Highlights
This assignment is worth 35% of the total assessment for 7906ICT. It is individual work. While you can discuss the assignment with your peers, your submission should be your own work. You should provide evidence of your own work incorporated in your submission.
The objective of this assignment is to gain knowledge and understanding of digital forensics through research and practical experience. This understanding is to be demonstrated by submission of a formal technical report of an analysis of digital forensics artefacts and a brief essay on recent advanced in digital forensics and a Digital Forensics Investigator’s report for non-technical audiences.
Scenario
In Albuquerque, New Mexico, there has been a mass shooting at the Welker Compound on Daniel Road with over 10 casualties. The owners of the property have long been suspected to be a criminal gang with white supremist ideologies. The compound had been under police surveillance with network traffic for the day of the shooting captured by the ISP. A damaged laptop was discovered at the scene and a memory dump was made but the disk image was unrecoverable. There has also been a mobile phone found near the body of the gang leader and several other suspected criminals.1
Task 1
You are a digital forensics analyst for the Albuquerque Police Department. You have been tasked with examining any digital forensic evidence found at the scene as well as the network capture. The case supervisor suggests you address the following questions.
1. Who are the suspects in the transmission? When does the first communication begin?
2. What browsers are the suspects using and on what operating systems?
3. Are there undercover DEA agents within the gang? If so, who are they?
4. What was sent for Jesse to collect? 5. Is Jesse a DEA agent?
6. What applications are running on the memory dump computer?
7. What web pages has the memory dump computer visited recently?
8. What is email address of the owner of the memory dump computer?
9. What is password of the memory dump computer? 10. Create a detailed timeline of the significant events that take place on the memory dump computer.
11. What are the non-stock applications installed on the phone?
12. Who is in the contacts list?
13. What messages and calls have been sent and received by the phone?
14. What Internet searches has the owner of the phone made?
15. Is there a link between this phone and the disk image provided in Assessment A2. If so what is it?
As part of the answer for each of these questions you must include:
• A clear description of the evidence and reasoning for your answer.
• A detailed description of the process that you followed and the tools that you used to obtain the evidence. It is expected that you will include screenshots in your description.
This ICT Assignment has been solved by our ICT Experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.