Posted: May 25th, 2022

Computer Forensics Research Paper

Computer Forensics

The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital — a photograph taken from an approximate distance of 3 feet from the occupant’s desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our initial inspection finds an inventory made up of computers, keyboards, monitors, hard drives, a mouse, a digital box or receiver, a usb drive, a backup hard drive, cords and various office supplies and personal items (National Institute of Justice, 2008)

Don't use plagiarized sources. Get Your Custom Essay on
Computer Forensics Research Paper
Just from $13/Page
Order Essay

Our very preliminary analysis of the material shows that:1. Types of computer equipment

Telephone

Personal Items

Office Supplies

Schedules or Instructions

Disks, external and internal storage

Potential Digital Evidence

The best way to establish a complete inventory of the items in question is to use a gridding technique, with the X-axis representing a series of letters and the y-axis a series of numbers. In this way, one can systematically move through the evidence without missing any details. Of course, some items (like desks) take up multiple areas, and thus may confirm to many parts of the grid. As an example, if we take the photograph given and apply a grid to it, we find:1

2

3

4

5

6

7

8

9

ABCDEFGHIJ

We can then simply make a simple model to ensure that we cover all aspects of the gridded material, A-J and 1-9 (Krotski, 2011).

Listing of the Evidence

Significance

Preservation and Storage

Black or dark wood desk, left side

Office furniture, but has unopened cabinets

Contents of drawers examined piece-by-piece and logged, desk photographed, wrapped in plastic and stored in warehouse.

Computer disk or DVD

Data may be on disks

Data examined, noted and stored electronically. Material swept for trace and fingerprints and stored in evidence bag.

Coffee cup

Fingerprints potential

Fingerprints processed, contents processed in lab, material placed in evidence bag and stored in warehouse.

Hard drive

Data may be on Disk

Data examined, noted and stored electronically. Material swept for trace and fingerprints and stored in evidence bag.

Paper clips, colored

Office supplies, likely little overt significance

Bagged in evidence bag.

Desk pad

Office supplies, likely little overt significance

Bagged in evidence bag.

Collateral or instructions on paper

Information content needs to be examined.

Bagged in evidence bag .Information or data analyzed and noted

Various office supplies

Office supplies, likely little overt significance

Bagged in evidence bag.

Plastic case, contents unknown

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

CD or DVD Cover

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Multiline telephone, black with white cord

Office supplies, likely little overt significance

Bagged in evidence bag.

Desk cam or external hard drive (Grey)

Office supplies, likely little overt significance

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Clear plastic cup with tools or writing utensils (Pens, screwdriver, highlight marker)

Information content needs to be examined. Other tools may be included.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Container with the words “Fab” might be fabric softener

Manufacturer and usage needs to be examined

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

2 monitors, appear 20-23″ side each

Office supplies, likely little overt significance

Fingerprints, note anything missing or out of order.

Unplugged USB cable

Why unplugged and from what

Cables bagged and tagged.

Monitor stand with 2 cords trailing on right side

Office supplies, likely little overt significance

Monitor stand bagged and tagged.

Yellow Sticky note attached to L. monitor

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Opened computer disk or DVD disk

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Advertising or collateral material (yellow)

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Steno Pad, white with black pen on left

Information content needs to be examined. (e.g. what else is on pad)

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Various papers including green card

Information content needs to be examined.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Microphone or potential external electronic device (center of monitors)

Identify and examine for info.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Computer keyboard

Wear pattern or unusual issues

Fingerprints, bagged and tagged.

Business card

Content of information

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Black electronic device, might be control board for electronics or external hard drive

Identify and examine for info.

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

3 unplugged audio plugs / cords

Electronic equipment, but why unplugged, is device missing

Bagged in evidence bag.

1 unplugged black USB memory stick

Data and why unplugged

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Keyboard tray with various incidental supplies in pull out drawer

Contents need to be identified

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Grey computer desk

Office supplies, likely little overt significance

Photographed, any hidden or objects not identified visually bagged and tagged.

1 electronic device, appears to be back up power supply (left under grey desk)

Log of power or what is unplugged?

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

2 Desktop computers, one black, one silver

Data and usage content might be quite important

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Instruction collateral, appears to be from dual monitor stand

Information or notes may be on material

Data analyzed and noted. Bagged in evidence bag. Analyzed depending on logo or info.

Various computer cables and cords

Why unplugged, what are the devices?

Bagged in evidence bag. Analyzed depending on logo or info.

White computer mouse

Fingerprints or potential hiding place inside of mouse

Bagged in evidence bag. Analyzed depending on logo or info.

Black mouse pad

Logo might establish pattern of behavior.

Bagged in evidence bag. Analyzed depending on logo or info.

Potential Non-Digital Evidence

Potential Non-Digital Evidence

Significance

Contents of black desk draws, 2 on left side of desk

Information, files that are pertinent, work and non-work product

Information on electronic devices: data from potential external hard drive, computer disks, usb memory sticks, two computers

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Information from collateral, sticky notes, note pads, papers

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Logos from mouse pad, bottles

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Information from potential web cam

Information and data analysis could lead to significant clues in the case surrounding the work habits, personal habits and information exchange from the employee and/or others in the office. This might establish a pattern of behavior, ancillary devices and locations, friends or colleagues, vices, areas of frequency, etc.

Information from unplugged cords

What devices appear to have been unplugged?

Fingerprint information from Mouse, phone, pens, keyboard

May establish who was using devices, frequency of use and potential DNA trace

Forensic Examination and Analysis Tools

1. DNA trace evidence — Are their biologicals left on the keyboard, saliva in the coffee cup, other evidence of DNA materials. May use Orion-Lite DNA Recovery field Kit, #9064 which includes an LED light for stain detection, swabs and evidence packaging equipment (Evident Crime Scene Products, 2014).

2. Latent Fingerprint Processing Kit — What fingerprints are on the keyboard, monitors, cups, electronic devices, desks, etc. May use deluxe Fingerprinting kit to include measuring devices, different grades and colors of powers, scales, etc. May use the Charlie Walsh Deluxe Fingerprinting Recovery Kit, #9075 (Evident Crime Scene Products, 2014).

3. Forensics analysis of computer materials often require tools that scans disk images, files and directories that extract information like credit card numbers, domains visited, e-mail addresses, urls and zip files. It is helpful that this data be reviewed through text files, which can be analyzed manually or using other tools. The Bulk Extractor, current version 1.4.1, is able to do a series of forensic analyses on data in hard drives, cell phones, usb memory sticks and computer discs. Materials managed and available through Digital Corp and downloaded at: http://digitalcorpora.org/downloads/bulk_extractor/, Instructions available as well. (Garfinkel, 2012).

Summation of Prepared Court Documents

1. I am a certified forensics examiner for the City of Winslow. My identification is 238723, and I have been with the organization for 10 years.

2. My education includes: xyz university, abc university, over 400 hours in complimentary forensics training courses and I am Board Certified in Forensics analysis. I have taught courses and seminars at over 200 venues.

3. I was contacted by Detective X in the City of Winslow Police Department. He produced a duly executed search warrant for the premises, signed by Judge Y on March 1, 2014.

4. Under Detective X’s instructions, On March 2, 2014 at 1014am, I entered the premises of Widget Corporation, 124 Main Street, Winslow, X, and proceeded to the desk noted in personnel files from Widget of Mr. X Didit.

5. I photographed and digitally preserved the scene, and also acquired previous digital materials from Detective X.

6. Due to the impact on the personal life and preservation of Constitutional Rights, it was important to calculate the hash value of the various electronic and digital devices found at the scene. Because electronic evidence is becoming so important in criminal identification, it is important to understand the authentication and use of electronic devices. The 2006 Federal Rules of Civil Procedure were amended to establish new standards concerning the preservation and discovery of electronically stored devices, and hash values are important to authenticating such devices. A hash value is a unique numerical identifier, a digital fingerprint, if you will, that is assigned to a file, group of files or portion of a file based on a standard mathematical algorithm generated (MD5 and SHA). This means that each value, or each file, is distinctive and can be tracked for alteration. Hashing is the term we use to guarantee that the original data set remains original and may be used as legal, unaltered, evidence (Federal Evidence Review, 2008).

7. I personally examined the photographs taken by original investigating officers and compared with my own, finding no alteration of any materials or evidence. Further, a thorough fingerprint and DNA analysis was done; all personnel who had visited the scene prior (law enforcement or Widget employees) were also fingerprinted and DNA samples taken, if not on file, to eliminate them from crime scene materials.

8. The items were inventoried and then checked by two additional staff members, both of whom signed notarized affidavits to the veracity of the materials (Romano, 2005).

9. All materials collected were tagged and given unique identification numbers; all digital and electronic data was analyzed by professional forensic analysts, and all materials were stored securely and documented using appropriate levels of Federal Evidence Law (Romano).

10. The information I provided to the Court in terms of actual materials found in Mr. Didit’s workspace, the analysis and inventory of the materials, and the verbatim download of his browsing, email and data storage habits are all signed and sworn materials, preserved as evidence also under appropriate levels of Federal Evidence Law (Romano).

REFERENCES

Evident Crime Scene Products. (2014, January). Orion-Lite DNA Kit. Retrieved from evidentcrimescene.com: http://www.evidentcrimescene.com/cata/kits/kits.html

Federal Evidence Review. (2008, September 18). Using Hash values in Handling Electronic Evidence. Retrieved from federalevidence.com: http://federalevidence.com/blog/2008/september/using-%E2%80%9Chash%E2%80%9D-values-handling-electronic-evidence

Garfinkel, S. (2012, November). Using bulk_extractor for digital forensics triage and cross-drive analysis. Retrieved from simson.net: http://simson.net/ref/2012/2012-08-08%20bulk_extractor%20Tutorial.pdf

Krotski, M. (2011, November). Effectively Using Electronic Evidence Before and At Trial. Retrieved from U.S. Department of Justice: http://www.justice.gov/usao/eousa/foia_reading_room/usab5906.pdf

National Institute of Justice. (2008, April 14). Securing and Evaluating the Scene. Retrieved from Office of Justice Programs: http://www.nij.gov/publications/ecrime-guide-219941/ch3-securing-scene/Pages/welcome.aspx

Romano, L. (2005, June 1). Electronic Evidence and the Federal Rules. Retrieved from Digital Commons: http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=2485&context=llr


Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently
 

Online Academic Help With Different Subjects

Literature

Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.

Finance

Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!

Psychology

While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.

Engineering

Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.

Nursing

In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.

Sociology

Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.

Business

We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!

Statistics

We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.

Law

Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Open chat
1
Need assignment help? You can contact our live agent via WhatsApp using +1 718 717 2861

Feel free to ask questions, clarifications, or discounts available when placing an order.