Operation Stop Hack

Operation Stop Hack
Introduction
Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.

View the setup found in the suspects home(uploaded). Then document your findings and secure all relevant evidence.

Instructions
Write a 23 page paper in which you:

Investigate the legal statutes involved in this type of case and outline specific legal consideration to take when collecting evidence.
Pre-plan how to approach the crime scene, documenting the steps and procedures to process the digital evidence.
Analyze the crime scene diagram and document and tag each device that will be collected for evidence, specifying the importance of each device.
Use the Strayer Library to conduct your research. Use no less than three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed and double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

SHORT ANSWER QUESTIONS: NUMBER QUESTION
1. Examine WinHex and the Sleuth Kit and Autopsy at Open Source Digital Forensics. In a few sentences, describe a scenario when you might find a use for each of these tools. Is one tool preferred more than the others in this industry? Why do you think learning these tools is important? Using the Internet, recommend a website or video that provides a tutorial on how to best use one of the three tools. Share with your classmates and provide links to any useful resource you find.
In your research, are there any other tools that can be used to perform the same tasks? Have you used them? Do you like them better or not as much?
(Note: For citing Internet sources in your discussion, please see the Web Sources section of the Strayer Writing Standards guide available in the left-hand menu.)
2. What do you believe was the original purpose of steganography tools and how have criminals used them to their advantage? Share some steganography tools youve found on the Web with your classmates and provide links to any useful resource you find. Describe in a few sentences how you might use these tools for good, and how they might be used for nefarious purposes.
(Note: For citing Internet sources in your discussion, please see the Web Sources section of the Strayer Writing Standards guide available in the left-hand menu.)
Search the Internet and find a free steganography tool. Post your link and provide a brief explanation on how the tool is used.