logo

Report on Case in Cyber Forensics

33 Pages5596 Words52 Views
   

Added on  2020-04-01

Report on Case in Cyber Forensics

   Added on 2020-04-01

ShareRelated Documents
CYBER FORENSICS REPORT
Report on Case in Cyber Forensics_1
2
Abstract
The following case file documents the investigation that was done on the
machine that was owned by Aaron Greene who bought it from the second hand
market. The machine originally belonged to Jo, a M57 employee, and the
machine was a workstation in the M57 organization. Aaron Greene, the current
owner of the machine, found suspicious elements in the machine and
surrendered the machine to the police for investigation. On investigation, certain
files were found in the machine that could suggest that Jo was involved in
dealing and production of amphetamine and methamphetamine. Two hard drive
images of the machine were made of two different dates and investigators
analysed, examined and used with various software to look into the digital copies
of the hard drive without tampering the original machine. The investigation
shows the recording of an excel sheet which suggests that the suspect may have
been involved in the negotiation of a transaction regarding the sale of the drugs.
The suspect may have also been involved in the production of
methamphetamine and amphetamine. Further investigation has lighted on a
certain amount of tampering that has occurred on the digital copy of the hard
drive made on the second day that could indicate ‘foul play’ on the part of the
police, negligence done either intentionally or accidental, and the involvement of
suspect in an attempt to destroy digital evidence. Information has been
extracted for the second hard drive that could suggest that the suspect was
trying to destroy physical evidence as well by the use of certain chemicals. The
investigation procedure is followed in the way to either prove or disprove the
charges set against the suspects involved in this case.
Report on Case in Cyber Forensics_2
3
Table of Contents
1. Abstract 2
2. Body of Report
4
a. Character Profile 4
i. Main Character Profile
4
1. Profile – Jo 4
ii. Minor Character Profile
4
1. Company Profile – M57
4
2. Public Department Profile – Police Department
4
3. Public Department Profile – Police Department
4
b. Case Background 5
c. The Investigation Procedure
6
d. Investigation Findings – Inculpatory Evidence
9
i. Suspicion in dealing with Amphetamine and
Methamphetamine
ii. Production of Amphetamine and Methamphetamine
12
iii. Suspicion in Selling of Amphetamine and Methamphetamine
14
iv. Tampering of Physical Evidence
17
e. Time Line of Events
27
f. Case Summary
28
3. Conclusion 29
4. References 30
5. Appendices 31
Report on Case in Cyber Forensics_3
4
1. Body of Report
a. Character Profile
i. Main Character Profile
1. Profile – Jo
Name: Jo
E-mail Address: N/A
Role: Original owner of the suspect’s computer.
Suspicions: Production of illegal substances, purchase and sales of
illegal substances, tampering of evidence.
Presumed IP
Address:
10.2.84.4.[1]
Organization M57
Notes: [1] Obtained from browser cookies that was stored while
the computer was in Jo’s possession.
ii. Minor Character Profile
2. Company Profile – M57
Name: M57
E-mail Address: N/A
Role: Employer of the suspect/seized computer was the
Report on Case in Cyber Forensics_4
5
workstation of this organization
Suspicions: Involvement in purchase and sales of illegal substances,
drug production, drug trade, harbouring a drug-seller and
drug-producer
Job Patent search Company
Notes: The seized computer belonged to the M57 organization
and the use of such computer for any purpose was done in
the organization itself.
3. Public Department Profile – Police Department
Name: Police Department
E-mail Address: N/A
Role: Tampering of evidence, probably out of negligence
Suspicions: Collusion with the suspect, wilful negligence in job,
tampering of evidence due to intentional negligence
Job Law-enforcement
Notes: The two hard drive images extracted from the seized
computer has been compared to be different with the
second image being tampered with. Such tampering has
been noted to be done due to the negligence of the police,
but that suggests a ‘foul-play’ involved on the police’s part
and needs to be investigated further to arrive at a proper
conclusion.
b. Case Background
The machine that has been possessed and investigated is lately owned by Aaron
Greene who had bought the device in question from a second-hand market. After
the transference of ownership of the device, the current owner of the machine,
Aaron Greene, discovers that the previous data of the computer has not been
erased. On analysis of the said data, Aaron Greene finds out suspicious
documents and videos on the drive that could be related to the buying, creating,
possessing and selling of methamphetamines, an illegal drug that is slowly
becoming a bane to the society. Aaron reports his findings to the police and the
machine in question is handed over for further investigation into the matter.
Report on Case in Cyber Forensics_5
6
From the analysis of the machine, it has been found out that the computer can
be traced back to be used as a former workstation by Jo, a M57 employee, as a
work machine. The machine was thus originally belonged to the m57.biz, a new
patent search company that researches patent information of its clients. After
such a major discovery, the CEO of M57, Pat McGoo was contacted by the police
who granted the permission for the imaging of all the computers that was being
used or has been used before by the M57 organization to support additional
investigation.
However, there are evidences that suggest that the evidence extraction has not
been flawless. There are certain evidences such as the differences between the
images of the hard drive that points out that the police assigned to collect the
evidence have somehow tampered with the evidence. However, the forensics
experts have tried to document such differences in the evidence, retraced back
some of the tampered evidence to bring about a more genuine case that might
follow the real events that might have been transpired through the machine in
question (Berger & Heath , 2007).
Such a foul-play has also been taken into account as a negligible act on the part
of the police, but it is yet to be seen whether the negligence committed by the
police was unintentional or not. The investigators had tried to use hex editing
and other software functions to try and find out how the ‘foul-play’ has occurred,
the lost information and whether the tampering of the said information was
intentional or not. Hence, the contamination of the evidence and the comparison
of the two image files of the original machine extracted from the device in
question is also an important part of the case.
The police as in pursuit of the thumb drive of the suspect, Jo, who is an employee
of the organization, M57. After the permission granted by the CEO of the
organization, the police shall be imaging the remaining workstation of the said
organization and in the process, try to find out how the specific organization or
the workstation of that specific organization, or the employee employed in the
organization had come about to become involved in this specific case regarding
the exchange and use of drugs.
c. The Investigation Procedure
After creating a digital copy of the machine, all the investigation procedure has
been conducted on the copy of the ‘live’ data or the original machine, thereby
Report on Case in Cyber Forensics_6
7
preventing any accidental tampering of evidence in the process so as to
preserve the integrity of the evidence as it is.
The investigation on the machine was conducted by the use of various software
which are as follows:
- Access Data® FTK® Imager Version 4.1.1.1
- ProDiscover Version 7.0.0.3
- OSForensics
These software has been used to investigate the materials extracted from the
device in question. The materials found are
Hard drive image 2009-11-19.E01 (of the original sold computer) – E01
Second drive image purporting to be of the same computer – AD1, AD2
Hard drive image 2009-12-01.E01 (of the suspect’s replacement computer
seize from M57) – E01
Second drive image purporting to be of the same computer – AD1, AD2,
AD3
The hard drive images were extracted by using FTK Imager by the use of
Forensic Acquisition feature, thereby creating a physical image of the drive in
question.
The investigation process is mainly comprised sifting through the files of the
computer and making sure to gather inculpatory evidences that could be used as
a base to set up an argument for or against the owner of the computer, Jo, the
employee of M57 organization. The sifting procedure has been done using the
FTK Imager software to mount and read the hard drive images that have been
extracted from the device and the use of ProDiscover to sift through the files of
the suspect computer and make a timeline out of it. The OSForensics software
has been used to create a hash lookup and make the system files in the hard
drive image invisible so that it would be possible for the investigators to
concentration on the specific files that has been presented in the drive image.
The Windows 7 hash set has been used to hide the system files of windows and
provide the normal documents for the work to be done. Fig 1 shows the use of
the hash set to bring out the necessary files downloaded by the user of or related
to methamphetamine of amphetamine. There has been only one encrypted file
process in the drive that could inculpate the suspect as a seller of the drugs that
Report on Case in Cyber Forensics_7
8
has been searched for using the device in question (Duan, Gu & Whinston,
2008).
Additionally, file slack tools and file slack analysis tools from the OSForensics
software has been used to locate files whose extensions have been changed to
conceal the file from the eyes of the investigators. Other tools to reveal
concealed hidden folders and files, encrypted data and protected documents
have been used during the investigation procedure so as to go through a
thorough analysis of the drive image and make sure that none of the evidence is
overlooked during the investigation process.
The use of these software and method have allowed the investigator to go
through the device and form a proper narrative that could be assumed to be
closer to the reality of the past events and so that the investigation could be
performed in a swift and accurate manner with the least amount of
contamination creeping into the drive images that have been extracted from the
device in question. Such methods have also been used to make comparison
between the two separate file images that have been collected by the
investigators and to try and point out the changes that has taken place between
the two imaged due or the ‘tampering’ of the evidence by the ‘foul play’ of the
police. The investigators have also tried by these methods to restore the
conditions of the files that has been tampered with to the best of their ability and
to document the tampering and try to set up a proper investigative narrative to
discuss the nature of the tampering that has taken place.
Report on Case in Cyber Forensics_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Forensic and Information Technology Assignment
|28
|2755
|50