Sunday, September 26, 2010

Parameters For Selecting A Triage Tool

http://www.forensicmag.com/article/parameters-selecting-triage-tool?page=0,1

Can anything really be deleted offline? Is it true, if someone were to erase their past history, no one could ever find out what they were looking at? The answers to these questions are obviously no, everything can be traced online. There are many ways for investigators to receive past online history. A way in which is beginning to flourish are the triage tools. These tools are made to capture data from a live system meaning they can keep the data long after “plug is pulled.”
Triaging a computer can be a very important aspect for investigators because it can provide them with the methodology to quickly assess a computer’s relevance to an investigation prior to removing its power and seizure. Using these tools, investigators can trace where criminals have been and who they have been contacting. These tools are not only useful for investigators; they can also be productive for the military.
Although the military have many sources of retrieving lost information due to explosions of technology, they have been using different triage tools to determine which one works best for their situations. The way in which the USSOCOM, United States Specials Operations Command, have been selecting their triage tools has been by previous procurements. The tools were tested among different computer scenarios such as computer hard drives, SD cards, and USB Thumb Drives. They then tested each triage tool and found the ADF Triage G2 Tool from ADF Solutions, Inc. was rated the highest among military testing.
The triage tools seem to be a very productive way in helping prevent or identify any crimes. There will always be a controversy of people thinking it is unconstitutional because it is an invasion of privacy. The real question comes down to if you think privacy of someone’s previous records is more important than the lives of others.

2 comments:

Janelle said...

I really liked the way Devon used a question at the beginning to draw you in and make you interested. Web security is an important issue in this age of technology and information. Everyone has at least some interest in keeping the web safe. I also liked the way she used specific examples to show where exactly these tools could be used. The military is fighting to defend us in many ways even though we usually don’t think about them as leaders in retrieving information. If, however, Triaging could save the lives of those who are daily risking their lives for us it is obviously very worthwhile. I also felt that she did a good job of explaining what triaging was since I understood what the issues like invasion of privacy entailed. I was helpful to understand what was being debated before trying to determine which side of the conflict is in the right.
I thought there could have been a little more critic of the article instead of simply expressing a view on the debate mentioned in the article. Even though it wasn’t in the article I would have liked to know more about how triaging could be used by criminals to steal your identity. I knew that you could bring back internet history no matter how hard you tried to cover it but I had never heard of an actually software that could do that.

kevin said...

I think that this article was very interesting; also I think that it was well written by Devon.
The reason why I liked the topic was because, when I think that I hit delete its gone but in reality its not. Also I find it interesting that some one could perform some type of operation on a computer to extract information from it. Another thing that I liked about the blog was how she was able to give us examples of how this triage is used with the military. The thing that I noticed was missing was that there was no critic of the article. Also it would have been interesting to hear about how everyday people could use this product and what the future holds for computer security.