Report Structure
Essential focal point of this project is investigate the advanced propelled crime scene examination images by utilizing sensible tool. Essentially, space of Western Australia does not offer access to electronic substance identified with comedians since it is illegal access, assurance and stream the impelled substance identified with clowns. The comedians’ modernized substance are gotten to by malware. In this manner, this examination is essentials to investigate the impelled substance identified with the clowns.
By and large, the charge was make the law endorsement where by an witness professes to get to the comedians related information inside a work put. Regardless, some humourist’s substance are gotten to without the work put. Shockingly, junior impelled pro got the modernized wrongdoing scene examination photograph of the PC that is comedians substance played out a genuine mooring. Thusly, this circumstance the lesser advanced progressed legitimate sciences examiner wiped the primary hard drive from the PC. Since, the anticipated securing is finished by forensically solid way. Along these lines, the lesser specialist effortlessly picked the legal picture. The suspect, Clark demies the getting to the humourist content furthermore Clark does not affirm that the PC has a place with him.
The Clark says, he doesn’t generally take the PC home or jar it. In this manner, senior investigator needs to audit the legal photograph of the lap which was seized with right warrants. In like manner, moreover Clark express the PC was debased with malware that accomplished distinctive potential substance showing up on the PC. This examination is finished by utilizing the after death examination propelled wrongdoing scene examination instrument. The examination will be done and talked about in detail.
Presentation of content relating to offence
Here, user needs to give the introduction of substance identifying with the offense. The gave appropriate examination imparted that the charge was make the law essential where by an witness announces to get to the clowns related information inside a work put. Shockingly, junior pushed excellent got the modernized offense scene examination photo of the PC that is clowns substance played out a genuine anchoring. Consequently, this situation the Junior analyst wiped the rule hard drive from the PC. Since, the foreseen secures is done by forensically strong way. In this manner, the junior investigator effectively picked the criminological picture. Along these lines, senior examiner needs to explore the quantifiable photograph of the lap which was seized with right warrants. This examination is finished by utilizing the digital forensics tool.
Presentation of Content Relating to Offence
Extraction of 7 Zip
Here, user needs to use the 7 zip to extract the provided case file. To extract the case file by using the below steps.
- First, user needs to download and install the 7 zip software.
- Once installtion is completed successfully, after user needs to open the 7 zip to click the file to open the all provided case file.
- Then, select the all the files and right click the files to click the 7 zip to choose the extract option.
- After, all the files are extracted into one file.
This processes are demostrated as below.
At lasy, user successfully extracted the given case file.
Then, user needs to download and install the autospy software tool because this tool is used to provide the effective investigation for digital forensics investigation. Basically, this tool easily analysis the case file by using the key word search and ingest modules. These two options are very useful to analysis the provided case file. The autopsy installation is completed successylly, open the autopsy to click new case which is illustrated as below.
After, the new case windows is open which contains the following information such as case name, base directory and case type. Here, we are enter the case name as digital forensics, the base directory is used to save the case file. So, browse the directory to save the case file. After choose the case type as single user. Then, click the next. This processes are illustrated as below.
The user is required to fill the necessary information such as case number. After, enter this is it required to press on the button, Finish and this will create a case file as demonstrated in the following figure.After the creation of a case file, on the case add the data source. It contains raw bit data thus it is suggested to select the disk image which is unallocated, as demonstrated in the following figure.
Then, browse and choose forensic images files and press the button, Next, as demonstrated in the following figure (CYBERCRIME AND DIGITAL FORENSICS, 2018).
Later, it is required to configure the given case file in the ingest modules and press on the button, Next.
Finally, for the newly created case file the data sources are added, as demonstrated in the following figure.Likewise, all the given forensics image must be added to the digital forensics case (Duranti & Endicott-Popovsky, 2010).After all the data sources are included in the created case, the user must identify the evidence which is related to the investigation of digital forensic.
Identification
In this section, the forensics image file information will be identified, for proceeding the analysis of digital forensics.
182.7z.002 Case File Identification
Choose appropriate data file for identifying the information of the case file, as demonstrated in the following figure (Flory, 2016).Just a single deleted file is available in this case file, as illustrated in the following figure.For displaying the details of the deleted file, the following details are utilized (Garfinkel, 2011).
Extraction of 7 Zip
This is a case file that comprises of certain keyword search information such as, single regular expression, single literal keyword search and email address. The following figure displays the three files from the email address key search file.The below table represents the details that are utilized for displaying the provided case file’s outcome.
182.7z.003 Case File Identification
Click the appropriate data file for identifying the information of the case file, as demonstrated in the following figure (Gogolin, 2013).Just a single deleted file is available in this case file, as illustrated in the following figure.The below table represents the details of the deleted files from the case file (Hannay, 2011).
This is a case file that comprises of certain keyword search information such as, email address, single regular expression and single literal keyword search. The following figure displays the three files from the email address key search file.The following table displays the result details of the provided case file.
182.7z.004 Case File Identification
Click the appropriate data file for identifying the information of the case file, as demonstrated in the following figure.Just a single deleted file is available in this case file, as shown in the following figure.The below table represents the details related to the provided results of the case file.This is a case file that comprises of certain keyword search information such as, single regular expression, email address and a single literal keyword search. The following figure displays the three files from the email address key search file.
The following table displays the result details of the provided case file.
182.7z.005 Case File Identification
Click the appropriate data file for identifying the information of the case file, as demonstrated in the following figure.Only one deleted file is available in the given case file.The below table represents the deleted files’ detail, from the case file.
182.7z.006 Case File Identification
Click the appropriate data file for identifying the information of the case file, as demonstrated in the following figure.Only one deleted file is available in the given case file.The below table represents the details of the deleted files from the case fileHere is a case file that comprises of certain keyword search information such as, single regular expression, email address and a single literal keyword search. The following figure displays the three files from the email address key search file.
The following table displays the result details of the provided case file.
Identification
182.7z.007 Case File Identification
Click the appropriate data file for identifying the information of the case file, as demonstrated in the following figure.
Only one deleted file is available in the given case file.
The below table represents the details of the deleted files from the case file.Here is a case file that comprises of certain keyword search information such as, single regular expression, email address and a single literal keyword search. The following figure displays the three files from the email address key search file.
The below table displays the results of the given case file.
182.7z.008 Case File Identification
Click the appropriate data file for identifying the information of the case file, as demonstrated in the following figure.Just a single deleted file is available in this case file, as illustrated in the following figure.The below table represents the details of the deleted files from the case file.
Here is a case file that comprises of certain keyword search information such as, single regular expression, email address and a single literal keyword search. The following figure displays the three files from the email address key search file.
The following table represents the result details related to the given case file.
182.7z.009 Case File Identification
Select the appropriate data file for identifying the information of the case file, as demonstrated in the following figure.Only one deleted file is available in the given case file.The below table represents the details of the deleted files from the case file.
The case file doesn’t contain any file on the system.Finally, the digital forensics investigation is utilized for delivering the details of forensics images which are raw bit data. The given case file comprises of only one deleted file and has various email key word search files. A third party is used for illegal access. This investigation didn’t install any software on the system (Steel, 2014).
Case file successfully created. Add data source on created new case. Click the add data source and browse the data source folder. After, select the all the provided data file.Data source is successfully added.After identified, extracted and analysed on the provided case file. By Choose appropriate data file for identifying the information of the case file.
• Just a single deleted file is available in this case file Successfully investigator identified, extracted and analysed the given case file.Then, It is needed that the investigator has to indent the given digital content that are used, accessed and deleted the files. Click the appropriate data file for identifying the information of the case file.
• Only one deleted file is available in the given case file. Successfully investigator intent the digital content on the given case file.For determining the number of files presented in the system, the forensics image file is used The user must click on an appropriate data file for identifying the information of the case file, such as quantity.
• The provided case file contains email address key search which has three files.Successfully investigator determine the quantity of files on the provided case file.Finally, determine the installed software on the system.Click the appropriate data file for identifying the information of the case file. View the all the folders and file his investigation didn’t install any software on the system
References
Boddington, R. (2016). Practical Digital Forensics. Packt Publishing.
Casey, E. (2012). Cloud computing and digital forensics. Digital Investigation, 9(2), 69-70. doi:
CLANRYE INTL. (2018). CYBERCRIME AND DIGITAL FORENSICS. [S.l.].
Duranti, L., & Endicott-Popovsky, B. (2010). Digital Records Forensics: A New Science and Academic Program for Forensic Readiness. Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2010.1075
Flory, T. (2016). Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies. Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2016.1374
Garfinkel, S. (2011). Column: File Cabinet Forensics. Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2011.1103
Gogolin, G. (2013). Digital forensics explained. Boca Raton, FL: CRC Press.Hannay, P. (2011). Kindle Forensics: Acquisition & Analysis. Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2011.1093
Larson, S. (2014). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Journal Of Digital Forensics, Security And Law. doi: 10.15394/jdfsl.2014.1165
Marshall, A. (2009). Digital Forensics. Chichester: John Wiley & Sons.Parasram, S. Digital Forensics with Kali Linux.
Pollitt, M., & Shenoi, S. (2010). Advances in digital forensics. New York: Springer/International Federation for Information Processing.
Ray, I., & Shenoi, S. (2011). Advances in digital forensics IV. New York: Springer.Sammons, J. (2015). The basics of digital forensics. Amsterdam: Syngress Media. Steel, C. (2014). Idiographic Digital Profiling: Behavioral Analysis Based On Digital Forensics. Journal Of Digital Forensics, Security And Law.