Professional Documents
Culture Documents
Lorenze Salas
Digital Forensics has changed the world of finding evidence from the digital media for
the likes of the mobile devices, computers, surveillance cameras, cloud service, and much more.
It provides the investigator to identify who is the suspects and reveal their motives on a specific
target during an investigation. The types of digital forensics cases can be “Intellectual Property
theft, Industrial espionage, Inappropriate use of the Internet and email in the workplace, and
n.d.).
In this assignment, in the Lonewolf EO1 file, the things we are looking for is hard drive
architecture, total disk space, number of partitions, file systems, user accounts, evidence files,
$MFT analysis of each evidence file, disk location of each file (or file fragments).
In the Autopsy software application, to investigate the number of partitions, I clicked the
data source tree folder, it shows 6 different volumes of partitions alongside with their
descriptions, flags, and sectors information under the listing table tab.
they run in their computer, web history, web searches, and more artificial types that is listed as
evidence.
FINAL PRACTICAL ASSIGNMENT: SOLVE THE CRIME 4
In the Operating Systems User Account Extracted Content, there are about 5 register accounts
(SAM source files) and 3 software accounts in the service. “Jcloudy” stood out the most because
it has recent activity on the computer and given a password hint. The 4 other register accounts
Users folder, then expanded the jcloudy user account (which is the main
files on the jcloudy (or Jimcloudy) user account, the OneDrive folder
tab.
FINAL PRACTICAL ASSIGNMENT: SOLVE THE CRIME 6
event should take place, the date and time of the event, the suspects
planning document covers reveals their set up ideas before executing the
operation. They contain their target, the supplies they are buying, escape
document shows the Jimcloudy views on gun control and gun-free zones.
Jimcloudy said:
“You will soon see when the blood has been shed and the defenseless
bodies stacked high. I will do what I must. No matter who is hurt, the
To establish a timeline on what happened on “Town Hall For Our Lives” event on Saturday,
April 7, 2018 on 21030 Whitfield Place Sterling VA, 20165. Approximately between 12:30 PM
and 1:00 PM, the suspect, Jimcloudy, has entered the building and started a mass shooting during
that timeframe.
The suspect leaves the library entrance after his plan was completed and headed to Dulles
the destination.
When the suspect arrives at the Dulles International Airport, he gets his ticket via online few
days prior before the mass shooting. The suspect’s destination will be Denpasar, Bali, Indonesia
on April 8, 2018 after departing the United States for 22+ hours. Additionally, the suspect booked
a lodging in Sea Breeze Candidasa, which is an hour and thirty minutes away from Denpasar,
Bali, Indonesia.
FINAL PRACTICAL ASSIGNMENT: SOLVE THE CRIME 9
OneDrive – 22 files
FINAL PRACTICAL ASSIGNMENT: SOLVE THE CRIME 10
References
Gurkok, C. (2017). Master file table | Computer and Information Security Handbook (Third
Edition). sciencedirect. https://www.sciencedirect.com/topics/computer-science/master-
file-table
guru99. https://www.guru99.com/digital-forensics.html#:~:text=Digital%20Forensics
%20is%20defined%20as,phone%2C%20server%2C%20or%20network