Nobody downloaded yet

Computer Forensic Examiner Field Report - Case Study Example

Comments (0) Cite this document
Digital Evidence Field Report James Moravec Institution Digital Evidence Field Report Introduction Digital evidence report plays a significant role of providing accurate information on how digital forensic analysts conduct their fieldwork. The value of digital evidence report underpins the role of digital forensic expert in solving crime using digital evidence…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Computer Forensic Examiner Field Report
Read TextPreview

Extract of sample "Computer Forensic Examiner Field Report"

Download file to see previous pages During the process of gathering digital evidence, elaborate documentation is necessary to help identity evidence, and demonstrate policies used in the exercise. In addition, appropriate documentation is essential in the location of evidence found in a crime scene. In relation to documentation, a clear chain of custody helps determine analysts involved in handling of evidence. It also identifies the owners of evidence and persons who receive it, as well as store them (Turkey, 2008). This concept is vital in tracing the movement of evidence from one analyst to another. During a digital evidence fieldwork, an evidence custodian will keep accurate documentation of the evidence and ensure that evidence has tags and stored in secure bags ready for transport. The most vital reason for maintaining chain of custody is ensuring that digital evidence is admissible as evidence (Soloman, 2011, p.55). Concisely, the above tasks transpired during a recent digital evidence fieldwork where I was called to identify, secure, and preserve digital evidence from a suspected corporate user. Observation Last week on 25 November 2012, our department received a request to from a local media firm for a digital evidence analysis. ...
The room had several other pieces of computer hardware such as servers, switches, and network cables. There were some shelves on the right with some five computers. The administrator, who was showing us the computers, pointed at the computers and told us that the suspect used one of the computers. Seeing that we had room to use for the investigation, I agreed with Dorothy what we could carry identify the evidence on it. First, we asked the network administrator to help us identify the suspect computer. To do this, we asked network administrator to produce a list of IP address and associated MAC addresses during the period when the crime is believed to have occurred. Being that the he had prior records, we had the Mac address of the suspect computer, 00:80:R2:45:F7:67. We booted all the computers and indented the computer with the above MAC address. Dorothy documented the model of the computer and the serial number she found underneath the computer. Evidence collection Being that the owner of the computers—the media firm—we were ready to begin collecting evidence of the alleged CP, which was a crime and against the policies of the firm. First, we ensured that no one was around the computer alone except for Dorothy and I as we did not want any disturbance. We opened the computer and using our tools, we run some applications to check if there was any evidence of CP in the suspect computer. The first tool that we used was Retriever, which searched the entire hard drive and located child pornography material in the disk drive. The computer had several files and links of child pornography in the internet history and browser cookies. We did document what the retriever software displayed as the search result. Moreover, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Computer Forensic Examiner Field Report Case Study”, n.d.)
Retrieved from
(Computer Forensic Examiner Field Report Case Study)
“Computer Forensic Examiner Field Report Case Study”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Forensic Examiner Field Report

Field report

...for experts to offer commentaries on how the culture and society is influenced by digital media (Adobe Museum of Digital Media par. 3). The museum has established a favorable relationship with the software company, Adobe Inc. with the possibility of encouraging the use of software products made by the latter. There are several things to expect from AMDM since it hosts exhibits drawn from different fields, ranging from photography to product improvement and mass media. What is fascinating about the show is that the exhibits are always presented by guest presenters who are recognized for their exceptional leadership in the field of technology, art or business according to Adobe Museum of Digital Media...
3 Pages(750 words)Movie Review

Field Experience Observation Report

...? “Field Experience Observation ReportField experience observation report It has becomeincreasingly more important to make topics and students in alignment with differences and diversity, be it with regards to gender, culture, race, etc. This encompasses the variety of students in the class, and everyone can relate to it; also, it provides a holistic approach to an aspect even if there isn’t diversity in the classroom because there is diversity in the world and the world is becoming an increasingly globalized place. I believe that my teacher is dealing with student differences due to the readings and aspects that we have learned and the way class learning takes place....
3 Pages(750 words)Essay

Computer Forensic Tools

.... The cost hiring a professional computer forensic expert is extremely high. A profound trial lawyer and Technologist computer forensic examiner based in UK charges between 500 to 1000 dollars per hour to examine a computer system that contains digital evidence. The expert charges the client according to the magnitude of the crime committed and the size of the company. To perform the operation for a large business organization, the expert can charge over a thousand dollars. In addition, the expert also charges some extra $500 for his security. Research has shown that the expert has experience in the...
3 Pages(750 words)Term Paper

Field Report

...? Field Experience Narrative Report Late adulthood is a frequently seen aspect in several nations. Most of the old aged people are willing to lead their life independently. In such situation, there lays a need for delivering better healthcare to those people by the nursing professionals in order to develop their health and assist them leading their life happily. With this concern, this paper intends to provide a detailed description about the field experience relating to explore and focus on the humanistic aspect of nursing. Field Experience Narrative Report Late adulthood is a life stage which is estimated to occur after 65 years (Royal Challenge of...
4 Pages(1000 words)Essay

Computer crime and forensic

...? Representations of Islam in the media Grade (29th, Oct. Computer crime and forensic Question My opinion on this matter is that the leakage has served to expose some law violations by the country’s security agencies, which then calls for more attention especially regarding the Patriot Act and its application by the security agencies. It is out of the leakage by Edward Snowden, that the issue of the law flouting activities of the security agencies has been disclosed, which now places the public in a better position to scrutinize the impacts of such a law on their privacy (Greenberg, 2013). The good that he has done is to open up the activities of NSA, as well as its partner in Britain, who violates the...
3 Pages(750 words)Term Paper

Computer forensic

... 4. The Forensic Process _______________________________ 8-9 5. Report ___________________________________________ 9-10 i) Forensic Policy ___________________________________________ 10-14 6. Forensic Techniques that help the organization improve their response To information security incidents _____________________ 14-15 i) Scientific Principles utilized the Computer Forensic ______________ 15-16 7. Threats to the Organization _________________________ 16-17 i) Viruses and other malicious code ________________________ 17-18 8. Firewall __________________________________________ 18-20 9. Various forms of examination conducted ______________ 20-21 10. Handling the problems... . 3. Scope...
18 Pages(4500 words)Essay

Computer Forensic

...). The extent of the search is tailored to the extent of the probable cause. If the police wish to seize a computer and analyze it at a later time, the probable cause statement should demonstrate the impracticality or danger of examining the computer on the premises hence the need to confiscate it and analyze it off-site. REFERENCES [3] Computer Forensics [4] [5] [6] issues in computer forensics [1] Computer...
36 Pages(9000 words)Essay

Computer Forensic Software

.... The enterprise-class and the database-driven architecture has the capabilities to handle huge amounts of data sets while exhibiting stability and high processing speeds which are not present in other Forensics Software. FTK has managed to maintain its superiority in industry standard forensic technologies for at least two decades [1]. The Big Picture The basic procedures for undertaking a computer forensic examination while using FTK and FTK imager include acquisition and reservation of the evidence, analysis of the evidence, presentation of the evidence through a case report for documenting the evidence and investigation of the...
14 Pages(3500 words)Essay

The Structure of Computer Forensic Report using FTK imager

...s The Structure of Computer Forensic Report using FTK Imager Executive Summary This sole reason for carrying out this particular investigation is to determine the origin of a controversial email information that contained a spreadsheet entailing confidential company information and how it eventually ended up on a competitors website. The spreadsheet file attachment was posted on the technical support forum of the competitors website. This has subsequently led to the need to carry out an investigation to audit the origin of the file and the reason as to why the file was submitted. The company involved is the, which has a total asset worth of $10 million and 10 employees hired...
5 Pages(1250 words)Case Study

Field Report

...Field report on the Melbourne Story Word count (1724) Field Report on the Melbourne Story Research Topic: How does the presentation The Melbourne Story in the Museum of Victoria illustrates Australian history? Site visited: Museum of Victoria Introduction and brief History The Museum of Victoria is the largest public museum in Australia and is home to many tourists and students who are envious to learn about the Australian history. It was started in 1854 and has continued to expand with time (Melbourne Museum, 2015, retrieved from It amalgamated with the technological museum of Victoria in 1870 and thus changed its...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Computer Forensic Examiner Field Report for FREE!

Contact Us