Case Study on "Digital Forensics: Issues and Developments"

Case Study 4 pages (1284 words) Sources: 4

[EXCERPT] . . . .

The regional teams has to work with the U.S. Secret Service and gather evidence to create forensic pictures and to analyze that data with a particular network of computers known as the Clustered Computing Analysis Platform (C-CAP). The criminals in question used truly sophisticated methods and data configurations and thus the experts who were faced with the task of analyzing this data had to meet the task in question using the most cutting edge tools. "Since existing tools used to discover compromised credit card and financial account numbers produced many false positives, the DIID team also developed a new tool called CCFinder. CCFinder is more effective than previous tools at finding and validating account numbers and eliminating duplicate numbers" (cert.org, 2014). This can be so damaging because it essentially causes all the investigators to run around in circles during their investigation -- making no real accomplishments.

This is also so problematic because the investigators are dealing with unfathomably large amounts of data. Thus, this particular case meant that all experts involved had to push for a new form of technology which would provide a higher standard of data analysis. The CCFinder didn't disappoint in a wide variety of ways, particularly in the fact that it established something known as a "pedigree" which demonstrated where each number was found and which also provides a path for how they were traded (cert.org). Thus, one of the most valuable aspects that CCFinder offered was the intensive simplification: "CCFinder was a big deal when we were working with 3 million account numbers,' said team member Matthew Geiger. "Then we quickly went from there to 45 million in the TJX case" (
Continue scrolling to

download full paper
cert.org). Such amounts of data could be staggering for any other investigation team -- so staggering that it would become unmanageable and ultimately cause the investigation to fail. CCFinder was able to prevent human error, and allow for better tracking in cases like these -- cases where there is an element of human espionage.

As the best experts in the realm of data analysis will admit, the tactics of criminals are just getting better and better, and they're streamlining them at some of the most staggering rates of speed. CCFinder has been found to be effective and such an important tool because it extracts code clones in C, C++, Java, COBOL, and other source files (Kamiya, 2002). This is a tool which has been tested for over a decade and has found to be resourceful even when dealing with some of the most intensive and intricate forms of code. It has been able to locate clones and used metrics to correctly pinpoint the traits of the systems at large (Kamiya, 2002). CCFinder has been compared to other such techniques in this day and age and has been able to withstand the test.

Thus, the arena of digital forensics continues to grow and evolve, making it a truly nuanced and demanding field. As experts and users in the field watch it grow and develop more and more cases will emerge helping to shed light upon the nuances and individual rights issues and data analysis issues as they emerge.

References

Cert.org. (2014). TJX & Heartland. Retrieved from Cert.org: http://www.cert.org/digital-intelligence/case-studies/tjx-heartland.cfm?

FBI.gov. (2011). Digital Forensics. Retrieved from fbi.gov: http://www.fbi.gov/news/stories/2011/may/forensics_053111

Kamiya, T. (2002). CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE Transactions on Software Engineering, 654 -- 670.

Liptak, A. (2014, June 25). Major Ruling Shields Privacy of Cellphones. Retrieved from nytimes.com: http://www.nytimes.com/2014/06/26/us/supreme-court-cellphones-search-privacy.html?_r=0&module=ArrowsNav&contentCollection=Politics&action=keypress&region=FixedLeft&pgtype=article

Noyes, K. (2014, August). And there he stood, with a smoking datum in his hand. Retrieved from fortune.com: http://fortune.com/2014/08/28/digital-forensics/ READ MORE

Quoted Instructions for "Digital Forensics: Issues and Developments" Assignment:

Project 1: Case Analysis

Identify two reported cases that have impacted the evidentiary process or analysis in digital forensic cases; student will cite the case and summarize the issue before the court; the majority of the analysis should be dedicated to the impact the cases had on the application of digital evidence in the criminal justice system or the manner in which the digital forensic analyst performs his/her function

Students may use an unreported case with the instructor’s approval; instructors may pre-identify the cases, and the project will begin with the summarizations

Project Requirements:

4 full pages minimum (approximately 2 pages per case) Paper should be initiated with an introductory paragraph and ended with a conclusion Format: 12 point font, double-space, one-inch margin Bibliography/reference page (not included in page count): APA citation style

How to Reference "Digital Forensics: Issues and Developments" Case Study in a Bibliography

Digital Forensics: Issues and Developments.” A1-TermPaper.com, 2014, https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152. Accessed 5 Oct 2024.

Digital Forensics: Issues and Developments (2014). Retrieved from https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152
A1-TermPaper.com. (2014). Digital Forensics: Issues and Developments. [online] Available at: https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152 [Accessed 5 Oct, 2024].
”Digital Forensics: Issues and Developments” 2014. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152.
”Digital Forensics: Issues and Developments” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152.
[1] ”Digital Forensics: Issues and Developments”, A1-TermPaper.com, 2014. [Online]. Available: https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152. [Accessed: 5-Oct-2024].
1. Digital Forensics: Issues and Developments [Internet]. A1-TermPaper.com. 2014 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152
1. Digital Forensics: Issues and Developments. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152. Published 2014. Accessed October 5, 2024.

Related Papers:

Digital Forensics Research Paper

Paper Icon

Cloud Computing Digital Forensics

The pace at which technology develops in today's world makes inventions and discoveries very temporary and short-lived. Digital forensics is an area of technological development that… read more

Research Paper 4 pages (1273 words) Sources: 4 Topic: Computers / IT / Internet


Digital Evidence Forensics and the Law Research Paper

Paper Icon

Forensics

Digital evidence/forensics and the law.

Digital Forensics

"How does Carrier's (2005) digital forensics process of preservation, isolation, correlation and logging (PICL) compare to the United States Department of Justice's… read more

Research Paper 12 pages (3398 words) Sources: 10 Topic: Crime / Police / Criminal Justice


Evidence Elimination Tools Essay

Paper Icon

Forensics Evidence Elimination Tools

The work of Ryan Harris (2005) entitled: Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problems" states that forensic investigation "...endeavors… read more

Essay 3 pages (790 words) Sources: 2 Topic: Computers / IT / Internet


Altering Digital Photos Art or Fraud Term Paper

Paper Icon

Altering Digital Photos: Art or Fraud, And Societal Effects

Is altering digital photographs art or fraud? After doing much reading on the idea of whether or not doctored digital photos… read more

Term Paper 4 pages (1608 words) Sources: 2 Topic: Journalism / Media / PR / News


Security Issues of Online Communities Term Paper

Paper Icon

Security Issues of Online Communities

Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more

Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!