Description
Case Study:
You are the law enforcement official gathering evidence against a suspected online pedophile. The individual in question is suspected of enticing children through online chats, email, and text messaging. Additionally, this individual is thought to be using information obtained through credit card fraud to pay for his online activity and camouflage his identity.
For this project, you are to explain how you would gather evidence on the suspected individual. Thoroughly explain your course of investigation and methods of research, including (but not limited to):
- Description of the use of computer operating system data you would use in investigating the case.
- Your specific investigation relative to how the individual obtained credit card data.
- Specifics in terms of use of identity theft and high-tech crime investigative protocols.
- Method(s) you would employ in email tracking.
- Specifics in terms of chat investigation protocols you would employ.
- Specific techniques for online intelligence gathering you would employ.
- Method or methods you would employ for exceptions to the search warrant requirement to obtain information.
- Procedures you would follow for obtaining a search warrant if necessary.
- Methods you would use to:
- extract, transport, and store digital evidence from the suspects PC;
- research and recover computer files deleted by the suspect and;
- access data files encrypted by the suspect.
As part of your research for this project, investigate prior real-life cases with fact patterns similar to this case study. Include in your paper commentary on how the real-life cases may have impacted the current methods for handling digital evidence.
Note: This Assignment requires outside research. Use at least two credible sources beyond the text material and discuss how you evaluated the credibility of the resources used. You may consult the Kaplan Online Library, the Internet, the textbook, other course materials, and any other outside resources in supporting your task, using proper citations in APA style.
The paper:
- Length should be 5 – 6 pages, excluding cover page and references page
- Viewpoint and purpose should be clearly established and sustained
- Assignment should follow the conventions of Standard American English (correct grammar, punctuation, etc.).
- Writing should be well ordered, logical, and unified, as well as original and insightful
- Your work should display superior content, organization, style, and mechanics
- Appropriate citation style should be followed
Explanation & Answer
Hello. I hope this assignment meets your expectations. if it does, please remember to give me a thumbs up! Looking forward to working with you again.
Running Head: Investigating, Researching, and Gathering Digital Evidence
INVESTIGATING, RESEARCHING, AND GATHERING DIGITAL EVIDENCE
[Name of Student]
[Affiliation]
[Date]
1
Investigating, Researching, and Gathering Digital Evidence
2
Introduction
Computer forensics is a branch of digital forensic science which pertains the excursion of
evidence from digital storage media and computer. Computer forensics aims at examining digital
media forensically with the intention obtaining, preserving, retrieving lost data, reviewing and
presenting opinions or facts concerning the information. Although computers forensics is mainly
linked to the investigation of computer crimes, the discipline can also be employed in civil
proceedings. It can also be used to recover data as well as creative legal audit trails. The current
world now allows the use of digital evidence, and thus, it has been used reliably in various highprofile court files (Pearson & Singleton, 2008).
Computer Operating System Data used in Computer Forensics
One of the crucial data that is used to remotely track suspects who use computers to do
malicious deeds is the IP Address. The Internet Protocol (IP) Address is a unique identifier that
is assigned to each computer or other devices such a mobile device, router or printer connected
to a TCP/IP network. The identifier is used to trace and identify the nodes that are in
communication with other nodes in the same connection. There are various Linux commands
which can be entered and identify computers that are making connections. Obtaining the IP
address then requires one to trace the exact location where the connection is coming from by
using sophisticated tools (Slusky, Partow-Navid & Doshi, 2012).
Chats, sent messages, digital media and emails also contain data which would be very
helpful to investigators. Digital files, for example, such as images can have crucial data such as
the name of the device used to capture them, the exact time of capture as well the location of the
device when capturing the specific photo. Deletion of these files does not guarantee that they are
completely wiped ...