In an essay format of 2 pages answer the questions below. Your IT department has
ID: 3819929 • Letter: I
Question
In an essay format of 2 pages answer the questions below.
Your IT department has just created an IR/Computer Forensics team; you are tasked with setting it up. Your first assignment is the following: John Smith from the Collections Department has been accessing child pornographic websites from the company computer. What laws and crimes are involved? What equipment do you need to perform the exam? What legal matters need to be addressed? How are you going to handle John Smith’s computer in a forensically sound manner?
Explanation / Answer
Child pornography could be a style of kid sexual exploitation. Federal law defines kiddie porn as any visual depiction of sexually express conduct involving a minor. pictures, creative activity also are brought up as child offense pictures. Federal law prohibits the assembly, distribution, importation, reception, or possession of any image of kid creative activity. A violation of federal kiddie porn laws could be a serious crime, and guilty offenders face fines severe penalties
Most cases begin with a research warrant and a seizure of apparatus which can embrace computers, onerous drives, flash drives, discs, DVR systems, videodisc players, MP3 players, cameras, smartphones, pill computers, and the rest that may be accustomed store, view, or play pictures or videos. Search warrants are often nonheritable once someone reports finding kiddie porn on a pc. The coverage person could also be a family friend, a pc technician that worked on the pc, associate degree leader, or anyone World Health Organization has direct or remote access to the system. In some cases, enforcement personnel use downloaded peer-to-peer programs to go looking networked computers for files that embrace banned contraband. Police could notice accounts and scientific discipline addresses once websites posting or promoting contraband pictures square measure clean up. several of those sites, some that square measure hosted in foreign countries, charge users for access and retain records of users and/or their pc scientific discipline addresses. And, of course, computers could also be searched if confiscated incident to associate degree investigation for an additional crime, like pc fraud or harlotry if the pc is employed to post ads on bulletin board sites.
First, don't build statements to police or outside persons or parties. meaning no discussion with family or friends concerning the facts of the case. something you say are often accustomed support criminal charges, even though you suspect they have an inclination to indicate your innocence. Exercise your right to stay silent and demand on chatting with associate degree professional and having him or her gift before you may say something to police.Do not expect to induce your pc instrumentation back anytime shortly. no matter is on there's there permanently and currently you've got to subsume the implications. If you {wish} a pc you'll wish to exchange the instrumentation and take applicable steps to stop any similar issues arising within the future.
Second, there square measure many ways you'll have nonheritable pictures on a pc. merely having the photographs somewhere within the memory of your pc doesn't prove that you simply had the requisite intent or information to possess the image. Computers could have several users, files square measure typically cached in memory while not your information, etc. meaning crucial that user could have accessed, downloaded or disseminated contraband kiddie porn pictures could also be a major defense issue. Even a 1 time user of a pc could contaminate its Winchester drive or cache memory with contraband. that's notably true for pc systems that share a web affiliation like wireless networks reception.
Third, many states have dominated that someone can't be guilty of "possessing" kiddie porn supported just viewing sexy pictures a data processor. Pennsylvania, Virginia, Washington and Wisconsin have had similar rulings on the difficulty. once a picture is viewed on a pc, that image is "cached" by the online mbrowser. meaning it should exist on the pc while not the person ever creating an effort to transfer the image. tho' the person could are conscious of what they were viewing, they'll are unaware that they were mechanically downloaded and saved to his pc, and thus, did not "knowingly possess" the creative activity as state law needs. even though the person saw what the location contained and directly left, the image would are on their pc which was deemed shy for a toddler creative activity conviction.
Approval - Before you begin touching that machine, confirm that you simply have gotten all the proper approvals. you'll would like hour, legal, information Protection, staff council's approval etc. suppose "Cover your ass" 1st.
Acquisition - currently, you'll begin the acquisition of the proof. All should be drained a forensically sound manner e.g. use a write blocker. Chain of Custody record should be clearly maintained.
Analysis - This goes while not speech communication. Time to research no matter you only nonheritable.
Reporting - the ultimate product of your rhetorical activities. The one factor that the management really need from you - the report. Prepare not just one report, but two. Management report and technical report. bear in mind that bosses love presentation slides. Disposal - Once the report has been finalized and everybody is happy (except the suspect maybe), you'll have to come to a decision what to try to to with the proof. essentially you would like to "dispose" them. you cannot simply keep them forever beneath your table right (don't try this, proof should be hold on during a secure place!)?. Basically, here square measure the choices that you simply will refer to the Requestor:
a) come the proof to the him/her
b) firmly destroy the proof
c) Forward the proof to a different party (as requested by the Requestor)
d) Keep it during a secure storage
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.