smartphones to communicate. a)
What do you think you can find on their phones? If there's suspicion of communication between two suspects in a drug case, despite the absence of direct communication via calls, SMS, or data streams intercepted through lawful means, there are still several avenues to explore on their smartphones:
Messaging Apps
Cloud Storage
Location History
Internet Browser History
Photos and Videos
Third Party Apps
It's important to note that accessing this information may require appropriate legal authorization, such as a warrant, and should be conducted in agreement with applicable laws and regulations.
b)
How would you start looking for their communication? When facing with the challenge of investigating suspected communication between two individuals in a drug case, despite the lack of direct evidence from lawful interception, there are several steps to start looking for their communication on their smartphones:
Digital Forensic Analysis
Network Analysis
Application Analysis
Deleted Data Recovery
Collaboration with Tech Experts
Interviews
Surveillance and Monitoring
By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can effectively uncover evidence of communication between suspected ringleaders in a drug case.
c)
Anything you can do before the suspects are brought in? Before bringing the suspects in for questioning or further investigation, there are several steps you can take to gather preliminary evidence and build a case:
Surveillance
Data Analysis
Witness Interviews
Search Warrants
Informant Cooperation
By taking these proactive steps before bringing the suspects in, law enforcement agencies can gather additional evidence, identify potential communication methods, and strengthen the case against the suspected ringleaders in the drug operation.
d)
How would you acquire the data from the phones? Acquiring data from the smartphones of suspected ringleaders in a drug case can be a complicated process, requiring law and guidelines. Here's how you might proceed to gain access to the data:
Obtain Legal Authorization
Secure the Devices
Use Forensic Tools
Cloud Data Extraction
Backup Extraction
Analyze the Data
By following these steps and following law and guidelines, law enforcement agencies can gain access to the data from the smartphones of suspected ringleaders in a drug case to gather evidence and build a stronger case.
e)
And how would you search for traces?
If there is direct communication between the suspected ringleaders in a drug case hasn't been detected through lawful capture methods such as SMS, calls, or direct data streams, but there is a suspicion that they've used their smartphones to communicate, there are several methods to search for traces of communication:
App Usage Analysis
Deleted Data Recovery
Network Traffic Analysis
Digital Footprint Analysis
Location Tracking
Content Hiding Techniques
Informant Help
By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can search for traces of communication between suspected ringleaders in a drug case.
2-
The handling of evidence is an important consideration. The crime scene investigator has found a phone on the scene of crime, and suspects that there is crucial evidence in the phone. The phone seems to have some droplets inside the cracked screen. He hands you the
phone and says that due to the importance of the digital evidence, you should acquire the data first, and then the other forensic experts will look for fingerprints and biological traces after you are finished. A)
How should you handle the device? Handling the device properly is crucial to maintain the integrity of the digital evidence. Here's how I would handle the device in this scenario:
Secure the Device
Secure Storage
Prevent Further Damage
Acquire Data First
Use Forensic Tools
Coordinate with Other Experts
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help