Friday, April 29, 2016
Lab Activity, Week Four
Chat Transcript: I am doing a research project on digital forensics and have a prosecuting attorney that has agreed to let me interview him. The only problem is, I am having a heck of a time trying to form questions to ask him. Do you have any tips or advice for coming up with good interview questions?
Wednesday, April 27, 2016
Progress Report, Week Four
My progress in my research is coming along as expected. I got a little behind last week due to personal obligations, but am mostly back on track. I have a lot of good sources that I have found and am now working on reading and researching the information. I have an outline for my paper, and am adding information to it and expanding on it as I go.
My goal this week is to have the 5 - 10 interview questions prepared. I am finding it hard to come up with good questions so far as I am still researching and learning about social networking forensics. I want to be sure that the questions that I ask are good questions that will give me some new insight about the challenges of social networking forensics.
My goal for next week is to continue on with my research. I would like to have a pretty solid outline done and all of my research laid out so that I can start writing my paper within the next couple of weeks.
My goal this week is to have the 5 - 10 interview questions prepared. I am finding it hard to come up with good questions so far as I am still researching and learning about social networking forensics. I want to be sure that the questions that I ask are good questions that will give me some new insight about the challenges of social networking forensics.
My goal for next week is to continue on with my research. I would like to have a pretty solid outline done and all of my research laid out so that I can start writing my paper within the next couple of weeks.
Tuesday, April 26, 2016
Journal Entry, Week Three
Journal Prompt: List at least 3 resources that you considered but rejected for your project? Why did you choose to not use them?
1.
https://www.sba-research.org/wp-content/uploads/publications/socialForensics_preprint.pdf
This link from SBA-research.org, had a lot of great information on social networking forensics, and I was sad to have to let it go. The reason that I decided to toss this information is that upon a little digging, I found that SBA Research is a research company out of Vienna, Austria. While there was a lot of great information in this article, I want to keep my research focused to challenges in social networking forensics in the United States. The challenges that we face here in the states are likely different than challenges faced in other countries. I want to make sure that the research that I do is relevant to the laws and challenges here.
2.
http://csis.pace.edu/~ctappert/srd2009/a4.pdf
This is an article that was published by Pace University and focuses on forensics tools used for social media. While this article appears to have a lot of information, the article is from 2009, and with how fast technology changes, a lot of it may be outdated. While I will take some leads from this article to find out what tools and practices may still be in use, it will only be used as a jumping off point and not a main source.
3.
http://www.forensicmag.com/articles/2012/12/social-media-and-changing-role-investigators
This last one is actually an article that I didn't think I would use because it is from an online magazine, but ended up using. At first glance I wasn't sure it was going to provide much information, but reading further into it, it has a lot of great information pertaining to social media, data collecting and privacy laws. I looked into the magazine and it appears to be a legitimate magazine aimed at professionals in any forensics field. The author of this particular article, Benjamin Wright, is a teacher at SANS Institute, and teaches the law of data security and investigations. While checking out the legitimacy of this website, I also found some recent news stories that are perfect examples of cases that rely on social networking forensics such as these articles posted on the site yesterday (GRAPHIC CONTENT WARNING):
http://www.forensicmag.com/news/2016/04/how-child-predator-was-caught-tiny-clue-photo-he-posted-online
and
http://www.forensicmag.com/articles/2016/04/teen-girl-accused-live-streaming-friends-rape-social-media
This Forensicmag.com also offers a whole section of their website dedicated to digital forensics with the most up-to-date information on digital forensics, privacy, hacking, cyberattacks, data protection and much more. I am excited to dig through this website although I will have to try to not get too lost in all of the information.
http://www.forensicmag.com/topics/digital-forensics
1.
https://www.sba-research.org/wp-content/uploads/publications/socialForensics_preprint.pdf
This link from SBA-research.org, had a lot of great information on social networking forensics, and I was sad to have to let it go. The reason that I decided to toss this information is that upon a little digging, I found that SBA Research is a research company out of Vienna, Austria. While there was a lot of great information in this article, I want to keep my research focused to challenges in social networking forensics in the United States. The challenges that we face here in the states are likely different than challenges faced in other countries. I want to make sure that the research that I do is relevant to the laws and challenges here.
2.
This is an article that was published by Pace University and focuses on forensics tools used for social media. While this article appears to have a lot of information, the article is from 2009, and with how fast technology changes, a lot of it may be outdated. While I will take some leads from this article to find out what tools and practices may still be in use, it will only be used as a jumping off point and not a main source.
3.
http://www.forensicmag.com/articles/2012/12/social-media-and-changing-role-investigators
This last one is actually an article that I didn't think I would use because it is from an online magazine, but ended up using. At first glance I wasn't sure it was going to provide much information, but reading further into it, it has a lot of great information pertaining to social media, data collecting and privacy laws. I looked into the magazine and it appears to be a legitimate magazine aimed at professionals in any forensics field. The author of this particular article, Benjamin Wright, is a teacher at SANS Institute, and teaches the law of data security and investigations. While checking out the legitimacy of this website, I also found some recent news stories that are perfect examples of cases that rely on social networking forensics such as these articles posted on the site yesterday (GRAPHIC CONTENT WARNING):
http://www.forensicmag.com/news/2016/04/how-child-predator-was-caught-tiny-clue-photo-he-posted-online
and
http://www.forensicmag.com/articles/2016/04/teen-girl-accused-live-streaming-friends-rape-social-media
This Forensicmag.com also offers a whole section of their website dedicated to digital forensics with the most up-to-date information on digital forensics, privacy, hacking, cyberattacks, data protection and much more. I am excited to dig through this website although I will have to try to not get too lost in all of the information.
http://www.forensicmag.com/topics/digital-forensics
Sunday, April 24, 2016
Progress Report, Week Three
The progress of my research paper is going good so far. I addressed my detailed plan on how I was going to use my time in order to have a rough draft by week 9 in the Lab Activity, Week Three, so I won't go into it here. Right now, I am working on developing some research questions that I would like to ask the attorney that I am interviewing. I have a couple of questions that I would like to ask, but my goal is to have 5 to 10 questions that I can ask him to aid in my research. My goal is to have these done by the next week. These questions should develop organically during researching and reading. Having that done, and having some more research done are my main goals for the upcoming week. Now that I have some new search terms from the "Ask the Librarian" service, I will be able to find some good information.
Friday, April 22, 2016
Lab Activity, Week Three
In this week's group lab the discussion was focused on defining our research methods/schedules and discussing search terms and methods that have worked well for us. I will start out by first discussing the latter.
As far as searching for information, search terms that work well on the Google machine don't always work as well when searching academic databases. On Google, while I can use broad or narrow search terms and yield plenty of results, the challenge then becomes determining whether or not the source is a good source or not. When searching in the library databases, I found that coming up with search results that were relevant was much more difficult. To aid in my searches, I used the "Ask a librarian" service to determine how to yield better search results. One tip that the librarian gave me was to use "computer forensics" (with the quotes) AND "social media" (with quotes) to glue the terms together. The librarian also taught me a new term in which I had not heard before which is "cybersluething."
When it comes to the schedule I plan to keep for my research, it will look similar to the standard plan that is laid out in the syllabus only instead of having weeks 3 - 4 for searching, weeks 4 - 5 for reading and evaluating, and weeks 6 - 8 for outlining and drafting, I will be using weeks 3 - 8 for all of the above. My process is more of a continual process of researching, reading, evaluating, outlining and drafting.
As far as searching for information, search terms that work well on the Google machine don't always work as well when searching academic databases. On Google, while I can use broad or narrow search terms and yield plenty of results, the challenge then becomes determining whether or not the source is a good source or not. When searching in the library databases, I found that coming up with search results that were relevant was much more difficult. To aid in my searches, I used the "Ask a librarian" service to determine how to yield better search results. One tip that the librarian gave me was to use "computer forensics" (with the quotes) AND "social media" (with quotes) to glue the terms together. The librarian also taught me a new term in which I had not heard before which is "cybersluething."
When it comes to the schedule I plan to keep for my research, it will look similar to the standard plan that is laid out in the syllabus only instead of having weeks 3 - 4 for searching, weeks 4 - 5 for reading and evaluating, and weeks 6 - 8 for outlining and drafting, I will be using weeks 3 - 8 for all of the above. My process is more of a continual process of researching, reading, evaluating, outlining and drafting.
Sunday, April 17, 2016
Journal Entry, Week Two
Journal prompt: What new avenues or angles of research have you discovered while searching for information on your topic?
"And the biggest challenge isn't the processing of evidence. Data is data, they (providers) just copy and paste what they have on file.
It's the interpretation of it once received by law enforcement (needing an expert to testify in court) and overcoming the pushback from the providers over privacy concerns that are the hardest hurdles (the Apple iPhone saga that was in the news recently).
Just some food for thought as you develop questions. (R. Davy, personal communication, April 15, 2016)"
"And the biggest challenge isn't the processing of evidence. Data is data, they (providers) just copy and paste what they have on file.
It's the interpretation of it once received by law enforcement (needing an expert to testify in court) and overcoming the pushback from the providers over privacy concerns that are the hardest hurdles (the Apple iPhone saga that was in the news recently).
Just some food for thought as you develop questions. (R. Davy, personal communication, April 15, 2016)"
The above quote came from an email
from a prosecuting attorney who has agreed to speak with me on what he has
experienced to be challenging when using social networking forensics as
evidence to prosecute a crime. I had emailed him stating, "It will be interesting to hear your point of view since not
having evidence processed correctly can be detrimental when it comes to using
it as evidence." His reply back to me made me realize that what I
believed to have been one of the biggest challenges of using social networking
forensics as evidence to prosecute (or defend against) a crime, may have been a
misconception. I had not really considered what it would take to find an
expert to testify in court or what challenges might arise in how the data is interpreted.
Another angle
that Davy (2016) mentions is that pushback from providers over privacy
concerns. While I had previously
considered how privacy laws concerning the individual or defendant might cause
some challenges to collecting evidence and using it as evidence, I was more
focused on an individual’s rights than on a company’s obligation to protect its
customers data.
This email
correspondence has definitely given me more “food for thought” as I move
forward in my research. I will definitely
be looking into more of the challenges that arise during prosecution phases
when using social networking forensics, and will be giving more considerations
to what obligations an organization has to protecting its customers and what
obligations it has to release personal information and data to the government
for use in prosecuting crimes.
Subscribe to:
Comments (Atom)