1. Answer:
Mobile communication devices including different personal digital assistants are not limited to voice calls and short messages only. These devices can easily browse the internet and can use different types of utility and facility applications, such as viewing maps of a certain place, tracking other people via a GPS system and so on. A device with so many features certainly helps a person as well as the society to ease the lifestyle. On the other hand, bad people can use these features to harm other people. In the recent days 22nd July 2016, an eighteen-year-old guy attacked with a gun at a mall in Munich. In that attack, at least 10 people were killed and 27 people were injured. In that place, the police got a smartphone and the police were assuming that it belonged to the perpetrator. To conduct the investigation on the smartphone following steps could be taken.
The SIM card number and the IEMI number of the phone should be discovered. Then these numbers could be searched in the relevant database to find to which person the SIM and the phone were belonging to.
The phone call records of the SIM could be found out; it will help to understand to which persons the perpetrator contacted in the recent months. From the list of contacted persons, suspicious persons could be traced.
Phone's memory could be searched to know whether there are any suspicious files that could bear the information of the attacking plan. Any special application which could be used to trace the persons who arrived or stayed at the attacking place.
2. Answer:
The legal fight between the US FBI and Apple over accessing the iPhone of the person who was engaged in a shooting attack in San Bernardino attack in the year of 2015 has become an issue in the field of investigation. The dispute between Apple and FBI had several issues, such as
civil rights of preserving personal matter secured from other people
keeping the phone and software secured from the hackers and other vulnerable attacks
keeping the iPhone as a secured device, so that the customers can trust it security features
In the dispute, the Apple Incorporation did not help the FBI, though there was an order from the court to help the FBI. The Apple Inc. was bound to some rules of keeping the rights of their customers, by the same time they had the responsibility to keep their products secured from the hackers and other threats. Actually, the dispute had been finished on the mid-way; Apple Inc. did not need to give access to the iPhone data, but the FBI agents got into the iPhone via a third party.
Should Apple have helped FBI in the investigation and assisted to decrypt the phone? It could be answered from several angles.
The Apple Inc. should help the FBI to the investigation to solve the cases and find out the main criminals of the criminal activities, but by the same time Apple will have to keep the civil rights and the customers' data secured.
In the dispute, the Apple Inc. did not need to disclose the personal security of the iPhone. The FBI agents got access via a third party which was an Israeli company. Apple Inc. is one the most popular and powerful smartphone companies in the world, their phones have an excellent quality security level. The question is how the Israeli company got access to the iPhone. It can be answered from two angles. One is that the company is highly equipped with ultra-modern hardware and software as well as excellent quality staffs. Another is that Israel knew about the person who attacked in San Bernardino.
3. Answer:
Immanuel Kant worked on evaluating motivations-for-action. He was a German philosopher. He argued that every philosophy finally aims at giving answers to these questions:
What can a person know?
What should the person do? And
What may the person hope?
His ethics are structured in a notion of the categorical imperative. The concept is based on an ethical principle which states that a person should always respect others' humanity, and that person always should act with the rules and regulations that could be held for every person. What should the person do? According to Kant’s reply, the person should do rationally that fits a universal law of moral.
If present world’s cybercrime has to be explained with the view of the philosopher Immanuel Kant, then it could be said that a person wants to know something to make himself/herself eligible for some sort of works or positions in the society. That person wants to do such things which can help the person to reach the destination of his aim. The person may hope to get at least legal supports from the society and other persons. In today’s cybercrime, the criminals cannot reach to their destinations of their aims with their earned skills and experience; they try to acquire something else via a shortcut process. Then the cyber criminals perform the activities regardless of legal or illegal and think that other person will not help them to achieve their aims. Hence, they can do criminal activities. In brief, it can be said that cyber criminals do not know enough to earn their desired skills and experience, and hence they want to achieve their goals via shortcut knowledge.
4. Answer:
A successful electronic investigation should go through following steps: planning and preparation, incident detection, initial response, response strategy formulation, forensic backups, investigation, security measure implementation, network monitoring, recovery, reporting, and follow-up. If all of these steps are followed, then almost all the evidence could be collected. The hardware, software, and peripherals of a forensic system should be chosen based on the above-stated steps.
Forensic workstations should be designed with following hardware, software, and peripherals. The station should be equipped with Forensic Recovery of Evidence Device, which may include IDE-drive write blocker, SATA-drive write blocker, USB write blocker, Multimedia or other memory card write blocker or floppy write protection. Digital Intelligence FRED-M can be a good equipment for a forensic workstation.
5. Answer:
Computer forensic data collection can be speed up by using high powerful forensic workstations with latest data collection software. Recently an Australian student made a Linux tool which can speed up the computer forensic tasks for cops. The student stripped out much functionalities from the operating system, so that when the tool will be installed on the system it will do specific tasks at a faster speed.
Another strategy to speed up the forensic computer tasks is by maintaining a standardization process. By taking attempts to bring different device manufacturers and WAC organizations under a platform, the system and process could be speed up. Standard guidelines and technologies will lower the cost of recovering data as well as speeding up the investigation process.
6. Answer:
Computer forensics is a subject which involves obtaining as well as analyzing digital data for use as evidence in administrative, civil, or criminal cases. Displaying warning banners can play a role in computer forensic investigation tasks. By displaying warning banners an organization can stay away from litigation. When a user of a computer will attempt to enter into a virtual private network or in a company intranet, they may view a warning banner/s which may warn the user that the organization will have the right to investigate the system or some specific information about the user. Such things will allow the companies to investigate the computer systems of the users in case of any forensic investigation issues.