Академический Документы
Профессиональный Документы
Культура Документы
INVESTIGATION REPORT
SEARCH WARRANT
To: Kaboyaone and Yusuph This is to certify and approve an application request by the forth stated duo, Kaboyaone and Yusuph in the search of Johns property herein his computer. The computer is believed to have anonymous information pertaining to the launched copyright infringement case.
The property to be searched is assumed to conceal the information pertaining to John and his actions during the course of his employment at MenBest Company (complaints).
The search or investigations that shall be conducted by Kaboyaone and Yusuph is expected to commence on or before the 19th of December 2011.
Issued to Kaboyaone and Yusuph, signature: ________________________ Date and time issued: _____________________ City and State: ______________________________________ Issuer signature: _____________________________________
INVESTIGATION REPORT
INVESTIGATION REPORT
Snapshots
APPENDIX E
INVESTIGATION REPORT
Chain of Custody
Evidence Date/Time ID
Evidence 1.0 Wednesday, Dec 14, , 10:58:58 PM Evidence 2.0 Thursday, ec 15, , 3:15:52 PM Evidence 3.0 Thursday, Dec 15, , 11:07:06 AM Evidence 4.0 Monday, ec 12, , Kileo Kaboyaone Kileo Kaboyaone Kileo Kaboyaone Kileo Kaboyaone MD5 55e3179fca3952c8be9fe60469d0def6 SHA1 615ac66be406e89387ac3542a02d61f20e0e2 1ea MD5 55e3179fca3952c8be9fe60469d0def6 SHA1 615ac66be406e89387ac3542a02d61f20e0e2 1ea MD5 e6a9d458968ce2821906c0b68acef880 SHA1 68747aa9b3d94938371740642402eb83aed9 3204 MD5 e6a9d458968ce2821906c0b68acef880 SHA1 68747aa9b3d94938371740642402eb83aed9 3204 Evidence 5.0 Monday, ec 12, , Kileo Kaboyaone MD5 e6a9d458968ce2821906c0b68acef880 SHA1 68747aa9b3d94938371740642402eb83aed9 3204
Custodian
Witness
Hash Values
6:18:52 PM
3:15:52 PM
INVESTIGATION REPORT
Timeline analysis
Time 7th Dec 2011 11:25 HRS 7th Dec 2011 11:45 HRS 7th Dec 2011 11:52 HRS 7th Dec 2011 12:20 HRS Action Jullys account was cracked by John MenBest Copyright design was stolen from the company by John MenBest Design was collected from Jullys account by john The file that was taken from Jully was encrypted and zipped with password protection by John. 7th Dec 2011 13:10 HRS The file that Was encrypted and protected with password was sent to BadBoys in an attachment mail 7th Dec 2011 13:40 HRS The MenBest stolen Design Copyright was sent to BadBoys
INVESTIGATION REPORT
Functional analysis
LOCAL REMOTE
MEDIA
CD-R Probability 10
FLOPPY Probability 9
SW Internet
IMAGE
KEYBORD Probability 6
USER
USER SKILL
USB
SPIKER
MEDIA 6
INVESTIGATION REPORT
Relational analysis
7th
John collects the design from Jullys account and saves into a file 7th Dec 2011 1152HRS
John encrypts the file and zipped it with password protection 7th Dec 2011 1220HRS
John sends the copyright for MenBest design to BadBoys 7th Dec 2011 1340HRS
INVESTIGATION REPORT
1.6 RECONSTRACTION
Theinvestigative reconstruction leads to a more complete picture of a crime this is the phase where by the determination of what happened to the crime who committed the crime how and why the crime was committed is founded. This is also considered as a summary of the evidence analysis. In this case the Zipped file was encrypted and password protected which was then sent to BadBoys Company. The file contained some image with the format JNG and this image was the future design of MenBest winter clothing, MenChris. The evidence which contain image of the one of the Jacket called high visibility which is contained in the attached mail file; copyrights for the design were violated as it was stolen from the legitimate designer MenBest to BadBoys. John used Key logger to get Jullys account details which he then used the account details to crack into Jullys Account and still the designs of MenBest winter clothing and e-mail them to bad boys. The image of IPod jacket and the woolrichwwnn_2 crop were sent to BadBoys as stolen Designs from MenBest. All these evidences show that there were copyright infringements.
INVESTIGATION REPORT
INVESTIGATION REPORT
10
INVESTIGATION REPORT
11
INVESTIGATION REPORT
APPENDIX E: KEYLOGGER
12