Preview

Wireless Investigation Research Paper

Better Essays
Open Document
Open Document
1923 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Investigation Research Paper
Wireless Network Investigations

Introduction The following paper will be prepared so that any team can handle a forensic investigation that has had wireless devices introduced to the crime scene. I will be walking through the steps that a forensic team will take when handling a wireless device. There will be a comprehensive list of each step an investigator will take in the investigative process. By the end of this report the forensic technicians in front of me will know each step and procedure they must take when extracting evidence from a wireless device.

Wireless Network Investigations This paper
…show more content…
are some of the major steps performed during this phase. It is our job as forensic investigators to be able to prove the evidence we collected is valid and that the techniques that we use can cause no damage or altering of any of the media devices we gathered. We must prove to the court that the evidence we collected has maintained the integrity of the court by following evidence check in and check out rules, date, time and investigator name and the mathematical techniques that are used to maintain the authentication of the wireless device. Phase ten is Analysis, here the forensic team performs a technical review of the results from the investigation, so that any relationships can be formed between fragments of data, hidden data is also analyzed, basically the information obtained during the examination phase is gone over so a timeline can be built and the event is then reconstructed. The National Institute of Justice guidelines recommend timeframe analysis, hidden data analysis, application analysis and file analysis of the extracted data so by using a combination of these types of analysis your results are complete and …show more content…
Our report must be written with no mistakes grammatically and no spelling error, this report is a professional view of a crime that was committed with the use of wireless devices. All of the evidence that was found on said devices has been captured using the proper forensic tools as to no cause any integrity problems with the original and copied evidence. This report along with supporting materials like copies of digital evidence, chain of custody document, printouts of various items of evidence etc. should also be submitted. Once this is completed we move onto the final phase in Ramabhadran (2013) twelve

You May Also Find These Documents Helpful

  • Powerful Essays

    In this case study I will examine the forensic evidence (limited to the main ballistic evidence), that was presented in the criminal trials and the forensic evidence that was introduced by the prosecution.…

    • 1606 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    These devices use has effectively improve communication for authorities and agencies in all field of criminal justice. The simple use of a cellular phone and laptops having the ability to retrieve information at any giving moment and time of the day proves how effective this technology has become and aided with…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    the results of each. FTP is a protocol that is used extensively in business and social…

    • 381 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The last process is to collect and package the evidence in the proper containers. The evidence that is the most important is that evidence that is fragile and can be contaminated easily. This might include fingerprints and blood evidence that could break down quickly. All evidence should be put in separate containers so that the evidence does not get contaminated by another piece of evidence. Firearms should be…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    **Collection**Any and all investigating officers should keep this in mind as well as have a warrant baring the proper wording and language that adheres to search and seizure of a personal computer in order to avoid violating any privacy rights. First the officer should check to see if the computer is on or off. If an officer finds that the computer is not on, he or she should not turn it on the evidence must not be altered; however if the officer finds the computer on then the officer should photograph the screen even if the screen is in sleep mode. Once the computer is photographed the power should be disconnected. In other words the modem should be drained of power by unplugging it. Next the officer should be sure to insert a police disc into the CD or DVD drive; bear in mind the disc should be blank and after inserting it the drive should be sealed. All other hardware connected to the system should be photographed in order to have a record of how the system was…

    • 1674 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Wireless Signals

    • 551 Words
    • 3 Pages

    Wireless signals are all around us as we walk or drive around the city or town where we live. The four types of wireless technologies that are out there are Wi-Fi, Cellular, Bluetooth, and WiMAX. We will be looking at these types of wireless technologies a little more in depth, where are they most commonly used, and how they differ from one another. The first wireless technology that we will be looking at is the Wi-Fi wireless signal. The Wi-Fi signal is mainly associated with computer networking, the specification used to create a wireless local area network is the IEEE 802.11. One would use this type of wireless technology if you were a business owner opening up a coffee shop and needed a public network. The network would have a wired connection to an internet source, then leading to a wireless router that transmits and receives the data from all of the customer’s devices that want to use the Wi-Fi. This will also connect all of the devices to one another through the network. The next type of wireless technology that we will be looking at is Cellular. This type of wireless technology is most often associated with wireless telephones. The cellular network is connected to cells that will enable a user to move around freely while staying connected to the network. This type of signal is used everywhere you go nowadays and are used by everyone. There are a multitude of devices that use these networks at one time and those include, smart phones, tablets, and some computers can use the cell towers to get a signal to be able to use the internet. The first generation of cellular signals was completely analog, and from there with the growing demand of faster speeds and better connectivity technology brought us 2G, 3G, and the ever popular 4G phones. Bluetooth is the next technology that we will touch on and is very similar to the Wi-Fi and cellular networks but on…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Digital forensics uses scientific methods of extracting evidence from computers or other digital devices. It simples involves retrieving data from existing or deleted files, interpreting there meaning and putting it all together in context of an investigation. Digital forensics is a scientific process that uses analysis tools, methods and documentation to discover electronic evidence. Where other forensic sciences may alter the original media digital forensics strives to maintain the integrity of the original media and make sure it is not altered in any way. The methods used to create forensic copies of media and data keeps the integrity of the original intact. McKemmish defines…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Crime Scene Investigator

    • 2104 Words
    • 9 Pages

    Now in order for them to do this they have to first do a walkthrough of the scene to determine what strategy they will need to use in order to apprehend evidence from the scene (work.chro.com. n.d.). They also need to figure out what equipment and resources will be needed to collect the evidence during their walkthrough of the crime scene. Furthermore, they document the crime scene and all of the evidence that has been collected at the crime scene in order to later be able to testify in court that the evidence in question is from that scene and has been properly documented and collected.…

    • 2104 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    References: Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Preservation Of Evidence

    • 720 Words
    • 3 Pages

    Many cases are won or lost by the weight of the prosecution’s evidence. Through methods of discovery of evidence, both the prosecution and defense have equal opportunity to develop evidence they believe is needed to prove or dismiss/ reject claims. Trace evidence and the preservation of evidence are very vital in any investigation. These two components are two of the most important things that can help investigators find their suspect(s), and lock them up or if done without proper care, the preservation of evidence or lack thereof can possibly make or break a case. Investigators taking the time out to pull trace evidence off of their victim(s), and placing it in whatever object is fit to hold and preserve the evidence, is very vital, because…

    • 720 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Laci Peterson Case:

    • 3313 Words
    • 14 Pages

    Laci Denise (Rocha) Peterson was born May 4, 1974 to Sharon and Dennis Rocha. Ever since Laci was a baby she was known for her big grinning smile and large dimples. People used to say that her smile hinted at a devilish side to her (Fleeman, 2003). As an adult she still had that beaming smile that people couldn’t resist wanting to get to know. Because of that smile, millions of people couldn’t resist wanting to help find…

    • 3313 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    The harmonization of the law relating to information technology and evidence by the Indian legislature, together with the positive approach of the Indian courts in recognizing and appreciating electronic evidence, has equipped India to meet the new challenges of the digital era. The Indian courts have observed that the judiciary always respond to changing needs with regard to the development of technologies and uses its own interpretative principle to achieve a balance when Parliament has not responded to the need to amend the legislation, having regard to the development in the field of science. The Supreme Court of India has recognized that law must, therefore be constantly adapted to the speed of change in society. Again the apex court has further laid down that the expanding horizon of science and technology has thrown challenges to lawyers and judges dealing with the proof of facts in disputes where advance techniques in technology have been used. Storage, processing and transmission of data on magnetic and silicon media have become cost effective and easy to handle. Conventional means of records and data processing have become outdated, and rules relating to admissibility of electronic evidence and its proof have been incorporated into Indian law.…

    • 3021 Words
    • 13 Pages
    Powerful Essays