Preview

Forensics: Graphic Files, Zip Files

Good Essays
Open Document
Open Document
686 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Forensics: Graphic Files, Zip Files
Running Head: Amanda Gaidry CJ317-01 Computer Forensics: Unit 7 Project

Unit 7 Project: Case Project 10-3 and 10-4
Amanda Gaidry
Kaplan University

CJ317-01 Computer Forensics
James Stewart

ABSTRACT: During this investigation, you have come across a zip file which you believe to be a graphic file, a JPEG graphics file; this could very well be the needed evidence against an employee who has allegedly been sending non-appropriate photos through email attachments. At the attempt to open the file with an image viewing program, you are getting a message stating that the file is corrupt. There are tools for recovering files that are very important and often needed in order to continue your investigation(s).
Case Project 10-3:
First you must understand that when graphics files are part of the investigation, you need to be able to locate and recover all and any graphics files on the suspect 's computer. Images are not always saved in the normal graphics file formats; just as with any type of evidence, the bad guys will use any 'tool ' they know of to hide what they are doing wrong! You must also understand how the compression ( 'zipping ') works with files. In this situation, the file type is a ".zip" which tells you that it was created with a compression program and you should know that JPEG file formats use the "Loosy Compression" method. This method permanently deletes 'bits ' of information from the file to compress the data; unlike "Lossless Compression" which uses techniques to reduce the file(s) size without removing data from the file(s). Since you are already well aware of how each compression method works, you must now 'recover ' the suspected graphic file.
By using forensics tools you have discovered this file you suspect to be a graphic file even though it is not stored as a standard graphics file, like a JPEG. You must also use tools to recover the graphics file. Since graphic files have headers with instructions on how to display them, the



References: Nelson, B., Phillips, A., Enfinger, F., Steuart, C. (2008) Guide to Computer Forensics and Investigations Third Edition. Boston, MA: Course Technology, Cengage Learning. http://filext.com http://forums.techarena.in/windows-software/1061229.htm http://www.qarchive.org/

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    You can restore deleted files by simply clicking on the recycling bin on your desktop. Once you open the recycling bin simply right click the document and choose restore to restore the file from being deleted.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Case Project 3 2

    • 451 Words
    • 2 Pages

    In Finder, locate the forensic image file of the suspect system on the target drive. Be careful not to mount the forensic image file before it has been locked (see limitations section below). Right-click or press ‘Command + I’ to open the “Get Info” dialog box in Finder. Select the “locked” radio button to lock the forensic image into read-only mode.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The BTK Killer

    • 654 Words
    • 3 Pages

    In the case of the BTK killer the metadata that the forensic examiner was able to uncover was the fact that the user account of the computer being used was named “Dennis” and it gave specific details about the location of the computer. The computers that were used were identified as one at public library and a computer at the church. All of this information was located in the “properties” section of the document. The details the metadata provided about the church then prompted the investigators to conduct an internet search on church and found that there was a Dennis Raider on staff. Additionally the metadata was able to provide the date the file was created, the date that the file was modified, and the date that the file was printed. Metadata is used in all forms of digital media to include documents, web pages, videos, images and much more. The metadata in this case was created automatically by the Microsoft Office application and was saved even though Dennis Raider deleted the file from the disk.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Image viewer is another software which I have used to view the image when I was creating the posters. It shows me any image saved with any file format. The best thing about the image viewer is that you do not have to buy it. It comes with the windows itself.…

    • 1486 Words
    • 6 Pages
    Better Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. What are some of the challenges with fingerprint evidence? What is science doing to make fingerprint analysis better?…

    • 258 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Forensics

    • 320 Words
    • 2 Pages

    • There were bloodstains on a shirt, and they found the pair of pants in his room.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    photo work

    • 635 Words
    • 3 Pages

    JPEG stands for Joint Photo Experts Group. You have to keep in mind that the data can be easily lost since the file is compressed.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Good Essays

    FTK Imager Step Action

    • 1138 Words
    • 6 Pages

    Note: Before doing this Create a folder “Windows Protected files” on External Hard Disk and choose this folder to save the Evidence file.…

    • 1138 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    The stages of this process include creating a full-fledged and distinctive occupation, establishing a national association that is given various responsibilities in regards to the profession, train the future practitioners through university sponsor programs that are established and solidified, and engage in political mobilization to gain political and legal support to give members a specific niche. It is evident that digital forensics is well on its way to being established as a profession due to the fact that many digital forensic programs are being offered and training individuals at universities and many of the law enforcement agencies in the United States staff practitioners. However, digital forensics still possesses many issues to becoming a full fledge profession, due to the fact that they do not have an established national association that represents its interests, educates the public, enforces a code of ethics, etc.; does not have a uniform training program in place; and possesses little to no political mobilization. I believe that if this field continues to advance as it has over the past forty years, it will indeed become a “true” profession in the near…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Scientific Working Groups

    • 984 Words
    • 4 Pages

    Scientific Working Group on Digital Evidence (SWGDE) “brings together organizations actively engaged in the field of digital and multimedia evidence to foster communication and cooperation as well as to ensure quality and consistency within the forensic community.” The SWGDE works to bring together associations that are actively focused on the field of digital and multimedia evidence to bring communication and collaboration as well as…

    • 984 Words
    • 4 Pages
    Better Essays

Related Topics