You are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security.  In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered.  Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation.   Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM).  In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software.  During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number.  You specified the Suspect was using IP Address 71.143.70.239:8451.  Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms. After coordinating with the university Office of Technology Resources (OTR), you discovered all of the dorms utilized one outward-facing IP Address, which was then routed through various network switches in multiple buildings.  OTR stated they knew nothing about the controllers except that they were installed as part of a grant by the former ISP.  The current ISP denies they know the switches or how they are wired. You have been able to download CSAM from the Suspect every day since your first encounter, and I believe you can use this to identify the Suspect by tracing them through the series of Switches.  You think you will need to plug into each switch to track the Suspect, but to do this, you will have to crack the password for each button and collect network data on all traffic while you wait to download content for the Suspect. Before conducting your network analysis, you take a moment to consider the legality of your identified investigation plan.  You come up with the following questions that you must answer: Do your actions constitute a violation of the CFAA?  Why or why not? Do the Dormitory residents have a Reasonable Expectation of Privacy in the data passing through the Network Switches? Do you require a Search Warrant to analyze the Network Traffic? With or without a Warrant, what should the scope of your Network analysis entail?

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
100%

You are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security.  In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered.  Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation.  

Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM).  In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software.  During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number.  You specified the Suspect was using IP Address 71.143.70.239:8451.  Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms.

After coordinating with the university Office of Technology Resources (OTR), you discovered all of the dorms utilized one outward-facing IP Address, which was then routed through various network switches in multiple buildings.  OTR stated they knew nothing about the controllers except that they were installed as part of a grant by the former ISP.  The current ISP denies they know the switches or how they are wired.

You have been able to download CSAM from the Suspect every day since your first encounter, and I believe you can use this to identify the Suspect by tracing them through the series of Switches.  You think you will need to plug into each switch to track the Suspect, but to do this, you will have to crack the password for each button and collect network data on all traffic while you wait to download content for the Suspect.

Before conducting your network analysis, you take a moment to consider the legality of your identified investigation plan.  You come up with the following questions that you must answer:

  1. Do your actions constitute a violation of the CFAA?  Why or why not?
  2. Do the Dormitory residents have a Reasonable Expectation of Privacy in the data passing through the Network Switches?
  3. Do you require a Search Warrant to analyze the Network Traffic?
  4. With or without a Warrant, what should the scope of your Network analysis entail?
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and Decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-engineering and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY