Digital Forensics Analysis of Steve Rogers
Digital Forensics Analysis of Steve Rogers
Executive summary
Digital forensic is the method used by various digital analysts of various department to translate
and reveal electronic information. The main aim is to find the data stored to investigate and
evidence for various projects. . Technical analysis is being made in the case of a steve roger.
Based on the example provided, a complete analysis is made as a “digital forensics analyst”. As
in-depth research on the case presented, all the question is being resolved and answered. Steve's
roger was Captain America, and he saves humanity from evil sources. This report has critically
assessed all aspects of the roles played by Roger. The character of steve rogers was the first
avenger. There have been 12 questions, and each of the items has been answered with a critical
analysis of different aspects. Thus, this technical report based on digital forensic has critically
discussed and illustrated all the prominent elements.
DIGITAL FORENSICS ASSIGNMENT
Table of Contents
Executive summary ..................................................................................................................................................... 2
Introduction ................................................................................................................................................................ 4
Analysis ....................................................................................................................................................................... 4
Answer 1 ................................................................................................................................................................. 4
Answer 2 ................................................................................................................................................................. 6
Answer 3 ................................................................................................................................................................. 8
Answer 4. .............................................................................................................................................................. 10
Answer 5 ............................................................................................................................................................... 12
Answer6. ............................................................................................................................................................... 14
Answer 7 ............................................................................................................................................................... 15
Answer 8 ............................................................................................................................................................... 16
Answer 9 ............................................................................................................................................................... 17
10. Answer ............................................................................................................................................................ 18
Answer 11 ............................................................................................................................................................. 18
Answer 12 ............................................................................................................................................................. 19
Conclusion ................................................................................................................................................................. 21
Reference List............................................................................................................................................................ 22
Appendices................................................................................................................................................................ 27
Introduction .............................................................................................................................................................. 30
Previous Work ........................................................................................................................................................... 30
New Project............................................................................................................................................................... 32
Recommendations .................................................................................................................................................... 33
Conclusions ............................................................................................................................................................... 33
youtube , (2017), Overview of Digital Forensics,Retrieved from:............................................................................. 35
youtube ,(2019), Understanding the Forensic Science in Digital Forensics, Retrieved from: ................................... 35
DIGITAL FORENSICS ASSIGNMENT
Introduction
Nowadays, the biggest problem that the companies are facing in the corporate and the business
sector is “Cyber threat”. If this happens on a huge scale, then it is known as “Cyber terrorism”.
According to this, the impact is felt by human emotion and cost. Therefore to preserve this data,
identification of the data, collection of data and its analysis requires a particular type of science
which is thus named as digital forensics. It is very important in today's world. Its main goal is to
give support to the elements including monitoring, to protect the sensitive data, troubleshooting,
and recovery of the program. If a crime is being committed then the digital forensics experts are
called to analyze the crime scene and collect the possible evidence and then analyze it and
produce it to the court as a piece of evidence. It is very challenging sometimes in the “non-
traditional environment” where there is no adequate amount of data is collected. It is therefore
known as a process to gather scientific methods and other pieces of evidence to help in solving
the crimes.
Analysis
Answer 1
The agents are “Natasha Romanoff” and “Rumlow” (Chawki et al. 2015).
“Natasha Romanoff” is the name who was a Russian spy as a name “Black Widow”. After a
certain amount of time she absconded to the United States and then she becomes a spy agent of
the agency “S.H.I.E.L.D”. The “Black widow” was first introduced as a non-costumed,
recurring spy of Russia and later on, she recruits the besotted costumed archer. After that
Russian Government provides “Natasha Romanoff”, her first “Black Widow” costume and
high-tech weaponry, but later on Black Widow cracked to the United States after appearing,
temporarily brainwashed against the U.S. “Black Widow” is a human, skilled in expressions of
the human experience of reconnaissance and combative techniques, with specialities close by to-
hand battle and cross-examination (Al-Kawaz et al. 2018). She has the athletic ability of an
Olympic class competitor and shows up almost superhuman now and again. Her weapon of
decision is a wrist-mounted shooter, or whatever else she can get her hands on. She is very much
confident in both intelligence and beauty and she is one of the greatest spies all around the world.
DIGITAL FORENSICS ASSIGNMENT
She is having that much of superhuman abilities that she can fight with any opponents by her
skills. She is about valiant, nearly to the point of imprudence. The “Black Widow” is
additionally an ace of subterfuge, often talking her foes into snares of her own formulating. In
her darker days, she has suggested that she come up short on an ethical compass yet as a
specialist of “S.H.I.E.L.D”, she seems to think about the purpose of the world (Cohen, 2015).
The character “Brock Rumlow” is called as “Crossbones”. Brock Rumlow was a spy of
“H.Y.D.R.A” who had been working as an agent of “S.H.I.E.L.D” and the field commander
of STRIKE’s team. Rumlow who had become a world-class combatant with huge involvement
in street fighting, military combat techniques and martial art (Du, Le-Khac & Scanlon,
2017). Following the Battle of New York, Rumlow's STRIKE group had been requested to
restore the Scepter to “H.Y.D.R.A”. Following this, Rumlow pursued “Captain America” on a
few missions until the “H.Y.D.R.A” Uprising was uncovered and Rumlow was requested to
guide their group and kill “Captain America” compelled of Alexander Pierce (Griffin et al. 2018)
When he recouped from his wounds, Rumlow had found that Pierce had been murdered during
the fight and “H.Y.D.R.A” was totally vanquished. Thus, Rumlow figured out how to escape
from the emergency clinic he was treated, and, building a Battlefield Suit, expecting another
codename of Crossbones, turned into a free fear based oppressor, setting out onto his way to
make anybody associated with his ruin endure the torment and misfortune he persevered (Karie,
Venter,2015).
DIGITAL FORENSICS ASSIGNMENT
Commence
Presenet,
complete
and further Prepare
taks
identified
Inference
Evaluate and
Developmen
Identify
t
Collect,
Analyse Preserve,
Collate
(Source: Self-Created)
Answer 2
The browsers that are being used by the agents are “windows XP with the server of 2012”. These
browsers are being used in different kinds of operating systems (Lillis et al. 2016). The agents of
H.Y.D.R.A were using “windows XP with the server of 2012 through windows 8”. The tools for
computer forensic were “FTK imager, Access DataâÂÂs Forensic Toolkit (FTK), Guidance
SoftwareâÂÂs EnCase, prefetch analyzer, registry analyzer” and many other tools used by the
forensic analyst (Losavio, Seigfried-Spellar & Sloan 2016). With today regularly changing
advancements and situations it is unavoidable that each association will manage cybercrime,
including misrepresentation, insider dangers, mechanical surveillance, and phishing. Government
organizations likewise need the ability to perform media abuse and recuperate key knowledge
accessible on foe frameworks.
Some of the “data forensic tools” areas:-
DIGITAL FORENSICS ASSIGNMENT
1. “Digital forensic framework” - DFF is one of the most popular tools used by forensic
experts for the digital analyst and is committed to digital forensics. It comes under the
License of GPL. It can be used by experts or non-expert without any difficulty (Lutui,
2016). The tool is used for the custody of the digital chain to connect with local or
inaccessible devices, an operating system with Linux or windows. It can also be used to
recover any deleted or hidden files.
2. “Open computer forensic architecture” - “Open computer forensic architecture” (OCFA)
was created by the “Dutch National Police Agency” for brutalizing digital forensics. it is
also an open-source tool and is popular across the digital analyst. The operating system
for OCFA is Linux and for storing data, it uses a database of PostgreSQL. It comes under
a GPL license (Mir, Shoaib & Sarfraz, 2016).
3. Caine - Caine stands for “computer-aided investigative environment” is a Linux based
tool used for digital forensics. It gives a situation to accommodate existing programming
devices as programming modules in an easy to use way (Montasari, 2017).
4. “X - Ways forensics” - It is an advanced tool and works efficiently for digital forensics. It
is believed to be X- ways does not need much resource. This tool has some special
features such as it can calculate bulk hash easily, it has self-cloning and disk imaging
features (Neuner, Schmiedecker & Weippl, 2016).
It supports all the important extension for file systems such as dotExt3, dotFAT16, TFAT,
CDFS/ISO9660/Joliet, dotFAT12, dotFAT32, dotexFAT, dotNext3, dotUDF (Valjarevic, Venter,
2015).
It has an automatic feature for recovering lost or deleted hard disk data. It has a gallery perceive
for photos or pictures. It has the capability to extract the emails of clients and many such features
are available in this tool (Watson, Dehghantanha, 2016).
1. EnCase - it is another forensic based software with multi-use features. It can collect data
from several devices with a piece of potential evidence. It can also create an article or
report found from evidence. This is a free software tool and can be used by anyone
around the world (Yang & Chow, 2015).
DIGITAL FORENSICS ASSIGNMENT
Answer 3
HYDRA is a criminal organization that is situated worldwide and is very famous. Its main aim is
to dominate the world to establish a “New World Order”. For the past years, HYDRA had taken
advantage of SHIELD. They used their agents in many ways and silently kill those who came
into their part. They always had their own way ([Link], 2016 ).
The double agents of Hydra are as follows:
1. “Captain America” - Recently in the Avengers: Endgame elevator scene when Captain
America stole the “Mindstone” from SHIELD and while he was standing inside the
elevator he quietly whispered “Hail Hydra” and walked out of the elevator (mecs-
[Link], 2018 ).
1. Hellfire - During “Secret Invasion” to keep a watch on the children of the “superhero
and Villians” Nick Fury kept tabs on them. Later he deviated the team towards “Skrull
invasion”. One of the children among them was Hellfire who was a double agent
working for Hydra ([Link], 2018 ).
1. Hardball - He was once a good guy whom “Wonder Man” approached and taken into the
team and enlisted him for the “Civil War”. his bounty got increased suddenly and thus
supervillains approached him and gave a contract to him which led him to be a member
of Nevada and thus was another double agent.
DIGITAL FORENSICS ASSIGNMENT
1. Wendell Vaughn - He was once a member of SHIELD who later turned his back and
became an agent. It is because of Vaughn, the team SHIELD got broken after an
operation ([Link], 2016).
1. Silver Fox - She was an important character in X-Men who was seen during
the “Wolverine” movie. She was a member of a force along with Maverick, Sabretooth,
and Wolverine. She was once the girlfriend of Wolverine who was dead. But soon after
some time, Wolverine found out that “Silver Fox” is alive and is working for Hydra as a
double agent ([Link] , 2019 ).
1. Spider-Woman - She is the most fascinating character in this whole series as she was a
triple agent who was once working for HYDRA, SHIELD and later worked for Nick
Fury. Jessica was also known as Spider-Woman once trained by Hydra and later lost all
her abilities. After that, he chooses to join the special task force named SHIELD. Soon
after that, Hydra approached her and gave her an offer that she cannot reject. The offer
was to spy on SHIELD and give all the information to HYDRA on return she could get
back all her lost abilities. So she finally agreed to that started working as a double agent
([Link], 2019).
1. Alexander Pierce - He was one of the most important members of the “World Security
Council” who always overshadowed “SHIELD and The Winter Soldier”. He was a
member of Hydra but helped “Nick Fury” many times as he was his comrade once
([Link], 2019).
10
1. John Garrett - He was also a double agent who used to steal the documents as he was
very tech-savvy and always used “high-level security clearance” to access the
documents ([Link], 2019).
1. Grant Ward - He was a member of SHIELD who was very skilled in “hand to hand
combat”. He later joined team Hydra and was very loyal to the team. He was killed and
then possessed by Hive during a war with another planet.
Answer 4.
There are some of the following applications which were running on “steve’s computer” These
applications that are being used in the computer aims at analyzing the various facts regarding the
SHIELD. Some of the apps that are being run by him on his laptop are “7-Zip, Adobe acrobat
professional”. These were certain applications that are being operated by steve on his computer.
Steve, one of the key members of the organization and also being known as captain America
must ascertain the facts behind this. Steve and his contribution have been one of the considerable
points that need to be considered effective. Steve who has been working under Nick fury was
responsible for all kinds of missions and hence he has initiated many ways to sustain this
mobility in the SHIELD. In a nutshell, this can be elaborated that he is one of the main parts of
this entire background. Since he has been witnessing many battles and insurgency situations in
and around the region, therefore, he must access and consider all the facts that are important in
obtaining the evidence of HYDRA. Nick has been considering him as one of the most reliable
men and hence after being intercepted by the assailants who were winter soldiers, Nick has
approached Steve rogers to warn and apprise him of the ongoing situation in SHIELD. On the
basis of the current situation that has been erupted, this can be stated that Steve must open
the applications and find out the exact cause as to how such situations are getting complicated.
Besides, this should also have been done keeping in mind the fact that Nick has revealed to steve
regarding the compromise in SHIELD.
Rogers was confounded by this frightening disclosure, similarly as the Strike power unit and city
police surrounded its position and captured “Rogers, Romanoff, and Wilson”. The vehicle was
DIGITAL FORENSICS ASSIGNMENT
11
finaly brought back to Rogers which gives the idea that the 107th unit was captured in such a
manner that is how he endures tumbling from the train. Rogers, loaded up with blame and regret,
assumed liability for what occurred Bucky. Natasha revealed to him that it was not his overall
deficiency. The gatekeepers hauled out a twirly doo taser and was held by the other gatekeeper,
uncovering herself as Maria Hill. Utilizing the “Mouse Hole gadget”, she liberated Rogers as
well as the group and carried them to a mystery office where she discovered to them a recovering
“Nick Fury”, who was constantly faking his passing. Anger and Hill revealed to them that
Project was just hours away and that the “helicarriers” would float in a series, associated,
focusing on the entirety of its objectives before terminating. The best way to forestall was finally
to utilize three different gadgets that would remove “S.H.I.E.L.D”. Command over the
helicarriers. Wrath expected to spare S.H.I.E.L.D. yet, and Steve solidly demanded that the
association be destroyed all after the debasement comes under.
• Cloud Forensics
• Mobile Forensics
• Computer Forensics
• Network Forensics
• Audio and Video Forensics
(Source: Self-created)
DIGITAL FORENSICS ASSIGNMENT
12
Answer 5
Rogers came back to the medical clinic to recover the glimmer actually drove when there was a
sight about the USB that was lost. Natasha showed up behind roger. Irately steve requested to
recognize whatever Natasha was knewing. She disclosed to roger about the conceal shooter was
referred by the knowledge of the world as The “Winter Soldier” and Natasha was experiencing
him earlier from quite a while ago. Rogers inferred about the intel which was usefull on the blaze
drive, which was the reason The “Winter Soldier” was entrusted with the death of director of
SHIELD that is fury . “Rogers and Romanoff”, camouflaged in regular citizen clothing, made a
beeline for a nearby Washington D.C. shopping center which was prest in the company named
Apple center where Natasha endeavored to peruse the record on a workstation yet got the
information encryption difficult to split and realized that the following nine minutes
“S.H.I.E.L.D”. would surround the position where they were present. She chose to locate the first
source utilizing a “satellite tracker” to stick point the information starting points which
uncovered a spot in “New Jersey” very commonplace to Rogers. Law requirement was quite
delayed to appreciate the need for crime scene investigation strategies to PCs and other technical
machines. During the year of the 1980s, “digital forensics was the public who are working for
police departments or any law governing the body. People with a hobby in computers and
technical knowledge were also a part of this digital forensics. Data storage was the main part of
attention for the police departments and the law governing bodies because of the reason that
examiners had to go to seize, hold and breakdown documentation from suspects. As the Strike
power unit surrounded them, both kissed, and their open presentation of warmth enabled them to
avoid the group. Both laid hold of the jeep which was going to “New Jersey”. While driving,
Natasha teasingly inquired as to whether that was his first kiss since the 1940s and in the event
that he had understanding. Steve guaranteed her it wasn't. The touching base at “Camp Lehigh”
where Rogers recalled his preparation that was done with the “Strategic Scientific Reserve”.
Natasha, in the meantime, scanned for the wellspring of the sign yet was not able to discover one
accepting they had hit an impasse. The framework got up, and a computerized variant of “Arnim
Zola” showed up on the screen, he uncovered what had happened after his catch by the Captain
along with his partners and the moment where body could not salvage, he moved his brain into
DIGITAL FORENSICS ASSIGNMENT
13
programming and in that procedure he helped in shaping “S.H.I.E.L.D”. after the completion of
War World 2 yet in addition set moving sleeper HYDRA operators to invade and assume control
over the association and throughout the previous seventy one year’s HYDRA was functioning
S.H.I.E.L.D in a way to push the whole world to the brink of collapse. Zola had been taking a
shot at a calculation for HYDRA for wiping out their present dangers and potential dangers in
the future. He told Natasha as well as Steve that a portion of the passing of SHIELD. Pioneers
had been because of HYDRA utilizing their professional killer, in which “Howard Stark” was
also included. “Zola” was additionally associated with the production of “The Winter Soldier
program”. “Romanoff” asked about the “Project Insight” was, Zola reacted by revealing to them
that they could not come fast on schedule; he was slowing down. Rogers drag to the overall
mesh of sewer vent up and, with the girl Natasha, bounced into the matter and utilized his team
of shield to secure them, when a rocket knock the shelter and trash of it fell around all of them.
Energetically, Rogers pushed free of the debris and jetsam at that point did Natasha to wellbeing
before the Strike power showed up nearby. Coming back to Washington, Rogers goes to Sam,
requesting a spot to remain briefly. As both tidied themselves, Rogers saw that she was not
feeling well, so he moved toward Natasha. She told about the disclosure of “HYDRA”
penetrating “S.H.I.E.L.D”.
Report Triage
Investigate Collect
process Decrypt
DIGITAL FORENSICS ASSIGNMENT
14
Answer6.
Steve Rogers email address is chrisevans_captainamerica@[Link]
When we first saw him on screen, he was very skinny and got beaten up by the big boys. Soon
after that, he got a “super-soldier serum” and finally got an aim in his life to do work for the
country. The best thing about Captain America is he does not give up easily. He keeps on
fighting until his last breath. Based on his role that he has been playing, this can be further said
that his role in terms of reducing and controlling the situation of war has been remarkable. He
has contributed a lot in terms of strengthening his army to tackle any situation. He was a class of
a soldier and was very decorated among them. Soon after that he took part in the US Army and
fought by their side against Nazis in “World War 2”. He was one of the super-soldiers with a
brave soul. Nazis used to call him “Red Skull”. He had lightning speed and a powerful body.
Soon the army sent him for a tour to” sell war bonds”. When his friend “Barnes army” got
captured, he decided to jump in the fight and fight it out like real men. He was a “one-man
fighting machine”. He had a stylish shield in his hand which was made by Wakandan metal. It is
also called vibranium. It began with the fact that many of the documentation was not devoted to
paper. The first formal program for digital forensics was introduced by the FBI at all the law
governing bodies. In the meantime, lots of techniques are being used to identify and track down
the hackers as they interfere in the systems of computers which were developed “ad hoc” in the
private sector. A generally classified seminal point came in the year of 1986, when Cliff Stoll
who was a system admin at “Lawrence Berkeley National Laboratory”, tested to look out
fingering a hacker who was from German and who was breaking into delicate systems and
trading data to the KGB [Referred to appendix 1].
DIGITAL FORENSICS ASSIGNMENT
15
He used his shield in all of his fights as it can block enemy attacks and it can also be used as a
throwable weapon that comes back to the owner i.e. Captain America on throwing to the enemy.
It was his “constant companion” along his journey in the Marvels. He became a “symbol of
strength”. He was also good at using fire weapons but he rarely carried them as the shield was
very powerful and his “suit was bulletproof”. His first enemy was a Nazi scientist who was part
of the Hydra family. He also fought a battle with the supervillain Thanos. He did his part
in “stopping the Titan” which would end the world and make the population half.
Answer 7
Steve Rogers's password was Captain America. Before Captain America, his full name
was Captain “Steven Grant Steve Rogers” who was developed by “Abraham Erskine” to fight
during “World War 2”. Before going to MIA he fought against Hydra and Nazis. It was Captain
America and Natasha who discovered that Hydra has a secret team within SHIELD. He along
with “Sam Wilson” destroyed Hydra. After the peacemaking program went rogue and started to
kill all the innocents, Steve killed Ultron. He later became the “leader of Avengers” and went
on a mission to stop Rumlow from getting the most dangerous weapon which is a biological one.
The mission failed because many of the innocents were killed. He was one of the most decorated
soldiers in Avenger who was very classy. He has been using his device since he was part of the
SHIELD and has thus played a major role. He has contributed a lot in his field and as a result,
this has been seen that he has been preferring the password that can protect the device. He is one
of the glorious avengers who have fought many battles effectively. Hence, he has preferred using
these passwords so that he can protect his device from any kind of outer attack. When Tony
Stark returned in “Endgame” he confronted Captain America and mentioned him about the
mistakes that he had done. Therefore it forced Captain America to correct his mistakes and fight
for it. He then kept himself at a distance from Avengers. But he told Natasha that from inside he
was with the Avengers as he did not move on. It was a big leap for Captain America that we can
see in “Age Of Ultron” and “Civil Wars”. Barnes conducted a research and found that the
avenger is mobilize to exclude the particles of HYDRA. This creates roger to join his old
teammates. Avengers operate a mission in the whole world to trace crossbones. Steve roger also
DIGITAL FORENSICS ASSIGNMENT
16
hire gabe jones and his team to attack on the base of HYDRA. Roger with gabe jones team
destroy maximum mission of HYDRA. In a train incident roger and his team successfully
capture Zola but during the process barns somehow fall from the train and landed to roger
apartment. In 1940, roger wake up in hospital and found a audio from radio broadcasting a game
of baseball which he attempted in 1941. This was creating some doubt in his mind. He suddenly
goes to Times Square outside and found that all things all happening in present. Director of
SHIELD calls him and inform that you are in sleep for almost seventy years. Fury goes to the
roger and give him a mission with the world. Some of the apps that are being run by steve on his
laptop are “7-Zip, Adobe acrobat professional”. These were certain applications that are being
operated by steve on his computer. Steve, one of the key members of the organization and also
being known as captain America must ascertain the facts behind this. Steve and his contribution
have been one of the considerable points that need to be considered effective. Steve who has
been working under Nick fury was responsible for all kinds of missions and hence he has
initiated many ways to sustain this mobility in the SHIELD. Steve roger’s main aim was to
destroy all the ongoing mission of HYDRA at all its base. Rogers and his team had conducted
many project and mission to go through the missions of HYDRA.
After a while when he woke up from ice he found himself in an “unstable situation”. The story
of Captain America is a tragic story Referred to appendix 2]..
Answer 8
Based on the details and information found using extensive methods of digital forensics
conducted on the flesh device, this can be stated that the computer that is being used by him has
been infected. The infected PC is being used by hi for the communication had led to making this
investigation on the matter. Therefore, this has been suggested by him to look into the matter
extensively. He has looked into the matter and therefore consulted with an analyst of digital
forensics to find out what went wrong with the device he has been using. Roger, being the
captain of America, has been playing a very crucial role in this regard. He has been one of the
DIGITAL FORENSICS ASSIGNMENT
17
main characters who have contributed significantly in terms of sustain g the value of the
SHIELD. He has been witnessing some of the glorious experience of life as being the part of the
many battles that have been fought. Some of the battles that can be explained are the battle of the
network. He has been working under the nick fury and has been one of the key members of the
shield. He has played a very important role in terms of sustaining the value of the SHIELD. This
can be further said that Roger has been utilizing all the resources that he has. One of the most
important parts of the instruments that are being used by him is the computer that he has been
using. Based on the data and evidence that has been collected, this can be stated that the role that
his computer is one of the important sources of communication that he has been making over the
years. Roger knew the consequences of the situation in case his device is infected by the virus.
Being one of the key members of the SHIELD, he has been playing major roles. Therefore, it is
important to safe the device forms any kind of outer attack. Keeping this in mind he has
suggested consulting a detailed probe as to how this happened with the device Referred to
appendix 3]..
Answer 9
Daisy Johnson was a “high-level hacker” who was also known as “Skye”. She was a SHIELD
operative. Her mother was killed by HYDRA. She was sent to find Phil Coulson because she
needed him by her side. He was Nick Fury’s right hand in almost all the missions and later
became the “Director of SHIELD”. He led to the “resurfacing of Captain America” and ran
many operations whether in tactical, interference and surveillance. During a war between Loki,
he was defeated by Loki which gave a push to the Avengers. Later on, he got healed and formed
a new team and became its leader and started dealing with “the SHIELD cases”. He came to
know all the truth about HYDRA and SHIELD after his death. Soon after that when Hydra was
becoming more powerful then he started to sent his force to fight with HYDRA and later got
victorious in the battle against Garrett. After this battle, Nick Fury gave him the post of Director
in the SHIELD team. He thus became an agent while working for SHIELD. Daisy puts more
weight on herself than she should. Despite the fact that ascending in the S.H.I.E.L.D. positions,
DIGITAL FORENSICS ASSIGNMENT
18
she's not reluctant to disrupt a couple of guidelines to secure her companions or those out of
luck.
10. Answer
Daisy Johnson who was also known as “Quake”, is a secret agent on the organization
intelligence “S.H.I.E.L.D” and she has the generating power of the earthquake. She was
destined to Calvin Johnson and Jiaying, yet was removed when her mom was apparently
slaughtered by H.Y.D.R.A. Growing up a vagrant, she embraced the name Skye who worked for
the agency “Rising Tide”, putting her in the S.H.I.E.L.D 's. radar. Notwithstanding, Phil Coulson
selected her into his group and delegated her as an advisor where she turned into an esteemed
operator during the chase for the Clairvoyant. After the occasions of the H.Y.D.R.A Upgrowing,
she had joined the remainder of her group in going off the network. Skye was crushed when she
discovered that Grant Ward was an H.Y.D.R.A usable, and she has joined the group in
overcoming the Project of Centipede and John Garrett. During the year of 2008, Daisy Johnson
joins as a secret warrior in the team of Nick Fury under the codename “Quake”. Skye was a
hacktivist with the Rising Tide until and unless in later she was selected by the
organization “S.H.I.E.L.D”. Roger, captain of America is one of the brave soldiers who fought
bravely in the battle of newyork and sustained the legacy of bravery in the fictional movie of
America. This has been mentioned with some of the instances that are the part of his life
journey as frictional character. He has sustained the very firm position in the organization named
SHIELD and always strived for the bravery as frictional character. Being one of the soldiers he
always sustained his team of and won many battles.
Answer 11
DIGITAL FORENSICS ASSIGNMENT
19
Answer 12
DIGITAL FORENSICS ASSIGNMENT
20
Figure 5: Timeline
Figure 6: Timeline
21
Conclusion
Digital forensics plays a very important role in order to investigate the matter that primarily
happens with the devices. This technical report has critically assessed the various aspects of
digital forensics. A clear difference between scientific analysis for research goal and forensic
analysis using a scientific approach has been made. It is crucial to remember this distinction. The
Research of Scientific is always subject to alteration whereas forensic analysis should result in a
clear-cut result and any circumspection on that result made fair to a court. Digital forensics plays
a very important role to solve crimes with digital services and also against digital services. It has
given a broader view of the scope of computer forensics. A difference between research and
scientific investigations had made. Different techniques and sound tools exist to analyze and
search digital data. Disregarding of the tools, emerging digital age and evaluation of technology
needs a large amount of research in digital forensics.
DIGITAL FORENSICS ASSIGNMENT
22
Reference List
Book
Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015). Cybercrime, digital forensics and
jurisdiction (Vol. 593). Springer. Retrieved from: [Link]
content/uploads/2017/12/[Link]
[Retrieved on: 04.09.2019]
Journal
Al-Kawaz, H., Clark, N., Furnell, S. M., Li, F., & Alburan, A. (2018, June). Advanced facial
recognition for digital forensics. In 17th European Conference on Cyber Warfare and
Security (pp. 11-19). Academic Conferences and Publishing International Limited.
Retrieved from:
[Link]
_Digital_Forensics_Hiba_Alkawaz.[Link] [Retrieved on: 04.09.2019]
Cohen, F. B. (2015). Digital diplomatics and forensics: going forward on a global basis. Records
Management Journal, 25(1), 21-44. Retrieved from: [Link]
[Link] [Retrieved on: 04.09.2019]
Du, X., Le-Khac, N. A., & Scanlon, M. (2017). Evaluation of digital forensic process models
with respect to digital forensics as a service. arXiv preprint arXiv:1708.01730. Retrieved
from: [Link] [Retrieved on: 04.09.2019]
Griffin, P. K., Emmerthal, L. D., Aurigemma, K., Raabe, E. W., Bedoya, L., Oestreicher, K. E.,
& Shanley, J. H. (2018). U.S. Patent Application No. 15/619,623. Retrieved from:
[Link]
[Link] [Retrieved on: 04.09.2019]
DIGITAL FORENSICS ASSIGNMENT
23
Karie, N. M., & Venter, H. S. (2015). Taxonomy of challenges for digital forensics. Journal of
forensic sciences, 60(4), 885-893. Retrieved from:
[Link]
ence=1 [Retrieved on: 04.09.2019]
Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016). Current challenges and future
research areas for digital forensic investigation. arXiv preprint arXiv:1604.03850.
Retrieved from: [Link] [Retrieved on: 04.09.2019]
Losavio, M., Seigfried-Spellar, K. C., & Sloan III, J. J. (2016). Why digital forensics is not a
profession and how it can become one. Criminal Justice Studies, 29(2), 143-162.
Retrieved from:
[Link]
_not_a_profssion_and_how_it_can_become_one.pdf?response-
contentdisposition=inline%3B%20filename%3DWhy_digital_forensics_is_not_a_profess
[Link]&X-AmzAlgorithm=AWS4-HMAC-SHA256&X-Amz-
Credential=AKIAIWOWYYGZ2Y53UL3A%2F20190911%2Fus-east-
1%2Fs3%2Faws4_request&X-Amz-Date=20190911T160105Z&X-Amz-
Expires=3600&X-Amz-SignedHeaders=host&X-Amz-
Signature=5bcbc0cb9b3e71767ef2be278f4344ed2b10d0d4d8843b024d9953a896634f0c
[Retrieved on: 04.09.2019]
Mir, S. S., Shoaib, U., & Sarfraz, M. S. (2016). Analysis of digital forensic investigation
models. International Journal of Computer Science and Information Security, 14(11),
292. Retrieved from:
[Link]
SIS_CameraReady_pp._292-[Link]?response-
contentdisposition=inline%3B%20filename%3DAnalysis_of_Digital_Forensic_Investiga
DIGITAL FORENSICS ASSIGNMENT
24
[Link]&X-AmzAlgorithm=AWS4-HMAC-SHA256&X-Amz-
Credential=AKIAIWOWYYGZ2Y53UL3A%2F20190911%2Fus-east-
1%2Fs3%2Faws4_request&X-Amz-Date=20190911T161826Z&X-Amz-
Expires=3600&X-Amz-SignedHeaders=host&X-Amz-
Signature=ad6e688a511f3281532d2c8438bf8462a250cf781a2e9f61f42d21c9915f18ad
[Retrieved on: 04.09.2019]
Montasari, R. (2017). A standardised data acquisition process model for digital forensic
investigations. International Journal of Information and Computer Security, 9(3), 229-
249. Retrieved from: [Link]
[Link] [Retrieved on: 04.09.2019]
Neuner, S., Schmiedecker, M., & Weippl, E. (2016). Effectiveness of file‐based deduplication in
digital forensics. Security and Communication Networks, 9(15), 2876-2885. Retrieved
from: [Link] [Retrieved on:
04.09.2019]
Valjarevic, A., & Venter, H. S. (2015). A comprehensive and harmonized digital forensic
investigation process model. Journal of forensic sciences, 60(6), 1467-1483. Retrieved
from:
[Link]
[Link]?sequence=1 [Retrieved on: 04.09.2019]
Valjarevic, A., & Venter, H. S. (2016). Introduction of concurrent processes into the digital
forensic investigation process. Australian Journal of Forensic Sciences, 48(3), 339-357.
Retrieved from:
[Link]
f?sequence=1 [Retrieved on: 04.09.2019]
Watson, S., & Dehghantanha, A. (2016). Digital forensics: the missing piece of the internet of
things promise. Computer Fraud & Security, 2016(6), 5-8. Retrieved from:
DIGITAL FORENSICS ASSIGNMENT
25
[Link]
f [Retrieved on: 04.09.2019]
Yang, M., & Chow, K. P. (2015, January). An information extraction framework for digital
forensic investigations. In IFIP International Conference on Digital Forensics (pp. 61-
76). Springer, Cham. Retrieved from: [Link]
[Retrieved on: 04.09.2019]
Online Article
[Link] , 2018 Forensics Image Acquisition Process of Digital Evidence Retrieved from:
[Link] [Retrieved on:
04.09.2019]
[Link] , 2018 Digital forensics investigative framework for control rooms in critical
infrastructure Retrieved from:
[Link] [Retrieved on:
04.09.2019]
26
Credential=AKIAIWOWYYGZ2Y53UL3A%2F20190911%2Fus-east-
1%2Fs3%2Faws4_request&X-Amz-Date=20190911T162203Z&X-Amz-
Expires=3600&X-Amz-SignedHeaders=host&X-Amz-
Signature=23469b9dab898c5c21b250855e55fb94a5407ed51dfae34f920570bc9bdec236
[Retrieved on: 04.09.2019]
Website
27
Appendices
Appendix 1: Digital Forensics Process
(Source: [Link]
[Link]/images?q=tbn:ANd9GcTQHH0J2PN9FedRHTrmdebnOYegBFBS34HHzuK7E
BCRFYinD8572g)
DIGITAL FORENSICS ASSIGNMENT
28
(Source:
[Link]
238801408@1533945011919/[Link])
DIGITAL FORENSICS ASSIGNMENT
29
( Source : [Link]
[Link]/images?q=tbn:ANd9GcTAE2EaTXqigE5LFW7eIXJlJjhyWwIfinqoXh3-
Lpjz9pQBc3v6bg)
DIGITAL FORENSICS ASSIGNMENT
30
Task: 2
Abstract— The essay will be on the topic of Forensic Standards and Legal Regulations which will
discuss elaborately on the various problems that the modern world is facing today due to the more
and more dependence on the internet and computer. A security system in the form of Digital Forensic
will provide convenience and support to the people to freely use their systems. It will ensure that the
user's details are not leaked and the criminals are not able to misuse the technology. It will discuss the
advancements of technology and how the criminals try to use it to escape from the crime. At last, it
will give a convenience that the Digital Forensic is developing and always trying to stop cybercrime as
people and organizations are relying more on computer-generated information for their daily
processing.
Introduction
The topic selected for an essay is Forensic Standards and Legal Regulations which discusses various helps
that Digital forensic provides and at the same time it covers problems that the Digital Forensic is facing
in a modern-day generation. People are relying more on the computerized data and therefore needs a
security setup to save the privacy of the user's order to keep criminals away from the cyber crimes and
help people to be a victim of such unlawful activity. It is an urgent need of the hour to review the
progress of the investigation that Rogers has carried on for the conformation and identifying the
previous mistakes. It is also necessary to evaluate because it may help in the future findings of the
research. Digital Forensic helps to find and collect the digital or computerized data that can be used in
any criminal work. It not only covers computer data but anything that can store any kind of essential
data that can be used to harm or in criminal activities.
Previous Work
Digital Forensics works in a complex scenario and it must be fast-moving. With more usage of cloud
storage, E-wallet, Internet access, and smartphones the risk of digital crime always persist and it
imposes a high risk(Coulthard et al. 2016). The risk is not just bound within the four walls but across the
international borders and the seas. Any person from any corner of the world can commit a crime and
damage someone's interest with a simple computer system and a high-speed internet
DIGITAL FORENSICS ASSIGNMENT
31
connection(Dirkmaat,2015).. Therefore digital forensic experts are required under the legal jurisdictions
to collect the data in large quantities buried for digital activities. In the coming days "Digital Forensic"
will face new and tough challenges. The increasing number of cybercrimes is making law enforcement
agencies and other intelligence agencies busy and active to combat the crimes. The modern Digital
Forensics is covering vast aspect from law to computer applications and finance-related issues.
In the past few years, the Digital Forensics has seen a significant change in the field of technological
advancements to support and aid data collection and research during the digital investigation(Akbal,
Günes & Akbal, 2016). The concept of Digital Forensics came into force during the 90s when the crimes
related to computers started growing. It was the period of the rapid growth of computers and the
internet and it was gaining popularity. The period from the year 1999 to 2007 is considered to be the
Golden era for Digital Forensic. It was seen as a time machine that could see into the past criminal works
and freeze the ongoing criminal activity. However, with advancements in technology and the skill of
people, it still possesses great threats. Today the Forensic technicians are not able to properly collect
the data systematically and analyze and study the data even if it is collected. This problem is more
prominent in the case of mobile and cell phones. From the beginning of the Digital Forensic to date the
field of this area has vastly exploded. The increasing incidents of hacking there is a strong need for a
sophisticated network of such intellectuals, who can identify the threats in due time and stop it before
anything undesirable incident occurs.
The data of any device is said to be acquired when the digital data is acquired and secured for the
examination of the crime that was done. It will be fatal for any organization to neglect the threat of
computer forensics or handle it improperly(Mohammed, Clarke & Li 2016). It may result in destroying
vital information and may be legally held in the court for improper usage of the data for failing to
protect customer data. It is also beneficial as it saves the organization money. Many organizations invest
a lot of their capital just to ensure the security of their stored data. Anyone who is looking into the
matter of computer forensic must have a good grip on the legal aspects and need to take decisions and
actions under the legal guidelines. Any organization dealing with security-related matters needs to
assure its security so that the critical data does not go into the wrong hands(Montasar 2016). These
organizations can be an arms manufacturing company or intelligence agencies. In recent times there has
been a massive increase in the number of attacks through the internet. It is estimated that in the next
few decades wars among the nations will be on the digital platform rather than bombs and missiles as of
now(Ramadhani, Saragih, Rahim, & Siahaan 2017)
Therefore the major objective of Digital Forensics is to safeguard the data, identify it and analyze to
preserve the authenticity of the evidence that is collected so that it can be used in legal cases.
DIGITAL FORENSICS ASSIGNMENT
32
New Project
Digital Forensics played a major role in many of the Forensic Standards and Legal Regulations
investigations. The tools used in the Digital Forensics are within the law. There is rapid development in
the forensic tools in the past few years and it has been done successfully. New tools developed have
replaced the older tools that have become obsolete and unable to collect the data efficiently(Sun,
Shih& Hwang 2015)
. The inefficiency of the older tolls resulted in the delayed analyzation of the data which resulted to wait
for months before the actual data. Not just the tools but development in the process of research
techniques is also equally important to cope up with the upcoming technologies. The new emerging
problem of Digital Forensics employs the modernization of the methods of collecting the data and also
to maintain the authenticity of the data that is collected so that the final result is not hampered. When
there was a need for an in-depth analysis of the data there are no such software to analyze the data and
the researchers relied more on the collection which was considered appropriate. This problem was
sensed by the software developers and developed and advanced their development in that direction.
Many of such software are available and even in the free source. As Digital Forensics is developing it
allows larger volumes of data to be processed and is not fixed to a location. The evidence collected in
this system is not like the physical data collected and may not be applied to the same rules.
Digital Forensics is already growing at a fast rate and is beyond the analysis of the hard disk images.
Collecting memory images varies in the data being collected. A universal method to deal with the issue
has been adopted. The live investigation modifies data that is stored but the data must be acceptable to
the court(Weiser, Biros& Mosier 2016
)
It is expected that the speed of the then forensic tools will increase up to a speed of more than 5 times
and will be faster and more sophisticated by twice. It will only take half of the effort that we now put to
examine data and in a short period. A lot of new automated tools are developing which can be used and
handled by less-skilled workers and hence data collection and processing of the data will be much easier
and faster as from now. However, the cost of forensic tools may not go down in the future but more
open source software and tools will be freely available for the ones who are willing. The final results may
not be 100% valid. In some cases, the programs may have some error causing the system to hang or
stop. The cost of the operation can be from minimum to maximum depending on the type of
occurrence. This may incur a loss or delay in service or discontinuity in the process. The prolonged delay
in the process may result in the termination of the project or incur a huge loss to the project. This loss
greatly depends on the dependency of the business, how much it is dependent on the Digital Forensics
as computing has become important to every business and industry. Any business operation running
smoothly will be hampered if there is a discontinuous flow of information in the business. When this
happens the productivity of the company declines and the lower level of the company is badly affected
and if this continues for the long term than the outcome of the result will be unacceptable. The
DIGITAL FORENSICS ASSIGNMENT
33
companies in recent years have relied on the system generates information and any misinformation or
interruption of the data will put a halt on the functioning of the organization.
Digital Forensics is on the top of its evolution not as advanced and high tech technology but due to the
reliance of the people as a necessary tool for the business. The use of computer technology in
committing crimes like theft, murder, dri\ug trafficking, and money laundering has put it into the
category of the criminal tool.
Recommendations
The digital Forensic is still considered a new concept and still, the new framework needs to be
incorporated to make it a more secure platform to conduct secret business activities and public details
must not be released or leaked into the public. Steps and the method of findings are different from
country to country and the country law may not support the forensic findings. The related laws need to
be reformed more to strengthen the forensic activities and stop criminal actions and bring the law
abusers into the spotlight for proper jurisdiction. This is the reason why digital forensics is still
considered to be in a developing stage and considered young. The major problem that persists with
digital forensics is that the digital evidence is a lot more easy to remove with the advancement in the
technology the crime makers find one way or the other way to hide themselves out from the
investigation. The criminals hide their data in the storage data which makes it extremely difficult for the
investigators to detect the actual data. The developers need to somehow go forward in this direction
and need to find a way so that no such data can be hidden for the investigators to make the job easier
and faster. Any intelligent attacker can hide the data related to the process which some of the hackers
may not be able to do so. Some times the data to be investigated may be large and the investigators
have to go through a large number of files which consumes a lot more time. Since time plays an
important role in many of thee cases it is challenging for the investigating team to process all the data
properly and thoroughly. The investigators need to find a solution to this issue to fasten their
investigation without missing any evidence so that at last the final result is not hampered. At last, comes
the legal challenges, as in many of the cases the investigators need to get through such data that may
hamper the privacy of the company to get the [Link] may generate thousands of data that can
not be shared to maintain the secrecy of the company which is compromised by the investigation. Such
related issues regarding the privacy of the company or individual needs to be considered for fair and
clean investigation.
Conclusions
The ever-advancing technology is no drought benefitting human life but all this progress comes at a cost
of cybercrimes in the form of computer crimes. Digital Forensics is a new concept and it is fast accepted
DIGITAL FORENSICS ASSIGNMENT
34
by the people and organizations. Digital forensics is helping to find out crime and criminals that try to
commit computer crimes. These assure the users to use the computer and internet freely as it provides
security against the criminals. Surely, the development of computer forensic will grow in the future to
stop the cyber-related crimes and it is not stopping shortly as humans with more automation and
computerization relying more on computer-generated data for its daily proceedings, therefore, it needs
high security in the form of Digital Forensics.
References
Book
Coulthard, M., Johnson, A., & Wright, D. (2016). An introduction to forensic linguistics: Language in
evidence.
Routledge.U.K.,Retrievedfrom:[Link]
o_Forensic_Ling.pdf?response-content-
disposition=inline%3B%20filename%3DAn_Introduction_to_Forensic_Linguistics.pdf&X-Amz-
Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIWOWYYGZ2Y53UL3A%2F20190911%2Fus-
east-1%2Fs3%2Faws4_request&X-Amz-Date=20190911T160443Z&X-Amz-Expires=3600&X-Amz-
SignedHeaders=host&X-Amz-
Signature=824353f500f4600f2021f25477fbc688083c5a4125ebee37f91e2d5122b4d058[Retrieved on
01.09.2019]
Dirkmaat, D. (Ed.). (2015). A companion to forensic anthropology. John Wiley & Sons. U.S, Retrieved
from:[Link]
_Graves_and_Resolving_Commingling_Issues_through_Spatial_Analysis/links/567428a008ae502c99c77
f84/Archaeology-Mass-Graves-and-Resolving-Commingling-Issues-through-Spatial-
[Link][Retrieved on 01.09.2019]
Journal
Akbal, E., Günes, F., & Akbal, A. (2016). Digital Forensic Analyses of Web Browser Records. JSW, 11(7),
631-637. Turkey, Retrieved from:
[Link] [ Retrieved on
01.09.2019]
Mohammed, H., Clarke, N., & Li, F. (2016). An automated approach for digital forensic analysis of
heterogeneous big data. Australia, Retrieved from:
[Link]
554&context=ecuworkspost2013 [ Retrieved on 01.09.2019 ]
DIGITAL FORENSICS ASSIGNMENT
35
Montasari, R. (2016). Review and assessment of the existing digital forensic investigation process
models. International Journal of Computer Applications, 147(7), 41-49.U.K. Retrieved from:
[Link] [Retrieved
on01.09.2019 ]
Ramadhani, S., Saragih, Y. M., Rahim, R., & Siahaan, A. P. U. (2017). Post-Genesis Digital Forensics
Investigation. Int. J. Sci. Res. Sci. Technol, 3(6), 164-166. Malaysia, Retrieved
from:[Link]
Post-Genesis_Digital_Forensics_Investigation/links/597f55c5458515687b4acda3/Post-Genesis-Digital-
[Link][Retrieved on 01.09.2019]
Sun, J. R., Shih, M. L., & Hwang, M. S. (2015). A Survey of Digital Evidences Forensic and Cybercrime
Investigation Procedure. IJ Network Security, 17(5), [Link], Retrieved from:
[Link] [Retrieved on
01.09.2019]
Weiser, M., Biros, D. P., & Mosier, G. (2016). Development of a national repository of digital forensic
intelligence.U.S, Retrieved from
:[Link]
icle=1002&context=adfsl[Retrieved on 01.09.2019]
Online Article
[Link] , (2016), Ireland, Evaluation of Digital Forensic Process Models with Respect to Digital Forensics
as a Service, Retrieved from: [Link] on
01.09.2019]
Website