Question

In this major task assume you are a Digital Forensics Examiner. Considering a real or a...

In this major task assume you are a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be the examination of a storage media (HDD, USB Drive, etc), email or social media forensics, mobile device forensics, cloud forensics or any other appropriate scenario you can think of.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

I AM AN DIGITAL FORENSIC EXAMINER SUBMITTIG A REPORT ON THE CASE OF CHILD PORNOGRAPHY

CASE :- THE HYPOTHETICAL CASE THAT HAS BEEN CONSIDERED HERE IS OF CHILD PORNOGRAPHY...

VOILATIONS:- THE CASE IS OF THE REASON OF UPLOADING CHILD PORNOGRAPHIC VEDIOS ON A REFUTED PLATFORM..ALSO ON THE GROUNDS OF FORCING CHILDREN IN SUCH ACTIVITIES.

FACTS:- THE PORNSITE HAS BEEN HELD GUILY ON BASIS ON FACTS MENTIONED BELOW.

1) VEDIOS FOUND ON THE TAPE ,HARDDISK,EXTERNAL DRIVES etc..

THE VEDIOS FOUND ON DISK HAVE BEEN MATCHED WITH THOSE THAT HAVE BEEN FOUND ON THE INTERNET (WEB SERVER). THE DATA WAS INITIALLY DELETED BUT WITH THE HELP OF OUR TECHNICAL TEAM WE WERE ABLE TO RECOVER THE VEDIOS..

2) THE CHILDREN IN VEDIOS WERE EXAMINED MEDICALLY AND THEN PSYCOLOGICALLY WHICH REVEALED THAT THEY HAVE BEEN FORCED INTO CHILD PORNOGRAPHY BY THE PEOPLE WORKING FOR THE PORNSITE..

ON FURTHER EXAMINATION IT WAS FOUND OUT THAT THE CHILDREN WERE FROM POOR FAMILY ..BOTH THE CHILDREN GANESH AND SHIVA WERE GIVEN TO THEM BY THEIR PARENTS WHO WERE OFFERED MONEY IN RETURN..THE PARENTS CONFESSED THE SAME AND HENCE PROVES THAT THE DEFENDANT'S CLIENT IS GUILTY..

3) WHEN THE TEHNICAL TEAM SEARCED EVERY DEVICE THEY FOUND A LOT SUCH VEDIOS HIDDEN ON THE CLOUD .. MOST OF THEM WERE SIMILAR TO THE ABOVE TWO CASES AND HENCE PROSECUTOR DEMANDS STRICT ACTION AGAINST THEM..

4) ANOTHER MAJOR EVIDENCE WAS THE CHATS OF THE DEFENDANT'S CLIENT WHEN EXAMINED REVEALED HOW THEY PLANNED EVERY THING, THERE COURSE OF ACTION etc..

SIR I HAVE COMPILED ALL THE TECHNICAL FACTS ABOVE TO HELP YOU WIN THE CASE..

Add a comment
Know the answer?
Add Answer to:
In this major task assume you are a Digital Forensics Examiner. Considering a real or a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Need help with this Digital Forensics, please. Thank you in advance! As we know, the usage...

    Need help with this Digital Forensics, please. Thank you in advance! As we know, the usage of cloud storage services(e.g. Dropbox, google drive) leaves a system with a trail of data artifacts that can be used as forensic evidence. Briefly discuss FOUR DATA ARTIFACTS that usage of cloud storage services may leave in one’s computer system.

  • Digital Forensics You are investigating a case of industrial espionage for a company called Superior Bicycles....

    Digital Forensics You are investigating a case of industrial espionage for a company called Superior Bicycles. A disk image was acquired from a suspected employee, Chris Murphy’s computer that was seized as part of the investigation. The disk is a Windows drive formatted in NTFS. Your task is to collect digital evidences for the case. Once complete the investigation, write an Investigation Report that shall answer the following questions: 1)Is the image’s integrity is preserved? 2)What types of evidence (Photograph,...

  • 6 points: Forensics Install the Autopsy tool from sleuthkit: https://www.sleuthkit.org/autopsy/ Making use of this tool...

    6 points: Forensics Install the Autopsy tool from sleuthkit: https://www.sleuthkit.org/autopsy/ Making use of this tool load the 'Lone Wolf' image from: PLEASE NOTE: this image in >12GB. https://drive.google.com/open?id=1JSvCeZgo2mfnPy8Y41qZqU5bms1PSq0G (Links to an external site.)Links to an external site. and analyse this image to begin a forensic examination. PLEASE NOTE: this image in >12GB.   A quick 'getting started' guide was presented in this weeks lecture. Analysis of this image can take ~30 minutes on mid range hardware. This should not affect your...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT