Case Study on "Digital Forensics: Issues and Developments"
Case Study 4 pages (1284 words) Sources: 4
[EXCERPT] . . . .
The regional teams has to work with the U.S. Secret Service and gather evidence to create forensic pictures and to analyze that data with a particular network of computers known as the Clustered Computing Analysis Platform (C-CAP). The criminals in question used truly sophisticated methods and data configurations and thus the experts who were faced with the task of analyzing this data had to meet the task in question using the most cutting edge tools. "Since existing tools used to discover compromised credit card and financial account numbers produced many false positives, the DIID team also developed a new tool called CCFinder. CCFinder is more effective than previous tools at finding and validating account numbers and eliminating duplicate numbers" (cert.org, 2014). This can be so damaging because it essentially causes all the investigators to run around in circles during their investigation -- making no real accomplishments.This is also so problematic because the investigators are dealing with unfathomably large amounts of data. Thus, this particular case meant that all experts involved had to push for a new form of technology which would provide a higher standard of data analysis. The CCFinder didn't disappoint in a wide variety of ways, particularly in the fact that it established something known as a "pedigree" which demonstrated where each number was found and which also provides a path for how they were traded (cert.org). Thus, one of the most valuable aspects that CCFinder offered was the intensive simplification: "CCFinder was a big deal when we were working with 3 million account numbers,' said team member Matthew Geiger. "Then we quickly went from there to 45 million in the TJX case" (
download full paper ⤓
As the best experts in the realm of data analysis will admit, the tactics of criminals are just getting better and better, and they're streamlining them at some of the most staggering rates of speed. CCFinder has been found to be effective and such an important tool because it extracts code clones in C, C++, Java, COBOL, and other source files (Kamiya, 2002). This is a tool which has been tested for over a decade and has found to be resourceful even when dealing with some of the most intensive and intricate forms of code. It has been able to locate clones and used metrics to correctly pinpoint the traits of the systems at large (Kamiya, 2002). CCFinder has been compared to other such techniques in this day and age and has been able to withstand the test.
Thus, the arena of digital forensics continues to grow and evolve, making it a truly nuanced and demanding field. As experts and users in the field watch it grow and develop more and more cases will emerge helping to shed light upon the nuances and individual rights issues and data analysis issues as they emerge.
References
Cert.org. (2014). TJX & Heartland. Retrieved from Cert.org: http://www.cert.org/digital-intelligence/case-studies/tjx-heartland.cfm?
FBI.gov. (2011). Digital Forensics. Retrieved from fbi.gov: http://www.fbi.gov/news/stories/2011/may/forensics_053111
Kamiya, T. (2002). CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE Transactions on Software Engineering, 654 -- 670.
Liptak, A. (2014, June 25). Major Ruling Shields Privacy of Cellphones. Retrieved from nytimes.com: http://www.nytimes.com/2014/06/26/us/supreme-court-cellphones-search-privacy.html?_r=0&module=ArrowsNav&contentCollection=Politics&action=keypress®ion=FixedLeft&pgtype=article
Noyes, K. (2014, August). And there he stood, with a smoking datum in his hand. Retrieved from fortune.com: http://fortune.com/2014/08/28/digital-forensics/ READ MORE
Quoted Instructions for "Digital Forensics: Issues and Developments" Assignment:
Project 1: Case Analysis
Identify two reported cases that have impacted the evidentiary process or analysis in digital forensic cases; student will cite the case and summarize the issue before the court; the majority of the analysis should be dedicated to the impact the cases had on the application of digital evidence in the criminal justice system or the manner in which the digital forensic analyst performs his/her function
Students may use an unreported case with the instructor’s approval; instructors may pre-identify the cases, and the project will begin with the summarizations
Project Requirements:
4 full pages minimum (approximately 2 pages per case) Paper should be initiated with an introductory paragraph and ended with a conclusion Format: 12 point font, double-space, one-inch margin Bibliography/reference page (not included in page count): APA citation style
How to Reference "Digital Forensics: Issues and Developments" Case Study in a Bibliography
“Digital Forensics: Issues and Developments.” A1-TermPaper.com, 2014, https://www.a1-termpaper.com/topics/essay/digital-forensics-developments-evolution/9588152. Accessed 5 Oct 2024.
Related Papers:
Digital Forensics Research Paper
Cloud Computing Digital Forensics
The pace at which technology develops in today's world makes inventions and discoveries very temporary and short-lived. Digital forensics is an area of technological development that… read more
Research Paper 4 pages (1273 words) Sources: 4 Topic: Computers / IT / Internet
Digital Evidence Forensics and the Law Research Paper
Forensics
Digital evidence/forensics and the law.
Digital Forensics
"How does Carrier's (2005) digital forensics process of preservation, isolation, correlation and logging (PICL) compare to the United States Department of Justice's… read more
Research Paper 12 pages (3398 words) Sources: 10 Topic: Crime / Police / Criminal Justice
Evidence Elimination Tools Essay
Forensics Evidence Elimination Tools
The work of Ryan Harris (2005) entitled: Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problems" states that forensic investigation "...endeavors… read more
Essay 3 pages (790 words) Sources: 2 Topic: Computers / IT / Internet
Altering Digital Photos Art or Fraud Term Paper
Altering Digital Photos: Art or Fraud, And Societal Effects
Is altering digital photographs art or fraud? After doing much reading on the idea of whether or not doctored digital photos… read more
Term Paper 4 pages (1608 words) Sources: 2 Topic: Journalism / Media / PR / News
Security Issues of Online Communities Term Paper
Security Issues of Online Communities
Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more
Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet
Sat, Oct 5, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!