Challenges In Forensic Investigations

Great Essays
INTRODUCTION Today with fast growing digital age of modern technology, digital forensic experts are facing a number of data sources that they need and rely on to acquire valuable information for their investigations. Data sources can come from different forms and areas such as: personal computer, hard drives, network logs, social networking sites, mobile devices. These sources can contain a vast amount of data. Hence, they lead up to many challenges in acquiring the data. For example, just in mobile devices category, there are multiple types of devices – cell phones, smartphones, tablets, PDA devices, and more. Three different events – network intrusion, malware installation, and insider file deletion – can be used to prioritize data sources’ …show more content…
Discovering all activities of an employee, logging every single key-strokes allow the investigators to find out what the employee did during his logon session. Also, the investigators are able to figure out what files were deleted by compare these logs with a backup log.
Challenges
The Intrusion Detection System (IDS) is a growing need in most organizations both private and public. The IDS can generate a massive number of log files depending on organization’s traffic volume and information they handle. The investigators have to know how and where to find sufficient information with the log files. In addition, they need to look for evidence from multiple log files in different areas which may take a long time to complete. Using log files as the evidence, the investigators have to prove that the log files are admissible to the judge and jury. The U.S. Code Tile 28, Section 1732 states that “logs files are admissible as evidence if they are collected in the regular course of business.” In any case, this standard of admissibility does not ensure that in a specific case log files can be considered legal. This means the organization has to have logging turn on in their network all the time which builds up a vast amount of large files and causes storage issues (Vacca & Erbschloe,
…show more content…
Also, mane mobile devices have master reset codes that can wipe out all contents of the device to default factory settings. For example, FBI tried to crack an iPhone in San Bernardino shooting case. The iPhone has a feature that will wipe all data stored on the phone after 10 failed phone-unlock attempts. Another feature is that waiting time for next unlock attempt gradually increases the time allowed between attempts (Nakashima, 2016). In addition, mobile devices might be found in a damaged condition, caused by accident or considered activity. Devices with noticeable external damage don’t certainly prevent data extraction. Modern mobile devices allow users to perform remote lock and/or remote data wipe with a simple text command to the device. Forensic examiners have to take precautions when dealing with mobile devices in terms of handling and isolating them from other

Related Documents

  • Superior Essays

    Log files created by the web browser also store web browsing history information such as web pages visited and accessed along with dates and times of those visits (Ravi, 2007). The registry can provide evidentiary value to the digital forensic investigator as well in relation to web browser artifacts. Items such as passwords, default search provider and search engine, and the URLs typed into the web browser address bar are stored in the NTUSER.DAT file located within the NTUSER.DAT hive in the registry. Twenty five URLs can be stored at one time in the NTUSER.DAT file and they are cycled out as new URLs are typed into the web browser.…

    • 661 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Also, the correct internet browsing security configuration setting should be implemented on the end users laptop to allow first party cookies, and blocking the third party cookies from other websites to protect from tracking and advertisements. By hardening it means that “Protection is provided in various layers and is often referred to as defense in depth. Protecting in layers means to protect at the host level, the application level, the operating system level, the user level, the physical level and all the sublevels in between” [1]. The best practices recommends that the antivirus program should be scheduled periodically to monitor any…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. From what sources might the incident response team gather evidence? The incident response team should be alert to any electronic devices as they begin gathering evidence from different sources. For example, they see a gaming system.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Can the evidence be gathered legally? “Depending on the type of the case, the evidence can be lawfully gotten in numerous ways. Searched and warrants, among different activities, are altogether regular approaches way to gather evidence. Depending on the evidence is gathered is a thing that esteems it lawfully acquired or wrongfully obtained” (Proly, Laporte & Mulligan, P.A.). Enable an examination to continue at a cost to the extent of the episode, limit intrusion into the business from any examination and guarantee that confirmation has a constructive outcome of the result of any legitimate…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    1. The individuals I believe that ought to be interviewed for this investigation are Mr. McBride, Mr. Jenkins, Mr. McBride’s co-workers, and the forensic expert(s) who examined the evidence. Mr. McBride is innocent till proving guilty of taking “Product X” from Greenwood and his statement should be gathered accordingly. Mr. Jenkins statement would also need to be gathered to collect information as to how he came to believe Mr. McBride potentially stole the information and what the consequences would have been if obtained by competitors.…

    • 1217 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Computerized tracking systems have the advantages of capturing disclosures for the entire entity based on the computer network being used. Also this method utilizes can easily locate records of disclosure and are able to print upon request. However, the use of any computer system are not always safe due to systems crashing or being hacked. On the other hand, manual logs have the advantage of tracking disclosures and information by written proof from the individual requesting PHI.…

    • 349 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The fourth amendment protects all citizens from illegal searches and seizure of their possessions and property. The Weeks v. United States case law was established in 1914, which consisted of police entering Fremont Weeks home and illegally seizing evidence of Weeks transporting lottery tickets through the mail. This case is what brought forth the exclusionary rule, which makes any evidence obtained during an illegal search and seizure possibly inadmissible in court. To uphold the fourth amendment, officers need a probable cause to justify the search of someone’s home and other property. To establish probable cause, officers need factual evidence that leads them to believe that the suspect has committed a crime.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The BTK was a very good but sloppy serial killer and it’s only because the lack of modern forensic technology that he was able to kill so many people. He knew not to leave finger prints but left DNA at almost every crime scene. DNA testing in the 1980s was relatively new and took a large sample to create a DNA profile and unlike today where the tests can be done within a day, there weren’t as many crime labs that could process the DNA. The Crime Scene investigators had a lot of evidence to process because the killing spread across the entire house.…

    • 516 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Federal Bureau of Investigation vs. Apple On December 2, 2015, there was a mass shooting in San Bernardino, California that claimed more than a dozen lives of innocent people. The attackers Tashfeen Malik and Syed Farook, a married couple that lived in Redlands, California. The married couple also attempted to bomb the San Bernardino County Department of Public Health were this malicious crime took place. However, hours later the couple was found and died in a shoot out with law enforcements, after the couple was then pronounced died.…

    • 805 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    1) The Greenwood Company just ended the employment of Mr. McBride for numerous of reasons. Through his exit interview, Mr. McBride made more than a few alarming statements providing reasonable mistrust to the business that he may have mantled with the source code for “Product X”. The Human Resources Director, Mr. Jenkins, briefed the Incident Response Team that the business wants to recollect the possibility to bring up the investigation to law enforcement in the future, so whatever completed should be anticipated for later prospective permissibility in court. Personnel of the company acknowledged the receipt of the handbook which confirms that no matter what is brought to business property, comprising of employees themselves, are likely…

    • 1611 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Investigations As investigations are all about gathering evidences, the combination of using theft act investigation, concealment investigation and conversion investigation would achieve to uncover the fraud. Theft Act Investigation To investigate the false refunds, the investigator should combine invigilation and surveillance techniques to uncover the fraud. Invigilation Invigilation would be helpful to uncover the fraud because the opportunities of stealing money would be cut off during invigilating. The store manager would first copy all the cash records, bank statements and sale relevant records for one month and then would tell all employees that the company insisted on daily audited records for one month to analyze region store performance.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Background: Recently, Apple was required to unlock a work-issued iPhone-5C to cooperate with FBI in a terrorist attack. However, Apple declined the request. Apple’s attitude on encryption: Law enforcement agents around the country have already said they have hundreds of iPhones they want Apple to unlock if the FBI wins this case. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks. Of course, Apple would do our best to protect that key, but in a world where all of our data is under constant threat, it would be relentlessly attacked by hackers and cybercriminals.…

    • 947 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Mr. Oliver sent the three photos to a single person whom he deems trustworthy enough to not exploit the photos. Task 2) Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law…

    • 711 Words
    • 3 Pages
    Great Essays