Nobody downloaded yet

Computer Forensic Examiner Field Report - Case Study Example

Comments (0) Cite this document
Digital Evidence Field Report James Moravec Institution Digital Evidence Field Report Introduction Digital evidence report plays a significant role of providing accurate information on how digital forensic analysts conduct their fieldwork. The value of digital evidence report underpins the role of digital forensic expert in solving crime using digital evidence…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Computer Forensic Examiner Field Report
Read TextPreview

Extract of sample
"Computer Forensic Examiner Field Report"

Download file to see previous pages During the process of gathering digital evidence, elaborate documentation is necessary to help identity evidence, and demonstrate policies used in the exercise. In addition, appropriate documentation is essential in the location of evidence found in a crime scene. In relation to documentation, a clear chain of custody helps determine analysts involved in handling of evidence. It also identifies the owners of evidence and persons who receive it, as well as store them (Turkey, 2008). This concept is vital in tracing the movement of evidence from one analyst to another. During a digital evidence fieldwork, an evidence custodian will keep accurate documentation of the evidence and ensure that evidence has tags and stored in secure bags ready for transport. The most vital reason for maintaining chain of custody is ensuring that digital evidence is admissible as evidence (Soloman, 2011, p.55). Concisely, the above tasks transpired during a recent digital evidence fieldwork where I was called to identify, secure, and preserve digital evidence from a suspected corporate user. Observation Last week on 25 November 2012, our department received a request to from a local media firm for a digital evidence analysis. ...
The room had several other pieces of computer hardware such as servers, switches, and network cables. There were some shelves on the right with some five computers. The administrator, who was showing us the computers, pointed at the computers and told us that the suspect used one of the computers. Seeing that we had room to use for the investigation, I agreed with Dorothy what we could carry identify the evidence on it. First, we asked the network administrator to help us identify the suspect computer. To do this, we asked network administrator to produce a list of IP address and associated MAC addresses during the period when the crime is believed to have occurred. Being that the he had prior records, we had the Mac address of the suspect computer, 00:80:R2:45:F7:67. We booted all the computers and indented the computer with the above MAC address. Dorothy documented the model of the computer and the serial number she found underneath the computer. Evidence collection Being that the owner of the computers—the media firm—we were ready to begin collecting evidence of the alleged CP, which was a crime and against the policies of the firm. First, we ensured that no one was around the computer alone except for Dorothy and I as we did not want any disturbance. We opened the computer and using our tools, we run some applications to check if there was any evidence of CP in the suspect computer. The first tool that we used was Retriever, which searched the entire hard drive and located child pornography material in the disk drive. The computer had several files and links of child pornography in the internet history and browser cookies. We did document what the retriever software displayed as the search result. Moreover, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Computer Forensic Examiner Field Report Case Study”, n.d.)
Retrieved from https://studentshare.org/information-technology/1463486-computer-forensic-examiner-field-report
(Computer Forensic Examiner Field Report Case Study)
“Computer Forensic Examiner Field Report Case Study”, n.d. https://studentshare.org/information-technology/1463486-computer-forensic-examiner-field-report.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Forensic Accountants as Fraud Buggers
This paper gives a description of the legal responsibilities of forensic accountants within business organizations or companies. More importantly, the paper illustrates forensic accounting by the use of two forensic accounting cases in which forensic accountants were involved in demonstrating accounting problems within companies.
6 Pages(1500 words)Case Study
Computer Forensic
The Fourth Amendment of the US Constitution ( and each state’s constitution) protects everyone’s right to be secure in their person, residence and property from search and seizure. Thus like any
36 Pages(9000 words)Essay
Forensic case portfolio
The field of digital forensic is expanding and experts have achieved significant milestones in handling digital crime. Because some criminals use computers to commit crimes that contravene various laws, the role of digital computer analyst continues to grow.
11 Pages(2750 words)Case Study
Computer forensic
As computer evolved out of academic to business and government, there was more data and resource at risk. Hackers incursions became an issue handled through legal channels.
18 Pages(4500 words)Essay
Forensic Evidence
According to Mr. Anderson, "it was supposed to be a surprise visit for Caroline's birthday." But it was them who were surprised with the news from their daughter's flatmates that "Caroline has not been around for 3 days." Mrs. Anderson is extremely worried because "it was also 3 days ago since Caroline paid a call."
6 Pages(1500 words)Case Study
Essential of forensic investigation
Some of them are fingerprints, evidence and trace examination, genetic fingerprints, ballistics and tool markings, blood evidence, forensic chemistry, autopsies, document examination, arson investigation, etc. A
20 Pages(5000 words)Case Study
Deloitte Forensic center article
I would suggest that more like two or three out of every five people actually attempt to defraud insurance companies for a variety of reasons, such as pressing debt or just general laziness. In my opinion,
1 Pages(250 words)Case Study
Forensic Science Case Study
Gregsten’s girlfriend, was raped and later shot five times, but by fate she did not die but rather got paralyzed. After the decision from the court that Hanratty must face death penalty for the crime he was convicted of, but a day prior to the execution, he tells his
24 Pages(6000 words)Case Study
The Structure of Computer Forensic Report using FTK imager
This has subsequently led to the need to carry out an investigation to audit the origin of the file and the reason as to why the file was submitted. The company involved is the M57.biz, which has a
5 Pages(1250 words)Case Study
Digital forensic analyst
Digital computer forensic has revolutionized the process of collecting, analyzing and presenting evidence from computers before any court of law. While computer forensic is a new field, much has been realized through the use of various techniques that have made it possible for digital analyst to collect and analyze data that are admissible in court (Casey, 2010).
5 Pages(1250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Case Study on topic Computer Forensic Examiner Field Report for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us