Verified Document

Computer Forensics Case Study Research Paper

Computer Forensics The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital -- a photograph taken from an approximate distance of 3 feet from the occupant's desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our initial inspection finds an inventory made up of computers, keyboards, monitors, hard drives, a mouse, a digital box or receiver, a usb drive, a backup hard drive, cords and various office supplies and personal items (National Institute of Justice, 2008)

Our very preliminary analysis of the material shows that:1. Types of computer equipment

Telephone

Personal Items

Office Supplies

Schedules or Instructions

Disks, external and internal storage

Potential Digital Evidence

The best way to establish a complete inventory of the items in question is to use a gridding technique, with the X-axis representing a series of letters and the y-axis a series of numbers. In this way, one can systematically move through the evidence without missing any details. Of course, some items (like desks) take up multiple areas, and thus may confirm to many parts of the grid. As an example, if we take the photograph given and apply a grid to it, we find:1

2

3

4

5

6

7

8

9

ABCDEFGHIJ

We can then simply make a simple model to ensure that we cover all aspects of the gridded material, A-J and 1-9 (Krotski, 2011).

Listing of the Evidence

Significance

Preservation and Storage

Black or dark wood desk, left side

Office furniture, but has unopened cabinets

Contents of drawers examined piece-by-piece and logged, desk photographed, wrapped in plastic and stored in warehouse.

Computer disk or DVD

Data may be on disks

Data examined, noted and stored electronically. Material swept for trace and fingerprints and stored in evidence bag.

Coffee cup

Fingerprints potential

Fingerprints processed, contents processed in lab, material placed in evidence bag and stored in warehouse.

Hard drive

Data may be on Disk

Data examined, noted and stored electronically. Material swept for trace and fingerprints and stored in evidence bag.

Paper clips, colored

Office supplies, likely little overt significance

Bagged in evidence bag.

Desk pad

Office supplies, likely little overt significance

Bagged in evidence bag.

Collateral or instructions on paper

Information content needs to be examined.

Bagged in evidence bag .Information or data analyzed and noted

Various office supplies

Office supplies, likely little overt significance

Bagged in evidence bag.

Plastic case, contents unknown

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

CD or DVD Cover

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Multiline telephone, black with white cord

Office supplies, likely little overt significance

Bagged in evidence bag.

Desk cam or external hard drive (Grey)

Office supplies, likely little overt significance

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Clear plastic cup with tools or writing utensils (Pens, screwdriver, highlight marker)

Information content needs to be examined. Other tools may be included.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Container with the words "Fab" might be fabric softener

Manufacturer and usage needs to be examined

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

2 monitors, appear 20-23" side each

Office supplies, likely little overt significance

Fingerprints, note anything missing or out of order.

Unplugged USB cable

Why unplugged and from what

Cables bagged and tagged.

Monitor stand with 2 cords trailing on right side

Office supplies, likely little overt significance

Monitor stand bagged and tagged.

Yellow Sticky note attached to L. monitor

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Opened computer disk or DVD disk

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Advertising or collateral material (yellow)

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Steno Pad, white with black pen on left

Information content needs to be examined. (e.g. what else is on pad)

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Various papers including green card

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Microphone or potential external electronic device (center of monitors)

Identify and examine for info.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Computer keyboard

Wear pattern or unusual issues

Fingerprints, bagged and tagged.

Bagged in evidence bag. Analyzed depending on logo or info.
Black electronic device, might be control board for electronics or external hard drive

Identify and examine for info.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

3 unplugged audio plugs / cords

Electronic equipment, but why unplugged, is device missing

Bagged in evidence bag.

1 unplugged black USB memory stick

Data and why unplugged

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Keyboard tray with various incidental supplies in pull out drawer

Contents need to be identified

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Grey computer desk

Office supplies, likely little overt significance

Photographed, any hidden or objects not identified visually bagged and tagged.

1 electronic device, appears to be back up power supply (left under grey desk)

Log of power or what is unplugged?

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

2 Desktop computers, one black, one silver

Data and usage content might be quite important

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Instruction collateral, appears to be from dual monitor stand

Information or notes may be on material

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Various computer cables and cords

Why unplugged, what are the devices?

Bagged in evidence bag. Analyzed depending on logo or info.

White computer mouse

Fingerprints or potential hiding place inside of mouse

Bagged in evidence bag. Analyzed depending on logo or info.

Black mouse pad

Logo might establish pattern of behavior.

Bagged in evidence bag. Analyzed depending on logo or info.

Potential Non-Digital Evidence

Potential Non-Digital Evidence

Significance

Contents of black desk draws, 2 on left side of desk

Information, files that are pertinent, work and non-work product

Information on electronic devices: data from potential external hard drive, computer disks, usb memory sticks, two computers

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Information from collateral, sticky notes, note pads, papers

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Logos from mouse pad, bottles

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Information from potential web cam

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Information from unplugged cords

What devices appear to have been unplugged?

Fingerprint information from Mouse, phone, pens, keyboard

May establish who was using devices, frequency of use and potential DNA trace

Forensic Examination and Analysis Tools

1. DNA trace evidence -- Are their biologicals left on the keyboard, saliva in the coffee cup, other evidence of DNA materials. May use Orion-Lite DNA Recovery field Kit, #9064 which includes an LED light for stain detection, swabs and evidence packaging equipment (Evident Crime Scene Products, 2014).

2. Latent Fingerprint Processing Kit -- What fingerprints are on the keyboard, monitors, cups, electronic devices, desks, etc. May use deluxe Fingerprinting kit to include measuring devices, different grades and colors of powers, scales, etc. May use the Charlie Walsh Deluxe Fingerprinting Recovery Kit, #9075 (Evident Crime Scene Products, 2014).

3. Forensics analysis of computer materials often require tools that scans disk images, files and directories that extract information like credit card numbers, domains visited, e-mail addresses, urls and zip files. It is helpful that this data be reviewed through text files, which can be analyzed manually or using other tools. The Bulk Extractor, current version 1.4.1, is able to do a series of forensic analyses on data in hard drives, cell phones, usb memory sticks and computer discs. Materials managed and available through Digital Corp and downloaded at: http://digitalcorpora.org/downloads/bulk_extractor/, Instructions available as well. (Garfinkel, 2012).

Summation of Prepared Court Documents

1. I am a certified forensics examiner for the City of Winslow. My identification is 238723, and I have been with the organization for 10 years.

2. My education includes: xyz university, abc university, over 400 hours in complimentary forensics training courses and I am Board Certified in Forensics analysis. I have taught courses and seminars at over 200…

Sources used in this document:
REFERENCES

Evident Crime Scene Products. (2014, January). Orion-Lite DNA Kit. Retrieved from evidentcrimescene.com: http://www.evidentcrimescene.com/cata/kits/kits.html

Federal Evidence Review. (2008, September 18). Using Hash values in Handling Electronic Evidence. Retrieved from federalevidence.com: http://federalevidence.com/blog/2008/september/using-%E2%80%9Chash%E2%80%9D-values-handling-electronic-evidence

Garfinkel, S. (2012, November). Using bulk_extractor for digital forensics triage and cross-drive analysis. Retrieved from simson.net: http://simson.net/ref/2012/2012-08-08%20bulk_extractor%20Tutorial.pdf

Krotski, M. (2011, November). Effectively Using Electronic Evidence Before and At Trial. Retrieved from U.S. Department of Justice: http://www.justice.gov/usao/eousa/foia_reading_room/usab5906.pdf
National Institute of Justice. (2008, April 14). Securing and Evaluating the Scene. Retrieved from Office of Justice Programs: http://www.nij.gov/publications/ecrime-guide-219941/ch3-securing-scene/Pages/welcome.aspx
Romano, L. (2005, June 1). Electronic Evidence and the Federal Rules. Retrieved from Digital Commons: http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=2485&context=llr
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensics Solving Crimes Using
Words: 668 Length: 2 Document Type: Term Paper

Such information is collected using packet sniffers which are programs that can access all information passing through a computer, and not only information particularly sent to the computer. The packet sniffer can either pick all the information, or just selected what is needed, and at the specific time when the information passed through the computer. This is then copied into a given memory. However, for the packet sniffers to

Computer Forensic Investigation Making an
Words: 3228 Length: 12 Document Type: Research Paper

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with

Computer Forensics for Preventing Email
Words: 4655 Length: 17 Document Type: Capstone Project

i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a

Computer Surveillance: Qualitative Attempt to
Words: 4976 Length: 19 Document Type: Term Paper

Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions

Computer Forensics Law Enforcement
Words: 690 Length: 2 Document Type: Case Study

computer forensics tools and processes used by investigators continually evolve and change over time. Although the material published in the 2008 version of the United States Attorneys' Bulletin includes some stalwart information regarding processes and procedures, the specific issues at stake will have changed drastically in the nearly 8 years since the issue was published. For example, the operating systems and encryption methods would have completely changed from 2008

Digital Forensics in the Modern Age
Words: 794 Length: 2 Document Type: Case Study

computer forensic offense. Recommendations for investigation will be addressed. Further, an example of an industrial espionage case will be cited. Crimes Committed/Background This lawsuit entailed contract violation cross-claims, with the dispute between the two parties chiefly revolving around events that had transpired during the latter half of 1998. Residential Funding Corporation (RFC) was requested to salvage and present related emails dated from October to December 1998, from its backup drives. The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now