Sign In
Not register? Register Now!
Pages:
1 page/β‰ˆ275 words
Sources:
2 Sources
Style:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:

The Use of Steganography in Digital Forensics in the Criminal Justice System

Essay Instructions:

This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means "covered writing." When some people think of steganography, or "stego," they think of documents or other data files being hidden in other file types (usually image/picture files). Interestingly, the use of stego goes much farther back than the use of computers. Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message. Cryptography scrambles a message so that it is unreadable, but still visible, while stego camouflages data to hide it or make it undetectable. This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on each of those subjects), but rather to help you understand their place in the criminal justice process.
Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question. As many of you have discussed, it is important to make sure you know the limits of your warrant. But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child porn, but you do not have child porn addressed in any way by your warrant. What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use stego techniques to hide other files.
This week I would like you to do some research on encryption and steganography. First, list five (5) examples each of how steganography and encryption or cryptology were used BEFORE the advent of computers. Then, discuss how stegonography or encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.

Essay Sample Content Preview:
Topic:
Student’s name:
Institution:
Due date:
Digital forensics in the criminal justice system
Yaman and Hebah explain that while the function of steganography is to conceal communication to covert a message from a third party, the function of cryptography is to create a message unreadable so that an authorized person could not understand, though the existence of the concealed communication is not hidden (16).
Steganography was used first in 440 B.C in ancient Greece when people used to write messages on the wood, and then conceal them using wax. Secondly, a message could be tattooed on a shaved head of a slave, and concealed by the growth of his hair. The message could be exposed by shaving the head of the slave. For instance, a hidden message carried a warning information alerting Greece about Persian’s motives of invasion plans. Third example is based on encryption technique whose earliest form can be traced when people tried to hide certain messages they wanted to keep secret by substituting parts of message with pictures, numbers and symbols (Yaman and Hebah 17). In 1500 BC, the Assyrian merchants utilized intaglio (a small flat carved stone) to create writing and images to identify themselves in trading transactions. In this way, people knew a specific signature belonging to the merchants. In 100-44 BC, Julius Caesar utilized a simple substitution with normal alphabet for government communications. Caesar did not trust the messengers when he sent messages to his trusted allies. Therefore, Caesar used to replace each A by a D, each B by an E and that way throughout the alphabet. Only intended recipient, who understood the “shift by 3” rule, was able to decipher the message. Giovanni Battista Porta, in 1563, wrote a text on ciphers, creating the digraphic cipher. Porta categorized ciphers as symbol substitution, substitution, and transposition. He used misspelling and synonyms to confuse the cryptanalyst.
Just like man...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These MLA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!