Saturday, January 25, 2020

Recovery of Digital Evidence

Recovery of Digital Evidence Introduction The University suspects that a case of wrongdoing has been undertaken by a member of staff within Edge Hill University and the computer forensic team, of which you are part of, has been asked to investigate.   You and your team have been asked to launch an investigation into alleged misuse of the Universitys IT system. The office used a member of staff has been isolated, sealed and secured. The staff member has been interviewed by IT services as well as the Dead of faculty and HR and has subsequently denied all wrongdoing. Items from the staff office have been recovered by your team. The evidence recovery has been conducted in a rigorous secure manner in lines with a strict methodology. The Principles of Digital Evidence Evidence Recovery Process From the start of the process there must be a set way to conduct the investigation, the crime scene is a very delicate place in terms of collection of critical vital evidence, which if left unsecure could be easily be altered or corrupted, therefore its important to follow several key stages, the first being; The Plan of the Investigation Where are, we going to find the suspected evidence, i.e. on Computer system, Smart phone, USB, floppy disc, Hard Drive. Should social media i.e., Twitter, Facebook, Chat Forums, be checked for relevant evidence they may hold. Contact of user ISP for trace history Mobile network contact, may have on online account with online storage. How to conduct the Investigation My Flow Plan Right to Search and Seizure In order to conduct an investigation there are Legal and ethical aspects that are very important and must always be adhered to key points that would always be considered when its decided that evidence will need to be received; Just because there are several computers in the house doesnt necessary mean that they should all be seized for forensic inspection, the person attending the crime scene must have Reasonable grounds to remove possessions and there must be justified reasons for doing this. Due to the sensitive nature of the investigation it would always be a necessary moral characteristic that the investigator would be honest and truthful. Consideration as to whether what items are likely to hold key information, i.e. there would no point in seizing a microwave when we are looking at a computer related crime. Consider the offence, narrow down the time period of suspected crime. Items found that are connected to internet are likely to contain key information and should be seized. Documents/booklets, notepads to be seized as they may hold online storage accounts and passwords where information is held. Approach Strategy This all would be done using a Flow plan for the team to follow as discussed in Assignment 1, Capture of relevant information One of the most important steps within the whole process, if mistake is made here then the whole investigation is under threat. The room was secured and isolated to risk the impact of any tampering with evidence. This could basically fail in to a very similar category, this may involve the collection of volatile date. Volatile data is the data that we have at the scheme of the crime that may be lost if the investigator doesnt follow the correct procedure, i.e. recording what state the computer is on at that time. The Volatile data would be stored for example on a PC in the Ram (Random Access Memory) and would contain key information such as website data, chat history etc. that may be key to overall success of the investigation. Bagging in secure bags that are tamper proof insuring that they are labelled acutely with a reference number for later inspection. Suspected member of staff interviewed denied any wrong doing. Analyse of Evidence Evidence has been recovered from the staff office by a colleague within the forensic team, we have found the following; A USB pen drive seized bagged up in secure zipper bag Feedback to be given to give information on where to investigation in going. Each step to be recorded Time scales available Resources available to investigator Tools that are available for the forensic analysis. Data recovered from the USB drive, seems to just be Standard information but further analysis is needed to establish truth. Evidence Seized Note pad with 3 passwords on; Cabbage Apple Pear USB device seized from the office. From what we can see on the USB is 3 PDFs 3 Images A word document Titled Payments for paper4you Files present on USB Un touched On the next step of my investigation I will open each file without any interference from any Encryption programs. File Payments for papers4you.docx File 30037888.pdf File AUP.pfd , File conduct.pdf Chocolate 1.jpg.png Even more chocolate.jpg.png More Chocolate.jpg.png Investigation of the Evidence For the pupose of the investigation I will now check to see if the items sesiued are extactly as they seem. I do think this step is necessary aspart of the on going investigatiion. In order to check individual files, I will use OpenSteg application, the reason to do this is it will check each induvual file in order to establish any hidden files located on the the USB. To do this I will use a programe called OpenSteg which will highlight any hidden information OpenStego Menu,- As you can see we can Hide or Extract Data from a any file, in this case we will be Extracting the Data from the chosen file. Menu of the file which I wish to look at though OpenStego Chocolate 1 On checking the file, it is clear the it needs a password to open it, I will try the 3-password written down on the note pad recovered from the scene, which are: Apple Cabbage Pear It would appear that there is a file within this picture titled;Master_Sheet.xlsx Upon opening the Excel File it appers that it requires a password of which I have 3 ; Apple Pear Cabbage Apple and Pear are unsuccessful, but Cabbage has grated me access to the Excel file It appears to show Financial transactions from Papers 4 you dated from 2008 to 2016 2008 2009 2010 2011 2012 2013 2014 2015 2016 The same was done with the file Even more chocolate.jpg.png Upon doing this it is clear there is a file hidden within the picture titled Invoice Jan-16.docx As per below; Picture 3 to be checked using OpenStego file name More Chocolate Using password Pear Information from file Jan-15 Bring the evidence together as one we could use Encase this would give us a clear understanding of all the evidence together in one file format I have demonstrated in a walk through via screenshots Landing Page Encase New case Location and name File is now given name Assignment 2 and location. Adding Evidence to the case Locate relevant file to add the information needed for the investigation. Section of key files to use as evidence. Summary of the Evidence From conducting this investigation certain key points must be established when investigating the case Facts or fiction and can prove this with hard evidence. Prove that it did happen in the first place. Are we looking at the right person that is accused? Have any mistakes been made., things been missed or thigs been altered. Forming the whole investigation, we can see from the Time Line, what information and by what process was followed It is with my Recommendation that the Case be referred to CPS for Criminal Proceedings. Due to the many breachs with in the law, (Data Protection, Computer misuse act, It Computer Policy) and the and the vast amounts of money received, it is unlikely that internal University formal proceedings would bring accountability for the thief. In Conclusion, it would also be recommended that upon Criminal Proceedings being initiated, that an order for the Proceeds of Crime Act be sort to recover the ill-gotten gains.

Friday, January 17, 2020

Religion Terms Chapter 3 (Social Justice)

1. Praxis: Living according to one’s belief, not just in private, but also in a way that affects the world. a. Through this critical appropriation critical praxis becomes a possibility.2. Circle of faith in action: The approach to doing justice that we will examine, which borrows the aspects of the circle of praxis and A Call to Action. b. People all around are called to follow the circle of faith in action to help make the world a better place.3. Awareness: Seeing, hearing, and knowing the world in a spirit of friendship, as God does. c. We are called to spread awareness of the problems people are facing in the world, so we can help them.4. Worldview: The beliefs that guide the way someone relates to the world. d. People around the world have different worldviews on how things may affect them, good or bad.5. Culture: All of the shared values, beliefs, and ways of relating and living together that characterizes a particular group of people. e. Understanding another’s cu lture is one way to bring people closer.6. Respect: To look beyond the outer appearances and first impressions to see the goodness that is the foundation of all God’s creation f. If we want to be respected, we must first respects ourselves.7. Analysis: The process of understanding how people’s lives are affected by the relationships that shape the society in which they live. g. Before we try to approach the problem, we must first go through the process of analysis.8. Interdependent: Depending on one another for our existence. h. We live in an interdependent world where everyone need one another.9. Relationship map: Shows the connection between people that shape our society. i. Everyone’s relationship can be seen in the link of the relationship map. 10. Social structure: The patterns that shape any society. j. Many people say that the social structure of out society are somewhat corrupted.11. Structure of sin: The individuals’ decisions that contribute to the social structure that block justice. k. Our bad decisions are the structures of sin.12. Power: God-given ability everyone has to affect their own lives; lives of others, and the world around them in either positive or negative ways. l. Everyone thirsts for power over others, but little do they know that sometimes is brings pain to them.13. Power-over: The belief that human beings are the source of their own power recalls the Original Sin of the first humans, who believe that they could become their own God. (If power is given, it can also be taken) m. Many corporations long for power-over, because they are always fighting to become the top company in the world.14. Power-with: Everyone has God-given power, because we live in an interdependent world, that power is mean t to be shared in relationships with others. n. God wants his creations to have power-with instead of longing to have all the power to their selves because power-with can help bring the relationship between everyone stronger.15. Boycott: Withdrawal from commercial or social relations with (a country, organization, or person) as a punishment or protest. o. Throughout history, there have been many boycotts regarding because people have been treated unfairly.16. Strike: Refusal to work as a form of organized protest, typically in an attempt to obtain a particular concession or concessions from their employer. p. Many strikes have taken place because employees are not happy with the way they are treated by their employers,17. Action: To change the situation in a way that allows all the people who are involved to experience the good life that the Creator planned for them. q. People should take the action of helping to increase peace and health in the world.18. Direct action: Action that occurs on the level of individual relationships and is aimed at meeting an immediate need. r. When we do direct action, we can immediately help those in need.19. Social action: Action that occurs on a level of social structure. s. When social action is taking place, we can spread the awareness of the problem to people who pay no attention to such horrors in the world.20. Basic ecclesial communities: Small groups of Christians who gather to celebrate the liturgy, hear the Scripture, discuss problems they face in society, and find solutions through inspiration of the Gospel. t. Basic ecclesial communities gather together to help those in need through ideas from the Gospel.21. Mohandas Karamchand Gandhi: Took seriously Jesus’ instructions to love the enemy; developed own ideas about how to act on Jesus’ teachings. u. M.K. Gandhi was a very influential man from India.22. Non-violent non-cooperation: Gandhi’s approach of protesting, striking, and boycotting. v. Gandh i’s non-violent non-cooperation was a way of protesting without aggression of the protestors that may start violence.23. Civil disobedience: intentionally breaking laws that are unjust. w. Civil disobedience can be seen as breaking a law but not actually breaking a law because it was already broken in the first place.

Thursday, January 9, 2020

Gender And Sexuality The Girl With The Dragon Tattoo

Gender and sexuality, words that can put many different pictures in our head. One of the most common pictures we all develop is probably the sexual activity done by two opposite genders. These words do not always mean how they sound. Gender plays a big role in today’s society where men are thought to be more powerful than women physically, mentally, and emotionally. Sexuality in other words, can be described differently by many different people, where many consider it as big part of every adult’s life and it’s a necessity. The gender and the sexuality play a big role in many fiction, nonfiction and crime novels. Gender and Sexuality are big part of the Swedish crime novels since most of their writing has to do about a conflict between two opposite genders. The girl with the dragon tattoo, one of the most famous Swedish crime novel, written by Stieg Larsson addresses these issues. In this particular book, men and women tend to have the equal amount of power. Salla nder, in other words, â€Å"the girl with the dragon tattoo† has almost the same amount of power as the Mikel Blomkvist, which is the main character of the novel and also a male gender. They are both signed for the same task, which is obvious that they are both have the same amount of power in order to complete the task. Some of the resources available for Mikel Blomkvist is not available for Sallander, but she still finds a way to make it up to him. However, because a male gender is dominant and more powerful thanShow MoreRelatedA Review of The Girl with the Dragon Tattoo1165 Words   |  5 Pagesï » ¿ There have been few works of popular literature written in the new century which have so accurately captured the conflicted state of feminist identity in todays modern corporate culture that Stieg Larssons 2005 novel The Girl With the Dragon Tattoo. Written in a searing tone which is representative of the repressed rage exuded by Lisbeth Salander, the enigmatic heroine who suffers atrocious crimes at the hand of powerful men and wields a sadistic sense of vigilante-style vengeance against thoseRead MoreFemale Protagonists of Detective Narratives938 Words   |  4 Pagesa detective narrative. I will compare and contrast Clarice Starling in The Silence of the Lambs and Lisbeth Salander from The Girl With the Dragon Tattoo to explore two women that are progressive in breaking through traditional gender roles and are successful at portraying a female that goes against the grain. These women portray unique and progressive ideas about sexuality. Clarice and Lisbeth are two empowered femal es that are successful as detectives. Usually, a female in the center of detectiveRead MoreSummary Of Gilbert And Gubar And Tatar. Queen As A Trickster1041 Words   |  5 Pages Joosen’s thesis revolves around the didactic potential fairy tales hold, arguing the feminist side in criticizing the gender bias and influence that fairy tales have on young children. She goes on to introduce the idea that retelling fairy tales, with a feminist twist, provides a new perspective on the traditional ones, using Sleeping Ugly as an example. Joosen then compares Lieberman’s critiques to the tale – traditional versus transformed. Following, she analyzes the purpose of retellings and