Question: Please provide the correct solution and explain briefly according to the question. Discuss in a five - to - seven - page paper, the procedures,

Please provide the correct solution and explain briefly according to the question. Discuss in a five-to-seven-page paper, the procedures, tools, and results for the first three steps of the Chi Mak espionage investigation process model:
Identification/assessment
Collection/acquisition
Preservation
For the Identification/Assessment step, tell me more about:
Your pre-planned strategy in preparing and approaching the crime scenes and
Was a valid search warrant required?
What are the charges against the suspects, in order to search for the evidence to convict him/her for the offense?
Discuss what federal criminal statutes the FBI prosecution must show the suspects committed in order to convict them.
What is the physical and digital evidence from each of the crime scenes?
Tell me about the suspects and their activity; and
Talk about the physical location of the crime scenes and the possibility of cyberspace (emails, URLs), equipment (various types of wire and wireless hardware devices), and software applications that you expect when approaching your digital crime scenes.
2. For the Acquisition/Collection Process, you should provide a list of all the evidence that was collected from the crime scenes. For example, were there photographs, recordings, garbage, and other types of evidence from crime scenes that you have not mentioned. Describe:
Tell me the process on how you acquired the evidence.
Tell me the methods you used to prove the evidence is authentic and not modified during the acquisition process (for example was there a chain of custody).
Discuss the Acquisition process in more detail involving the following 2 steps: 1 Duplication: Where was the analysis of this process conducted? At the crime scenes or at a lab?
State the forensic method used. For example, if there was duplication of the digital evidence, state if write blocking was used by a physical hardware device or software to copy the original digital evidence by removing the hard drive from the computer.
2 Verification: Discuss if the forensic tools that analyzed the data were valid. It is typical to see some form of data validation, for example MD5/ SHA1 values for the evidence collected.
Here you want to show the evidence will be admissible to court, and by the method you used to verify the evidence presented, the evidence is the same as the original evidence collected. Discuss in more detail the scientific methods used in the verification process to maintain the integrity of the evidence of what type of data.
3. For the Preservation Process:
Show the case management of your teams investigation.
Show the chain of custody, and that the data you collected is not contaminated. Remember the physical and digital data that is acquired must be properly isolated, secured, and preserved.
Discuss if a forensically sound copy of your original data was made, and the examination and analysis of this data was performed on the forensic copy. For example, discuss if a storage device was mounted as read-only to assure the data was not modified or overwritten during the time the device was mounted.
State if copies of the digital data are acquired through a live acquisition process to capture digital evidence from memory of a running system.
Show every link in the chain of custody of every person who handled or possessed the evidence from the time it was first discovered to the time it was returned to its original owner. . In the 3rd step of preservation, what copies were made of what type of evidence to prevent it from being destroyed?
Please provide valid references.
 Please provide the correct solution and explain briefly according to the

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!