Posted: May 25th, 2022
Computer Forensics
The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital — a photograph taken from an approximate distance of 3 feet from the occupant’s desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our initial inspection finds an inventory made up of computers, keyboards, monitors, hard drives, a mouse, a digital box or receiver, a usb drive, a backup hard drive, cords and various office supplies and personal items (National Institute of Justice, 2008)
Our very preliminary analysis of the material shows that:1. Types of computer equipment
Telephone
Personal Items
Office Supplies
Schedules or Instructions
Disks, external and internal storage
Potential Digital Evidence
The best way to establish a complete inventory of the items in question is to use a gridding technique, with the X-axis representing a series of letters and the y-axis a series of numbers. In this way, one can systematically move through the evidence without missing any details. Of course, some items (like desks) take up multiple areas, and thus may confirm to many parts of the grid. As an example, if we take the photograph given and apply a grid to it, we find:1
2
3
4
5
6
7
8
9
ABCDEFGHIJ
We can then simply make a simple model to ensure that we cover all aspects of the gridded material, A-J and 1-9 (Krotski, 2011).
Listing of the Evidence
Significance
Preservation and Storage
Black or dark wood desk, left side
Office furniture, but has unopened cabinets
Contents of drawers examined piece-by-piece and logged, desk photographed, wrapped in plastic and stored in warehouse.
Computer disk or DVD
Data may be on disks
Data examined, noted and stored electronically. Material swept for trace and fingerprints and stored in evidence bag.
Coffee cup
Fingerprints potential
Fingerprints processed, contents processed in lab, material placed in evidence bag and stored in warehouse.
Hard drive
Data may be on Disk
Data examined, noted and stored electronically. Material swept for trace and fingerprints and stored in evidence bag.
Paper clips, colored
Office supplies, likely little overt significance
Bagged in evidence bag.
Desk pad
Office supplies, likely little overt significance
Bagged in evidence bag.
Collateral or instructions on paper
Information content needs to be examined.
Bagged in evidence bag .Information or data analyzed and noted
Various office supplies
Office supplies, likely little overt significance
Bagged in evidence bag.
Plastic case, contents unknown
Information content needs to be examined.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
CD or DVD Cover
Information content needs to be examined.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Multiline telephone, black with white cord
Office supplies, likely little overt significance
Bagged in evidence bag.
Desk cam or external hard drive (Grey)
Office supplies, likely little overt significance
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Clear plastic cup with tools or writing utensils (Pens, screwdriver, highlight marker)
Information content needs to be examined. Other tools may be included.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Container with the words “Fab” might be fabric softener
Manufacturer and usage needs to be examined
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
2 monitors, appear 20-23″ side each
Office supplies, likely little overt significance
Fingerprints, note anything missing or out of order.
Unplugged USB cable
Why unplugged and from what
Cables bagged and tagged.
Monitor stand with 2 cords trailing on right side
Office supplies, likely little overt significance
Monitor stand bagged and tagged.
Yellow Sticky note attached to L. monitor
Information content needs to be examined.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Opened computer disk or DVD disk
Information content needs to be examined.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Advertising or collateral material (yellow)
Information content needs to be examined.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Steno Pad, white with black pen on left
Information content needs to be examined. (e.g. what else is on pad)
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Various papers including green card
Information content needs to be examined.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Microphone or potential external electronic device (center of monitors)
Identify and examine for info.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Computer keyboard
Wear pattern or unusual issues
Fingerprints, bagged and tagged.
Business card
Content of information
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Black electronic device, might be control board for electronics or external hard drive
Identify and examine for info.
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
3 unplugged audio plugs / cords
Electronic equipment, but why unplugged, is device missing
Bagged in evidence bag.
1 unplugged black USB memory stick
Data and why unplugged
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Keyboard tray with various incidental supplies in pull out drawer
Contents need to be identified
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Grey computer desk
Office supplies, likely little overt significance
Photographed, any hidden or objects not identified visually bagged and tagged.
1 electronic device, appears to be back up power supply (left under grey desk)
Log of power or what is unplugged?
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
2 Desktop computers, one black, one silver
Data and usage content might be quite important
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Instruction collateral, appears to be from dual monitor stand
Information or notes may be on material
Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.
Various computer cables and cords
Why unplugged, what are the devices?
Bagged in evidence bag. Analyzed depending on logo or info.
White computer mouse
Fingerprints or potential hiding place inside of mouse
Bagged in evidence bag. Analyzed depending on logo or info.
Black mouse pad
Logo might establish pattern of behavior.
Bagged in evidence bag. Analyzed depending on logo or info.
Potential Non-Digital Evidence
Potential Non-Digital Evidence
Significance
Contents of black desk draws, 2 on left side of desk
Information, files that are pertinent, work and non-work product
Information on electronic devices: data from potential external hard drive, computer disks, usb memory sticks, two computers
Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.
Information from collateral, sticky notes, note pads, papers
Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.
Logos from mouse pad, bottles
Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.
Information from potential web cam
Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.
Information from unplugged cords
What devices appear to have been unplugged?
Fingerprint information from Mouse, phone, pens, keyboard
May establish who was using devices, frequency of use and potential DNA trace
Forensic Examination and Analysis Tools
1. DNA trace evidence — Are their biologicals left on the keyboard, saliva in the coffee cup, other evidence of DNA materials. May use Orion-Lite DNA Recovery field Kit, #9064 which includes an LED light for stain detection, swabs and evidence packaging equipment (Evident Crime Scene Products, 2014).
2. Latent Fingerprint Processing Kit — What fingerprints are on the keyboard, monitors, cups, electronic devices, desks, etc. May use deluxe Fingerprinting kit to include measuring devices, different grades and colors of powers, scales, etc. May use the Charlie Walsh Deluxe Fingerprinting Recovery Kit, #9075 (Evident Crime Scene Products, 2014).
3. Forensics analysis of computer materials often require tools that scans disk images, files and directories that extract information like credit card numbers, domains visited, e-mail addresses, urls and zip files. It is helpful that this data be reviewed through text files, which can be analyzed manually or using other tools. The Bulk Extractor, current version 1.4.1, is able to do a series of forensic analyses on data in hard drives, cell phones, usb memory sticks and computer discs. Materials managed and available through Digital Corp and downloaded at: http://digitalcorpora.org/downloads/bulk_extractor/, Instructions available as well. (Garfinkel, 2012).
Summation of Prepared Court Documents
1. I am a certified forensics examiner for the City of Winslow. My identification is 238723, and I have been with the organization for 10 years.
2. My education includes: xyz university, abc university, over 400 hours in complimentary forensics training courses and I am Board Certified in Forensics analysis. I have taught courses and seminars at over 200 venues.
3. I was contacted by Detective X in the City of Winslow Police Department. He produced a duly executed search warrant for the premises, signed by Judge Y on March 1, 2014.
4. Under Detective X’s instructions, On March 2, 2014 at 1014am, I entered the premises of Widget Corporation, 124 Main Street, Winslow, X, and proceeded to the desk noted in personnel files from Widget of Mr. X Didit.
5. I photographed and digitally preserved the scene, and also acquired previous digital materials from Detective X.
6. Due to the impact on the personal life and preservation of Constitutional Rights, it was important to calculate the hash value of the various electronic and digital devices found at the scene. Because electronic evidence is becoming so important in criminal identification, it is important to understand the authentication and use of electronic devices. The 2006 Federal Rules of Civil Procedure were amended to establish new standards concerning the preservation and discovery of electronically stored devices, and hash values are important to authenticating such devices. A hash value is a unique numerical identifier, a digital fingerprint, if you will, that is assigned to a file, group of files or portion of a file based on a standard mathematical algorithm generated (MD5 and SHA). This means that each value, or each file, is distinctive and can be tracked for alteration. Hashing is the term we use to guarantee that the original data set remains original and may be used as legal, unaltered, evidence (Federal Evidence Review, 2008).
7. I personally examined the photographs taken by original investigating officers and compared with my own, finding no alteration of any materials or evidence. Further, a thorough fingerprint and DNA analysis was done; all personnel who had visited the scene prior (law enforcement or Widget employees) were also fingerprinted and DNA samples taken, if not on file, to eliminate them from crime scene materials.
8. The items were inventoried and then checked by two additional staff members, both of whom signed notarized affidavits to the veracity of the materials (Romano, 2005).
9. All materials collected were tagged and given unique identification numbers; all digital and electronic data was analyzed by professional forensic analysts, and all materials were stored securely and documented using appropriate levels of Federal Evidence Law (Romano).
10. The information I provided to the Court in terms of actual materials found in Mr. Didit’s workspace, the analysis and inventory of the materials, and the verbatim download of his browsing, email and data storage habits are all signed and sworn materials, preserved as evidence also under appropriate levels of Federal Evidence Law (Romano).
REFERENCES
Evident Crime Scene Products. (2014, January). Orion-Lite DNA Kit. Retrieved from evidentcrimescene.com: http://www.evidentcrimescene.com/cata/kits/kits.html
Federal Evidence Review. (2008, September 18). Using Hash values in Handling Electronic Evidence. Retrieved from federalevidence.com: http://federalevidence.com/blog/2008/september/using-%E2%80%9Chash%E2%80%9D-values-handling-electronic-evidence
Garfinkel, S. (2012, November). Using bulk_extractor for digital forensics triage and cross-drive analysis. Retrieved from simson.net: http://simson.net/ref/2012/2012-08-08%20bulk_extractor%20Tutorial.pdf
Krotski, M. (2011, November). Effectively Using Electronic Evidence Before and At Trial. Retrieved from U.S. Department of Justice: http://www.justice.gov/usao/eousa/foia_reading_room/usab5906.pdf
National Institute of Justice. (2008, April 14). Securing and Evaluating the Scene. Retrieved from Office of Justice Programs: http://www.nij.gov/publications/ecrime-guide-219941/ch3-securing-scene/Pages/welcome.aspx
Romano, L. (2005, June 1). Electronic Evidence and the Federal Rules. Retrieved from Digital Commons: http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=2485&context=llr
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!
Place an order in 3 easy steps. Takes less than 5 mins.