Handling Digital Data IT Essay

A Suspect, 17 season old male, is a suspected online pedophile, using online talk, email and text messaging using web/internet to mobile (eliminating in this situation phone to mobile texting), to entice children. He's also regarded as using information obtained through credit cards fraud to cover online activity and camouflage his id. Think has a Windows-based computer in his room, and only he has usage of it. His mother reported finding naked pictures of minors on his son's computer screen several times, and also, mom reported that they are getting packages in the mail not delivered to their addresses but tackled to different names. His son opens the deals and keeps the things.

Description of the utilization of computer operating-system data you would use in investigating the case.

One can acquire important information, evidence, or intellect information gathering utilizing a computer's operating system (Operating-system) information, and they're as follow (Knetzger & Muraski, 2008):

The use of record particular date and time (creation time frame, last accessed, improved) - The operating system keeps a path or record of file and its properties, like the night out and time a data file is created, previous access & previous modified. That is important to an investigation since it backs up or it shows when the precise date was file was created, gain access to and modified. For instance, if Joe left work for a doctor's appointment from noon to 2:00PM on 1/2/2011, and the document that is in question was created, gain access to or revised at 1/2/011 at 1:00PM, it is safe to state that Joe was not the think because he was from the office when the data file was created, access or modified. Time frame created is when the file was originally generated. Date last gain access to, is when the document was reached by not modified. Date revised is when the file was last utilized and modified. Take note these times are using the system clock. Therefore, if someone changes the night out from 2011 to 2001, then your stamps will peculiar or different from the file date/time properties.

System particular date and time - There are numerous uses of the system day and time aside from the relation to record properties. The usage of the time zone (Coordinated Universal Time - UTC) preparing, such as knowing on email where or which time zone (or setting) it was directed from, for example, system logs uses system night out and time also, such as when the previous password was improved, when MS Prospect was last launched, when the last defrag was ran, etc.

File type (the utilization of file expansion and file header) - File extensions are associated using its file type. A picture record, such as. jpg, . bmp, . png, will start a graphic application or program. A. doc record may open up MS Word or WordPad. A. txt file will open a Text message Editor. A video file will open up a video record etc. Though, not absolutely all applications or document will open based on the file expansion because of several reasons. One reason is an application may not be installed on your personal computer. If the record. xlsx was emailed to User A, whose machine does not have Excel installed, then even if he twice clicks the data file, the file won't open because the application form associated with it isn't installed on his machine. Keeping this at heart, many high-tech felons change the record extension to put off an investigator, but that they do not know is the fact that changing record extensions don't have the record header. A data file header includes coded information. Therefore, in case a. DOC document was changed to. TXT, the file header will still show that it is a. DOC (in hexadecimal format). Forensic Analysis Applications read document headers rather than document extensions (Spruill, 2010).

File path, folders and properties - Knowing where in fact the record is stored, which folder it is store and its own properties, such as quality, etc. Taking records of all these information is important when gathering evidence. Knowing where the suspect is covering the documents, such as setting up a folder and concealing it outside the "My Documents" folder is important.

Bookmarks and Favorites - These information shows where in fact the user often visits. Making use of the "recently visited" sites pays to information too.

Logging & Registry - Monitors changes in password, installs/uninstalls, programs deleted, when a hardware device was installed, uninstalled, previous connected, etc.

Recently used / ran programs - In Windows, visiting Start will show the last accessed, ran or used applications. For instance, when a suspect reviews that MS Outlook was never access on his computer, and it shows that it was last accessed "yesterday" then your application was utilized no more than 2 days previously.

Recent Documents (within an software) - This works the same as recently ran programs. This section will show the last documents accessed on the computer. Also, in a application, MS Term, for example, by clicking File (or any office Icon), under the "Recent Documents" section shows the last documents accessed. The amount of documents shown could be setup by an individual.

And so forth ---- Exactly what falls under the jobs performed by the operating system, such as (Knetzger & Muraski, 2008), "processor management, system resources construction, hardware device configuration, storage space management, program user interface and interface" (p. 36).

In addition, if regulations officer is no expert, and is merely there to assemble information, he must act as the legal advisor, and leave the specialized system administration to the technical experts, like a Forensic Specialist. Leave the complex work to the complex experts so that evidence is guaranteed and conserved properly.

Your specific exploration relative to the way the individual obtained bank card data.

In this scenario, the suspect obtained bank card data through internet chat rooms. He visited internet boards, such as ICQ (I Seek You) and Internet Relay Chat (IRC) to meet like-minded/ill-minded individuals and obtained free of charge plus some with a minimal fee credit card information. Online internet talk is a great way for criminals to speak and show information without sacrificing their identity.

Other methods for getting mastercard information are as follow (Knetzger & Muraski, 2008, pp. 99-101):

Dumpster Traveling - Where offenders filtering through people's garbage or garbage cans to look for bank card information, such as bills that are tossed out in the garbage, preapproved credit-based card request, etc. People put their garbage cans in the curb, in the public area, having lower or no degree of level of privacy, where offenders could easily go through them.

Shoulder Searching - Offenders overlooking someone's shoulder while he or she is making a business deal using an ATM, for example, and stealing the password, then later on stealing his or her ATM card.

Social Executive - Offenders convincing (engineering to believe) unsuspected individuals to provide his or her account.

Inside Access to BANK CARD Information - Offenders actually stealing in a company they work for. For example, working at a section store where customer's charge card information is straightforward access.

Credit Card Number Generating Software - Offenders may easily buy this program that can generate valid mastercard numbers, where they can just affix bogus names, addresses, etc. with the number to make a fake personality for the utilization of the charge card.

Skimming - The copying of the information of a debit card stored in the magnetic strip on the back of the visa or mastercard utilizing a "small portable device known as 'skimmer'" (Knetzger & Muraski, 2008).

Email and INTERNET SITE Scams - Faking unsuspected individuals to go to a counterfeit site where they provide their information thinking that the site is genuine. In 2005, there is a phishing con where emails were sent to eBay members confirming to improve their security password for identity fraud security. Members were taken to a fake site, but seemed genuine getting the same look and feel of the genuine eBay site, where they provided their information to improve their password. Going for a nearer look by technological experts, the website address or Universal Source Locator (Web address), was pointing elsewhere. Millions of customers were victimized (eBay, 2008)

Steal it - The actual stealing of credit cards by offenders by breaking into cars and homes, mugging, etc.

Specifics in conditions useful of identity robbery and high-tech crime investigative protocols.

According to Knetzger & Muraski (2008), there are several steps for looking into identity robbery and high-tech online-based crimes and they're as follow (p. 141):

The grievance is received, and then your complaint is determined as to the kind of the grievance it is.

Create an image (evidentiary carbon copy) of the data.

Working on the duplicate, get all relevant information from the email by growing the header to full view, and also information from other website, digital documents, etc.

Determining the origin of data, such as uncovering the foundation Ip.

Using the IP Lookup to look for the ISP of source Ip, or originating Ip. An IP Lookup is an instrument to provide more/readable information of your IP addresses. For instance: 74. 125. 87. 104 is www. google. com.

After learning the ISP, subpoena the ISP company for data relevant to the data found above, like the originator of the email, for example.

Document and safely and securely secure and maintain all digital evidence so later it used for assessment, evaluation and/or recreated for court. In addition to documenting and conserving evidence, a proper maintenance of chain of guardianship is also essential.

In addition to the steps above, police must also recommend to victims to acquire a complete copy of these credit report, so that they can review illegal deals. Also, if they have not already done so, to have them apply to the three (3) major credit scoring bureaus: Experian, Equifax and TransUnion for future security.

Lastly, for personal information theft, law enforcement must ask important relevant questions associated with identity robbery so that successful exploration is more lucrative. According to Matching to Knetzger & Muraski (2008), the next questionnaire should be asked or directed at the sufferer to answer, then must be contained in the case file (pp. 72-73):

What is your Community Security number?

What is your cellular phone and/or pager quantity?

What is your e-mail address?

How did you feel aware of the identity robbery?

When have you first become aware of the identity robbery?

Do you understand when the personality theft first started?

What fraudulent activity has been devoted in your name?

If a bag or budget was stolen, what documents were kept in your wallet or wallet? Include Friendly Security numbers, license numbers, credit card numbers, and so forth.

To your knowledge, has your mail ever been stolen before?

Do you have a postoffice box?

What do you really normally do with spam (e. g. , credit card offers)? Shred them or perhaps chuck them away?

Do you put outgoing mail in your mailbox or deliver it to a stand-alone email receptacle or the post office?

What other offences have you been the sufferer of (e. g. , burglary, theft)?

Have you recently misplaced any financial documents (e. g. , debit/credit cards)?

Have you just lately viewed a backup of your credit history?

Do you have a personal Internet site or perhaps you have posted your personal information to any Internet site (e. g. , genealogy sites, websites) or is it listed in any open source internet directories (e. g. , white pages, birthday sites)?

Have you lately used your credit greeting card to acquire services over the phone or online?

Have you recently filled out any internet-based forms that included your individual information?

Do you utilize your Sociable Security quantity as a distinctive identifier for medical details, mortgage records, and so forth?

What universities or colleges have you attended? Dates of attendance?

Is your Friendly Security amount or driver's license number imprinted on your assessments?

What financial institutions do you work with?

Do you utilize online banking, invoice pay services, or purchase items on online auction sites?

What energy companies provide your vitality, light, mobile, and Internet services?

What bank cards, including merchant credit cards, do you have in your name?

Do you understand who may have stolen your personal information?

Have you lately received and replied to any e-mail messages that requested private information from you?

Method(s) you'll employ in e-mail monitoring.

According to Knetzger & Muraski (2008), listed below are steps to traffic monitoring emails (p. 164):

Make an evidentiary backup or copies of the e-mail concept - Never work off of the original for preservation. Damaging the original copy can't be used as evidence, and changes can't be reversed and accepted in courtroom.

Expanding email subject matter to full email header (from basic view), shows more info such as time and time stamp, Ip or addresses and routing.

Work backward chronologically from the newest timestamp to the oldest timestamp and take a look at the associated IP addresses - An Ip or IP addresses (where the email was routed before getting to its vacation spot), shows which Internet Service Provider (ISP), the e-mail originated from. From the entire email header, time and timestamps are also proven to reveal the day it was delivered from an ISP, received, routed, etc

Perform a WHOIS after acquiring the IP address or IP addresses taken from the email full view. WHOIS can be an internet software or function that will help you to search an IP and gives back information of the said IP or website owner or registrant.

Subpoena the correct ISP company to get information of domain name registrant of said email sender who can be the suspect for mailing the email at said source, day and time.

Specifics in conditions of chat analysis protocols you'll employ.

Steps to employ when investigating pedophiles using chat rooms, instead messenger, e-mail or other online communication methods are as follow (Knetzger & Muraski, 2008):

Create a fictitious online identity (undercover), such as creating fictitious accounts on chat, email, instant messaging, networking sites, photographs, etc. . . to make the investigator appear like a.

Setup logging to automatically log activities on talk, instant message, and so on, to keep an eye on all online communication.

Visit online boards that generally is employed or visited by minors and young adults

Readily respond to other chatters that start interacting and pretend to be always a modest even if the investigator is not really a minor. It is strongly recommended not to initiate the communication.

All efforts to send or any activities regarding pornography, child pornography, and other damaging material must be recorded.

If an offline assembly is recommended and offered, commonly respond and agree to the getting together with.

Arrange a "sting procedure" to arrest the suspect at the agreed getting together with place, time and time.

Make the arrest

Specific approaches for online brains gathering you would employ.

According to Knetzger & Muraski (2008), the three (3) basic requirements to searching the internet for cleverness information are (p. 213):

Knowing where you can search - Such as for example using search engines to find the internet. There are several search engines. Some to say are www. google. com, www. yahoo. com, www. bing. com, www. aolsearch. com, etc. There's also online teams/forums where like-minded people, such as criminals, meet. You will find boards such as Internet Relay Chat (IRC) and you can use www. searchirc. com to search keywords, such as "child pornography" and it will give results of chat rooms available for child pornography, messages and who posted the messages relating to "child pornography. " Other boards are Yahoo Chat Groups, ICQ (I Seek You), etc. And in addition marketing sites such as Facebook, Myspace, Friendster, etc.

Knowing how to search effectively - There are different sites to acquire information intellect, such as open-source and closed-source sites. FOR INSTANCE, an investigator can used an open-source to search for a person or witness' contact information to aid him along with his analysis, to get nearer to the suspect or get leads. He may also use a finished source including the National Criminal offense Information Centre (NCIC) to discover the criminal background of a suspect. Effectively

Knowing what to do with the info - Is the main step the acquisition of information gathering. The use of important information that applies to a study or investigations is intelligence information. Keeping data found regarding steps to make a cotton candy does or might not apply to exploration of how to make a bomb, for example. Knowing what's useful and what is not is important, and how valuable the information is.

Method or methods you would employ for exceptions to the search warrant need to obtain information.

In this circumstance, the consent by the parent or guardian of a, who is 17-years-old, will do to produce a search with out a search warrant. Though, there are legal things to remember regarding consent (Knetzger & Muraski, 2008), and they're:

Must get and given voluntarily and knowingly.

Must be realized by way of a regular/typical person.

Keep from using broad, general terms. Be more specific and exact with the consent regarding search of any computer and other storage space devices.

It is required to get a consent to seize if the computer needs to be taken off its original place.

It is preferred that consent is devote writing, even if it's not required, and that the right to refuse, as well as how to revoke his or her consent are also spelled out on paper.

When obtaining consent from people who jointly own a computer and are present, both must consent to the search, but may be able to consent to individual user/logon brands unique to only him or her. Although, in cases like this, it is only the small who uses his computer and his parent consented to the search and seizure.

Procedures you'll follow for obtaining a search warrant if necessary.

Probable cause is a must for all those search warrants to be given. Probably cause is a "reasonable surface for supposing that a fee is well-founded" (Merriam-Webster Online Dictionary, n. d. ), such as in this case, the mother confirming her own child about pornography on his computer. Therefore, all information and intelligence information compiled from the investigations (speaking with mom and witnesses, complete facts of occurrences, etc that ascertains the think, location, person or folks, and what to be looked) should be all written within an affidavit, which may then be as basis of possible cause. "These details (on the affidavit) must be considered reliable and finally approved by a judge, courtroom commissioner, or magistrate" (Knetzger & Muraski, 2008, p. 242).

Methods you would use to extract, move, and store digital proof from the suspects Laptop or computer.

According to Knetzger & Muraski (2008), there are protocols to check out for legal reasons enforcement when extracting, gathering, moving digital evidence, and they're (p. 282).

Preserve the initial facts by not damaging it, such as putting the item near heat or drinking water, or by focusing on the original proof. When imaging a hard drive, be sure to make a duplicate, and then put aside the original for safety. Make a backup of the duplicate, and analysis should be done on the clone of the clone of the hard drive. Research should be achieved by the expert, a Forensic Specialist, and using a Forensics Software. Functions of Computer Forensic Software are (Knetzger & Muraski, 2008): Acquire digital evidence or data files; Clone/maintain digital data; Analyze digital information files; Independent and categorize documents by type; Compare facts records to lists of known contraband data; Recover removed or covered data; Split or recover passwords to permit access to encrypted data; and Systematically report studies in a paper record (p. 295).

Placing digital facts in protective storage to preserve in unspoiled level, such as positioning hard disks in non-static, padded containers, and from heat or water.

Photographing the positioning having large/far injections, medium pictures and close-up shots, and record, record, or even photographing anything on the computer display, for example, that'll be lost when the computer is turn off.

Keep the think away from gadgets and computer/s to avoid possible damage that the think can impose.

Properly electric power down pcs and electronic devices to avoid further lack of digital evidence. It is recommended for pcs to be unplugged from the trunk of the computer, rather than unplugging the cord from the wall membrane only. For laptop computers, unplug AC adapter and also take away the power. (Knetzger & Muraski, 2008).

Again, placing computer systems and digital electronic components in proper safe-keeping, protective pots, such as putting hard disks in padded, defensive, non-static bags. Also making certain, again, to not place these things near heat, liquid, radio waves or from being destroyed by the suspect or other individuals.

Recording serial amounts and identifying symbols or markings for each research items.

Seal and label evidence items.

Never leave facts items unattended and also to maintain proper string of guardianship. "Once the materials are securely at the police station or firm headquarters, generally they'll be completely inventoried before being anchored in an research locker or other secure keeping facility" (Knetzger & Muraski, 2008).

Methods you'll use to analyze and recover computer files erased by the suspect.

Check the recycle bin

Use Forensic Software to recover deleted files

Check backup devices, such as tape drives, CDs, Movie, thumb drives, exterior hard disks, PDA, ipod device, iPhones, videos, photographs, camera and camera memo potato chips, email, hard duplicate such as printouts, etc.

In addition, the two (2) important things to keep in mind regarding deleted files are need for time, and what sort of hard drive or hard drives are set-up. Also, if the data are deleted, but the recycle bin is not emptied, then which great potential for recovering the document or files. If the recycle bin has been emptied, then the more time that elapses, the greater chance the document or files deleted will be vanished by being overwritten by new ones, such as creating new data, or even just restarting the system, or jogging the hard drive defragment tools. So far as the drive set up, partitioned drives and how the operating-system is installed change lives. In case the OS is installed on the C: drive and all data files are preserved on D: and if the think deletes a data file on D, which likelihood a temporary document is preserved in the machine temporarily folder on C: particularly if the suspect is not high-tech knowledgeable.

Methods you'll use to gain access to data files encrypted by the suspect.

"Encryption is a large challenge to regulations enforcement community because it can range from difficult to impossible to defeat" (Knetzger & Muraski, 2008, p. 301).

To try, focusing on a non-evidentiary backup, make an effort to decrypt using a free encryption software available online. If lucky, an investigator could acquire a program used for encryption to decode the encrypted document.

Also, if blessed, by being provided the username and password by the suspect, or by using security password cracking programs.

Real-Life Circumstance & Commentary and Its Impact to Current Options for Handling Digital Evidence

USA today (2010) accounts that the U. S. Justice Department's new research implies that one-third of love-making offences against minors are determined by minors themselves, and that seven (7) out of eight (8) are age groups 12 years-old minimum amount, and 7% only of offenders are ladies, which makes 93% of offenders are young men. Also, young offenders 14 years old and more aged must now register as sexual predator if they commit the crime and must register every three months, as a requirement of the Adam Walsh Child Security and Safety Take action of 2006, matching to USA Today (2010).

There is nothing online that presents a real-life case that relate with the scenario I've used. The public juvenile sexual predator registry will not let me view a certain name so that I can further research the truth. No success.

The impact of real-life instances to current method is the Daubert Concern Law. According to the US Legal (n. d. ), the Daubert Problem Law is a "hearing conducted prior to the judge where in fact the validity and admissibility of expert testimony is challenged by opposing counsel. The expert must demonstrate that his / her methodology and reasoning are medically valid and can be employed to the facts of the circumstance. " In the digital world, the Daubert Obstacle can be used for the approval of Forensic Tools. A couple of five (5) standard examination/challenges for each tool that is employed and they're: Tool must be falsifiable, refutable and testable; Tool have been put through peer review and publication; Includes a known or potential error rate; The lifestyle and maintenance of specifications and controls concerning its operation; and The amount to which the theory and technique is normally accepted by the relevant medical community. (Spruill, 2010).

  • More than 7000 students trust us to do their work
  • 90% of customers place more than 5 orders with us
place an order

Latest posts

Read more informative topics on our blog
The Educational Curriculum INSIDE THE Philippines Education Essay
Education The educational curriculum in the Philippines is low in comparison to other countries. Other countries are able to find out more advanced...
The Ecotourism In Scotland Travel and leisure Essay
Tourism Hospitality and travel and leisure are very closely linked; every time a tourist comes to Scotland there are lots of restaurant and hotels to...
Corporate Social Responsibility: Targets and Concepts
Business Abstract Corporate Social Responsibility is a management principle whereby companies integrate social and environmental concerns in their...
A Personal Reflection AROUND THE ITM Information Technology Essay
Information Technology I have been in information technology industry for a long time. I have first-hand information technology experience especially in...
The Theory Of Mcdonaldization Commerce Essay
Commerce McDonaldization is the process where the concepts of the junk food industry have come to dominate an increasing variety of organizations in...
The Interpretation Of Life Quotes
Philosophy As you all know most of us are here in this planet for a while only and our life or being blessed as a individuals is a gift irrespective of...
The Sex Appeal In Advertising Mass media Essay
Media Through the years we have found a diversity advertising resources for offering products which were calling the attention of the costumers, to be...
Impacts of Tourism Deregulation and National Security
Marketing National security is definitely an issue going out with back to as early as when man started out arranging himself in contemporary society....
Homogeneous And Differentiated Product In Microeconomics Economics Essay
Economics The economic issue in this observation involves the concept of homogeneous and differentiated product in microeconomics According to Lindeman...
Check the price
for your assignment
we accept
  • Visa payment system
  • MasterCard payment system
  • Payoneer payment system
  • PayPal payment system
Money back
100% quality
Plagiarism free writing service