(The Tale of Three Friends)
Victim : Hazel, she was found dead with stab wounds to neck and stomach.
Suspects :
Sonny : Cybersecurity consultant (private sector), top student, had unrequited feelings for Hazel since Year 1.
Jack : Technician at Temasek Polytechnic, Hazel’s fiancé, close friend of Sonny.
Key Event : Both were arrested on Hazel’s wedding day, claiming ignorance of her death.
Objective : Use mobile device forensics to determine who planned Hazel’s murder .
Sonny’s Motive : Rejected confession of love to Hazel days before her death.
Jack’s Motive : No explicit motive, but potential jealousy or hidden tensions?
Timeline Oddities :
Both claim ignorance of her death until questioned—possible lie or coincidence?
Location Data : GPS logs from phones (e.g., proximity to Hazel’s home on the day of death).
Communication Patterns :
Call logs, messages, or emails between Sonny/Jack and unknown contacts.
Deleted messages (recoverable via SQLite carving).
Social Media Activity : Posts/check-ins near Hazel’s location or suspicious activity.
App Data : Ride-hailing apps (e.g., Grab), calendar entries, or notes.
Sonny’s Profile : Cybersecurity expertise could mean he covered tracks (e.g., encrypted chats, deleted logs).
Jack’s Profile : Technician role gives him access to campus systems
(Based on case details and forensic analysis goals)
Pre-Wedding Day :
Hazel and Jack inform Sonny of their marriage plans.
Sonny confesses feelings to Hazel privately; she rejects him.
Day of Murder :
Suspect (Sonny/Jack) travels to Hazel’s home (GPS logs).
Murder occurs; weapon (knife) left at the scene.
Post-Murder :
Suspect deletes communication logs or uses encryption.
Suspect creates alibi (e.g., fake GPS data, manipulated timestamps).
Wedding Day Arrest :
Police arrest both suspects before the ceremony.
(5 members, individual + group components)
Goal : Create actionable items for each phase of the NIST framework.
Breakdown :
Member 1 : Collection (Identify sources, acquire data, preserve integrity).
Member 2 : Examination (Filter relevant data)
Member 3 : Analysis (Timeline, relational/functional analysis, Locard’s Principle).
Member 4 : Reporting (Documentation, chain of custody, conclusions).
Member 5 : ?
Goal : Analyze VM images of Sonny/Jack’s phones to uncover evidence.
Breakdown :
Evidence Acquisition (1 member):
Use FTK Imager for forensic imaging.
Hash values (SHA-256) for integrity.
Temporal Analysis (1 member):
Reconstruct timeline using metadata (call logs, GPS, app timestamps).
Relational Analysis (2 members):
Map communication patterns (Sonny/Jack to Hazel, unknown contacts).
Use OSINT (e.g., Google Maps timeline, social media).
Functional Analysis (1 member):
Link evidence to actions (e.g., “How was the murder planned?”).
Report : Combine individual contributions into a cohesive document.
Presentation : Assign roles (e.g., Introduction, Analysis, Conclusion).
What to Do :
Open-Source Intelligence (OSINT) :
Use tools like Google Maps, social media, or public records to verify locations linked to evidence (e.g., GPS coordinates from suspects’ phones).
Example : If a suspect’s phone shows a location near a specific HDB block in Tampines, use Google Street View to confirm the address and justify a search warrant.
Tutor Authorization :
Notify your tutor via Microsoft Teams before visiting any site. Provide:
Exact address (e.g., “123 Tampines Street 44”).
Justification : Link the location to evidence (e.g., “GPS data places Sonny’s phone at this address 30 minutes before Hazel’s death”).
How to Document :
Create a Workload Distribution Table in your report. Assign roles based on the NIST Framework and marking rubrics:
Member | Task | NIST Phase | Deliverable |
---|---|---|---|
Member A | Collection | Identify devices, acquire forensic images | Hash values, CoC documentation |
Member B | Examination | Filter call logs, messages, GPS data | Screenshots of tools (e.g., Cellebrite) |
Member C | Analysis | Build timeline, relational analysis | Timeline diagram, Locard’s Principle deductions |
Member D | Reporting | Draft NIST-aligned report | PDF with bookmarks, formatting checks |
Member E | Case Defense | Prepare presentation slides | Rehearse Q&A, align with rubric criteria |
Report Structure & Content :
Cover Page :
Follow Appendix A template (Practical Class, Group No., members’ names).
Declarations :
Non-Plagiarism : Signed by all members.
AI Tools : Document prompts/responses (e.g., “Used ChatGPT to brainstorm timeline analysis”).
Forensic Examination (NIST Framework) :
Collection :
Document seizure of Sonny/Jack’s VM images.
Include photos of devices (even simulated ones).
Examination :
Use tools like Autopsy or Magnet AXIOM to extract SMS, call logs, GPS.
Analysis :
Temporal : Timeline of Hazel’s death vs. suspects’ activities.
Relational : Link Sonny’s deleted messages to Hazel’s rejection.
Functional : Use Locard’s Principle (e.g., “Sonny’s phone connected to Hazel’s Wi-Fi at the crime scene”).
Appendices :
Include your Task 1 Checklist and CoC forms.
Minimum Requirements Explained :
Crime Scene Handling :
Simulate steps from Week 1, Session 2 (e.g., “iPhone 15 Pro was found powered on; Airplane Mode enabled, SIM removed”).
Photos : Include mock screenshots of device states (even if using VMs).
Forensic Imaging :
Use FTK Imager to create forensic images of the VMs.
Hash Values : Document SHA-256 hashes for integrity.
Locard’s Exchange Principle :
Example: “Sonny’s phone shows Bluetooth pairing with Hazel’s smartwatch at the crime scene.”
Deductions :
Tie evidence to motives (e.g., “Jack’s phone has no GPS data near Hazel’s home, weakening his alibi”).