Question

In: Computer Science

Explain, with detailed examples, how Locard’s Exchange Principle will influence the forensic examination of a Solaris...

Explain, with detailed examples, how Locard’s Exchange Principle will influence the forensic examination of a Solaris Server.

Solutions

Expert Solution

Explain, with detailed examples, how Locard’s Exchange Principle will influence the forensic examination of a Solaris Server.

Answer

Locard’s Exchange Principle is often cited in forensics publications, “Every contact leaves a trace.” Essentially Locard’s Exchange Principle is applied to crime scenes in which the perpetrator(s) of a crime comes into contact with the scene.

The perpetrator(s) will both bring something into the scene, and leave with something from the scene. In the cyber world, the perpetrator may or may not come in physical contact with the crime scene, thus, this brings a new facet to crime scene analysis. According to the World of Forensic Science,Locard’s publications make no mention of an “exchange principle,” although he did make the observation It is impossible for a criminal to act, especially considering the intensity of a crime, without leaving traces of this presence.

Locard’s Exchange Principle does apply to cyber crimes involving computer networks, such as identity theft, electronic bank fraud, or denial of service attacks, even if the perpetrator does not physically come in contact with the crime scene. Although the perpetrator may make virtual contact with the crime scene through the use of a proxy machine, we believe he will still “leave a trace” and digital evidence will exist.

To illustrate the application of Locard’s Exchange Principle to a cyber crime, we take the example of use of the Autopsy Forensic Browser and Sleuthkit utilities to extract information regarding the installation of a rootkit in Solaris system.

One could contend that during this type of cyber crime Locard’s Exchange Principle does not apply. The rationale is that because a human is not at the crime scene there is no trace evidence from the human on the computer or digital media at the scene. However, in actuality ,the data recovered from the forensic image of the server is correlated with data from IDS logs and the file HISTORY tracks the changes in the functionality of the rootkit.

Thus, in this example, there is a trace at and from the scene.It may involve finding the trace evidence at other physical locations than just the one scene of the crime. The key logger could be added software or hardware or both, but in both cases it remains behind for an investigator to discover. This examination typically involves bits and bytes of information.


Related Solutions

Demonstrate how Forensic Accounting and Fraud Examination course material will benefit you as you transition into...
Demonstrate how Forensic Accounting and Fraud Examination course material will benefit you as you transition into corporate America. Provide specifics.
Explain the controllability principle and exception by reporting. Explain in detail with examples
Explain the controllability principle and exception by reporting. Explain in detail with examples
1. Using an example, explain how exchange rates influence business activities? 2. Explain the concept of...
1. Using an example, explain how exchange rates influence business activities? 2. Explain the concept of devaluation, and explain the effect devaluation has on the price of a country's imports.
Explain the dimensions of cultural values. How to they influence decision making? Provide examples.​
Explain the dimensions of cultural values. How to they influence decision making? Provide examples.​
Explain, with examples, how the values held by a society could influence the establishment of goals...
Explain, with examples, how the values held by a society could influence the establishment of goals and objectives for the design of a new civil engineering system or the operations of an existing system being planned in that society.
Define and explain the principle of social psychology (not the book), more specifically, social influence.
Define and explain the principle of social psychology (not the book), more specifically, social influence.
Give a detailed description of the Ames assay including how it is performed, the basic principle...
Give a detailed description of the Ames assay including how it is performed, the basic principle of how mutants are detected, what general types of mutations can be detected, and the advantages and disadvantages of the Ames assay over more complex mammalian genotoxicity tests.
1. Explain the concept of PPP theorem. How does it influence long term exchange rates? 2....
1. Explain the concept of PPP theorem. How does it influence long term exchange rates? 2. Numerical problems about undervaluation/overvaluation of currencies; application of PPP theorem. 3. If U.S. visitors to Mexico can buy more goods in Mexico than they can in the U.S. when they convert their dollars to pesos, is the dollar undervalued or overvalued? Explain.
Explain with examples (at least 3) of arbitrage in exchange rates.
Explain with examples (at least 3) of arbitrage in exchange rates.
Forecasting Exchange Rates Explain two of the methods for forecasting exchange rates and provide examples of...
Forecasting Exchange Rates Explain two of the methods for forecasting exchange rates and provide examples of how they might work.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT