blog




  • Essay / Potential Digital Evidence - 961

    Potential Digital Evidence As you can see from the photograph provided, Mr. Didit's workspace contained numerous pieces of digital evidence. There were two (2) computer towers upstairs containing emails between Mr. Didit and Kazuki Corporation discussing the design of the smartphone as well as classified coding image files for the smartphone's operating system. These towers were sealed in large anti-static evidence bags, establishing the chain of custody, and transported to off-site facilities for investigation. On Mr. Didit's desk were a USB storage device and two (2) unlabeled compact discs. All these storage devices contain images and programming codes related to the smartphone released by the two companies. There were two (2) other USB storage devices in the drawer under Mr. Didit's desk which were confiscated, but did not contain any evidence applicable to this investigation. USB devices and CDs were labeled to establish chain of custody and sealed in anti-static evidence bags for transport to the investigation premises. One (1) encrypted Western Digital hard drive was found on Mr. Didit's desk, containing several prototype images as well as untested code for the smartphone design. The drive was added to the evidence list establishing chain of custody and then sealed in an anti-static evidence bag approved for transport. The suspect's Voice over Internet Protocol (VoIP) phone was also removed from the scene. The phone was believed to contain vital telephone records which would prove that there had indeed been communication between Mr Didit and Kazuki Corporation. The phone was registered on the evidence collection document and then transported to the investigation center in an anti-static environment...... middle of paper ...... file systems as well as mobile devices including Apple's iOS and Android platforms. The latest version of FTK, 5, comes with Explicit Image Detection (EID). EID “recognizes not only skin tones, but also shapes and orientations of images that could be pornographic in nature” (AccessData, 2014). This feature makes FTK the most chosen tool when searching for images contained on digital devices. FTK was used on the two (2) computer towers and two (2) USB storage devices which revealed the images of the new smartphone design.Works CitedAccessData. (2014). Forensic Toolkit 5. Accessed February 19, 2014 from AccessData.com: http://www.accessdata.com/products/digital-forensics/ftk Guidance Software. (2014). EnCase Forensic v7. Retrieved February 20, 2014 from GuidanceSoftware: http://www.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx