Preview

Forensics: Graphic Files, Zip Files

Good Essays
Open Document
Open Document
686 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Forensics: Graphic Files, Zip Files
Running Head: Amanda Gaidry CJ317-01 Computer Forensics: Unit 7 Project

Unit 7 Project: Case Project 10-3 and 10-4
Amanda Gaidry
Kaplan University

CJ317-01 Computer Forensics
James Stewart

ABSTRACT: During this investigation, you have come across a zip file which you believe to be a graphic file, a JPEG graphics file; this could very well be the needed evidence against an employee who has allegedly been sending non-appropriate photos through email attachments. At the attempt to open the file with an image viewing program, you are getting a message stating that the file is corrupt. There are tools for recovering files that are very important and often needed in order to continue your investigation(s).
Case Project 10-3:
First you must understand that when graphics files are part of the investigation, you need to be able to locate and recover all and any graphics files on the suspect 's computer. Images are not always saved in the normal graphics file formats; just as with any type of evidence, the bad guys will use any 'tool ' they know of to hide what they are doing wrong! You must also understand how the compression ( 'zipping ') works with files. In this situation, the file type is a ".zip" which tells you that it was created with a compression program and you should know that JPEG file formats use the "Loosy Compression" method. This method permanently deletes 'bits ' of information from the file to compress the data; unlike "Lossless Compression" which uses techniques to reduce the file(s) size without removing data from the file(s). Since you are already well aware of how each compression method works, you must now 'recover ' the suspected graphic file.
By using forensics tools you have discovered this file you suspect to be a graphic file even though it is not stored as a standard graphics file, like a JPEG. You must also use tools to recover the graphics file. Since graphic files have headers with instructions on how to display them, the



References: Nelson, B., Phillips, A., Enfinger, F., Steuart, C. (2008) Guide to Computer Forensics and Investigations Third Edition. Boston, MA: Course Technology, Cengage Learning. http://filext.com http://forums.techarena.in/windows-software/1061229.htm http://www.qarchive.org/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Now I have bit a bit copy of 10 GB partition E made on USB drive in file called murder.img…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Ict Unit 30

    • 2076 Words
    • 9 Pages

    JPG file - JPG files, also known as JPEG files, are a common file format for digital photos and other digital graphics. When JPG files are saved, they use "lossy" compression, meaning image quality is lost as file size decreases.…

    • 2076 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Evidence is a type of proof. It is usually used to prove someone innocent or guilty. There are many different types of evidence, such as: testimony, direct, circumstantial, and physical evidence. However, according to the article “Forensic: Evidence, Clues, and Investigation” by Andrea Campbell, forensic evidence is the best evidence to present at a court case or trial.…

    • 226 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Case Project 3 2

    • 451 Words
    • 2 Pages

    In Finder, locate the forensic image file of the suspect system on the target drive. Be careful not to mount the forensic image file before it has been locked (see limitations section below). Right-click or press ‘Command + I’ to open the “Get Info” dialog box in Finder. Select the “locked” radio button to lock the forensic image into read-only mode.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    You can restore deleted files by simply clicking on the recycling bin on your desktop. Once you open the recycling bin simply right click the document and choose restore to restore the file from being deleted.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The BTK Killer

    • 654 Words
    • 3 Pages

    In the case of the BTK killer the metadata that the forensic examiner was able to uncover was the fact that the user account of the computer being used was named “Dennis” and it gave specific details about the location of the computer. The computers that were used were identified as one at public library and a computer at the church. All of this information was located in the “properties” section of the document. The details the metadata provided about the church then prompted the investigators to conduct an internet search on church and found that there was a Dennis Raider on staff. Additionally the metadata was able to provide the date the file was created, the date that the file was modified, and the date that the file was printed. Metadata is used in all forms of digital media to include documents, web pages, videos, images and much more. The metadata in this case was created automatically by the Microsoft Office application and was saved even though Dennis Raider deleted the file from the disk.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Digital Forensics Paper

    • 1687 Words
    • 7 Pages

    Computer forensics is the process of gathering, evaluating and retrieving data, mainly to stop or prevent fraud, to gather and preserve data information for a criminal investigation, or it can be used to recover data that has been deleted or accidentally lost. Most forensic investigators should be required to have knowledge of a computer, the operating system, and hardware and software. Data recovery can be done on CD, DVD, USB, PDA, hard drives, and mobile phones, and many other devices. (Hopkins, n.d.)…

    • 1687 Words
    • 7 Pages
    Good Essays
  • Better Essays

    CCJS321 Project 1

    • 1347 Words
    • 4 Pages

    K-Mart Corp. v. Trotti, 677 S.W.2d 632 (Court of Appeals of Texas, Houston First District 1984).…

    • 1347 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Crime Scene Investigation

    • 1546 Words
    • 7 Pages

    In solving a crime, a crime scene is usually imperative to the investigation. Documenting a crime scene helps to establish some of the evidence or rather investigative leads which may help solve the case. Additionally, the leads found in the crime scene can help solve the case or determine what happened. Poor scene documentation can prompt unacceptable evidence in a courtroom, or missed evidence that may permit a victim to escape with a crime. Photography is important during the documentation of a scene. It helps preserve some of the leads in hard copy form. Additionally, sketching of the scene also helps during the investigative process as well as storage of such data. By using photographs and crime scene sketches, the careful examination…

    • 1546 Words
    • 7 Pages
    Better Essays
  • Good Essays

    FTK Imager Step Action

    • 1138 Words
    • 6 Pages

    Note: Before doing this Create a folder “Windows Protected files” on External Hard Disk and choose this folder to save the Evidence file.…

    • 1138 Words
    • 6 Pages
    Good Essays

Related Topics