Digital Forensic Investigations

Improved Essays
Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain, …show more content…
Mueller III, former director of the Federal Bureau of Investigation (FBI) once said “there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” This is the new reality of today’s cyber world. With the ever increasing popularity of using virtual environments for businesses both large and small, using traditional method is no longer sufficient at combating cyber-attacks like the WannaCry virus. Digital forensic investigations techniques need to be altered to combat this new style of cyber-attacks. However, there are several challenges to the digital forensic investigative process that make the investigation process susceptible to incongruities, particularly during the legal process. There are several proposals that are considered to improve the digital forensic investigation process but essentially, to avoid massive attacks such as the ones these companies have faced, companies to need be proactive in their attempts to combat malicious activity in their digital environments.
Background
In 2001, the Digital Forensics Research Workshop (DFRWS) established a formal definition of digital forensics. This definition is noted in the conference report drafted by Gary Palmer as:
The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to operations.

Related Documents

  • Improved Essays

    Holmes/Scarpetta Project- The Valley of Fear What discipline was involved? Digital Forensics (cryptology)- The process of encrypting messages and examining digital media forensically to find, analyze, and present facts and opinions. What was the equipment used? The ciphers represent the pages of previous editions of Whitaker's Almanack.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Forensic response readiness plan is for the Greiblock Credit Union to able to collect, preserve, protect and analyze digital evidence so that this evidence can be effectively used in any legal matters, in disciplinary matters, in an employment tribunal or court of law. It will also prepare the GCU organizations to measures that they can respond to incidents effectively, timely and efficiently. Define the business scenarios that require digital evidence. Greiblock Credit Union needs to take a look at the hazard and potential effect on the organizations from the different kinds of cyber crimes.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    At times, there are certain cases where investigators run into dead ends or obstacles depending on the circumstances at hand. As in this case of the kidnapping and murder of special agent Enrique Camarena and Captain Alfredo Zavala, the DEA and forensic investigators faced many hurdles. The processing of significant evidence was constantly put to a halt. The DEA and investigators were unable to do things in the way that they wanted to. This put them through many challenges and hurdles in the investigative process.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Natural Driving Quiz

    • 462 Words
    • 2 Pages

    _________________________________in computer forensics, makes it possible to restore a suspect drive on your virtual machine crucial for specialist to identify potential VM files, artifacts and fragments can be deleted files. Virtual Machines 14. ________________________________the activity of defrauding an online account holder of financial information by posing as a legitimate company. Phishing 15.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Examples of analysis computer evidence are shown in today’s popular television shows such as Law and Order. Computer forensic scientist job is to examine and report information found on computers and networks that pertain to a criminal or civil investigation, although the same process and methods are not applied to all investigations. Computers and the Internet are significant problems for legal investigations; they represent the fastest growing technology tools used by criminals. As shown in this case computers can hold evidence of a wide range of criminal and unlawful activities. The computer forensic investigators in this case searched Scott’s database, traced IP addressed and recovered documents to determine who was responsible in the death of Laci Peterson.…

    • 700 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Secondly is to protect and secure the useful promising information that is relevant to the computer. An investigator should ensure that no available evidence are damaged, destroyed, or contaminated, and no possible computer virus is brought in to the suspect computer during the forensic inspection. Information represented by physical items, such as computer hardware and printed files, can be described easily by correctly following traditional physical evidence procedures. The actual challenge comes from acquiring evidence stored in these physical items, such as hard drives, CDs, DVDs, zip disks, or floppy disks. All data residing in the suspect computer’s hard drives and disks need to be protected from any potential evidence and this has…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Pc Wrongdoing Analysis

    • 81 Words
    • 1 Pages

    PC legal sciences agents and PC wrongdoing examiners help people, organizations and lawyers by finding and investigating data. PC scientific agents have practical experience in recouping, breaking down and introducing information from PCs for use in examinations or as confirmation. They decide the subtle elements of interruptions into PC frameworks, recoup information from encoded or eradicated documents, and recuperate messages and erased passwords. PC wrongdoing specialists explore PC violations, for example, wholesale fraud, irritating messages, and unlawful downloading of copyrighted…

    • 81 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Digital Evidence Crimes

    • 921 Words
    • 4 Pages

    According to the National Institute of Justice (NIJ) in an effort to fight e-crime and to collect relevant digital evidence for all crimes, law enforcement agencies are incorporating the collection and analysis of digital evidence into their infrastructure. Law enforcement analyze digital evidence in three areas: forensic computer, video, and audio analysis. Forensic…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Crime Scene Training Evaluation The Crime Scene Training Evaluation program video focuses on knowledge and skill of the training material. The program was intended for a Training Model evaluation for the trainees, and to see if the training program will be great for future training. This evaluation focuses on measuring if the trainees have incorporated the material for their employment, and if they demonstrate it in their behavior. The instruments of the evaluation will have been administered before and after training and a few months into the trainee’s job performance giving them an opportunity to apply what they’ve learned.…

    • 1208 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In Malaysia, WannaCry attack has arrived and infecting IT user especially business companies. Founder of Cyber Security Firm LGMS, C.F. Fong said that, one of his client which is a company director discovered the Ransomware on his personal laptop. It is detected as WannaCry which is one of the famous type of Ransomware. However, the laptop has been formatted after the attack.…

    • 1139 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    For example, a big blanket. The evidence is adequately just cutting a small piece of the part to be analyzed than the whole blanket to be sent to the lab. There is no way to preserve or store the evidence in the forensic lab because it is space consuming and they may have many cases related to the same evidence. The methods of experiment or analysis of evidence used have become an important aspect of an investigation. This is because, the methods used can also be questioned in the trial court that may cause the test carried out to become unqualified as a proof.…

    • 954 Words
    • 4 Pages
    Improved Essays