Comprehensive Forensic Report
Comprehensive Forensic Report
Date:
Student Name / Student Number:
Section – A
1. Executive Summary
In this report a detailed forensic analysis of digital evidence is presented which is associated
with a drug smuggling operation. This operation involves two main suspects Jane Esteban and
John Fredricksen. These individuals were detained at Wellington, New Zealand, on arrival from
Brisbane, Australia. During the investigation, one kilogram of methamphetamine was found
concealed in the suitcase of Fredricksen. During further investigation a place was raided in
Petone, in which some additional contrabands were seized, including digital devices. This report
provides the summary of investigation and digital footprints that connect these suspects to be involved
in drug smuggling network by performing detailed digital forensic investigation on their electronic
devices.
2. Introduction
Forensics in digital medium is nothing but the investigation of all the digital devices used for
conducting a crime. Consequently, digital forensic techniques are utilized on the seized
electronic devices as part of this case to examine more into this drug smuggling operation. The
main purpose of this investigation is to collect forensic evidence in order to establish any
linkage between the suspects.
3. Case Description
There are two principal suspects in this drug smuggling criminal case: the undercover cop, Jane
Esteban and also John Fredricksen who is a significant individual. Police found 1kg of
methamphetamine in the lining of Fredricksen's suitcase when he arrived in Wellington.
Additional inquiries brought a new location where more contraband, including a desktop
computer, was found. Therefore, it's important that we find further information from these for
us to really discover the depth of this illegal operation and who is involved in it.
4. Background and Activities of the Suspect
John Fredricksen: An experienced player in the world of drug smuggling, who used the
encryption channel to communicate with His New Zealand contact “Steve Kowhai”. He
communicated via Discord to plan logistics and used steganography to exchange classified
information. Fredricksen recruited Jane Esteban, as a drug mule, but in actual she was an
undercover officer who was collecting evidence against this network.
Jane Esteban: She is an undercover Australian Federal Police officer, who pretended as an
accomplice of Fredricksen to enter in his operation. She deployed malware to monitor
communications and gather intelligence. Her role was to collect incriminating evidence against
Fredricksen and Kowhai, so that they can be arrested.
Steve Kowhai: A prominent drug dealer in New Zealand, Kowhai target was to broaden the
ambit of his business. He shared techniques to escape from customs with Fredricksen and
helped him in concealing the incriminating messages within the pictures through
steganography. Steve's messages to Fredricksen were encrypted using multiple software.
5. Forensic Analysis and Conclusion
This process involved taking the device and imaging. First, the suspect laptops were imaged,
then the desktop computer, using FTK Imager; MD5 and SHA-1 hash values were calculated to
ascertain that no change in evidence occurred.
a. Encrypted Communications: The encrypted logs in Kowhai laptop were related to
logistic plans for smuggling of methamphetamine.
b. Hidden files: Data carving algorithms were used to hide some operational files
required for smuggling. In fact, these documents were hidden in image
files using steganography.
c. Malware Deployment: The Quasar RAT malware on Esteban's laptop proves that
she deployed it to spy on Fredricksen and Kowhai communication,
allowing her to obtain information leading to the involvement of these in the
criminal activity.
6. Conclusion
Thus, the forensic investigation has revealed an abundance of digital evidence, linking the
suspects to the drug smuggling operation. It includes; how the suspects were communicating
through encrypted channels and hiding documents or deploying software to recover messages.
This analysis played a pivotal role in building intelligence about the activities of the major drug
trafficking network and will prove extremely useful in not only taking out the suspects but also
in bringing down their illicit businesses
Section – B
Details of Methodology
1. The digital forensics methodology that is used in the investigation also guarantees integrity,
reliability and reproducibility of the results. In these forensics every step from gathering the
evidence to its analysis is done in a very detailed manner, so that the evidences can be
considered factual and unchallengeable.
2. Data Collection
Imaging Process:
The FTK Imager, which is commonly available tool used across much of the digital forensic
community to acquire standard (bit-by-bit) forensic image of the devices which were discovered
with the suspect. All imaging were assigned unique identifiers. MD5 and SHA-1 hash were also
calculated to provide integrity proof for the evidence associated with devices.
3. Systematic Review
Initial Analysis with Autopsy:
The initial examination was done by using autopsy, an open-source digital forensic tool. Images
were imported from the forensic environment into Autopsy for a general analysis of the file
system. Emphasis was on identifying major artefacts, including encrypted files, chat logs, and
hidden documents.
Memory Dump Analysis:
Volatile memory dumps from the devices were analyzed to capture ephemeral data like active
processes and network connections. Through the memory analysis plugins in Autopsy, it was
possible to identify active sessions that corresponded to communication tool usage such as
Discord and encrypted email clients like ProtonMail.
Issues in assessment:
Basic challenges encountered were safe communications and encryption cracking as well as
containing hidden information. More advanced techniques like brute-forcing and password
recovery have been used, but not with much success because of the complexity usually
associated with the passwords.
4. Replication
Documentation of Procedures:
Detailed documentation of all procedures, including tool settings, hash values, and
configurations utilized in the examination, was maintained so that, in the next case, results
could be reproduced step by step by another forensic examiner.
Hash Verification
The hash values of each forensic image and the extracted data were checked consistently
throughout the investigation to assure evidence integrity. Hash value changes would imply
altering; however, there was no sign of alteration in this case.
Peer Review:
These were peer reviewed at a peers-to-peer level by another forensic examiner to validate
them; they should be appropriate methodologies and based on the evidence support the
conclusion.
5. Conclusion
All methodologies applied here were all intensive and of the very same type being of use within
the best forensic practices. All samples collected and analyzed were handled with utmost care
to preserve the integrity, and all findings were reproducible and legally tenable. Hence,
whatever conclusions such an analysis would produce are reliable.
Section – C
1. Finding – 1: Wallpapers and Memes
Discovery: Medicinal wallpapers and memes on the laptop of Fredricksen and desktop from the
raided address.
Discussion: Inculpatory: The presence of these pictures indicates a propensity for drug culture,
and it might even indicate connection to the suspects' linking to drug activities. These are not
conclusive evidence but support other incriminating findings.
Supporting Evidence: These are in the "Pictures" folder and have been used as wallpapers on
the computer desk. Metadata analysis also shows they were created and last modified around
the time of suspects' arrest dates.
Supporting Evidence: The file was placed in the "Business" folder. Metadata analysis
determined the file was created and changed within the date range of the incident. It's within
the date range for the
event.
6. Find – 6: Techniques of Obscurity
Discovery: Inculpatory: The user, Fredricksen, used various disguises for concealment, including
encryption using TrueCrypt and document-hiding inside images by using steganography.
Discussion: These methods show quite advanced sophistication and a purpose of concealment
of evidence at crime scene against the law enforcement.
Supporting Evidence: Evidence was found for TrueCrypt volumes as well as steganographic
images where partial decryption with known keys showed the existence of hidden data inside,
proving usage of these methods of obfuscation.
9. Finding – 9: Malware
Discovery: Exculpatory:The Quasar RAT malware had been embedded inside a contact card
which had been sent to John Fredricksen via Discord from Jane Esteban.
Discussion: the malware enabled Esteban to track all the activities of Fredricksen and capture
relevant proofs, such as ProtonMail accounts. This malware was essential while gathering
intelligence on a drug operation.
Supporting Evidence: OSForensics was used to detect and examine the malware. Its
implementation, usage, and collected data were documented in ensuring the investigation was
extended further. 10. Discovery 10: Documents Discovery: An image of the Australian police
badge and an attachment labeled "course-undercover survival.pdf" on Esteban's PC. Discussion:
All these documents support Esteban's claim that she is an undercover officer, and therefore
she does not engage in the trafficking of the drugs. They let her explain her role as well as justify
the use of intrusive techniques, which is the malware.
1. FTK Imager