For this task, I will upload a text file with scrambled bits on the Interact site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.
In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario:
You are investigating a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS). EMTS has just finished an expensive marketing and customer service analysis with Superior Bicycles, LLC. Based on this analysis, EMTS plans to release advertising for its latest tour service with a joint product marketing campaign with Superior Bicycles. Unfortunately, EMTS suspects that a contract travel consultant, Bob Aspen, might have given sensitive marketing data to another bicycle competitor. EMTS is under a nondisclosure agreement with Superior Bicycles and must protect this advertising campaign material.
An EMTS manager found a USB drive on the desk Bob Aspen was assigned to. Your task is to determine whether the drive contains proprietary EMTS or Superior Bicycles data. The EMTS manager also gives you some interesting information he gathered from the Web server administrator. EMTS filters all Web-based e-mail traffic travelling through its network and detects suspicious attachments. When a Web-based e-mail with attachments is received, the Web filter is triggered. The EMTS manager gives you two screen captures, shown in Figures 8-5 and 8-6 (Textbook page 327), of partial e-mails intercepted by the Web filter that lead him to believe Bob Aspen might have engaged in questionable activities. (Nelson, Phillips, & Steuart, 2015, p. 326-327)
This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:
The following should be included as minimum requirements in the report structure:
Follow the referencing guidelines for APA 6 as specified in .
Submit the assignment in ONE word or pdf file on TURNITIN. Please do not submit *.zip or *.rar or multiple files.
Task 1: Recovering Scrambled Bits
In computer forensic digital information is identified and analyzed and used as a digital evidence in criminal, civil and administrative cases .Using different rules documents are maintained in a computer. Computer forensics need search warrants when preparing to search for a digital evidence. Reporting, analysis and analysis are the three stages in digital forensics.
First we have to gather the evidence from the suspect computer and identify whether the crime happen are not. Using computer forensics tools we can determine whether the suspect committed a crime or violated the company policy. Investigation process involves investigating the suspect computer and then collecting the evidence and preserving the evidence on a different computer. Computer forensic involves recovering deleted files and hidden files. In computer crimes and misuses evidence must be required.
2. Background Scenario:
EMTS is one of the best marketing and Service Company for the customer. In this company finished the marketing and customer service with Superior bicycles. EMTS is the best one compare to other Company. EMTS aimed to advertising the Superior Bicycles Product.in this EMTS Company, the person are gathering the Sensitive data for the marketing purpose to transfer the other Company. The EMTS are find out the suspected person.
Thus the Company signed the agreement for Superior bicycles, so the company details are much secured. The Bob Aspen stored the all information about the Superior Bicycles into the USB derive. The EMTS manager found out the USB drive and check out all the files, but the person deleted the whole files. The EMTS manager used to retrieve the data using the forensics tool. Thus help of the tool to retrieve all the deleted message, through the network. Web based is received the attachments fie through e-mail.
3. Forensic Tools used:
- Win hex
- Pro discover Basic
- Hex Workshop
Win hex is the most powerful tool. Win hex tool is discovered by AG Germany. Win hex tool is the latest version, it will produced the new advance one called hex editor. The tool is mainly used to gathering the information for the purpose of evidence. The tool widely used for analysis the data , editing and recovery the deleted data.
3.2Pro discover basic:
Pro discover basic tool is one of the forensic tool. Mainly used for the change the image file into the bootable file. It’s made by the Technology pathways, it’s one of the user friendly tool.
4. Scope of Engagement:
The method are used to derive the scientific tools, they are collection, validation, analysis, identification and presentation. The digital source are most important for gathering the evidence.
4.1Three types of digital Forensics communities:
- Law Enforcement
- Business and Industry
Digital Forensics Science:
The DFS activities are naturally investigated by the following Process are given below:
4.3Subtypes of DFS: They are three types of the DFS Analysis are given below:
- Media Analysis
- Code Analysis
- Network Analysis.
- 4.3.1Media Analysis:
Computer are mainly used to refer the Media. Media is the major parts of the Digital Forensics Science. Media analysis is the stored medium, it could be focused on the flash Memory and RAM. Media Analysis is also called as the network Analysis.
Task 2: Digital Forensics Report
4.3.2Methodology of Digital Forensics:
4.3.3Context of Computer Forensic
5. Summary of findings:
Our windows system installed the two forensic tool named as Hex Editor and pro discover basic. The hex editor tool mainly used for the shifting the bits. In our system contains the file name.txt. Thus the file contains the Cipher text data Converted into the Scrambled bits. By taking the scramble bits data to analysis and put into the hex editor tool .Thus the tool are easily finding out the plain text. The hex editor tool contains the operation toolbar, thus the toolbar are converted the bits into the plain text. If the original Palin text are generated could be change the bits type. This tool contains the 8,16,32,64 bits types, Change the bits one by one dependent on the original plain text. Another tool used for our windows system .Thus tool are mainly used for the converting the image file only. Thus any viruses occur any images, it could be easily find out the pro discover basic tool. Thus the tool are Commercial one for our windows System.
6. Analyzing digital Evidence
In digital evidence analysis you need to recover data. Suspect deleted the file or damage the file or overwritten files on a disk. Now the files are deleted the existing space become free. Forensic investigator need to recover the data .Identify the recourses and gathering the resource in your investigation plan. To acquire Bob Aspen’s from the Information department and then secure the evidence. Forensics workstation must require to conduct investigation and analysis. Computer forensic and data recovery are different.
You need the following items
- Bit stream imaging tool -Win Hex
- ProDiscover basic software
- Evidence custody form
- Evidence container for the storage media
- Computer to store the collected evidence and evidence locker
Evidence form which is used in corporate world
Report generated using evidence collection form.
7. Task 1: Recovering Scrambled bits
Win hex editor is the most powerful tool for analyzing. It can be converted the real image into the VMware, thus the tool are converted any of the file System like FAT, NTFS, CDFS, UDF media files. It is the important and good tool for analyzing.
Download Hex Workshop:
8. Acquire a USB Drive using ProDiscover basics
ProDiscover basic is a computer forensic tools which is used to recover the deleted files. After analyzing the computer you can retrieve the damaged and deleted files. To conduct an investigation you need to you forensic software.
Using variety of method evidence is collected. No single method retrieves all data from the disk so using several software’s retrieve the evidence. Evidence custody form contains case number, investigating organization (name of the organization), name of the investigator, short description of the case, exact location where the evidence was collected. A list of Evidence item collected, Evidence recovery tools, Date and time of evidence collected. You need to create a folder on your computer to store the digital evidence .create a sub folder to organize all the related files. Create two folder named as bicycle and Bob .copy the folder into USB drives. ProDiscover can convert a raw image of a disk into a bootable VMWare Machine.
Digital forensic is the application used to support the Criminal activities. Digital forensic is also known as digital forensic science. It is the branch of the forensic science. This is mainly used for the forensic report evidence and investigation purpose. Thus tool are used for the recovering the deleted data from the secondary storage. We are using the two forensic tool. Hex editor and pro discover basics tool are the Commercial one for the user. The user are easily view the raw file and image file. Thus file are converted to the binary data .
If the binary data file are access the forensic tool. Thus the tool change the binary file into the plain original text file. Before converting the plain text file, the data should be stored the computer file, it could be the hexadecimal format. The features of the tool are learning themselves. Many tutorials point are not available. In thus tool some of the files are open or not open based on the Source code. The pro basic tool are mainly used for the converting the image file into VMware manner. Thus the data could be secreted to pass through the client to server, could not be share the third party.
Carrier, B (2001). "Defining digital forensic examination and analysis tools". Digital Research Workshop II. Archived from the original on 15 October 2012. Retrieved 2 August 2010.
Peter Sommer (January 2004). "The future for the policing of cybercrime". Computer Fraud & Security 2004.
"Technology Crime Investigation::Mobile forensics". Archived from the original on 17 May 2008. Retrieved 18 August 2010.
Gary C. Kessler, “Anti-Forensics and the Digital Investigator, Champlain College Burlington”, 5th Australian Digital Forensics Conference, December 2007
Reilly .D, Wren .C, Berry .T, “Cloud computing: Forensic challenges for law enforcement”, Internet Technology and Secured Transactions (ICITST), 2010 International Conference for , vol., no., pp.1-7, 8-11 Nov. 2010 [URL]
Federal Bureau of Investigation (FBI), “Regional Computer Forensics Laboratory (RCFL)”, Program Annual Report for Fiscal Year 2007, Washington, DC, 2008
Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing”, NIST Special Publication, September 2011,
Dominik Birk, Christopher Wegener, “Technical Issues of Forensic Investigations in Cloud Computing Environments”, Systematic Approaches to Digital Forensic Engineering (SADFE), IEEE Sixth International Workshop on , vol., no., pp.1-10, 26-26 May 2011,
Stephen Biggs, Stilianos Vidalis, “Cloud Computing: The impact on digital forensic investigations”, Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for, vol., no., pp.1-6, 9-12 Nov. 2009,
Ben Kepes, “Understanding the Cloud Computing Stack SaaS, Paas, IaaS”, Diversity Limited, 2011,