Project 2 CCJS 321 – Digital Forensics | Name Date of submission: FEB 14, 2016 | Project 2 - CCJS 321 Digital Forensics For the purpose of this Project, you are still the InfoSec Specialist for the Makestuff Company. Consider this project a continuation of the work you performed in Project 1. With the scenario in mind, thoroughly answer the following questions (in paragraph format, properly citing outside research, where appropriate): 1. What permissions/authorities should you have before you search Mr. Yourprop’s former Company work area, and how would you document that authority? As the InfoSec Specialist, you wouldn’t be looking for a search warrant before going into his work area. “It is important to note that …show more content…
The three items that I would collect would be the external hard drive, the laptop, and the USB thumb drive. It’s important to remember that you ”must use caution when collecting, packaging, or storing digital devices to avoid altering, damaging, or destroying the digital evidence. Avoid using any tools or materials that may produce or emit static electricity or a magnetic field as these may damage or destroy the evidence” (Mukasey, 2008). The first item that I would collect as digital evidence would be the external hard drive. It may contain all types of evidence such as: files, logs, pictures, recordings, or even video logs. Before collecting it as evidence I would take pictures of the hard drive, making sure to get the manufacturer and serial numbers, and then document it. Once complete, I would seal it in an anti-static bag and label that as well. The second item that I would collect would be the laptop. This could have all of the same type of information that the hard drive has and also may contain copies, pictures, or the source code itself from “Product X.” The laptop may show whether or not he was sharing files or trade secrets with outside sources, or even if he were attempting to crack passwords so as to get into systems that weren’t available to
I think that the most interesting responsibility of a forensic scientist would be analyzing the data. I would always want to be the one to piece together a puzzle, and to solve a crime to figure out exactly what happened in a case. I think that it would be challenging, but it would also be interesting to join in on a case and examine and analyze the data to figure different things out.
Instructions: There are multiple parts to this assignment. Carefully read each section and type your answer in the space provided. Complete each part of this Homework Assignment to receive full credit.
The hard drive on the desk would be a good third source of digital evidence to seize. Assuming this hard drive is used for additional storage (i.e. does not have an Operating System on it), it would contain data similar to that which would’ve been on the USB Flash Drive: documents, images, videos, and maybe even some software files. Documentation should be done on the make, model, serial number and type (e.g. SATA, IDE, SCSI) of hard drive. For transportation, again, place into a static shock protective bag. Remember to keep the hard drive away from anything magnetic as the platters that are inside the hard drive are magnetically charged (U.S. Department of Justice, 2008).
This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporate policy on the use of electronic monitoring. These privacy policies are designed to both provide a clear guideline for employees on the difference between job related and personal privacy. The policies are designed to create a standard set of
While employed as a Human Resource Assistant, he is responsible for safeguarding Personal Identifiable Information (PII), and entering data or information in the electronic Personnel Files (e-OPF) and Defense Civilian Personnel System (DCPDS). Subsequently, he has not had any documented instances of failure to secure PII or putting such information at risk. Most importantly, he understands that it’s his duty to protect confidential information and ensure that it’s not compromised.
2. Your boss asks you to transmit a small fi le that includes sensitive personnel data to a
When was the last time she accessed her computer? What is her background in computers, what is her skill level? I need some background on the former employee, her computer habits and activities prior to the files being found on her computer. I must collect digital evidence while keeping the data unaltered, first thing. This data will be used later in the prosecution of the case. This can be done through calculating and recording an evidence file. Next is imaging of the computer media with a write-blocking tool. I must keep the chain of custody. The computer's RAM is examined for evidence. During the examination step, verify and catalog the presence and integrity of the original evidence and any copies. An analysis is made with specialized equipment to find out exactly what's stored on the digital media. This includes a manual review of all materials found on the media, a review of the Windows registry, techniques to crack passwords and retrieve protected data, keyword searches and extraction of email and pictures for further review.
The first step I have to do is to determine if I have enough probable cause. Can I get a judge to sign off on my affidavit and search warrant?Now I have obtained all the required information and the warrant I have decided that I will do the investigation at the office. There is no need to take the computer out of the office. With my chain of command form in my hand I am going to start by taking pictures and gathering my initial information. I am focusing on maintaining my integrity of my e-evidence.
One device that digital evidence can be found on is computer systems. Some evidence that a forensic examiner may look for on computer systems are browsing history, event history, image files, office documents, emails, chat logs, metadata, etc. A computer systems network configuration could also greatly benefit a forensic examiner. The configuration would potentially allow the examiner to identify connected nodes, routing schemes, router/modem equipment used, etc.
Computers have become a new weapon in committing crime, and to the burgeoning science of digital evidence, law enforcement now uses computers to fight crime. Digital evidence is information stored, transmitted, and received in binary form that can potentially be relied on as evidence in court. Notwithstanding, digital evidence is commonly associated with crimes that involve such devices, such as a computer hard drives, external storage devices, mobile phones, among others, and are often referred to as e-crimes. However, to fight e-crime, law enforcement must collect relevant digital evidence for such crimes, law enforcement agencies are incorporating the collection and analysis of digital evidence, also referred to as computer forensics, into many of their infrastructures.
Cyber forensics is becoming more and more common in crime investigation, this is expected, because of the relentless development of technology brings along with it crime related with
Among these dangers is privacy, in particular, what legal rights corporations and employees have in keeping their communications private. This paper will introduce the current legislation in this area, the expectation of privacy an employee should have, any court decisions that provide additional ruling, and what a corporation can do to prevent litigation in these matters.
Technological advancements, the increased prevalence of personal computing, and the exponential rise in electronic crime over the past few decades, has predicated the emergence of the cyber forensics field as experts seek to increase the effectiveness of administrative and criminal investigations. Though still in its infancy, the field purposes to apply the fundamental concepts and systematic methodologies utilized in traditional forensic investigations to the cyber realm. This is accomplished through the identification, preservation, examination, interpretation, and documentation of electronic media and digital evidence, conducted in a systematic fashion adhering to legislative rules of evidence, in order to provide an expert testimony for use in legal and/or administrative proceedings (EC-Council, 2010, p. 1-1). While specific investigative actions/processes will vary depending on the investigating entity, these core concepts remain consistent throughout the field, and provide a basis for all computer forensic activities.
In the article, “The rise of workplace spying”, Mr. Henry Ford used many different things to keep his workforce efficient including “pacing the factory floor with a stopwatch” to having “private investigators to spy on employees' home lives to make sure personal problems didn't interfere with their work performance”. Now I certainly believe that Mr. Ford have invaded the privacy of his employees. “Privacy in today’s workplace
The dawn of the computer age brought with it new and exciting ways to improve our daily routines. Unfortunately, that also brought with it the dawn of a new technological criminal age that would vigorously pursue ways to exploit email, the internet, mobile devices, personal identifiable information (PII), and etc. Information technology experts have done their best to counter these threats; however, in some cases, the criminal triumphs, which may or may not lead to them being caught by an expert cyber forensics team. Cyber forensics teams must carefully consider their terms, limitations, protocols and procedures in collecting evidence. Computer related incidents or crimes increases daily and it is imperative that law experts understand how to obtain this information off of electronic devices.