preview

Computer Forensics: Comprehensive Investigative Manual

Better Essays

Computer Forensics Comprehensive Investigative Manual CJ2670 Week 6 Capstone Project Part 2 Linda Isaacs January 11, 2015 Introduction This manual is to assist forensic technicians who may be responsible for preserving electronic crime scene and recognizing, collecting, preserving, and storing digital evidence. When dealing with digital evidence, these principles apply: The process of collecting, securing, and transporting digital evidence should not change the evidence in anyway. Only trained forensic technicians specifically for digital evidence should conduct the analysis. Everything done during the search, seizure, transportation and the storage of the digital evidence should be documented, preserved and ready for review. . …show more content…

Forensically wiping the hard drive simply means that all areas of the disk being used are written with on a single character and overwriting every file that had been stored on the drive previously. The drive needs to be forensically wiped before images are written to it or the images can be tainted by data that is left over on the drive. Tainting of the drive will affect the hash value and call into question the validity of the data. A hash is compared to a fingerprint with no two hashes being alike except for the identical files. Hashing puts a digital signature for the data which ensures the integrity of the file due to any type of modification of data can be detected. To ensure accuracy programs rely on mathematical cyclic redundancy check (CRC). By using the CRC validation processes compare the original source of data with the acquired data collected. If the data that had been collected has not been altered in any way then the hash values will be exactly the same. If there is even a slight difference the MD5 will be different when it is hashed again. Anyone can be custodian of the duplicate drive because an undetected alteration would be impossible. The MD5 is one-way which means the procedure cannot be reversed to reveal anything about the data collected except that is …show more content…

An anonymizer hides private information on the user’s behalf. Investigators track illegal activities online but run into trouble when people use anonymizer technology simply due to the threat of infringing on people’s rights. Investigators have to rely more on human error to assist them to connect the suspect to the anonymizing technology. However, Tor, a software package is the most well known anonymizing technology available. Also known as the “The Onion Router” conceals the source of online communications digging through layers of multiple nodes and encryption

Get Access