SlideShare a Scribd company logo
1 of 6
1) Assignment 1 ( 2 Pages )
Post-Assessment:
Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.
Mr. Fahad Naseem was arrested in connection with the
kidnapping and killing of journalist Daniel Pearl and admitted
sending ransom e-mails using his Laptop. The laptop and
handwritten versions of the e-mails were found in his
possession.
On the Contrary-A,
Naseem later retracted his confession and the defense attorney
asserted that logs from Mr. Naseem's Internet Service Provider
(ISP) indicated that Mr. Naseem's account was not active and
connected to the Internet at the time the e-mails were sent.
On the Contrary-B
Naseem's defense attorney claimed that the compromised
Laptop produced in court had a different serial number from the
one that was initially recorded in police records; hence,
documentation relating to the computer and evidence in the case
was inconsistent.
On the Contrary-C
Documentation presented in court indicated that the Federal
Bureau of Investigation (FBI) agent, Mr. Ronald Joseph
examined Mr. Naseem's Laptop between February 4 and 7,
2002. In contrast, documents indicated that the Laptop was not
seized from Mr. Naseem until February 11, 2002, and
the court denied the appeal, including the following
explanation.
On the Contrary-D
The lead investigator Mr. Shaikh Naeem recovered the Laptop
labeled (connection No. 66) retrieved from the accused, Mr.
Fahad Naseem, on November 2, 2002, was provided to Mr.
Ronald Joseph, FBI agent, who examined, conducted the
forensic investigation, formulated his report, and conveyed
evidence to the Consulate General of the United States of
America.
The report's content asserted that the Black Soft Computer came
with "Proworld" written on the exterior of the Laptop, and upon
opening the case, a Dell Latitude Cpi laptop was discovered.
The Laptop was identified in the report produced by this
witness to be of model PPL with Serial number ZH942 located
inside the Laptop as an IBM travel star hard driver [
sic
], confirmed to have been removed from the Laptop.
During examination, the label on the hard drive was identified
as a system with 4.3 GB storage capacity, and serial number
OKLA24302 on the outside of the laptop.
After examining Exhibits, Mushernama who recovered the
Laptop asserted that without a doubt whatever, the compromised
Laptop is the same equipment that was seized from the accused,
Mr. Fahad Naseem on November 2, 2002.
On the Contrary-E
The forensic investigation report confirmed that the same
Laptop was recovered on April 2, 2002 by the defense team.
Availability of the Laptop at the American Consulate on April
2, 2002 is not unnatural and impossible because Marianne Pearl
filed a complaint with the police on April 2, 2002, hours when
the case was in the at the hands of the Investigating Agency.
Questions 1. As an Aspirant and Hopeful Digital Forensic
Investigator:
1:1. Submit concluding evidence to the public and the court
substantiating that Mr. Fahad Naseem is guilty of kidnapping
and killing Mr. Daniel Pearl, the journalist.
1:2. Submit concluding evidence to the public and the court
demonstrating that Mr. Ronald Joseph examined Mr. Naseem's
Laptop between February 4 and 7, 2002, whereas documents
indicated that the Laptop was not seized from Mr. Naseem until
February 11, 2002.
1:3. Submit concluding evidence to the public and the court
attesting that Mr. Naseem's Laptop's availability at the
American Consulate on April 2, 2002, is unnatural and
unrealistic occurrences.
Academic Integrity/Plagiarism
At a Christian liberal arts university committed to the pursuit of
truth and understanding, any act of academic dishonesty is
especially distressing and cannot be tolerated. In general,
academic dishonesty involves the abuse and misuse of
information or people to gain an undeserved academic
advantage or evaluation. The common forms of academic
dishonesty include:
Cheating – using deception in the taking of tests or the
preparation of written work, using unauthorized materials,
copying another person’s work with or without consent, or
assisting another in such activities.
Lying – falsifying, fabricating, or forging information in either
written, spoken, or video presentations.
Plagiarism—using the published writings, data, interpretations,
or ideas of another without proper documentation
Plagiarism includes copying and pasting material from the
internet into assignments without properly citing the source of
the material.
Episodes of academic dishonesty are reported to the Vice
President for Academic Affairs. The potential penalty for
academic dishonesty includes a failing grade on an assignment,
a failing grade for the entire course, or charges against the
student with the appropriate disciplinary body.
Reference
Casey, E (2011). Digital Evidence and Computer Crime:
Forensic Science, Computers and the Internet, Elsevier.
2 ) Assignment 2 ( 2 Pages )
Many people think of the Internet as separate from the physical
world. This is simply not the case--crime on the Internet is
closely tied to crime in the physical world. There are a couple
of reasons for this cautionary note. A crime on the Internet
usually reflects a crime in the physical world, with human
perpetrators. and victims and should be treated with the same
gravity. To neglect the very real and direct link between people
and the online activities that involve them limits one's ability to
investigate and understand crimes with an online component.
Students think about the impact of auction and check fraud in
this modern era of digital shopping. This about how a
combination of evidence from the virtual and physical worlds is
used to apprehend a criminal.
Case Study
Case Example inspired by a case in (Casey, 2011)
A buyer on Amazon complained to police that he sent payment
to a seller but received no merchandise. The seller requested
that the buyer also send a cashier’s check for shipping and
additional costs. Over a period of weeks, several dozen similar
reports were made to the Internet Fraud Complaint Center
against the same seller. To hide his identity, the seller used a
Gmail account for online communications and several mail
drops to receive checks. Logs obtained from Gmail revealed that
the seller was accessing the Internet through a subsidiary of
AT&T. When served with a subpoena, AT&T disclosed the
suspect's Google account and associated address, credit card,
and telephone numbers. Investigators also obtained information
from the suspect's bank with a subpoena to determine that the
cashier's checks from the buyers had been deposited into the
suspect's bank account. A subpoena to Amazon for customer
order history and complaints and supporting evidence from each
of the buyers helped corroborate direct connections between the
suspect and the fraudulent activities. Employees at each mail
drop recognized a photograph of the suspect obtained from the
Department of Motor Vehicles. A subpoena to the credit card
number and a search of real estate property indicated where he
conducted most of his fraud. A 3rd company revealed the
suspect's Social Security the suspect's name turned up an
alternate residence the opportunity to uncover crimes in the
physical Internet.
Students respond to the following questions related to this case
in your
Cybertrail_YourLastName.docx
document.
Question 1 - Following the Cybertrail
Comment on the interconnectedness of the digital world. To
what extent does cyber-criminal have anonymity in their
transactions? Be detailed in your response.
Question 2 - Following the Cybertrail
By what means of your expertise in Digital Forensic Evidence
provide a critical forensic investigation approach that will play
a key role in protecting consumers in this scenario from digital
fraud such as this?

More Related Content

Similar to 1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx

Usa vs. arhndt judge says police need a warrant to view files on wireless n...
Usa vs. arhndt   judge says police need a warrant to view files on wireless n...Usa vs. arhndt   judge says police need a warrant to view files on wireless n...
Usa vs. arhndt judge says police need a warrant to view files on wireless n...Umesh Heendeniya
 
Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03CTIN
 
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docxIn Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docxEstelaJeffery653
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
Police can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme CourtPolice can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme CourtHarrison Weber
 
In this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxIn this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxrochellscroop
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docxtroutmanboris
 
In this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxIn this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxmecklenburgstrelitzh
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...Trustwave
 
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdfSex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdfHeatherTapani
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdfaesalem06
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAPDavid Sweigert
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)Felipe Prado
 
Cheap Essay Writing Service Long Deadlines A
Cheap Essay Writing Service Long Deadlines ACheap Essay Writing Service Long Deadlines A
Cheap Essay Writing Service Long Deadlines AAlyssa Schulte
 
Signature Forgery - Enhancing Transparency and Security with Digital Signatur...
Signature Forgery - Enhancing Transparency and Security with Digital Signatur...Signature Forgery - Enhancing Transparency and Security with Digital Signatur...
Signature Forgery - Enhancing Transparency and Security with Digital Signatur...Drysign By Exela
 

Similar to 1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx (20)

Usa vs. arhndt judge says police need a warrant to view files on wireless n...
Usa vs. arhndt   judge says police need a warrant to view files on wireless n...Usa vs. arhndt   judge says police need a warrant to view files on wireless n...
Usa vs. arhndt judge says police need a warrant to view files on wireless n...
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03
 
How America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mobHow America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mob
 
Justice Department Prosecutors Swamped With Data as Cases Leave Long Digital ...
Justice Department Prosecutors Swamped With Data as Cases Leave Long Digital ...Justice Department Prosecutors Swamped With Data as Cases Leave Long Digital ...
Justice Department Prosecutors Swamped With Data as Cases Leave Long Digital ...
 
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docxIn Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
In Weeks 2 through 4, you will follow a scenario as a case moves fro.docx
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
Police can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme CourtPolice can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme Court
 
In this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxIn this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docx
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
 
In this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxIn this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docx
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...
 
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdfSex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)
 
Cheap Essay Writing Service Long Deadlines A
Cheap Essay Writing Service Long Deadlines ACheap Essay Writing Service Long Deadlines A
Cheap Essay Writing Service Long Deadlines A
 
Signature Forgery - Enhancing Transparency and Security with Digital Signatur...
Signature Forgery - Enhancing Transparency and Security with Digital Signatur...Signature Forgery - Enhancing Transparency and Security with Digital Signatur...
Signature Forgery - Enhancing Transparency and Security with Digital Signatur...
 

More from teresehearn

1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docx1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docxteresehearn
 
1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docx1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docxteresehearn
 
1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docx1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docxteresehearn
 
1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docx1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docxteresehearn
 
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docxteresehearn
 
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docxteresehearn
 
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docxteresehearn
 
1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docx1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docxteresehearn
 
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docxteresehearn
 
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docxteresehearn
 
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docxteresehearn
 
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docxteresehearn
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docxteresehearn
 
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docxteresehearn
 
1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docx1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docxteresehearn
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docxteresehearn
 
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docxteresehearn
 
1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docx1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docxteresehearn
 
1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docx1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docxteresehearn
 
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docxteresehearn
 

More from teresehearn (20)

1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docx1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docx
 
1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docx1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docx
 
1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docx1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docx
 
1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docx1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docx
 
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
 
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
 
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
 
1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docx1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docx
 
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
 
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
 
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
 
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx
 
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
 
1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docx1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docx
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx
 
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
 
1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docx1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docx
 
1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docx1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docx
 
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx

  • 1. 1) Assignment 1 ( 2 Pages ) Post-Assessment: Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent. Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem's Internet Service Provider (ISP) indicated that Mr. Naseem's account was not active and connected to the Internet at the time the e-mails were sent. On the Contrary-B Naseem's defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. On the Contrary-C Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph
  • 2. examined Mr. Naseem's Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation. On the Contrary-D The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. The report's content asserted that the Black Soft Computer came with "Proworld" written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [ sic ], confirmed to have been removed from the Laptop. During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop. After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused,
  • 3. Mr. Fahad Naseem on November 2, 2002. On the Contrary-E The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency. Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator: 1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist. 1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem's Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002. 1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem's Laptop's availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. Academic Integrity/Plagiarism At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of
  • 4. information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include: Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities. Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations. Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material. Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on an assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body. Reference Casey, E (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Elsevier. 2 ) Assignment 2 ( 2 Pages )
  • 5. Many people think of the Internet as separate from the physical world. This is simply not the case--crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one's ability to investigate and understand crimes with an online component. Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal. Case Study Case Example inspired by a case in (Casey, 2011) A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect's Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect's bank with a subpoena to determine that the cashier's checks from the buyers had been deposited into the suspect's bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the
  • 6. suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect's Social Security the suspect's name turned up an alternate residence the opportunity to uncover crimes in the physical Internet. Students respond to the following questions related to this case in your Cybertrail_YourLastName.docx document. Question 1 - Following the Cybertrail Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. Question 2 - Following the Cybertrail By what means of your expertise in Digital Forensic Evidence provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?