SlideShare a Scribd company logo
Crimea: Russia or Ukraine? An International Law Perspective
Crimea was annexed by Russia in 2014 after a referendum
was held which was not up to international standards. This
move was largely condemned by the West and most of the
international community does not recognize Crimea as a
legitimate part of Russia, though it is now ruled by Russia and
applicable to its laws, currency, and military. For example,
residents of Crimea, even those who did not vote or voted
against the annexation, are subject to the Russian conscription
law which states that all healthy males aged 18 are required to
complete mandatory military service unless unable to do so for
a medical reason or if they are enrolled in a university
(Conscription Service, p. 1). Up to today, Ukraine and Russia
both claim that Crimea is theirs and there is no agreement
reached at the time to settle this conflict.
Background on how crimea was taken (maidan revolution,
etc.)
In order to begin to understand which country Crimea
belongs to, it is important to understand the history of the
peninsula. Crimea has been part of the Russian empire
beginning in 1783 (Kramer, 1) after the defeat of the Ottomans
up until 1954 when, during the Soviet Union, it was given to the
Ukrainian SFSR by Premier Khrushchev.
Russia’s argument as to why Crimea is theirs
West’s argument as to why it belongs to Ukraine (their
own motives and desire for influence)
International Law analysis
Works Cited
“Conscription Service.” Counterterrorism : Ministry of Defence
of the Russian
Federation, eng.mil.ru/en/career/conscription/determent.htm.
Kramer, M. (2018, February 02). Why Did Russia Give Away
Crimea Sixty Years Ago?
Retrieved December 07, 2018, from
https://www.wilsoncenter.org/publication/why-did-russia-give-
away-crimea-sixty-y
ears-ago?gclid=CLHnyZC7ndACFSLicgod-UEIXw
Milestone One: MEMO Draft 1
Milestone One: MEMO Draft 6
THIS IS THE PROFESSOR’S COMMENT ON THE MEMO
AND NEEDS TO BE FIXED FOR FINAL SUBMISSION.(
Gifty,Thanks for getting this turned in. For a memo, this is a
little long. You will want to be more succinct and cut this down
a bit.)
MEMO
DATE: 12/08/2018
TO: Non-expert Stakeholder
FROM: (Cybersecurity Practitioner)
SUBJECT: DIGITAL FORENSIC INVESTIGATION
MEMO
Over a period of years digital forensic investigation has out
grown into a body that in need of details digital forensic model.
Different academic researchers have suggested over a hundred
different types of investigation procedural models. In addition
to this proposed model over the years, there has been a
challenged whereby the model lack experimental testing to
ascertain the truth about the investigation. More so there is a
need of evaluating the same model to complement the process of
investigation progression in support to the entire scientific
community (Learner, D. E. (2009). Electronic crime scene
investigation. New York: Nova Science).
Based on the experienced encountered in ACME Company on
digital forensic investigation on Patrick Drew, there was
suspicions activities from HR department. The suspicion was
not proven. The information is handed over to IT department to
take a further analysis on the act and gather more details that
will give a clear and precise picture what the Company might be
facing. With the level of clearance that Patrick Drew has with
the Company operation, schematics, file and other technical
references maintenance, it was clear that he might be plotting to
tamper or steal information from the company to auction it to a
competitor. ACME company databases is preserve and
reinforced by security operation center (SOC). The center uses
Snort as an essential component of their security information
and event management (SIEM). Upon the suspicion, there was
an alert from SIEM to SOC of an existence of peer-to-peer
movement emanating from an internet protocol registered to
Drew’s computer. Realizing that there was transfer of files from
the same internet protocol, center for security enacted a two-
factor authorization to prevent sharing of files from one end to
another. This incident call for further action where the legal
team and Human Resource department decided to conduct
further digital forensic investigation on the matter.
There was a call to investigate the incident and the task was
handed over to digital forensic investigation team. For any
investigation to be conducted there must be due process that
should be followed to prevent any suspicion from the
investigated subject and to maintain a legal order that calls for
the same action. This process includes:
IDENTIFICATION
This is a process of identifying an incident from indicators and
defining the type of intrusion in the company. In this context
identification happens when SOC was alerted by SIEM of a
peer-to-peer files transfers which raised suspicion after (HR)
department reported the same suspicion from an internal worker
plotting to still the information.
PREPARATION
Digital forensic investigation should be ready to conduct the
process by gathering the required tools, methods, law suit
warrants, and overseeing authorizations and administration
support. Preparation in this scenario is understanding and
acknowledging the presents of SOC and SIEM and more so HR
department by monitoring and identifying the threats and taking
an initiate to investigate the matter. Presence of Snort and
Intrusion Prevention System contributed a lot to investigation
and gathering of facts.
METHODOLOGY PLAN
Formulating a plan based on possible witnesses and the
specified system in questions is also an essential strategy that
ease the entire investigation process. The core value for this
methodology is to collect proof of untainted facts in addition to
maximizing the effect on victim. The purpose of the process in
this scenario was to avoid the entire digital forensic
investigation from second guessing from the entire ACME
Company and the legal department on their initiate the
investigation on Patrick Drew suspicion and alleged data stolen.
Formulating a plan is give a clear picture and step to be
followed other than just rushing into the process without a
proper plan.
PROTECTION
All the evidence gathering from the crime scene were isolated,
fortified and the condition of physical and digital facts. The
entire process includes limiting the entire staff from using any
electromagnetic devices or digital devices in the scene. The
greater purpose of these process is avoiding any alteration to
the content that is under investigation by any part with the same
motive. Protecting evidence by digital forensic investigation
team is of important when conducting investigation of such
nature. Subject under investigation is presumed to have the
knowledge of the process and hence he/she might end up
tampering with the evidence.
ASSEMBLY
On identifying the physical scene all data should be recorded
and replicated with a standardized procedure which is legal and
follows due Company procedure.
SCRUTINY
There should be a deep search for facts involving the suspected
crime. The entire process involves focusing on recognizing the
pinning the essential evidence that are within unusual sites.
After collecting the facts, a detailed documentation analysis is
constructed.
BREAKDOWN
After gathering all the potential evidence, we determine the
importance, regenerate the pieces of information and come up
with a conclusion that lie entirely on the facts discovered on the
scene. The process might take long enough to come up with
actual and enough evidence to support the crime theory.
EXHIBITING
Final purpose for this entire process is to issue out exhibits that
will support crime theory. The reason behind presenting the
exhibit is to evaluate and relate whether the data collected and
analyzed matches with what the entire suspicion or allegation
was. Issuing out or presenting collected information to the
company by digital forensic investigation agency means that
they are in their full satisfactory state of what they have
gathered, and it is up to the Company to take further law suit
disciplinary process to the subject under investigation.
IMPACTS ON SECURITY
Respectively, there is a rise in the number of digital crimes in
each year in the entire world. With the changes in technology
and software users digitally savvy. The lawbreaking they
commit become refined. Legal suit is in a continuous race with
these criminals minded to make sure that the playing ground
remains leveled. Part of the process is coming up with
appropriate tools that will gap with the rise of the same crimes.
ACME Company should embrace the idea of developing a
constant team assigned to conducting investigation and auditing
every activity in the company. The impact to security in this
scenario is so sensitive that the company was in a position of
losing the entire company production under Patrick Drew
management.
With the information collected from the scene and the attempt
of stealing, company realized that every staff should be put
under monitoring process to avoid further of information.
Information collected prove beyond doubt the accuracy and
validity of the crime theory and call for further action. ACME
Company will take further action to the subject under
investigation and establishes defensibility against the Patrick
Drew action (Erickson, E. (2015). Criminalistics laboratory
manual: The basics of forensic investigation).
REFERENCES
Erickson, E. (2015). Criminalistics laboratory manual: The
basics of forensic investigation.
Muda, A. K., Choo, Y.-H, Abraham, A., & N, S. S.
(2014). Computational Intelligence in Digital Forensics:
Forensic Investigation and Applications. Cham: Springer
International Publishing.
Learner, D. E. (2009). Electronic crime scene investigation.
New York: Nova Science.
Erickson, E. (2015). Criminalistics laboratory manual: The
basics of forensic investigation

More Related Content

Similar to Crimea Russia or Ukraine An International Law Perspective.docx

Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
Johnson Ubah
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
Anne ndolo
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
BRNSSPublicationHubI
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
debishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ronnasleightholm
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
Editor IJCATR
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
CSCJournals
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
CSCJournals
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity Essay
Jessica Howard
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
ijcsa
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
YashPatel132112
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
aratibhavsar
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection Process
Michelle Singh
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
Bank Alfalah Limited
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
CSCJournals
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
Dr. Richard Otieno
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
BhagyasriPatel2
 

Similar to Crimea Russia or Ukraine An International Law Perspective.docx (20)

Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity Essay
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection Process
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 

More from willcoxjanay

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
willcoxjanay
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx
willcoxjanay
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx
willcoxjanay
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx
willcoxjanay
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx
willcoxjanay
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx
willcoxjanay
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx
willcoxjanay
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx
willcoxjanay
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
willcoxjanay
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx
willcoxjanay
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
willcoxjanay
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx
willcoxjanay
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx
willcoxjanay
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx
willcoxjanay
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
willcoxjanay
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
willcoxjanay
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
willcoxjanay
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
willcoxjanay
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docx
willcoxjanay
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docx
willcoxjanay
 

More from willcoxjanay (20)

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docx
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docx
 

Recently uploaded

Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

Crimea Russia or Ukraine An International Law Perspective.docx

  • 1. Crimea: Russia or Ukraine? An International Law Perspective Crimea was annexed by Russia in 2014 after a referendum was held which was not up to international standards. This move was largely condemned by the West and most of the international community does not recognize Crimea as a legitimate part of Russia, though it is now ruled by Russia and applicable to its laws, currency, and military. For example, residents of Crimea, even those who did not vote or voted against the annexation, are subject to the Russian conscription law which states that all healthy males aged 18 are required to complete mandatory military service unless unable to do so for a medical reason or if they are enrolled in a university (Conscription Service, p. 1). Up to today, Ukraine and Russia both claim that Crimea is theirs and there is no agreement reached at the time to settle this conflict. Background on how crimea was taken (maidan revolution, etc.) In order to begin to understand which country Crimea belongs to, it is important to understand the history of the peninsula. Crimea has been part of the Russian empire beginning in 1783 (Kramer, 1) after the defeat of the Ottomans up until 1954 when, during the Soviet Union, it was given to the Ukrainian SFSR by Premier Khrushchev. Russia’s argument as to why Crimea is theirs West’s argument as to why it belongs to Ukraine (their own motives and desire for influence) International Law analysis
  • 2. Works Cited “Conscription Service.” Counterterrorism : Ministry of Defence of the Russian Federation, eng.mil.ru/en/career/conscription/determent.htm. Kramer, M. (2018, February 02). Why Did Russia Give Away Crimea Sixty Years Ago? Retrieved December 07, 2018, from https://www.wilsoncenter.org/publication/why-did-russia-give- away-crimea-sixty-y ears-ago?gclid=CLHnyZC7ndACFSLicgod-UEIXw
  • 3. Milestone One: MEMO Draft 1 Milestone One: MEMO Draft 6 THIS IS THE PROFESSOR’S COMMENT ON THE MEMO AND NEEDS TO BE FIXED FOR FINAL SUBMISSION.( Gifty,Thanks for getting this turned in. For a memo, this is a little long. You will want to be more succinct and cut this down a bit.) MEMO DATE: 12/08/2018 TO: Non-expert Stakeholder FROM: (Cybersecurity Practitioner) SUBJECT: DIGITAL FORENSIC INVESTIGATION MEMO Over a period of years digital forensic investigation has out grown into a body that in need of details digital forensic model. Different academic researchers have suggested over a hundred different types of investigation procedural models. In addition to this proposed model over the years, there has been a challenged whereby the model lack experimental testing to ascertain the truth about the investigation. More so there is a need of evaluating the same model to complement the process of investigation progression in support to the entire scientific community (Learner, D. E. (2009). Electronic crime scene investigation. New York: Nova Science). Based on the experienced encountered in ACME Company on digital forensic investigation on Patrick Drew, there was suspicions activities from HR department. The suspicion was not proven. The information is handed over to IT department to take a further analysis on the act and gather more details that
  • 4. will give a clear and precise picture what the Company might be facing. With the level of clearance that Patrick Drew has with the Company operation, schematics, file and other technical references maintenance, it was clear that he might be plotting to tamper or steal information from the company to auction it to a competitor. ACME company databases is preserve and reinforced by security operation center (SOC). The center uses Snort as an essential component of their security information and event management (SIEM). Upon the suspicion, there was an alert from SIEM to SOC of an existence of peer-to-peer movement emanating from an internet protocol registered to Drew’s computer. Realizing that there was transfer of files from the same internet protocol, center for security enacted a two- factor authorization to prevent sharing of files from one end to another. This incident call for further action where the legal team and Human Resource department decided to conduct further digital forensic investigation on the matter. There was a call to investigate the incident and the task was handed over to digital forensic investigation team. For any investigation to be conducted there must be due process that should be followed to prevent any suspicion from the investigated subject and to maintain a legal order that calls for the same action. This process includes: IDENTIFICATION This is a process of identifying an incident from indicators and defining the type of intrusion in the company. In this context identification happens when SOC was alerted by SIEM of a peer-to-peer files transfers which raised suspicion after (HR) department reported the same suspicion from an internal worker plotting to still the information. PREPARATION Digital forensic investigation should be ready to conduct the process by gathering the required tools, methods, law suit warrants, and overseeing authorizations and administration
  • 5. support. Preparation in this scenario is understanding and acknowledging the presents of SOC and SIEM and more so HR department by monitoring and identifying the threats and taking an initiate to investigate the matter. Presence of Snort and Intrusion Prevention System contributed a lot to investigation and gathering of facts. METHODOLOGY PLAN Formulating a plan based on possible witnesses and the specified system in questions is also an essential strategy that ease the entire investigation process. The core value for this methodology is to collect proof of untainted facts in addition to maximizing the effect on victim. The purpose of the process in this scenario was to avoid the entire digital forensic investigation from second guessing from the entire ACME Company and the legal department on their initiate the investigation on Patrick Drew suspicion and alleged data stolen. Formulating a plan is give a clear picture and step to be followed other than just rushing into the process without a proper plan. PROTECTION All the evidence gathering from the crime scene were isolated, fortified and the condition of physical and digital facts. The entire process includes limiting the entire staff from using any electromagnetic devices or digital devices in the scene. The greater purpose of these process is avoiding any alteration to the content that is under investigation by any part with the same motive. Protecting evidence by digital forensic investigation team is of important when conducting investigation of such nature. Subject under investigation is presumed to have the knowledge of the process and hence he/she might end up tampering with the evidence. ASSEMBLY On identifying the physical scene all data should be recorded and replicated with a standardized procedure which is legal and follows due Company procedure.
  • 6. SCRUTINY There should be a deep search for facts involving the suspected crime. The entire process involves focusing on recognizing the pinning the essential evidence that are within unusual sites. After collecting the facts, a detailed documentation analysis is constructed. BREAKDOWN After gathering all the potential evidence, we determine the importance, regenerate the pieces of information and come up with a conclusion that lie entirely on the facts discovered on the scene. The process might take long enough to come up with actual and enough evidence to support the crime theory. EXHIBITING Final purpose for this entire process is to issue out exhibits that will support crime theory. The reason behind presenting the exhibit is to evaluate and relate whether the data collected and analyzed matches with what the entire suspicion or allegation was. Issuing out or presenting collected information to the company by digital forensic investigation agency means that they are in their full satisfactory state of what they have gathered, and it is up to the Company to take further law suit disciplinary process to the subject under investigation. IMPACTS ON SECURITY Respectively, there is a rise in the number of digital crimes in each year in the entire world. With the changes in technology and software users digitally savvy. The lawbreaking they commit become refined. Legal suit is in a continuous race with these criminals minded to make sure that the playing ground remains leveled. Part of the process is coming up with appropriate tools that will gap with the rise of the same crimes. ACME Company should embrace the idea of developing a constant team assigned to conducting investigation and auditing every activity in the company. The impact to security in this scenario is so sensitive that the company was in a position of losing the entire company production under Patrick Drew management.
  • 7. With the information collected from the scene and the attempt of stealing, company realized that every staff should be put under monitoring process to avoid further of information. Information collected prove beyond doubt the accuracy and validity of the crime theory and call for further action. ACME Company will take further action to the subject under investigation and establishes defensibility against the Patrick Drew action (Erickson, E. (2015). Criminalistics laboratory manual: The basics of forensic investigation). REFERENCES Erickson, E. (2015). Criminalistics laboratory manual: The basics of forensic investigation. Muda, A. K., Choo, Y.-H, Abraham, A., & N, S. S. (2014). Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Cham: Springer International Publishing. Learner, D. E. (2009). Electronic crime scene investigation. New York: Nova Science. Erickson, E. (2015). Criminalistics laboratory manual: The basics of forensic investigation