0% found this document useful (0 votes)
231 views9 pages

Bit362 Digital Forensics: Student Name

This document provides an overview of digital forensics techniques for investigating crimes involving cryptocurrencies like Bitcoin. It discusses analyzing email, chat services, passwords, wallet information, web browser history, and blockchains to gather evidence. Training police officers in proper digital evidence collection and management is also covered, as the prevalence of electronic devices at crime scenes continues to grow. International cooperation challenges involving cloud data and remote servers are noted as well.

Uploaded by

Ruhan Singh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
231 views9 pages

Bit362 Digital Forensics: Student Name

This document provides an overview of digital forensics techniques for investigating crimes involving cryptocurrencies like Bitcoin. It discusses analyzing email, chat services, passwords, wallet information, web browser history, and blockchains to gather evidence. Training police officers in proper digital evidence collection and management is also covered, as the prevalence of electronic devices at crime scenes continues to grow. International cooperation challenges involving cloud data and remote servers are noted as well.

Uploaded by

Ruhan Singh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 9

BIT362 DIGITAL FORENSICS

Student name
  
Table of Contents
Executive summary...............................................................................................................................2
Introduction...........................................................................................................................................3
Methods and techniques.......................................................................................................................3
Email and the chart services..............................................................................................................4
Passwords and Seed phrase..............................................................................................................5
Wallet analysis...................................................................................................................................5
Web browser history.........................................................................................................................6
Blockchain explorer...........................................................................................................................7
Conclusion.............................................................................................................................................8
References.............................................................................................................................................8

1|Page
Executive summary
Searching for digital currencies or cryptocurrencies has become a priority. All cryptocurrency-related
trades are stored in a blockchain and are not traded (e.g., immutable), which helps more than just
break the detection of fraud. Digital currency trading is needed to detect fraud and perpetuate
market integration. Many parts of digital certification management have been reduced. There are
many explanations for this, other than the rapid and widespread transfer of digital tools, investment
margins, and the lack of adequate reporting. Digital justice, with permissions, tools and key
personnel will be a viable option. Demonstrating a good return on investment is important for
meeting the needs of employees. Funding these efforts will create a mix of race, state, and federal
funds, and this can make it difficult for small businesses. Local and diverse models make it easy to
coordinate, letting officers know where support is needed.

Improving digital evidence education is not part of the basic research of police academies, however,
officers with all levels of expertise can relate to digital evidence related to case resolution. For
example, training improves the collection of evidence, such as instructing police officers on bag
physics that are needed to disassemble electronic devices. Lessons face large digital arts, limited
equipment, and the potential for changing observers. The reason for the business is the lack of
employee training in digital authentication. The backlash led to failed training as the team withdrew
its rivals from the playing field, and the backlash cut requests for the transfer of inadequate
equipment, previously or failed, financially and permits due to office delays due to financial
constraints., the digital evidence to be produced at each stage of the investigation and prosecution
and the work to be done.

In the age of digital evidence, the main focus is on the magnitude of laptop-related infringement.
Today, however, there is a digital physical device for almost every crime that can help detect the
extent of a collision. As a result, the investigation already includes, but digital evidence can also be
used for cybercrime. For example, analysts may think it is necessary to estimate whether the
information is unreliable or in the victim’s cloud accounts, and if it does not get it properly, it can
provide accurate information. Many reports of laptop violations may or may not exceed the limits of
investigation and / or prosecution. As victims of this crime turn to each other for help and murder,
appropriate response procedures are designed not only to help the victim, but also to record the
evidence and digital information they choose. Search and arrest by state authorities. This is an area
of much debate about digital evidence. Finally, Riley’s recent phone call (Riley v. California, No. 13-
132) revealed a change in the physical and mental evidence that should be allowed, cell phone
content, as opposed to ventilated physical data. one man. The distinction was made because of the
retention of essential elements of portable devices that would contain information about living
conditions, partners, and activities that would be outside the scope of the research. Riley makes it
difficult to distribute on screen. Once the cooperative system is set up, there is a risk that the cell
phone lock will be removed with the remote control or illegal keys, resulting in them not gaining
access to the knowledge.

2|Page
Introduction

Bitcoin is a decentralized cryptocurrency and payment network that allows peer-to-peer


transactions between users. The model, introduced in 2009, has gained some traction and now has a
market capitalization of nearly ten thousand dollars. A large market has grown to support these
developments, and it is a recognized fact that some of the larger retailers are making a profit. It has
leaked many fake numbers and now has more than two hundred cryptocurrencies called alt-coin. It
is very difficult to hold a digital certificate, even if ordered. Police officers responding to incidents or
arrests often lack the expertise to defend and use digital evidence to control the chain of custody
and after entering court. In general, the integration of digital evidence through victim devices, where
all experiences can be widely recorded over the phone, leads to the closure of sensitive information.
Management does not need ". Digital problems often arise in the region if digital certification is
required to ensure that qualified employees are not eligible. It does not exist on the physical device
where the offense is located, but it is on a remote server with cities, states or multiple countries.
Even in North American countries, ISPs may not allow it, especially because of procurement
responsibilities under ECPA. The International Memorandum of Understanding (MLAT) has enhanced
international certification, which can have a significant impact on service delivery Many changes will
make it more difficult to capture digital evidence in the future. The amended law states that general
information should not be allowed to ISPs by providing personal information to users, as the current
decision prohibits On electricity recovery. In the future, problems with cloud-based and smart data
may legally issues regarding the appropriate occurrence of portable “electronic microcomputers” as
part of the digital proofing process.

Methods and techniques


The main basis of the infringement is the receipt of material evidence, documents, necessary
documents, packaging, storage, and ultimately legal changes. The following are the main
investigations most commonly referred to as crime scenes:

 Local system
 Escape
 Search of line
 Grid system
 Spiral method
 Method of Wheel search
 The search is random

A crime scene was created to develop some web resources and replace Bitcoin. This allows
instructors to explore all the topics identified during the studies and apply them in the study of
theory. This involves creating multiple money numbers and placing activity symbols so that students
can create scenarios around the data they see. The tests are designed to test students
’understanding of the Bitcoin environment and highlight techniques they have learned in their
learning. Professionals should use appropriate procedures to analyse the data in order to follow up
and validate their results. evidence-based procedures showing how further steps should be taken to
identify defendants and examine the relevance of the evidence to their findings and limitations. It is

3|Page
not difficult to send key documents, as it is important to know that low-achieving students should
not be judged when making the assessment.

Email and the chart services


As with many search engines, email and chat repositories (such as web-based email, Slack, or chat
platforms such as WeChat, WhatsApp, Telegram, Signal, etc.) help with these additional details and
frameworks around ratings, and in particular, often help. identify additional stakeholders and / or
procedures for tracking the business. The results include important communication between the
parties, such as the addition of the cryptocurrency address, details of the final change, time / date,
and so on.

4|Page
Passwords and Seed phrase
The first step is to access wallet information; In general, " seed phrase" (12-16 words) should fit in
the wallet (assuming you have the ability to do so). Identifying a system or device such as store
passwords, static data, records, or encrypted storage will help open a wallet / address to be copied.

A useful store password for retrieving cryptographic devices and wallet information you want to
crack. People often use passwords that are similar to each of their accounts, which can be useful
information when trying to access wallet information saved from published images.

Wallet analysis
Every cryptocurrency business has started and cut out of the cryptocurrency address and / or wallet.
The address is similar to a bank account and has a similar history in the history of the business. A
wallet is a collection of addresses that can be a "wallet" (where crypto currency is stored "and other
exchanges, for example), a wallet (where money is received from of equipment or data) wallet based
- considered the most secure.), or desktop wallet software (a source of revenue for computers and /
or mobile devices). Knowing these things early on will help the researcher understand the financial
process involved in the problem. Artifacts such as wallet.dat files or wallet software such as meta
mask or myetherwallet.com can help recover funds and / or integrate crypto transactions.

5|Page
Web browser history
Browser history contains useful information about various user activities that are often useful for
researching cryptocurrency markets. The cache and history of the web browser help with the
exchange analysis that can be associated with the operation of the blockchain. Usernames and
passwords are usually found in your browser history or cache.

6|Page
Blockchain explorer
In identifying key locations and businesses, blockchain explorers are essential tools for blockchain
discovery and tracking the flow of money from one wallet to another. Government sources such as
ether scan or blockchain.com may help, but commercial products may be needed for more detailed
analysis.

It should be noted that unscrupulous individuals try to hide the blockchain industry with tools like
“mixers” or “ejectors” that break down the flow of money into smaller, more efficient processes.
These are difficult to track.

7|Page
Conclusion
Bitcoin is the main cryptocurrency that moves while holding the blockchain. The scary news is that
blockchain infringement does not end with Bitcoin. There are also many forms of money
cryptocurrencies, and there are ways to use them illegally. The supporting news is that the law has
created credibility to target the new developments that are most affected, which means only
disrupting the time-related impact of digital currency, including the version out right on equipment
and out of the box.

References
Cheah, E.-T. and Fry, J. (2015). Speculative bubbles in Bitcoin markets? An empirical investigation
into the fundamental value of Bitcoin. Economics Letters, [online] 130, pp.32–36. Available at:
http://webdelprofesor.ula.ve/economia/smzerpa/docencia/postgrado/Econom
%EDaMonetariaInternacional/materialdeapoyo/paper18.pdf [Accessed 26 Dec. 2018].

Van Der Horst, L., Choo, K.-K.R. and Le-Khac, N.-A. (2017). Process Memory Investigation of the
Bitcoin Clients Electrum and Bitcoin Core. IEEE Access, 5, pp.22385–22398.

Wu, Y., Luo, A. and Xu, D. (2019). Identifying suspicious addresses in Bitcoin thefts. Digital
Investigation, 31, p.200895.

8|Page

You might also like