SlideShare a Scribd company logo
1 of 7
Crimea: Russia or Ukraine? An International Law Perspective
Crimea was annexed by Russia in 2014 after a referendum
was held which was not up to international standards. This
move was largely condemned by the West and most of the
international community does not recognize Crimea as a
legitimate part of Russia, though it is now ruled by Russia and
applicable to its laws, currency, and military. For example,
residents of Crimea, even those who did not vote or voted
against the annexation, are subject to the Russian conscription
law which states that all healthy males aged 18 are required to
complete mandatory military service unless unable to do so for
a medical reason or if they are enrolled in a university
(Conscription Service, p. 1). Up to today, Ukraine and Russia
both claim that Crimea is theirs and there is no agreement
reached at the time to settle this conflict.
Background on how crimea was taken (maidan revolution,
etc.)
In order to begin to understand which country Crimea
belongs to, it is important to understand the history of the
peninsula. Crimea has been part of the Russian empire
beginning in 1783 (Kramer, 1) after the defeat of the Ottomans
up until 1954 when, during the Soviet Union, it was given to the
Ukrainian SFSR by Premier Khrushchev.
Russia’s argument as to why Crimea is theirs
West’s argument as to why it belongs to Ukraine (their
own motives and desire for influence)
International Law analysis
Works Cited
“Conscription Service.” Counterterrorism : Ministry of Defence
of the Russian
Federation, eng.mil.ru/en/career/conscription/determent.htm.
Kramer, M. (2018, February 02). Why Did Russia Give Away
Crimea Sixty Years Ago?
Retrieved December 07, 2018, from
https://www.wilsoncenter.org/publication/why-did-russia-give-
away-crimea-sixty-y
ears-ago?gclid=CLHnyZC7ndACFSLicgod-UEIXw
Milestone One: MEMO Draft 1
Milestone One: MEMO Draft 6
THIS IS THE PROFESSOR’S COMMENT ON THE MEMO
AND NEEDS TO BE FIXED FOR FINAL SUBMISSION.(
Gifty,Thanks for getting this turned in. For a memo, this is a
little long. You will want to be more succinct and cut this down
a bit.)
MEMO
DATE: 12/08/2018
TO: Non-expert Stakeholder
FROM: (Cybersecurity Practitioner)
SUBJECT: DIGITAL FORENSIC INVESTIGATION
MEMO
Over a period of years digital forensic investigation has out
grown into a body that in need of details digital forensic model.
Different academic researchers have suggested over a hundred
different types of investigation procedural models. In addition
to this proposed model over the years, there has been a
challenged whereby the model lack experimental testing to
ascertain the truth about the investigation. More so there is a
need of evaluating the same model to complement the process of
investigation progression in support to the entire scientific
community (Learner, D. E. (2009). Electronic crime scene
investigation. New York: Nova Science).
Based on the experienced encountered in ACME Company on
digital forensic investigation on Patrick Drew, there was
suspicions activities from HR department. The suspicion was
not proven. The information is handed over to IT department to
take a further analysis on the act and gather more details that
will give a clear and precise picture what the Company might be
facing. With the level of clearance that Patrick Drew has with
the Company operation, schematics, file and other technical
references maintenance, it was clear that he might be plotting to
tamper or steal information from the company to auction it to a
competitor. ACME company databases is preserve and
reinforced by security operation center (SOC). The center uses
Snort as an essential component of their security information
and event management (SIEM). Upon the suspicion, there was
an alert from SIEM to SOC of an existence of peer-to-peer
movement emanating from an internet protocol registered to
Drew’s computer. Realizing that there was transfer of files from
the same internet protocol, center for security enacted a two-
factor authorization to prevent sharing of files from one end to
another. This incident call for further action where the legal
team and Human Resource department decided to conduct
further digital forensic investigation on the matter.
There was a call to investigate the incident and the task was
handed over to digital forensic investigation team. For any
investigation to be conducted there must be due process that
should be followed to prevent any suspicion from the
investigated subject and to maintain a legal order that calls for
the same action. This process includes:
IDENTIFICATION
This is a process of identifying an incident from indicators and
defining the type of intrusion in the company. In this context
identification happens when SOC was alerted by SIEM of a
peer-to-peer files transfers which raised suspicion after (HR)
department reported the same suspicion from an internal worker
plotting to still the information.
PREPARATION
Digital forensic investigation should be ready to conduct the
process by gathering the required tools, methods, law suit
warrants, and overseeing authorizations and administration
support. Preparation in this scenario is understanding and
acknowledging the presents of SOC and SIEM and more so HR
department by monitoring and identifying the threats and taking
an initiate to investigate the matter. Presence of Snort and
Intrusion Prevention System contributed a lot to investigation
and gathering of facts.
METHODOLOGY PLAN
Formulating a plan based on possible witnesses and the
specified system in questions is also an essential strategy that
ease the entire investigation process. The core value for this
methodology is to collect proof of untainted facts in addition to
maximizing the effect on victim. The purpose of the process in
this scenario was to avoid the entire digital forensic
investigation from second guessing from the entire ACME
Company and the legal department on their initiate the
investigation on Patrick Drew suspicion and alleged data stolen.
Formulating a plan is give a clear picture and step to be
followed other than just rushing into the process without a
proper plan.
PROTECTION
All the evidence gathering from the crime scene were isolated,
fortified and the condition of physical and digital facts. The
entire process includes limiting the entire staff from using any
electromagnetic devices or digital devices in the scene. The
greater purpose of these process is avoiding any alteration to
the content that is under investigation by any part with the same
motive. Protecting evidence by digital forensic investigation
team is of important when conducting investigation of such
nature. Subject under investigation is presumed to have the
knowledge of the process and hence he/she might end up
tampering with the evidence.
ASSEMBLY
On identifying the physical scene all data should be recorded
and replicated with a standardized procedure which is legal and
follows due Company procedure.
SCRUTINY
There should be a deep search for facts involving the suspected
crime. The entire process involves focusing on recognizing the
pinning the essential evidence that are within unusual sites.
After collecting the facts, a detailed documentation analysis is
constructed.
BREAKDOWN
After gathering all the potential evidence, we determine the
importance, regenerate the pieces of information and come up
with a conclusion that lie entirely on the facts discovered on the
scene. The process might take long enough to come up with
actual and enough evidence to support the crime theory.
EXHIBITING
Final purpose for this entire process is to issue out exhibits that
will support crime theory. The reason behind presenting the
exhibit is to evaluate and relate whether the data collected and
analyzed matches with what the entire suspicion or allegation
was. Issuing out or presenting collected information to the
company by digital forensic investigation agency means that
they are in their full satisfactory state of what they have
gathered, and it is up to the Company to take further law suit
disciplinary process to the subject under investigation.
IMPACTS ON SECURITY
Respectively, there is a rise in the number of digital crimes in
each year in the entire world. With the changes in technology
and software users digitally savvy. The lawbreaking they
commit become refined. Legal suit is in a continuous race with
these criminals minded to make sure that the playing ground
remains leveled. Part of the process is coming up with
appropriate tools that will gap with the rise of the same crimes.
ACME Company should embrace the idea of developing a
constant team assigned to conducting investigation and auditing
every activity in the company. The impact to security in this
scenario is so sensitive that the company was in a position of
losing the entire company production under Patrick Drew
management.
With the information collected from the scene and the attempt
of stealing, company realized that every staff should be put
under monitoring process to avoid further of information.
Information collected prove beyond doubt the accuracy and
validity of the crime theory and call for further action. ACME
Company will take further action to the subject under
investigation and establishes defensibility against the Patrick
Drew action (Erickson, E. (2015). Criminalistics laboratory
manual: The basics of forensic investigation).
REFERENCES
Erickson, E. (2015). Criminalistics laboratory manual: The
basics of forensic investigation.
Muda, A. K., Choo, Y.-H, Abraham, A., & N, S. S.
(2014). Computational Intelligence in Digital Forensics:
Forensic Investigation and Applications. Cham: Springer
International Publishing.
Learner, D. E. (2009). Electronic crime scene investigation.
New York: Nova Science.
Erickson, E. (2015). Criminalistics laboratory manual: The
basics of forensic investigation

More Related Content

Similar to Crimea Russia or Ukraine An International Law Perspective.docx

Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemCSCJournals
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryCSCJournals
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayJessica Howard
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensicsijcsa
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptxaratibhavsar
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection ProcessMichelle Singh
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesCSCJournals
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 

Similar to Crimea Russia or Ukraine An International Law Perspective.docx (20)

Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity Essay
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection Process
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 

More from willcoxjanay

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxwillcoxjanay
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxwillcoxjanay
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxwillcoxjanay
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxwillcoxjanay
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxwillcoxjanay
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxwillcoxjanay
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxwillcoxjanay
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxwillcoxjanay
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxwillcoxjanay
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxwillcoxjanay
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxwillcoxjanay
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxwillcoxjanay
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxwillcoxjanay
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxwillcoxjanay
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxwillcoxjanay
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxwillcoxjanay
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxwillcoxjanay
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxwillcoxjanay
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxwillcoxjanay
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxwillcoxjanay
 

More from willcoxjanay (20)

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docx
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docx
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Crimea Russia or Ukraine An International Law Perspective.docx

  • 1. Crimea: Russia or Ukraine? An International Law Perspective Crimea was annexed by Russia in 2014 after a referendum was held which was not up to international standards. This move was largely condemned by the West and most of the international community does not recognize Crimea as a legitimate part of Russia, though it is now ruled by Russia and applicable to its laws, currency, and military. For example, residents of Crimea, even those who did not vote or voted against the annexation, are subject to the Russian conscription law which states that all healthy males aged 18 are required to complete mandatory military service unless unable to do so for a medical reason or if they are enrolled in a university (Conscription Service, p. 1). Up to today, Ukraine and Russia both claim that Crimea is theirs and there is no agreement reached at the time to settle this conflict. Background on how crimea was taken (maidan revolution, etc.) In order to begin to understand which country Crimea belongs to, it is important to understand the history of the peninsula. Crimea has been part of the Russian empire beginning in 1783 (Kramer, 1) after the defeat of the Ottomans up until 1954 when, during the Soviet Union, it was given to the Ukrainian SFSR by Premier Khrushchev. Russia’s argument as to why Crimea is theirs West’s argument as to why it belongs to Ukraine (their own motives and desire for influence) International Law analysis
  • 2. Works Cited “Conscription Service.” Counterterrorism : Ministry of Defence of the Russian Federation, eng.mil.ru/en/career/conscription/determent.htm. Kramer, M. (2018, February 02). Why Did Russia Give Away Crimea Sixty Years Ago? Retrieved December 07, 2018, from https://www.wilsoncenter.org/publication/why-did-russia-give- away-crimea-sixty-y ears-ago?gclid=CLHnyZC7ndACFSLicgod-UEIXw
  • 3. Milestone One: MEMO Draft 1 Milestone One: MEMO Draft 6 THIS IS THE PROFESSOR’S COMMENT ON THE MEMO AND NEEDS TO BE FIXED FOR FINAL SUBMISSION.( Gifty,Thanks for getting this turned in. For a memo, this is a little long. You will want to be more succinct and cut this down a bit.) MEMO DATE: 12/08/2018 TO: Non-expert Stakeholder FROM: (Cybersecurity Practitioner) SUBJECT: DIGITAL FORENSIC INVESTIGATION MEMO Over a period of years digital forensic investigation has out grown into a body that in need of details digital forensic model. Different academic researchers have suggested over a hundred different types of investigation procedural models. In addition to this proposed model over the years, there has been a challenged whereby the model lack experimental testing to ascertain the truth about the investigation. More so there is a need of evaluating the same model to complement the process of investigation progression in support to the entire scientific community (Learner, D. E. (2009). Electronic crime scene investigation. New York: Nova Science). Based on the experienced encountered in ACME Company on digital forensic investigation on Patrick Drew, there was suspicions activities from HR department. The suspicion was not proven. The information is handed over to IT department to take a further analysis on the act and gather more details that
  • 4. will give a clear and precise picture what the Company might be facing. With the level of clearance that Patrick Drew has with the Company operation, schematics, file and other technical references maintenance, it was clear that he might be plotting to tamper or steal information from the company to auction it to a competitor. ACME company databases is preserve and reinforced by security operation center (SOC). The center uses Snort as an essential component of their security information and event management (SIEM). Upon the suspicion, there was an alert from SIEM to SOC of an existence of peer-to-peer movement emanating from an internet protocol registered to Drew’s computer. Realizing that there was transfer of files from the same internet protocol, center for security enacted a two- factor authorization to prevent sharing of files from one end to another. This incident call for further action where the legal team and Human Resource department decided to conduct further digital forensic investigation on the matter. There was a call to investigate the incident and the task was handed over to digital forensic investigation team. For any investigation to be conducted there must be due process that should be followed to prevent any suspicion from the investigated subject and to maintain a legal order that calls for the same action. This process includes: IDENTIFICATION This is a process of identifying an incident from indicators and defining the type of intrusion in the company. In this context identification happens when SOC was alerted by SIEM of a peer-to-peer files transfers which raised suspicion after (HR) department reported the same suspicion from an internal worker plotting to still the information. PREPARATION Digital forensic investigation should be ready to conduct the process by gathering the required tools, methods, law suit warrants, and overseeing authorizations and administration
  • 5. support. Preparation in this scenario is understanding and acknowledging the presents of SOC and SIEM and more so HR department by monitoring and identifying the threats and taking an initiate to investigate the matter. Presence of Snort and Intrusion Prevention System contributed a lot to investigation and gathering of facts. METHODOLOGY PLAN Formulating a plan based on possible witnesses and the specified system in questions is also an essential strategy that ease the entire investigation process. The core value for this methodology is to collect proof of untainted facts in addition to maximizing the effect on victim. The purpose of the process in this scenario was to avoid the entire digital forensic investigation from second guessing from the entire ACME Company and the legal department on their initiate the investigation on Patrick Drew suspicion and alleged data stolen. Formulating a plan is give a clear picture and step to be followed other than just rushing into the process without a proper plan. PROTECTION All the evidence gathering from the crime scene were isolated, fortified and the condition of physical and digital facts. The entire process includes limiting the entire staff from using any electromagnetic devices or digital devices in the scene. The greater purpose of these process is avoiding any alteration to the content that is under investigation by any part with the same motive. Protecting evidence by digital forensic investigation team is of important when conducting investigation of such nature. Subject under investigation is presumed to have the knowledge of the process and hence he/she might end up tampering with the evidence. ASSEMBLY On identifying the physical scene all data should be recorded and replicated with a standardized procedure which is legal and follows due Company procedure.
  • 6. SCRUTINY There should be a deep search for facts involving the suspected crime. The entire process involves focusing on recognizing the pinning the essential evidence that are within unusual sites. After collecting the facts, a detailed documentation analysis is constructed. BREAKDOWN After gathering all the potential evidence, we determine the importance, regenerate the pieces of information and come up with a conclusion that lie entirely on the facts discovered on the scene. The process might take long enough to come up with actual and enough evidence to support the crime theory. EXHIBITING Final purpose for this entire process is to issue out exhibits that will support crime theory. The reason behind presenting the exhibit is to evaluate and relate whether the data collected and analyzed matches with what the entire suspicion or allegation was. Issuing out or presenting collected information to the company by digital forensic investigation agency means that they are in their full satisfactory state of what they have gathered, and it is up to the Company to take further law suit disciplinary process to the subject under investigation. IMPACTS ON SECURITY Respectively, there is a rise in the number of digital crimes in each year in the entire world. With the changes in technology and software users digitally savvy. The lawbreaking they commit become refined. Legal suit is in a continuous race with these criminals minded to make sure that the playing ground remains leveled. Part of the process is coming up with appropriate tools that will gap with the rise of the same crimes. ACME Company should embrace the idea of developing a constant team assigned to conducting investigation and auditing every activity in the company. The impact to security in this scenario is so sensitive that the company was in a position of losing the entire company production under Patrick Drew management.
  • 7. With the information collected from the scene and the attempt of stealing, company realized that every staff should be put under monitoring process to avoid further of information. Information collected prove beyond doubt the accuracy and validity of the crime theory and call for further action. ACME Company will take further action to the subject under investigation and establishes defensibility against the Patrick Drew action (Erickson, E. (2015). Criminalistics laboratory manual: The basics of forensic investigation). REFERENCES Erickson, E. (2015). Criminalistics laboratory manual: The basics of forensic investigation. Muda, A. K., Choo, Y.-H, Abraham, A., & N, S. S. (2014). Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Cham: Springer International Publishing. Learner, D. E. (2009). Electronic crime scene investigation. New York: Nova Science. Erickson, E. (2015). Criminalistics laboratory manual: The basics of forensic investigation