StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Digital forensic analyst - Case Study Example

Cite this document
Summary
This paper presents two cases, which have had a significant impact on the use of digital forensic in finding evidence. The cases are in line with the goal of digital forensic, which is scouring computer and network media for evidence after a digital crime has transpired (Baggili, 2011). …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Digital forensic analyst
Read Text Preview

Extract of sample "Digital forensic analyst"

? Digital Forensic Analyst James Moravec Introduction Digital computer forensic has revolutionized the process of collecting, analyzing and presenting evidence from computers before any court of law. While computer forensic is a new field, much has been realized through the use of various techniques that have made it possible for digital analyst to collect and analyze data that are admissible in court (Casey, 2010). Over years, there are many cases, which have benefited from the application of computer forensic in collecting admissible evidence before courts of law. This paper presents two cases, which have had a significant impact on the use of digital forensic in finding evidence. The cases are in line with the goal of digital forensic, which is scouring compute and network media for evidence after a digital crime has transpired (Baggili, 2011). The paper also outlines how the cases have had an impact on the trajectory of digital computer forensic and the work of digital forensic analyst. Case 1: U.S. v. Diaz The case between U.S and Diaz involved marijuana in New Mexico. In this case, Jesus Manuel Diaz had more than 1000 kilograms of Marijuana he wanted to distribute in the United States using his trucking company, JD Easyline (Admin, 2011). In December, 11th 2009, the United States district court heard that Daiz drove his truck eastbound from Mexico to the Arizona border where he intended to distribute Marijuana hidden in his truck. Being the Diaz wanted to cross the border with the marijuana onboard his truck, he had falsified the paper work detailing the real weight of the truck and the merchandise onboard. After arriving at a border booth, he went ahead to get the paperwork necessary for him to cross the border with the truck, but the credential booth was closed on that day. As a result, Diaz went out of his truck and met Officer Smid, whom he presented all the paper work including his driving license in pursuit of a clearance letter. However, Smid was worried about the weight Diaz had quoted in his paper work. The gross weight of Diaz’s truck was way below what Smid expected. Smid argued that an empty truck with fuel weighed close to 33,000 pounds. However, Diaz had pointed that the merchandise onboard was 9,762 pound, which concerned Smid because some weight was uncounted in the truck. Smid inspected Diaz paperwork and questioned the discrepancy in weight, which Diaz attempted to explain. He argued that some shippers often put more weight on the truck than necessary. An inspection of the truck revealed that Diaz did not have a CB radio and he had four cellphones. Furthermore, Smid discovered the Diaz was uneasy and was scratching his head, a behavior he had not displayed at the start of the conversation. The seal of the truck was a commercial seal and Smid noted that there was some air freshener in the truck, though this was missing in the bill of lading. A through search of the truck using a sniffer dog revealed more the 3,300 pounds of marijuana (Admin, 2011). In addition, a laptop computer and printer, Diaz used to falsify and print the bill of lading was found. A computer forensic testified in the court that Diaz had deleted a program he used to create a false bill of lading to justify the additional weight of marijuana. Forensic analysis revealed that the bill of lading was not the one the dollar store issued to Diaz. This evidence in this case had a significant impact on the case because it Diaz was found guilty and convicted. While Diaz had succeeded to alter the bill of lading, the work of computer forensic allowed the prosecutor to prove that Diaz had deleted software he used to make and print a false bill of lading. The case underscores the role of digital forensic analysts in discovering deleted files and linking the same to cases pending before courts of law. Moreover, the case proved that digital forensic analyst could determine the authenticity of documents by finding programs used to create them. In such cases, it would be easy for investigators to gather evidence necessary to prove that defendants are guilty of named crimes. The case of Diaz would remain as evidence that digital crime forensic have a new role of linking false documents and computer program even when users delete them from their computers. Case 2 Another case involving the use of computer forensic was the case between the United States versus Moore (No. 10-3149). In this case, Edward E. Moore appealed against the ruling made by a district court, which enhanced a sentence against him and denied him a reduction of sentence though he had accepted responsibility (Admin, 2011). Moore escaped police in Arkansas who wanted to stop him, but his car hit another car. He fled from the car on foot, but the police caught him after a short chase. The police officers searched his car and discovered two firearms—a pistol and a shot gun. The police also found that Moore had previous records of possessing firearms against the law, which he received convictions on two cases. Given that Moore had two weapons in his car, the police pressed charges against him for possession of the weapons. The police also found a picture in the phone of Moore with three guns. During the writing of the presentence report, Moore pleaded guilty for possessing the firearms, though there was no agreement between him and the probation officer. As the probation officer report, Moore also mentioned that a friend had sent him the photos to his cellphone. The probation officer wrote this in the presentence report, but this later appeared to be a misstatement Moore gave to the officer (Admin, 2011). While appealing the ruling, Moore argued that the photos were taken earlier than the period he was caught and they were not sufficient to enhance the sentence he received. However, the government disputed this claim. The government sought the help of a forensic expert who determined that the photo was not sent to Moore’s cell phone as the defendant had claimed. A digital forensic expert explained that the photo showing the defendant holding three guns, had been taken using the defendants photograph. This finding was against the claim that the photo had been sent to Moore by his friend. As a result of the finding, Moore changed his claim arguing that the photo was a photo another photo taken at an earlier date. Give that Moore had refrained from giving this version of the story; the court made an objection to this explanation and affirmed that the photos proved that the defendant had three more guns than those seized. This was an important stand possible through the work of digital forensic analyst who proved that photo’s metadata proved that the photo was taken by Moore’s cellphone. The case had proved that digital forensic analyst play a vital role in finding evidence that could help court pass correct judgment. While Moore claimed the photos were sent to him by a friend, the digital forensic analyst proved that Moore’s cellphone was used to take the photograph of him holding the weapons. In this case, the expert testimony of the forensic analyst helped affirm the charges against Moore, which justified the enhancement of the charges against him. The case, therefore, has a significant impact on the use of forensic science in collecting, analyzing and producing evidence that could help courts resolve courts. Most important, the case made it possible for forensic digital analyst to understand their role in helping court collaborate evidence defendants produce. In this case, the work of the forensic analyst helped the court of appeal affirm the ruling of the district court. Conclusion Digital forensic analysts have an essential role of collecting, analyzing and reporting them as evidence admissible before a court of law. This paper underscores the role of digital forensic analyst in producing evidence before courts of law. In the first, case, an analyst determined the Diaz used a computer program to modify the bill of lading before printing it. In the second case, Moore used his cellphone to take a photo, a finding he disputed. Both cases, uphold the fact that analyst have a vital role in collaborating digital media. Digital forensic analysts have a significant role in providing correct evidence. Most important, it altered how analyst works with other experts such as probation officers in reporting evidence. References Admin, (2011). U.S. v. Diaz - Marijuana possession - New Mexico, Retrieved 17th, November, 2012 http://infosecusa.com/us-v-diaz-marijuana-possession-new-mexico Admin, (2011). U.S. v. Moore - Computer Forensics - Criminal Case – Kansas, Retrieved 17th, November, 2012, http://www.infosecusa.com/moore-computer-forensics- criminal-case-kansas Baggili, I. (2011). Digital forensics and cybercrime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers. Berlin: Springer. Casey, E. (2010). Handbook of digital forensics and investigation. London: Academic. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Digital forensic analyst Case Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1461450-digital-forensic-analyst
(Digital Forensic Analyst Case Study Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1461450-digital-forensic-analyst.
“Digital Forensic Analyst Case Study Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1461450-digital-forensic-analyst.
  • Cited: 0 times

CHECK THESE SAMPLES OF Digital forensic analyst

Forensic Technology

This paper ''forensic Technology'' tells that it defined and considered a specific emerging field, consists of tools, techniques, and methods, developed for research purposes, to assist legal investigations.... forensic scientists are deployed to work in close coordination with expert search teams, forensic entomologists.... hellip; forensic technology assists in investigating domestic crime, fraud, cybercrime, murder, war crimes, crimes against humanity, recovery of mass disaster victims, and repatriation of war dead (Hunter & Cox, 2005)....
7 Pages (1750 words) Essay

Digital Forensic Investigation

This paper "digital forensic Investigation" discusses sources of data used during the investigation of digital forensics in an effective and legal way, and prioritize discussed data sources according to three different events of network intrusion, malware installation, and insider file detection.... OURCES OF DATAAs mentioned earlier, digital forensic investigation has been divided into different stages of preservation, collection, examination, and analysis (ENFSI, 2003)....
8 Pages (2000 words) Case Study

Technologies in Identifying Crime

The guide starts by introducing individuals to digital evidence to be the data, which is important during investigation and is transmitted and received through electronic devices (Holland, 2004).... The importance of securing these digital evidences is because of their vulnerability of crossing to the wrong jurisdictions and borders.... The first responders may require the digital devices and evidences at the crime scene through application of different principles required by the police divisions of different regions....
4 Pages (1000 words) Case Study

Peculiarities of Digital Forensic

This coursework describes the peculiarities of digital forensic.... This paper demonstrates the importance of computer forensics, the process involved with it, data collection, admissibility of digital forensic evidence and detection of hidden data.... Ignoring computer forensics the organization is taking a risk by obliterating very important evidence or having forensic proof not allowed in a court of law....
10 Pages (2500 words) Coursework

Mobile Digital Forensics

Mobile digital forensic is simply a branch of the digital forensics that deals specifically with the process of getting digital evidence from mobile technologies using sound forensic conditions (Marshall, 2008).... It is important to note that the proliferation of several mobile phones and related consumer electronics and technologies prompted the need for forensic study and examination of these devices in order to enhance their security and use (Sammons, 2012)....
6 Pages (1500 words) Research Paper

Digital Forensic Investigation

Thie report "digital forensic Investigation" details the examination of a USB Key drive image for evidence of Espionage.... It gives details of the forensic procedure used as well as the results of the investigation.... utopsy forensic is a commonly used open-source forensic tool.... AINE (Computer Aided Investigative Environment) is an integrated digital forensics environment based on Ubuntu-based GNU/Linux live distribution offering a complete forensic environment with a user-friendly graphical interface and a semi-automated report generating feature....
6 Pages (1500 words) Report

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers by Carrier

The paper "Defining digital forensic Examination and Analysis Tools Using Abstraction Layers" will seek to establish whether the research offered new understanding and reliable information regarding the field of digital forensic examination.... nbsp; Introduction Carrier's (2003) paper addresses a number of problems in the research; for instance, they utilize abstraction layers to identify where digital forensic tools can bring in errors and offer requirements that the tools have to follow....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us