Potential Digital Evidence

961 Words2 Pages

Potential Digital Evidence
As you can see in the photograph provided, Mr. Didit’s workspace contained numerous digital evidence items. There were two (2) computer towers on the floor that contained emails between Mr. Didit and Kazuki Corporation discussing the smartphone design along with image files of classified coding for the smartphone operating system. These towers were sealed within large anti-static evidence bags, establishing the chain-of-custody, and transported to the off-site facility for investigation. On Mr. Didit’s desk there was a USB storage device and two (2) unlabeled Compact Discs. All of these storage devices contain images and programming code related to the smartphone being released by both companies.
There were two (2) more USB storage devices in the drawer beneath Mr. Didit’s desk that were confiscated, but did not contain any evidence applicable to this investigation. The USB devices and CDs were tagged to establish chain-of-custody and sealed in anti-static evidence bags for transportation to the investigation facility. One (1) encrypted Western Digital hard disk drive was found on the desk of Mr. Didit which contained several prototype images as well as untested code for the smartphone design. The drive was added to the list of evidence establishing the chain-of-custody and then sealed in an approved anti-static evidence bag for transport.
The suspects Voice over Internet Protocol (VoIP) phone was also removed from the scene. The phone was believed to contain vital phone records which would prove that there was indeed communication between Mr. Didit and Kazuki Corporation. The phone was recorded on the evidence collection document and then transported to the investigation facility in an anti-static ev...

... middle of paper ...

... file systems as well as mobile devices including Apple’s iOS and Android platforms. The latest version of FTK, 5, comes with Explicit Image Detection (EID). EID “not only recognizes flesh tones, but shapes and image orientations that could be pornographic in nature” (AccessData, 2014). This feature makes FTK the tool most chosen when searching for images contained on digital devices. FTK was used on the two (2) computer towers and two (2) of the USB storage devices that revealed the images of the new smartphone design.

Works Cited

AccessData. (2014). Forensic Toolkit 5. Retrieved Feb 19, 2014, from AccessData.com: http://www.accessdata.com/products/digital-forensics/ftk Guidance Software. (2014). EnCase Forensic v7. Retrieved Feb 20, 2014, from Guidance
Software: http://www.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx

Open Document