If you were on the ...
 
Notifications
Clear all

If you were on the Laden case...

62 Posts
25 Users
0 Reactions
6,024 Views
(@miket065)
Estimable Member
Joined: 21 years ago
Posts: 187
 

I would process the case like I do any other. I would start by looking for "low hanging fruit"; Desktop Items, Documents, link files (as signposts), index.dat's, and the like.

The main difference would be that I would probably constantly be reporting on any tidbit of possibly relevant data so that someone might act on it before the enemy nullifies it.


   
ReplyQuote
(@jonathan)
Prominent Member
Joined: 20 years ago
Posts: 878
 

I would process the case like I do any other.

Me too. I'd work to to the instructions of the person/s who've requested I do the investigation.


   
ReplyQuote
(@mscotgrove)
Prominent Member
Joined: 17 years ago
Posts: 940
 

I would determine how much of the disk is encrypted, then start on a plan.


   
ReplyQuote
(@Anonymous 6593)
Guest
Joined: 17 years ago
Posts: 1158
 

No doubt much of what you want will be hidden in some form or another, so, you're handed drives from that compound, and told find me something.

What do you start off doing?

Ask the customer to *please* come up with a better project description than 'find something'. In the meantime, charge storage costs.


   
ReplyQuote
jhup
 jhup
(@jhup)
Noble Member
Joined: 16 years ago
Posts: 1442
 

If I was responsible for the case?

Hire the top 20 Forensic Investigators, give them a copy of the data and make each work independently.

Once they have completed their analysis, then make them work together.

Then combine the 21 reports as the final analysis.

I would be delivering the coffee, tea, Jolt, doughnuts, pizza or Twinkies of course on a beckon.

mrgreen


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Noone has asked the actual "basic" question .

Which OS was that PC running (choose one)

  • Windows (XP, Vista or 7) 😯
  • Linux roll
  • OSX wink

jaclaz


   
ReplyQuote
(@xennith)
Estimable Member
Joined: 15 years ago
Posts: 177
 

Do you not look to establish that in all of your investigations jaclaz?

Isnt that a bit like saying that nobody has pointed out that you should clone the disk first.


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Do you not look to establish that in all of your investigations jaclaz?

Isnt that a bit like saying that nobody has pointed out that you should clone the disk first.

I don't do investigations, sorry. (
(and I did state it was a "basic" question wink )

The original idea was to provoke a quick laugh with things like

Sure, Bill Gates is as Evil as the guy, no wonder, M$ OS was used!

Oh, I thought that only the good guys would use Linux….

Secluded terrorists tend to use Mac OSX because they cannot have Windows Update…

But still think that professional investigators might have more or less familiarity with a given OS over another.

Like (this is serious ! ), what if he used BeOS (or Haiku OS) or Open Solaris and it's ZFS?

How many can call themselves "familiar" with these? ?

What if there is a (closed source) Al-Qaeida OS (and/or crypted filesystem) noone knows anything about? ?

jaclaz


   
ReplyQuote
(@braveheart)
Eminent Member
Joined: 16 years ago
Posts: 31
 

I will be posting a list of things and information of interest that could be looked for in the database, very shortly.


   
ReplyQuote
(@armresl)
Noble Member
Joined: 21 years ago
Posts: 1011
Topic starter  

If you asked that you'd be dismissed from the case.

Not sure about you, but lots of people myself included are tasked with something very similiar, we don't know whats on the drive, but see what you can find.

No doubt much of what you want will be hidden in some form or another, so, you're handed drives from that compound, and told find me something.

What do you start off doing?

Ask the customer to *please* come up with a better project description than 'find something'. In the meantime, charge storage costs.


   
ReplyQuote
Page 2 / 7
Share: