MADS 6697 | Computer Security and Forensic Administration | Essay

Dominic stone

A priest with child porn? Never! English clergyman Dominic stone downloaded hundreds of pornographic images of children while working at his vicarage. While he wasn’t sentenced to any imprisonment, he was ordered to register as a sex offender for 10 years, and will not be allowed to work in Ministry for the remainder of his life. Stone tried to argue that someone else may have used his computer to download the images without his knowledge. But the only other person who had access to the computer was his wife. Not helping his case, it was proven that at the time of the downloads, there was also legitimate work being performed. Not only can investigators check the files on a computer, they can also see when files were added or edited, much like a doctor’s ability to determine the time of death of a corpse. 

 In this essay you will describe and analyze one digital forensics process that was followed in a legal and/or law enforcement context. Your essay is required to address the following question:

  • What was the legal hypothesis and/or crime being investigated?
  • How was the digital forensics process applied? How was evidence identified, collected, examined, analyzed, and presented?
  • What techniques were used to collect, preserve, and analyze the data?
  • How can the process be evaluated based on theories of ethics?

The essay should be 2000 words (+/-10%)and a referencing style should be used (APA,MLA, or any other reference style.).

The following criteria will be used to assess the essay:


Additions and modifications required /meets expectations/exceeds expectations

10-15%                                                        15-20%                                   20-25%

  • The case was described in detail and multiple news sources were used to summarize the case from different perspectives.



Additions and modifications required/ meets expectations/ exceeds expectations

10-15%                                                                15-20%                            20-25%

  • The digital evidences used in the investigation process were clearly described.
  • The techniques used to generate the evidence were explained.
  • When the media coverage of the investigation process does not clearly explain the techniques used, the essay provides additional explanations based on the book and/or academic articles.
  • For, example, if the digital evidence that was used consisted of recovered deleted file, the author is expected to provide a clear explanation of file system and how deleted files get recovered.
  • If the digital evidence consisted of data from an IOT device, the author is expected to explain how data gets extracted from the specific IOT device that was used in this case,

Additions and modifications required /meets/expectations /exceeds expectations

10-15%                                                                    15-20%                     20-25%

  • The identification, collection, analysis, and reporting processes were summarized in the essay.
  • The author is expected to explain the tools that were used to preserve and analyze the digital evidence. If no details were provided in news articles that covered the forensics case; the author is expected to add explanations base on the textbook and /or research articles about how to preserve evidence, protect its integrity, and analyze it.

 CRITERIA#4: (25)

Additions and modifications required/ meets expectations /exceeds expectations

10-15%                                                              15-20%                            20-25%

  • In the section, the author is expected to analyze the process that was followed in collecting and reporting the digital evidence from at least two theories of ethics.