Assignment 3 CCJS 321

docx

School

University of Maryland, College Park *

*We aren’t endorsed by this school

Course

321

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

8

Uploaded by BrigadierIceStarling13

Report
1 Assignment 3 Jae Woo CCJS 321 Section 6382 Professor Daniel Grove 03/03/2023
2 The first ethical dilemma for a digital forensic practitioner is the use of publication. The potential impact of results from digital forensic research not becoming publicly available can be a major risk or issue. Users of the software that contains evidence could attempt to hide the evidence in an unlawful manner and then switch to a more effective product that is capable of erasing the data in question. The developers may decide to take the published research and develop updates that can fix the problem. Now that the software can erase the locations, this will deny the use of important evidence for the digital forensic practitioners. The best way to ensure that the integrity of this ethical dilemma isn’t questioned upon is through the practice of publishing results of research to set limitations and help with protect the victim’s personal privacy (Hargreaves, 2020). The second ethical dilemma for a digital forensic practitioner is the mislabeling of professional credentials. Misrepresentations which include educational degrees, licensures, or certifications can be a huge ethical issue of dishonesty to the workplace. This is usually the case to impress clients, judge, or jury to avoid challenges. One way to avoid this type of ethical dishonesty is to do a thorough background check of the professional before admitting them into the company as a new hire (Yadav, 2017). The Google Home Voice Controller is an IoT device created for users to enjoy certain features and entertainment like media, alarms, and lights with just by the sound of their voice. This device is made for the comfort of the user and adds extra help for the disabled by allowing such a simple command of their own voice to accomplish tasks. The Amazon Dash Button is a device that ensures that the user doesn’t lack specific household items like soft drinks,
3 groceries, and personal care items. This device allows the user to order products quickly for the convenience of the user. The August Doorbell Cam is a very effective IoT device. This allows the user to answer the door from anywhere while also constantly checking the doors as well as capturing motion changes at the doorstep. This device is created to allow the user to let their guests inside very easily while also recording through a camera for added safety. The Google Home Voice Controller could contain valuable data for an investigation if the suspects or victim uses this device. The little bits of information stored on this device which includes the specific temperature the user likes, what time the users wake up every morning, and the specific media that the user is connected to are small but detailed bits of evidence that could be included in this device. All the data stored on this IoT device is encrypted and practices keeping personal data within the application or the device itself to help protect privacy, however, installing third-party apps may allow for risk of malicious apps that is being installed that can steal sensitive and personal information (Kelly, 2019). The Amazon Dash Button device can be useful evidence with the stored data in the device which includes the specific shopping carts made by the user. This will give the investigators an idea on what the user could be purchasing and why. All the data in this device is only stored within this device but can be acquired if the user have access to the personal login information (Newman, 2016). The August Doorbell Cam is valuable during an investigation due to the surprising amount of data that is stored in this device. Just like most IoT devices, the doorbell cam contains a lot of personal information including phone number, email address, postal address, and IP address. These are good enough evidence for the investigator to gather (Security.org, 2022).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 In South Africa, ‘narco drones’ are being used for basic reconnaissance and the distribution of drugs. One way to combat this is by implementing a tighter regulation, though it won’t prevent the crime from happening, but it may still provide earlier signs (Allen, 2022). In recent years, terrorist groups like ISIS have carried out drone attacks throughout the middle east like military bases, petroleum storages, and airports. These drones were also used not only for reconnaissance, but as an instrument of propaganda. ISIS used drones to capture footage of suicide car bombings. The implementation of more field security and added policies are ways to slow the usage of drones for terrorism (EER Editorials, 2022). Drones can be employed by terrorists for intelligence, surveillance, and reconnaissance missions, as well as being weaponized by using drones to carry grenades and dropping them onto military bases. A current countermeasure for these drone attacks includes what is called an electronic jamming, but it can be difficult to pull off (The Cipher Brief, 2018). Recently, terrorist groups are using drones for surveillance activities as well as delivering chemical, biological, radiological, nuclear, and explosive materials. Drones are also repurposed to be used to enter secure airspaces of a nuclear site and crashing into buildings. INTERPOL is assisting countries to protect their critical infrastructure by raising awareness, sharing practices, and facilitating information exchange on terrorist incidents involving drones (INTERPOL, n.d.). Drones currently store data through cloud computing for faster and more agile data collection and processing. When drone data is coupled with cloud and edge, the hovering data collection devices provide even faster insights of drone data (Guttman, 2022). There are multiple types of data information that is found in a drone device. Images or aerial photography
5 is a helpful tool for most organizations and industries. These drones are capable of having infrared, thermal, or HD imaging to capture the clearest images. Voice and video communications provides automated voice technology for the transfer of information and communication. Equipped with a GPS tracker and radar, drones are capable of using a navigation system and location-sensing during mapping, surveillance, and geospatial exploration. (Mirragin, 2021). One developing technology is computing power. Almost every device and appliance are being computerized and is still evolving. From data science to robotics, computing power will only increase and get better for the convenience of its users. Computing power is so broad that criminals and terrorists alike may also have access to this technology. Terrorists are very capable of utilizing technology like drones and robotics to attack others and causing mayhem. One way to counteract to this is keeping all new technology information private by building new policies and law. Artificial Intelligence continues to be one of the new technology trends (Duggal, 2023). AI is known for its superiority in imaging and speech recognition and navigation apps. The AI market will grow to a $190 billion industry by 2025. With the popularity and impressive outlook of the AI world, it is given that terrorists and criminals will be utilizing it for terrorism attacks and more. The best way to avoid this from happening is through operation security when discussing the new trends of AI. Keeping all information on technology private is a must (Duggal, 2023). 3D printing is one of the most popular tools for terrorist for its usability and low cost alternative to weapons. Terrorists will use 3D printers to create weapons which is a much cheaper option. One way to slow this process down is to build up security to keep the printers
6 from shipping out onto any suspicious locations (Duggal, 2023). Robotic Process Automation (RPA) is similar to AI and Machine Learning in a sense where its main purpose is automating jobs. RPA uses software to automate business processes like interpreting applications and processing transactions. RPA could easily play a benefiting factor for terrorists in the future if they’re able to get a hold of this new technology. RPA will be able to help the terrorists will easy transactions and dealing with data. RPA must boost its security levels and keep technology like RPA from getting out (Duggal, 2023). Lastly, 5G is the next technology trend. 5G enables us to brows the internet, use data driven services, and increase the bandwidth. With the improving technology with impressive amounts of data collection, 5G will help these technologies run more smoothly. Terrorists and criminals will be able get a hold of this type of technology much more effortlessly than the other technologies due to the large pool of telecom companies that may bring their services into other countries. The only way to approach this is to prepare for what is coming. The threats overseas will most likely have access to the internet and data collection, so to counteract, there must be thorough preparation (Duggal, 2023).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 Reference Hargreaves, C. (2020, May 12). Publication: An ethical dilemma for Digital Forensics Research? Forensic Focus. Retrieved March 3, 2023, from https://www.forensicfocus.com/articles/publication-an-ethical-dilemma-for-digital- forensics-research/ Yadav, P. K. (2017). Ethical issues across different fields of forensic science . Egyptian journal of forensic sciences. Retrieved March 3, 2023, from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5514178/ Kelly, G. (2019, November 26). Privacy and security evaluation of the google home smart speaker . Common Sense Education. Retrieved March 4, 2023, from https://www.commonsense.org/education/articles/privacy-and-security-evaluation-of-the- google-home-smart-speaker Newman, J. (2016, July 6). The Secret Power of Amazon’s dash buttons: Not sales, but Data . Retrieved March 4, 2023, from https://www.fastcompany.com/3061546/amazon-dash- buttons security.org. (2022, October 26). August doorbell cam pro privacy report . Security.org. Retrieved March 4, 2023, from https://www.security.org/privacy-guide/august-doorbell-cam-pro/ Allen, K. (2022, October 11). Weaponised drones – the latest tech threat to reach Africa . ISS Africa. Retrieved March 4, 2023, from https://issafrica.org/iss-today/weaponised-drones- the-latest-tech-threat-to-reach-africa#:~:text=But%20there%20is%20growing %20evidence,their%20intelligence%20and%20reconnaissance%20operations. EER Editorials. (2022, October 14). The use of drones by terrorist organizations: A constant challenge to counter-terrorism policies . European Eye on Radicalization. Retrieved March 4, 2023, from https://eeradicalization.com/the-use-of-drones-by-terrorist-organizations/ The Cipher Brief. (2018, October 3). Terrorists' use of drones and other emerging technologies . The Cipher Brief. Retrieved March 4, 2023, from https://www.thecipherbrief.com/column_article/terrorists-use-of-drones-and-other- emerging-technologies
INTERPOL. (n.d.). Drone technology: Security threats and benefits for police focus of Interpol Forum . INTERPOL. Retrieved March 4, 2023, from https://www.interpol.int/ar/1/1/2018/Drone-technology-security-threats-and-benefits-for- police-focus-of-INTERPOL-forum Guttman, C. (2022, June 1). Drones connect to cloud computing to analyze data stored from the Sky . The Forecast By Nutanix. Retrieved March 4, 2023, from https://www.nutanix.com/theforecastbynutanix/technology/drones-connect-to-cloud- computing-to-analyze-data-from-the-sky Duggal, N. (2023, January 24). Top 18 new trends in Technology for 2023: Simplilearn . Simplilearn.com. Retrieved March 4, 2023, from https://www.simplilearn.com/top- technology-trends-and-jobs-article