Computer Forensics: Strategies and Resources for Investigation
Verified
Added on 2023/06/03
|47
|5976
|157
AI Summary
This article discusses the strategies and resources used in computer forensics investigations, including the forensic tools FTK Imager, Autopsy, and OSForensics. It describes how these tools are used to collect digital evidence related to offences, and provides step-by-step instructions for installing them.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Computer Forensics
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents 1.Introduction...................................................................................................................................2 2.Overview of tasks...........................................................................................................................2 3.Strategies and Resources...............................................................................................................2 4.Progress........................................................................................................................................17 4.1Representation of Content related to offence........................................................................17 4.2Evidence Identification............................................................................................................35 4.3Intent of the digital content.....................................................................................................36 4.4File Quantity............................................................................................................................37 4.5Software installed related to investigation.............................................................................38 5.Conclusion....................................................................................................................................38 6.References....................................................................................................................................39 APPENDIX A......................................................................................................................................43 APPENDIX B.......................................................................................................................................45 Page1of47
1.Introduction In the Western Australia, a computer is seized from a work place. Because, the according to the information the clown content is accessed by the computer. Accessing, owing and distributing the clown content in Western Australia is illegal. The seized computer is forensically investigated. The forensic image of hard drive is obtained. The forensic image is known as digital evidence. The digital evidence related to the offence is collected. Now, the forensic investigation will be done on the obtained forensic image. This will be done by using forensic tools. The tools used for forensic investigation are OSForensics, Autopsy and FTK Imager. The ownership identification, intention of the offence and the number of files present in the forensic image will be found. 2.Overview of tasks The forensic tools are downloaded and installed to analyze the forensic image from the computer in which the offence is take place. First task is collecting the forensic image of the offence computer. After that analyze the forensic image using appropriate tools. By using these tools the clown content is found which is illegal in Western Australia. 3.Strategies and Resources The resources used for the investigation are FTK Imager, OSForensics tool and Autopsy. The Clark who is a suspect, the investigator and a junior investigator. And a system in which the forensic investigation will done. The tools used for investigating the given forensic image are explained below in detail ("Dendroecology: A Key Forensic Age-Dating Tool", 2005). FTK imager FTK imager is a forensic tool and a software library package which is used for Access the data from the image ("AccessData", 2018). FTK stores the images in the SMART file format and it is used in the different technologies. It is used to find the different PC crime scene and investigationprogrammingmadebyAccessData.Thetoolboxlikewiseincorporatesan independentplateimagingprogramcalledFTKImager.TheFTKimagerisasoftware Page2of47
acquisitiontool.Itisusedtopreviewtheevidencequickly("Chapter8- FTKImager Walkthrough - Incident Response and Computer Forensics, 3rd Edition", 2018). The computer forensics will be examined through the forensic toolkit manager. This forensic tool mainly used to get the evidence and keep it as secure. Also make the analysis about the evidence. IT makes the computer evidence as original. For that it had two ways, one is creating the image off suspect drive by the usage of hardware devices or software resources. It had many specifications regarding with the forensic investigation. They are described below ("Evidence Acquisition Using Accessdata FTK Imager", 2018). First one is email analysis. According to the email analysis the forensic tool provides interface for the email analysis. Also this tool is used to make the email parsing, header analysis regarding to the IP address. Next one is the file encryption. It is considered as the essential feature of forensic toolkit imager ("Forensic Toolkit FTK Imager Free Download - ALL PC World", 2018). It is used to crack the password. By the use of FTK imager we can retrieve the passwords over hundred applications ("FTK Imager - ForensicsWiki", 2018). Third one is data carving. By use the of forensic toolkit imager the robust data would be obtained. Also the investigators have the option to find the files based on the size and data types of the file. Fourth one is data visualization. This is considered as emerging one regarding to the forensic investigation. For the analysis of text data the investigators using the data visualization. It also helpful for the users in the way of making timeline construction, cluster graphs and also the geo location ("Ftk Imager - Free downloads and reviews - CNET Download.com", 2018). The web viewer also considered as the important one and it is used to accelerate the case assessments in real time. The multicast routing would be done by using the web viewer. Another feature is represented as Cerberus. It is used as the powerful automated malware detection. Here the machine intelligence concepts are used to sniffing the malware regarding the computers. OCR is next feature and it known as optical character recognition. It is used to make the images into readable text. Also it enables the multi-language support. Installation of Forensic toolkit imager The steps are listed below regarding to the installation of forensic toolkit imager. The screenshots are added for the installation steps. It staring with the initial step of installation and ending with the completion. Step 1- Welcome page Page3of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The initial page for the installation is displayed in the above. The install shield wizard is appeared. The warning section is provided. Step 2- License agreement The license agreement is shown in the above screenshot. The license is accepted. It is provided for the purpose of security. Page4of47
Step 3- Destination folder The storage path of the access data FK imager is appeared. The path is displayed. Step 4- Starting of the installation The ready stage is displayed for the installation. Here the install button should be clicked. Step 5 – Installing access data FTK imager Page5of47
The process of installing is appeared. The status is displayed for the installation. Step 6 – Completion of wizard The completion process is appeared. It will ready to launch the access data FTK imager. Step 7- Home page of FTK imager Page6of47
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The home page of the forensic toolkit imager is appeared in the screenshot. It shown the generic options regarding the tool (Bowser-Rollins, 2018). Step 8- Source selection The source selection is displayed in the screenshot. The evidence types are shown. Autopsy Page7of47
Autopsy is a computerized device and it is mainly used for doing the forensics things and it is tool works in forensics platform and the GUI ("Autopsy - Basis Technology", 2018). It is mainly used in the fields like law requirement activities, defense services, and other corporate analysts who wants to secure their contents ("Autopsy - Digital Forensics Platform - Hacking Vision", 2018). This tool is also used for exploring the contents like checking and investigating the computers to find what kind of activities occurred on a Personal Computers. Using this we can also does the features like recovering images in our camera's memory card. This tool is also used for other backup purposes ("Autopsy – Training | Autopsy", 2018). The software is to a great extent kept up by Basis Technology Corp. with the help of developers from the network. The organization offers bolster administrations and preparing for utilizing the product. The GUI of this tool shows the outcomes from the fundamental volume creation and using this tool it simpler for specialists to retrieve the relevant areas of information ("Autopsy | Open Source Digital Forensics", 2018). It is the forensic tool or software that makes it less difficult to send a significant number of the free generation programs and modules which are used in the Sleuth Kit ("Autopsy of a Dill Pickle-Introductory Lab for Anatomy or Forensics!", 2018).This tool also givesvariouscapacitiesthatguideontheoffchancethatadministration.Specifically, examinations began inside this tools are composed by cases, which can contains different hosts ("Autopsy", 2018). Each and every hosts are arranged to have its opportunity zone for setting the time with the goal that the occasions demonstrated are the equivalent as the first client would have seen. Each host can contain at least one record framework pictures to investigate.The designed autopsy tool has some specific principles. First one is extensible ("International Environmental Forensics Conference Qingdao, China, May 27–30, 2008", 2007). The new functionality should be added by developing the plugins. Also the tool should be provide the standard mechanism regarding the features. It offer many function to the development of case management. Investigators mostly use this case management. The functions are listed below. The event sequencer is a kind of function used in the case management. The time based events could be added ("Autopsy", 2018). The autopsy tool is used to sort the events. So through this function the investigators can easily determine the events. Next function is the notes. These notes could be saved based on the investigators. These functions are used to the investigators for creating the notes about the files and structures. Thesenotes are stored in the format such as ASCII value. The image integrity is considered as the third function ("Autopsy: Lesson 1: Page8of47
Analyzing Deleted JPEGs", 2018). Here the forensic investigation is used to ensuring the data is modified during the analysis. The autopsy tool develop the MD5 value for all files ("Hacking & Digital Forensics & Autopsy - Stay Anonymous", 2018). This tool is used to validate the integrity of the file. Then the fourth function is the reports. It can create the ASCII reports for the files and other file system structures. These reports are used for the developers to create the datasheets (Galvao, 2006). Installation of Autopsy ThestepsarelistedbelowregardingtotheinstallationofAutopsy("Autopsy: Download", 2018). The screenshots are added for the installation steps. It staring with the initial step of installation and ending with the completion. Page9of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
OS Forensics OS forensics is the sole property owned by PassMark Software Pty Ltd. They are the leading organization in the digital forensic analyzing software development ("The Evolution of Environmental Forensics in the United States", 2001). Their contribution to the digital forensics is highly noticeable ("The International Society of Environmental Forensics Announces the Following Workshops for 2002", 2002). OS forensic is one of the most important digital forensics analyzing tool. Many software developer use this OS Forensics software tool as a benchmark for test their capability. It shows that the OS forensics software tool is one of the most powerful digital forensic tool kit. Many government agencies as well as Major government agencies are their customers. Mostly this tool used for analyzing the various digital forensic evidences. This software tool is available in two varieties (begam, 2018). One is free editions and another one is Pro version. Here the Pro version has higher capability than free version. Because free version has some of limitations. Even though the free versions also the most powerful digital forensic evidence analyzer. Their pro version is available for 1000 bucks. But it is not that much costly ("Forensics, Anti-forensics and Counter Anti-forensics for JPEG Compressed Images", 2016). This price is reasonable. Because the competitor products are three to four times costlier than this software tool. But feature wise this software is not lower than any competitor products. This software tool has the high price to performance ratio. That’s the reason why most of the private companies prefer this software tool over other tools. This software mainly works based on the below given three process first one is Discover, second one is Identify and the last one is Manage ("Firefox OS Forensics: Guidelines and Challenges", 2016). This three step process helps to provide the extraordinary digital forensic evidence analyzing experience to the forensic investigators. These three steps are considered as the most prominent features of the any analyzing tool. Because the analyzing tool must provide the feature for analyze the evidences with higher fast (Armknecht & Dewald, 2015). Then the tool must identify the possible threats present in the analyzed evidence. After that the tool also helps to develop the proper formal report about the analysis and findings of the analysis. OS Forensics tool can capable of doing all the three activities as mentioned below. In the below given section the various features given by the OS forensics tool is explained. High speed file analyzing engines. Page12of47
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
It can able to search the files within the various files. Also can able to find the emails through this software tool. Facilitates the recovering option for the deleted files. Collects various system details from the digital forensic evidence effectively. It also provides the features to extract the various login credentials like user name and password for the evidences. This tool has the capability to develop the formal report regarding to the analysis and findings. Also create the drive image file for analyzing the evidence without disturbing the source. It is powerful enough to rebuild the RAID arrays. Also the company provides the excellent after purchase support. It is the most important feature for any goods and services. Their executives are available on all business days to help and support the users of the software tool. Also the installation procedure for installing this software tool is explained as pictures in the below context. It brings the better understanding than written format (Brinson, Robinson & Rogers, 2006). Installation of OSForensic The steps are listed below regarding to the installation of OSForensic. The screenshots are added for the installation steps (Carlton & Worthley, 2010). It staring with the initial step of installation and ending with the completion. Page13of47
Page14of47
Page15of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4.Progress 4.1Representation of Content related to offence Investigation using Autopsy tool The above image shows the investigation using the autopsy tool (Carlton, 2008). After analyzing the Clark’s database the image file has been identified and name of the image file is 182.dd and the above picture shows the representation of the image extraction. Page18of47
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
After the analysis with the image file using the autopsy tool the total files were identified in the hard drive (Casey, 2012). There are different kinds of file types were identified in the hard drive. The above picture signifies the representation of the clown image and other files which are all present in the image file. Page19of47
There are different file types were identified from the Clarks hard drive and there are 13 files are there in the desktop and the picture shows the representation of the data and a clown image present in the desktop (Casey, 2013). And this image has some evidence like modified time, change time, accessed time and created time (Casey, 2015). Using these different times the autopsy tool clearly shows the Clark involvement in the crime. Page20of47
This picture shows the different timings for the particular index image (Chandel, 2018). All the timings are similar hence all the things are happened in a same time and it is clearly shows evidence of the crime. Page21of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
This is another image in the same desktop folder and it is also a clown image and the date and time of the image is 2018-07-02 & 06:52. All the timings like the modified time, change time, access time and created time are same (Cho, Kim, Park & Gil, 2015). The name of the current image file is K7827739 and the above represents all these details. Page22of47
The above picture shows the video file in downloads folder. The name of the image file is clowns dancing and the downloaded date and time are 18thof June 2018 at 08:15 AM. This evidence clearly shows the Clark downloaded the clown related videos for doing the crime (Duc, 2018). There are totally 13 files are there in downloads folder and clown dancing video file is one of the file in downloads and duration of the file is 51 seconds. Page23of47
There are 17 items are there in the folder called pictures and using the autopsy tool we have opened an image file and this file is also a clown image (Ebert, 2012). But the modified date of this image file is 19thof June. Page24of47
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The above picture represents the image file which is in the pictures folder and the modified time and date of the picture are 18thJune 2018 at 05.50. The name of the image file is scarydown.jpg and there are some other files are also present in the pictures folder (Frysinger, 2002). Page25of47
Using this evidence we can able to find out all the web downloads in the system (Frysinger, Gaines & Reddy, 2002). It clearly represents the web downloads done by the Clark and all the web download source files are sqlite files and totally there are 16 files are present in the web downloads and the above picture clearly shows the URL representation and the path notation for all the 16 files in the web downloads folder(Haddad, 2004). Page26of47
This shows the representation of the Clark’s web history and there are 117 web histories are there in the Clark’s system and all the web histories are related to clown image and this incident clearly shows that crime (Joyce, Powers & Adelstein, 2008). Clark personal drive has all these histories and hence without his this won’t happen. This picture above shows all the web histories. Page27of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
This incident shows the extension mismatch details and all the mismatching contents are belongs to the bytes, png and dat format extensions. But the files does not supports the extension mentioned (Kessler, 2008). For example the png format extension files are not opening with the help of image viewing software’s and this is the one of the evidence against Clark. Page28of47
The operating system information has two kind of source files namely system and software. Both the system and software has same data source file. The name of the data source file is 182.dd. the name of the Clark desktop is ‘DESKTOP-MMAUQOG’ and this system has more temp and junk files and the suspect may already tried to delete all these information previously. All thesecrimesaredone througha usernamecalledcomputerand using theseallthe information such as username and other details are retrieved with the help of autopsy software (Larson, 2014). Along with the incidents the other details are saved like the user id, path, source file path, and artifact id etc. similarly Clark’s system is also having the username called computer and this incident surely tells the suspect is Clark. Page29of47
There are 9 bookmarks are there in the given result and among that 8 files are sqlite formats and remaining one file is belongs to URL file. In that the suspect regularly watches a website and bookmarked it for future use (Machemer & Wang, 2007). That website is related with the psychology oriented analysis. And all information about the bookmark were identified using this autopsy tool. Page30of47
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Using the analysis in the web downloads there are different files were identified and that Clark’s system also has the image file called scary clown.jpg and this incident is enough to prove that he is the suspect for all the incidents. The other web downloads are also related with clowns. Page31of47
The web downloads are retrieved from the hard drive. These files are downloaded by the suspect Clark. Because the computer user is handled by the Clark. Also the web downloads contains the files such as the clown images, videos and pdf file. The clown contents are wanted by the victim Clark (Morrison & Petrisor, 2004). Because these downloads are made by the Clark. The downloaded time and the file modified time are similar. Page32of47
The web histories are discovered from the identification of hard drive files. Here the referred URL links are used to prove the clown content is accessed by the Clark. It is mentioned by the time variation. Here the URL links are accesses at 18thJune. Also the downloaded clown files are stored and modified the same day. Also the searches are made by the Firefox software. The Clark installed the Firefox software (Morrison, 2001). These details are retrieved from the history of installed software’s. Also it is stored in the user computer. That is owned by the Clark. Page33of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The web searches are retrieved from the hard drive. The searches area belonging to the party clowns and clown dancing videos. These files are stored in the computer user. Here the Firefox software is used to search the content about clowns. These searches are created at 19th June. Downloads are made by the same day. So the suspect could be known as a Clark. Page34of47
The mail details are found from the given hard drive. The suspect sends the mail about clown contents to jerry Simpson. From this statement we can ensure the suspect is the Clark. Because it is sent by the suspect id. 4.2Evidence Identification The screenshots are added to find the owner of the file regarding the clowns. We have checked the owner permission of the computer user. By this verification we can make the identification about the suspect (Morrison, 2002). So these analysis are enough to make the decision about suspect. The suspect is the Clark. Page35of47
4.3Intent of the digital content The intent of the crime is confirmed. The Clark spreading clowning to all the systems in the work place. Jerry who works with the Clark is wrote the mail “stop clowning about and start working like a superman ;)”. From this, the criminal is the Clark is confirmed. He is purposely doing the act of distributing the clown images and contents. Page36of47
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4.4File Quantity More clown pictures and a video is found in the forensic image. There are also pdf, web downloads, web history, web search results and emails available.The programs are also installed on the system. And also the recent documents are found in the system. Page37of47
4.5Software installed related to investigation The Firefox, True crypt and MPlayer2 are the installed software which are related to the investigation of the forensic image. Clark used Firefox to download Clown video, pictures, document from the clown related websites in the internet. 5.Conclusion The forensic investigation is done with the help of forensic tool. The contents related to the offence is found including clown images, video, document, web downloads, web search, web bookmark and email. The ownership of the offense content is found and confirmed and then the intention of the crime is verified. The number of files stored in the forensic image of hard drive Page38of47
are analyzed and the programs and software installed on the device which is related to offence is found. 6.References AccessData. (2018). Retrieved from https://www.youtube.com/user/accessdatagroup Armknecht, F., & Dewald, A. (2015). Privacy-preserving email forensics.Digital Investigation,14, S127-S136. doi: 10.1016/j.diin.2015.05.003 Autopsy - Basis Technology. (2018). Retrieved from https://www.basistech.com/autopsy/ Autopsy - Digital Forensics Platform - Hacking Vision. (2018). Retrieved from https://hackingvision.com/2017/02/18/autopsy-digital-forensics-platform/ Autopsy – Training | Autopsy. (2018). Retrieved from https://www.autopsy.com/training/ Autopsy | Open Source Digital Forensics. (2018). Retrieved from https://www.autopsy.com/ Autopsy of a Dill Pickle-Introductory Lab for Anatomy or Forensics!. (2018). Retrieved from https://socalnailz.com/2018/08/30/autopsy-of-a-dill-pickle-a-great-introductory-lab-for- anatomy-or-forensics-edgy-instruction/ Autopsy. (2018). Retrieved from https://sourceforge.net/projects/autopsy/ Autopsy. (2018). Retrieved from https://www.sleuthkit.org/autopsy/ Autopsy: Download. (2018). Retrieved from https://www.sleuthkit.org/autopsy/download.php Autopsy: Lesson 1: Analyzing Deleted JPEGs. (2018). Retrieved from https://www.computersecuritystudent.com/FORENSICS/AUTOPSY/lesson1/index.html begam, r. (2018). Retrieved from http://nest.unm.edu/files/5513/9251/4756/Tutorial_1_- _FTK_Imager_-_Imaging.pdf Page39of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Bowser-Rollins, A. (2018). Tools of the Trade – FTK Imager. Retrieved from https://litigationsupportguru.com/tools-of-the-trade-ftk-imager Brinson, A., Robinson, A., & Rogers, M. (2006). A cyber forensics ontology: Creating a new approach to studying cyber forensics.Digital Investigation,3, 37-43. doi: 10.1016/j.diin.2006.06.008 Carlton, G. (2008). An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh.Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2008.1045 Carlton, G., & Worthley, R. (2010). Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners.Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2010.1069 Casey, E. (2012). Cloud computing and digital forensics.Digital Investigation,9(2), 69-70. doi: 10.1016/j.diin.2012.11.001 Casey, E. (2013). Triage in digital forensics.Digital Investigation,10(2), 85-86. doi: 10.1016/j.diin.2013.08.001 Casey, E. (2015). Smart home forensics.Digital Investigation,13, A1-A2. doi: 10.1016/j.diin.2015.05.017 Chandel, R. (2018). Step by Step Tutorial of FTK Imager (Beginners Guide ). Retrieved from http://www.hackingarticles.in/step-by-step-tutorial-of-ftk-imager-beginners-guide/ Chapter 8 - FTK Imager Walkthrough - Incident Response and Computer Forensics, 3rd Edition. (2018). Retrieved from https://ir3e.com/chapter-8-ftk-walkthrough/ Cho, S., Kim, D., Park, J., & Gil, K. (2015). Online Water Monitoring Method as a Water Security Tool: A Feasibility View.Environmental Forensics,16(3), 231-241. doi: 10.1080/15275922.2015.1059390 Page40of47
Dendroecology: A Key Forensic Age-Dating Tool. (2005).Environmental Forensics,6(1), 3-4. doi: 10.1080/15275920590913813 Duc, H. (2018). HOW TO INVESTIGATE FILES WITH FTK IMAGER - eForensics. Retrieved from https://eforensicsmag.com/how-to-investigate-files-with-ftk-imager/ Ebert, J. (2012). Book Review: Mastering Windows Network Forensics and Investigation, 2/E.Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2012.1136 Evidence Acquisition Using Accessdata FTK Imager. (2018). Retrieved from https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk- imager/ Firefox OS Forensics: Guidelines and Challenges. (2016).International Journal Of Science And Research (IJSR),5(6), 290-293. doi: 10.21275/v5i6.nov164047 Forensic Toolkit FTK Imager Free Download - ALL PC World. (2018). Retrieved from http://allpcworld.com/forensic-toolkit-ftk-imager-free-download/ Forensic Toolkit. (2018). Retrieved from https://en.wikipedia.org/wiki/Forensic_Toolkit Forensics, Anti-forensics and Counter Anti-forensics for JPEG Compressed Images. (2016).International Journal Of Computing, Communication And Instrumentation Engineering,3(1). doi: 10.15242/ijccie.e0116039 Frysinger, G. (2002). GC×GC—A New Analytical Tool For Environmental Forensics.Environmental Forensics,3(1), 27-34. doi: 10.1006/enfo.2002.0077 Frysinger, G., Gaines, R., & Reddy, C. (2002). GC × GC--A New Analytical Tool For Environmental Forensics.Environmental Forensics,3(1), 27-34. doi: 10.1080/15275920216245 FTK Imager - ForensicsWiki. (2018). Retrieved from https://www.forensicswiki.org/wiki/FTK_Imager FTK Imager 3.2.0. (2018). Retrieved from http://marketing.accessdata.com/ftkimager3.2.0 Page41of47
Galvao, R. (2006). Computer Forensics with the Sleuth Kit and the Autopsy Forensic Browse.The International Journal Of Forensic Computer Science, 41-44. doi: 10.5769/j200601005 Hacking & Digital Forensics & Autopsy - Stay Anonymous. (2018). Retrieved from https://www.udemy.com/hacking-digital-forensics-autopsy-stay-annoymous/ Haddad, R. (2004). Invited Editorial: What is Environmental Forensics?.Environmental Forensics,5(1), 3-3. doi: 10.1080/15275920490424006 International Environmental Forensics Conference Qingdao, China, May 27–30, 2008. (2007).Environmental Forensics,8(4), 405-405. doi: 10.1080/15275920701741766 Joyce, R., Powers, J., & Adelstein, F. (2008). MEGA: A tool for Mac OS X operating system and application forensics.Digital Investigation,5, S83-S90. doi: 10.1016/j.diin.2008.05.011 Kessler, G. (2008). Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit.Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2008.1051 Larson, S. (2014). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics.Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2014.1165 Machemer, S., & Wang, Z. (2007). Environmental Forensics at Pacifichem 2005.Environmental Forensics,8(1-2), 75-76. doi: 10.1080/15275920601180594 Morrison, R. (2001). Environmental Forensics: an International Forum.Environmental Forensics,2(4), 261. doi: 10.1006/enfo.2001.0067 Morrison, R. (2002). International Society of Environmental Forensics (ISEF).Environmental Forensics,3(2), 89. doi: 10.1006/enfo.2002.0082 Page42of47
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPENDIX A The running sheet of the forensic investigation is provided here. Date – Time of the investigation process Investigation ProcessTime consumed in minutes 15-10-2018 – 3:35 pmAnalyzing files from 182.dd Obtained Result: 47 15-10-2018 – 4:25 pmSearching of Clown image Obtained Result: k13320412.jpg 6 15-10-2018 -4:32 pmSearching of Clown image Obtained Result: k14032380.jpg 2 15-10-2018 -4:35 pmSearching of Clown image Obtained Result: index.jpg 2 15-10-2018 – 4:38 pmSearching of Clown image Obtained Result: k7827739.jpg 2 15-10-2018 – 4:41 pmSearching of video image Obtained Result: Clowns Dancing.mp4 15 15-10-2018 – 4:58 pmSearching of Clown image Obtained Result: kikkii_clown_party_pose.jpg 9 15-10-2018 – 5:03 pmA Searching of Clown image Obtained Result: scaryclown.jpg 3 15-10-2018 – 5:12 pmSearching of web downloads7 Page43of47
Obtained Result: The downloads of clowns are found 15-10-2018 – 5:20 pmSearching of web history Obtained Result: Historyofaccessingclown contents are proved 5 15-10-2018 – 5:26 pmSearchingofOSuser accounts Obtained Result: Thesuspecteduseraccount name of ‘computer’ is found. 10 15-10-2018 – 5:31 pmSearching of web bookmark Obtained Result: Clown content bookmark is found 4 15-10-2018 – 5:36 pmSearching of web search Obtained Result: Theclownrelatedsearches are happened is proved 16 15-10-2018 -5:54 pmSearching of mails Obtained Result: The Clark is the Criminal is confirmed 15 15-10-2018 -6:12 pmSearchingofinstalled programs Obtained Result: Offence related programs are noticed and they are installed on the system is verified. 12 Page44of47
APPENDIX B The timeline of the events is provided here. Picture/ video/ document /bookmark ExtensionCreatedModifiedCreation and its Reason Video - Clown dancing .mp4 16th June,2018 at 8:15:41 16th June,2018 at 8:15:47 It is downloaded from s34.onlinevideoconverter.com for watching and spreading the video. Picture - Scaryclown .jpg 18th June,2018 at 5:50:04 18th June,2018 at 5:50:06 It is downloaded from www.scarymommy.comfor owning and spreading the picture. Web bookmark 18th June,2018 at 08:20:36 The bookmark is made on the website of theconversation.com for accessing clown content Picture - Kikki_clown_ party_pose .jpg 19th June,2018 at 5:20:06 19th June,2018 at 5:20:06 It is downloaded from www.trickortreatmagic.com.au for owning and spreading the picture. Picture – index .jpg 2nd July,2018 at 6:42:29 2nd July,2018 at 6:42:29 It is downloaded from the internet for owning and spreading the picture. Picture – k13320412 .jpg 2nd July,2018 at 6:45:08 2nd July,2018 at 6:45:08 It is downloaded from fscomps.fotosearch.com for owning and spreading the picture. Picture – k14032380 .jpg 2nd July,2018 at 6:51:52 2nd July,2018 at 6:51:52 It is downloaded from fscomps.fotosearch.com for owning and spreading the picture. Page45of47
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Picture – k7827739 .jpg 2nd July,2018 at 6:52:14 2nd July,2018 at 6:52:14 It is downloaded from fscomps.fotosearch.com for owning and spreading the picture. Clown Mail2nd July,2018 at 07:50:09 2nd July,2018 at 05:41:54 It is sent from Clark to Jerry Simpson. Page46of47