What Options Does Paul Agent Have for Making the Evidence Requests from Foreign Countries?

Published: 2023-02-03
What Options Does Paul Agent Have for Making the Evidence Requests from Foreign Countries?
Type of paper:  Essay
Categories: Company Health and Social Care Other
Pages: 7
Wordcount: 1925 words
17 min read

What Issues are implicated, and how do you expect these Requests to Play Out - i.e., Do You Expect the Evidence Production Request will Be Successful? Why or Why Not?

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Depending on the investigation report from Paul Agent regarding on the attack of the XYZ system, the investigator ort to take various options in obtaining the evidence from the foreign countries that are linked to being the sources of multiple processes executed during the attack of the XYZ system. For instance, it was proved that from the two email account that was used to attack the XYZ system, the 1st email originated from an email provider that is based in the UK. Thus, the investigator (Paul Agent) should opt for investigating the company to establish further information regarding the email created and stored in the established UK email provider company servers a situation that may be swift due to the recent executive agreement entered between the UK and the US.

Further, the 2nd email account was established to originate from an Hushmail, which is an encrypted Canadian application. Also, to gather adequate evidence regarding the attack, Paul Agent will opt visiting the Hushmail Company via the company's office located in the US and guide him on whether he could visit its headquarters based in Canada for the investigation. Moreover, the system investigation report establishes that the 1st IP address used by the 1st attacker was rooted back and was proven to originate from an internet service provider (ISP) company based in Asia and which was noticed to have been previously used by the Bureau21 which is a military unit. Thus the investigator (Paul Agent) should opt to visit the ISP Company that owned the IP address in Asia to determine the real user of the device under the established IP in the attack.

The entire investigation ought to determine the reason behind the attack of the XYZ Corps system. Paul Agent investigation process aims at establishing the individual behind the cyber-attack, the reason for the attack, and the benefit of the attacker from the malicious activity on the XYZ corps system.

Paul Agent option in investigating the email provider company based in the UK where the 1st email that was used in registering the key domain names that were used route the attacker into the XYZ system. Based on the international law on cybersecurity, the act gives the mandate the responsible agencies to investigate any unlawful conduct exercised in the computer systems. Further, due to the executive agreement entered between the UK and the US, the evidence is expected to be successfully obtained. The act of Paul Agent subdividing the investigation into three Teams will make the exercise more accurate and reliable since it is based on lawful and experienced agencies. This will help in establishing the owner of the account since the mail company has to comply with the law and extract the full details relating to the account until the account user is caught.

Similarly, team 2 assigned the role of obtaining the evidence and the root of the 1st attacker, would be successful in accessing the owner of the second email that originated from the Hushmail. Basically, the Hushmail account was noted to have been used for registering the domain which was used for exporting the exfiltrated files of the XYZ company in an encrypted format. Notably, the obtainment of the evidence would be successful since already the Hushmail Canadian company has an office in the US that would be used as the base by team 2 for evidence obtainment. Further, if more advanced evidence would be required, the team would be riffed to Canada by Hushmail company's officers already based in the US.

Also, through the application of the cybersecurity international laws, it would be possible for the team two to obtain evidence on the 1st IP address that was established to originate from an internet service provider ISP Company based in Asia. The team2 would be able to root down and establish the exact computer used and under whose network it operated.

What about the need for Evidence Preservation? How would you propose Paul Agent go about this? What laws or Instruments would you suggest using, and why?

Preservation of the evidence more so electronic evidence such as those associated with cybersecurity incidences must be stored in an orderly manner to facilitate the overview of the full incidence as well as establish the bases of further investigations and containment of threat. The preservation of the evidence by Paul Agent would be of vital importance for the analysis of the successful incidences. This would be made possible through the utilization of the strict standards for preserving data that would ensure all the potential data has been captured and would remain uncompromised in the entire process of investigation of the XYZ system attacker.

According to my knowledge of evidence preservation, I would propose that the investigator (Paul Agent) should not be wary of rushing to the collection of evidence. This act could potentially compromise the value of the evidence which could be utilized in identifying the attacker's approach of compromise. Further, I would advise Paul Agent to put the act of evidence preservation as the first priority since according to the established regulations, the appropriately collected evidence is used in enforcing the successful criminal prosecution.

Additionally, I would propose to Paul Agent that, when he is gathering the evidence from the targeted sources, he need to utilize the forensic sound method in order to preserve the important digital evidence. This would help him in establishing a clear image of the occurrence as well as the effective responses that need to be launched. He should ensure that all the electronic evidence obtained is well handled with care and prevent it from further compromises, such as being overwritten or otherwise corrupted.

For precise evidence collection and preservation, competent tools need to be analyzed efficiently before the exercise kicks off. According to Paul Agent investigation, I would recommend the use of the following instrument;

Image Validation Tool

The application of this tool in the investigation process reassures the analyst that the image of the beat stream obtained from the evidentiary device matches those of the original drive (Selkie & Ellen, 130). This would be determined through the hash function mathematical formula on the instrument that helps in calculating the hash value of both the image copy and that of original media. Then the validity on the evident copy may be established through a signature that is created of the original drive, and their comparison is made to that created on the image. Later, a unique signature is created from the comparison which is used for validating the integrity forensic image bitstream made in the process of collecting the evidence.

Write Blocking Tools

The write blocking tools can be used for preventing unintended changes on the file attributes in an evidence system. Preserving of the obtained evidence by Paul Agent should ensure the evidence is free from alteration from any intruder. The writer blocking instrument plays an essential role in that I does not allow the last access date to change, it maintains the file time and date thus it is good at retaining the evidence integrity for the cybercrime investigation.

Given what we've learned about Attribution, to which Country would you attribute the initial hack (being handled by Paul Agent's Team 1)?

How did you make this attribution and what information did you base this attribution on?

Were there any false flags or any information you dismissed in terms of attribution?

And which categories of attribution do your factors fall into?

Based on the established report from Paul Agent investigation that is to be handled by team 1, the initial attacker is likely to have originated from Asia. From the knowledge of network communication in the issue of IP address, one is able to trace a computer user by his device IP address. From the report, it was established that two IP addresses were identified. However, the 1st IP address which was from the original hacker originated from an Internet service provider company that is located in Asia. This shows that trough back rooting of the IP address octets, it will lead the investigator up to the company's network where the device was operating. After that, the company would trace back its routing tables on their servers, and establish the mac address of the device used which fall at the middle of the IP address and further the computer number which is presented by the last octet of the IP address.

Further, despite the creation of the two email accounts by the attacker from different countries (UK and Hushmail from Canada), their host countries are registered under specific IP address that may be linked from the country where the hacker is based. Hence they may only help identify the hacker intention and may also help in identifying the hackers country of residence since they are registered under specific IP assigned to each country.

According to the investigative report, the XYZ system attribution falls under the hacker. Based on the report, it was examined that the attacker (hacker) used several navigation methods such as the creation of multiple email accounts that he ensured originated from different companies. The attacker also used IP addresses that he used came from different ISP companies. Additionally, the attacker gained access to the XYZ system via multiple links such as email accounts and maneuvered via different servers to ensure his identity is not noticed. However, due to the competency of the investigating agency, this was noticed since they used the multiple IP addresses to route down up to the origin.

Thinking about the new investigative measures discussed in this new set of facts, discuss each measure and whether there any 4th Amendment or other legal issues implicated by each (whether already employed in these new facts, or going to be employed shortly )?

If you do think that there are issues, what are they and why are they an issue/concern?

Based on the investigations on the new set of facts, it can be examined that the attacker breached the 4th amendment act on cybersecurity law which protects individuals from the search that are unreasonable. The amendments protect the company and individual privacy. Further, the 4th law amendment stipulates on creative ways and procedures which the law enforcement uses to conduct surveillance and Access Company's and personal computers, phones as well as the mails (Brenner, Susan & Leo, 211).

For instance, despite the actions of the investigating agency of obtaining evidence from the 1st mail account that seemed to originate from an email provider based in the UK, it was examined to have been used in registering a number of the critical domain that was used in routing the attacker in the XYZ Corp system. The procedure may breach the provided 4th amendment of law since the responsible investigating agency has no permission to access an individual email account from the owner despite being allowed by the email provider. This may lead to an exposer on individual privacy to the public a condition that may pose a lot of risk to the individual. Further, accessing the individual information without his consent may lead to compromising of the individual data integrity that rendering them unviable.

In the same way, the act of the Investigating agency to obtain evidence from the second email account that was used by the attacker for registering the domain which was used for exporting the exfiltrated file from the XYZ system and examined to have originated from a Canadian mail service provider by the name H...

Cite this page

What Options Does Paul Agent Have for Making the Evidence Requests from Foreign Countries?. (2023, Feb 03). Retrieved from https://speedypaper.com/essays/what-options-does-paul-agent-have-for-making-the-evidence-requests-from-foreign-countries

Request Removal

If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism