0% found this document useful (0 votes)
302 views31 pages

Digital Evidence Collection Portal

This document describes a project to create an e-crime portal to help law enforcement investigators collect digital evidence. The project was a partnership between Cal Poly and Amazon Web Services. The problem was that investigators lack knowledge about what digital evidence exists and how to obtain it from technology companies. The objectives of the initial phase were to create a prototype user interface for searching and obtaining geolocation data from Uber. It involved literature review on the background of digital evidence collection challenges and legislation. Project management tools like Asana and Microsoft Project were used to manage roles and track progress of the project.

Uploaded by

Josh Castle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
302 views31 pages

Digital Evidence Collection Portal

This document describes a project to create an e-crime portal to help law enforcement investigators collect digital evidence. The project was a partnership between Cal Poly and Amazon Web Services. The problem was that investigators lack knowledge about what digital evidence exists and how to obtain it from technology companies. The objectives of the initial phase were to create a prototype user interface for searching and obtaining geolocation data from Uber. It involved literature review on the background of digital evidence collection challenges and legislation. Project management tools like Asana and Microsoft Project were used to manage roles and track progress of the project.

Uploaded by

Josh Castle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

DXHUB E-CRIME PORTAL

Joshua Castle, Darren Kraker


Abstract

We live in a world dependent on technology with an exponentially growing number of electronic

devices. This evolving landscape of modern electronics paired with new technologies has

fundamentally changed the way we gather and subpoena evidence for today’s modern

crimes. Investigators lack up to date knowledge of the types of evidence that is available on devices.

Companies that collect this data also have an obligation to protect customer privacy. The paradigm

shift from physical to electronic evidence has caused us to re-examine not only how that evidence is

collected but also how legislation has responded as a result. This document describes the history and

background of the problem as well as a new innovative solution proposed by the Cal Poly Digital

Transformation hub.

1
Table of Contents
Abstract................................................................................................................................ 1

Introduction......................................................................................................................... 5

Problem Description ............................................................................................................................... 5

Objectives ................................................................................................................................................. 6

Literature Review ................................................................................................................ 7

Background............................................................................................................................................... 7

Project ....................................................................................................................................................... 8

Historical Legislation .............................................................................................................................. 8

Information (What is gathered? and How is it gathered?) ................................................................ 9

Evidence Collection Complications ................................................................................................... 10

Quantity (How much info is gathered and how often?) ................................................................. 11

Case Study (Electronic data collection in today’s news).................................................................. 11

Modern Legislation ............................................................................................................................... 13

Project Management Philosophies...................................................................................................... 14

Agile Project Management Tools ........................................................................................................ 15

Summary of Research ........................................................................................................................... 15

Solutions and Achievements ............................................................................................. 16

Project Management ......................................................................................................... 18

Conclusion ......................................................................................................................... 26

2
Future Research ................................................................................................................ 27

References ......................................................................................................................... 28

3
Table of Figures

Figure 1. Initial Brainstorm of E-Crime Portal from Solutions Workshop ..................................... 16

Figure 2. Main Search Page of Prototype Portal................................................................................... 17

Figure 3. Screenshot of Prototype Portal after Selection is Made ..................................................... 18

Figure 4. Flowchart of Roles and Corresponding Descriptions......................................................... 19

Figure 5. Work Breakdown in MS Project............................................................................................. 20

Figure 6. Meeting Notes Example .......................................................................................................... 23

Figure 7. Screen Capture of Asana Project Dashboard ....................................................................... 24

Figure 8. Microsoft Project Gantt Chart of Project Progress up to Present Time ......................... 24

4
Introduction
This project was the result of a partnership between California Polytechnic State University and

Amazon Web Services (AWS) in a joint venue known as the Digital Transformation Hub (DxHub).

The DxHub collaborates with public sector organizations to solve problems using design thinking

and proven innovation methodologies in combination with local experts to solve challenging

problems in new ways. This challenge was brought to the DxHub by the California Attorney

General's office. The motivation for this challenge was to build a training portal and toolset to

enable front-line criminal investigating officers the ability to collect digital evidence regardless of

their technical skill level. This document describes the project in detail and discusses how we used

modern project management tools and methodology to keep the project moving forward. Our role

as project managers involved organizing resources, kicking off the project to set expectations and

holding those resources accountable to assure the team delivered the project on time.

Problem Description
The explosion of new technology and its use in crime has created a situation where even

seasoned technologists don’t know what type of data is being collected on devices. Investigators

ultimately need to understand the data that may have been captured that could potentially be used as

evidence. Currently, this is accomplished through talking with others in the field and relying on a

network of information that is handed down based on experience. This method unfortunately

doesn’t scale well and relies on others to grow the knowledge of the unit. Investigative officers need

a way to search for evidence based on the type of crime. Once they have a list of possible evidence

options, they will need to know how to obtain that source of data and what process they must

follow. Since many of these electronic sources belong to technology companies, investigators need

guidance on how to subpoena that data using a process that is likely unique to that company. Each

5
technology company has a different process and terminology that is typically unique to that

company’s product. A guidebook on this process would help this issue. This project will enable

investigating officers to find sources of evidence embedded in this ocean of digital devices and guide

them through the process of how to obtain that information.

Objectives
In order to accomplish the overall goals that the California Attorney General's office had for the

DxHub, we outlined a series of milestones for the first phase of the project. The team had worked

through an innovative idea and approach through a solutions workshop held in Sacramento. That

led to a series of objectives to deliver the first phase as follows:

1. Create a user interface prototype illustrating how to search for geolocation data

2. Have this user interface produce a sample list of responses available from Uber based on

geolocation input

3. Have the user interface allow the user to select as specific response type and show the user

what a sampling of that data will contain

4. Have the interface walk the user through requesting this data from Uber to be used in court

6
Literature Review
In preparation for managing this project an extensive literature review was done to understand

the background and history as well as other potential solutions in this space.

Background
We live in a world that continues to be more dependent on technology. This evolving landscape

of new technologies has fundamentally changed the way we gather and subpoena evidence for

today’s modern crimes. All this new technology brings with it new types of digital evidence and the

criminal justice system has had to adapt to these changes. Evidence derived from social media is no

different but obstacles involving user privacy and creating proper channels of requesting

information often stand in the way of gathering effective evidence of criminal activity. Digital

evidence can be gathered from any electronic device that collects information. There are dozens of

sensors in many widely used electronic devices today and information collected by these sensors can

be used in a variety of ways. Some information you may have never even considered has been used

in criminal court already. Ohio police even used an implanted pacemaker to produce data that was

used in an arson and insurance fraud case (Jackson). Despite increased privacy concerns, people are

generally unaware of exactly how much of their ‘digital footprint’ can be used in a criminal

investigation. Similarly, investigators can also be out of the loop as to what tools are at their disposal

when they are attempting to solve a criminal case.

Currently, not only are investigators commonly unaware of potential sources of evidence but

procedures for obtaining evidence through digital forensics is not consistent or standardized (Reith,

Carr and Gunsch). The goal of this project is to create a technology solution to address evidence

collection in this new world. The DxHub E-Crime portal attempts to sort out some of the

7
difficulties with investigators ability to both be aware of potential digital evidence and to properly

obtain it in a standardized manner.

Project
This project was the result of a partnership between California Polytechnic State University and

Amazon Web Services (AWS) in a joint venue known as the Digital Transformation Hub (DxHub).

The DxHub collaborates with public sector organizations to solve problems using design thinking

and proven innovation methodologies in combination with the local experts to solve challenging

problems in new ways. This challenge was brought to the DxHub by the California Attorney

Generals office. The motivation for this challenge was to build a training portal and toolset to enable

front-line criminal investigating officers the ability to collect digital evidence regardless of their

technical skill level. The explosion of new technology and its use in crime has created a complex list

of options that now overwhelms even seasoned technologists. This review will focus on 5 main

areas of research to better inform project members of the following: historical background on

evidence collection, review of legislation both historical and recent changes, how Uber has made the

subpoena process easier, evidence collection process and technology, a review of agile project

management and tools used to manage resources for this project.

Technology companies have responded in kind to comply with new legislation and even built

new processes to support this ever-changing world.

Historical Legislation
The change from physical evidence to digital evidence collection has highlighted shortcomings

in rules governing how evidence is collected. This new technology creates problems in applying old

rules of physical evidence collection to digital and computer evidence (Kerr). Orin Kerr,

hypothesizes that in order to be fair, the rules that outline how investigators should obtain and use

8
warrants in searching for computer-related evidence should be updated to reflect a major change

given the medium. With physical evidence most searches can be done in one step where-as digital

evidence collection is almost always requires 2 steps. This raises the question is the property being

seized for evidence the electronic device, or is it the data contained within? Physical search warrants

help limit the ability of an officer to broadly search the entire contents of one’s home, but the digital

evidence requires seizing a computer hard-drive which could, in this analogy, would be like seizing

one’s house and searching the entire contents of your home. To further complicate matters, much

of our digital evidence involves data sent over the internet and through Internet Service Providers

(ISP)s. A subpoena of third part ISPs would prevent the Fourth amendment from offering adequate

protection. The result a change in legislation was needed to ensure privacy in a digital world

remained intact. This historical perspective illustrates the initial mistakes made as the legislation

system tried to catch up with technology (Goode).

Information (What is gathered? and How is it gathered?)


In an article written for the American Bar Association, lawyers James McLaren and Joshua

Calder detail the process of using evidence from ride sharing services as potential evidence in family

law disputes. Although the in-text examples do not detail criminal case as such are in the E-Crime

portal, their suggestions give a good idea of a lawyer’s perspective of the uses of data from ride

sharing platforms as evidence. It details that there are two ways that a potential lawyer can go about

using the ride sharing data. The first of which is through a formal request for a user to display their

trip history which includes the date and cost of the trip taken or a detailed history which includes the

map of the trip (pick up, drop off locations, route taken and payment method). If there is no

cooperation from the formal request for information a lawyer should move to the second of the two

paths of accruing applicable evidence from the ridesharing service. In this method a subpoena is

issued for detailed records stored on Uber’s servers. The subpoena should include the user’s email

9
address and phone number, and the time period for which records are being requested. The article

mentions and suggests the Uber legal guidelines that the Attorney General’s Office has supplied the

DxHub as a relevant resource.

McLaren and Calder state that information from ride sharing services has been effectively used

“to prove adultery, dissipation of marital assets and the spending ability of the breadwinning spouse

to support a claim for alimony and child support.” The pick-up and drop off data can support a

theory of adultery by showing several drop-offs at a hotel, from there other surveillance footage can

further support the claim. They note that the location information usually has to be investigated

further to find suitable evidence. For example, the drop off location may not be where the rider has

intended to go. Adjacent locations have to be considered as potential areas of interest. Researching

nearby locations can reveal that the rider likely was intending to go to business across the street

rather than the restaurant that was label as his or her drop off location. Uber data was considered an

effective tool, but proper analysis is necessary to obtain effective evidence.

Evidence Collection Complications


Unlike physical evidence, digital evidence requires additional layers of technology just to

properly collect and preserve data and the chain of custody. Many research papers and books have

been written on the subject (Cohen), (Muniz) which detail the complicated techniques that must be

used with modern technology devices as technology companies also attempt to protect user’s

personal information. Apple Computer Company has been in the news several times on their

position on personal privacy [7]. Apple is constantly updating the software that runs on their iPhone

devices to prevent unauthorized access to the data contained on the device. This means that not

only must forensic analysts use complicated technology to even retrieve data when a lawful warrant

10
has been written, but that technology may break as the vendor improves the way in which the device

is protected.

Quantity (How much info is gathered and how often?)


Application developers create press releases to show transparency to users concerned with data

collection. Many of the applications that would be used as a resource in the E-Crime portal release

transparency reports to the public that detail summaries of user data provided to law enforcement.

Transparency reports reviewed included reports from Lyft, Uber and Snapchat.

Snapchat releases transparency reports twice a year. In the first six months of 2018 Snapchat

received 7235 requests for data in the US and produced data in 85% of those instances. In 2017,

Lyft received 1178 requests for data in the US and complied with 87.5% of them. 128 of these

information requests came from California. In 2017, Uber received 2940 requests for data and

complied with between 68 and 73 percent of the time. It is important to note that data requests are

often for information in multiple accounts of both drivers and riders. In the first half of 2017 there

were an average of 2.7 accounts involved in each request. Assuming a similar investigative pattern,

around 10 percent of data requests come from California.

Case Study (Electronic data collection in today’s news)


There are an increasing number of criminal cases that use digital evidence to convict or

exonerate suspects. Often times digital evidence is used against suspects is posted to social media

sites such as Facebook or twitter as public information. In one case a murder weapon was connected

to a suspect after investigators found pictures of the item in public photos posted by the suspect on

Facebook (Embury-Dennis). In another case, pictures posted on Facebook showed suspects wearing

11
stolen jewelry (Fares). In each of the aforementioned cases, the evidence was voluntarily posted

publicly by the suspects themselves. Oftentimes in these instances officers or investigators are not

searching themselves for evidence on these platforms but are instead tipped off by people in the

community that use the given social media platform. The practice of having law enforcement

monitoring social media sites as other users appears to be straddling a line of legality. In order to

gain information about potential suspects of crimes a police chief created a fake Facebook account

and changed to profile picture daily. He claimed it to be no different than sending an undercover

officer into a public location. However, practices like these are in direct conflict with Facebook’s

user agreement which prohibits false accounts (Angeli, Taylor).

In a case more explicitly applicable to the DxHub’s E-Crime Portal, Chicago police were able to

identify accomplices conspiring in a fraud crime through the use of Uber’s geolocation data.

Although the Uber data alone was not evidence enough to place the suspects at the scene of the

alleged crime, it enabled investigators with a starting time and location to piece together other

sources of evidence. The drop off time and location data from Uber of the rides of the suspects was

the start of the trail that was continued by piecing together cell phone and surveillance footage from

private citizens. The trail of Uber data and private camera footage ultimately lead the investigators to

scene of the alleged crime (Ng). Cases like the ones mentioned in this paper show the uses of social

media evidence to solve crimes. The different cases also exhibit the variety of range in the uses of

social media evidence. Sometimes the prime pieces of evidence originate from a single social media

post while in other cases, the data from a social media platform can help find the first of a trail of

breadcrumbs of other kinds of evidence that ultimately leads to the suspect.

Despite its use, Uber can be very difficult to work with from the view of government agencies.

Government often lacks the explicit authority to gather data from Uber or other social media

12
platforms. Uber and others will cooperate voluntarily to avoid potential lawsuits, but Uber and

companies like them have to weigh their own commitments their users' personal data. Uber and

others have to balance potential risks of lawsuits by government agencies looking to access their data

and users who want their information kept private. An example of this balance that Uber attempts

to find is evident in a battle between the ride sharing service and the Taxi and Limousine

Commission in New York City. There, the TLC is attempting to hold Uber drivers to the same

regulations as other professional drivers in the city. The TLC primarily wants to ensure that drivers

are over worked and are not transporting passengers for more than 10 hours a day. To monitor this

policy the TLC requested that Uber hand over pickup and drop off data for drivers. However, Uber

has since refused this request on the basis that Uber cannot keep privacy commitments to users

once their data has left Uber’s control (Siddiqui). Despite the positive examples of social media

cooperation with law enforcement to solve crimes, Uber seems to convey a general policy of

cooperation on a very stringent case by case level and ultimately hesitant to partner with any outside

agencies regarding the sharing of user data. As a technology focused company, Uber will collect

information about its users as disclosed in a privacy policy disclosure. This information includes

location of users that purchase services from Uber directly and include precise location and time at

that location using GPS and or WiFi and IP address. This information is of great interest to

criminal investigators and can be used in a court of law as evidence. This is one example of the type

of information that can be used in the 21st Century as evidence. Uber has created a portal for law

enforcement to request this type of data with supported documentation. This portal was suggested

by the client as an example use case for the project to illustrate as part of our solution.

Modern Legislation

13
California has made the biggest steps in reviewing and updating legislation related to new

technologies and how those technologies may expose your privacy. Known as CalEPCA [3],

California Senate Bill 178 details how search warrants must be written with regard to digital evidence

to better align with the intent of the Fourth Amendment. Senator Mark Leno (D) and Joel

Anderson(R) have even suggested this is the nation’s best privacy law (Leno, Anderson). Supported

by major fortune 500 technology companies such as Facebook, Adobe, Dropbox and Google, this

legislation prevents law enforcement from accessing a person’s private information which includes

searching phones, online accounts, digital documents, text messages and location information

without getting explicit consent from a judge or showing it is an emergency that threatens life or

limb. This has made the collection process for law enforcement more complicated and has resulted

in careful procedures in how warrants are written and honored in trial. California Attorney General

has stated that many cases have been thrown out of court due to poorly written warrants and failure

to comply with these privacy standards.

Project Management Philosophies


This project will follow Agile project management methodology as dictated by the project

mentor. Amazon is a well-known leader in customer driven design and one of their guiding

leadership principals is customer obsession. Agile software development primarily got its start back

in 2001, when seventeen software developers on vacation were in search of a way to approach

software design and development in using a lean approach. The result was the Manifesto for Agile

Software Development (Beck, Hunt, Schwaber, et all) which is based on 12 simple principals. These

principals essentially focus on delivery working software frequently to the customer using

dynamically list of customer driven priorities in an iterative fashion. One of the more popular books

on the subject, Learning Agile (Stellman) details how software projects can benefit from project

planning in this way. Agile project management is especially popular for managing software products

14
that can be created in an iterative fashion. The philosophy help keeps the team engaged and can help

avoid common problems that result in software delays such as developers adding features to the

product that they feel are important. Be constantly adjusting development to the customer’s

priorities you can help focus resources on customer driven functionality. In addition, by allowing the

customer to use the software during the development process, it allows for the customer to validate

the design and further add improvements to the end product.

Agile Project Management Tools


Many different software tools allow project managers to track tasks and resources in an Agile

fashion. A brief survey of tools was done to determine the best tool to use for this project (Mosier).

Much of the research points to an initial rank done to identify the 20 most popular tools in this

space. Of those tools a comparison was done highlighting the strengths and weaknesses of those

tools that were free (Ferreira). The clear winner was Asana and as a result that tool is what we plan

to use to manage project resources on this project. The Asana tool will allow the team to conduct bi-

monthly sprints and track and prioritize and allow us to estimate project completion date as well as

predict the velocity of the team.

Summary of Research
Information revolution has radically changed the way humans interact with our surroundings.

We now have access to attributes in such large quantities that it has disrupted our legal system and

changed the way we think about crimes. This project will help educate law enforcement how to

navigate this rapidly evolving landscape of potential evidence that could be used to solve crimes in

ways never imagined.

15
Solutions and Achievements
Overall the team set out to create a lean prototype of an eCrime Training Portal that would

make it easier for law enforcement to discover subpoenable sources of data through a google like

search engine. The design team came up with a progressively innovative solution through iterative

design meetings and brainstorming how to effectively convey the results of such a search. Unlike

Google where results are clearly ranked, this tool might have several relevant sources that are

considered equally valuable. The result was a different design paradigm than a simple list of results.

Below in figure x is a picture of that whiteboard session. This ultimately led to the final design

shown in Figure x, y respectively. The demo with the client resulted in feedback that revealed the

officers may actually use search terms centered around evidence. Examples such as ‘blood, bomb,

cable decoder or even the name of a business” were given. The team is building out assets to

demonstrate these search terms. Our next demo is scheduled for June 17th.

Figure 1. Initial Brainstorm of E-Crime Portal from Solutions Workshop

16
Figure 2. Main Search Page of Prototype Portal

17
Figure 3. Screenshot of Prototype Portal after Selection is Made

Project Management
As project managers for this project, the team laid out a rough project timeline that would

achieve the previously described objectives. We would then revise this rough timeline into a more

detailed project roadmap in both Microsoft Project and Asana after resources available for the

project were better identified. The original project timeline is as follows:

1. Initial Mockup (Weeks 1-2)

a. Provide storyboard with the intended portal flow; solidify requirements

2. Iterate User Flow (Weeks 2-4)

a. Confirm user flow and begin to design the user interface

3. Graphics Work (Weeks 4-6)

18
a. Finalize the look and feel of the prototype and build final assets

4. Assemble User Interface (Weeks 6-8)

a. Build a draft interface based on client feedback and assemble the draft prototype

5. Present User Interface (Weeks 8-10)

a. Show the customer the draft user interface and get initial validation feedback

6. Final Buyoff (Weeks 10-12)

a. Implement changes from initial validation and present the final mockup

During the course of the project, the team laid out several tasks for the project managers that

would keep the project on track.

Hold a Project Kickoff Meeting

After resources were assigned by the DxHub we met with Shane, our project mentor, and the

two students that were assigned to work on the project. During this kickoff meeting, we gave the

students some background about the project and laid out project roles. The four roles needed for

the project were UI/UX developer, Project Manager, Developer and Graphics designer. Details

about the roles can be seen in the figure below.

Figure 4. Flowchart of Roles and Corresponding Descriptions

19
At the time the graphic design role was expected to be assigned to another student working for

the DxHub that was not in attendance. Shane was looking for a full developer for the project and

Tanner (one of the students in attendance) expressed interest in helping out in that role if needed.

Ultimately, the most critical role of this project is the user interface design. This was the assigned

focus of Tanner and Kellie (the two students) as this was the are in which they were most

experienced. Darren and Josh were the predetermined project managers.

The project managers then laid out the scope of the project and the initial general schedule for

the project that was previously described. The project managers then established some important

communication standards to be followed for the duration of the project. A channel on slack was set

up as the standard for quick check-ins and minor task assignments. Twice weekly stand-up meetings

were scheduled during a predetermined free time in everyone’s schedules. One was an in-person

standup on Mondays and the other was a scheduled zoom video conference on Thursdays.

Create a Work Breakdown with Milestones

A work breakdown structure of the tasks needed to complete the project was created in

Microsoft Project. An image of the work breakdown can be seen in Figure 5 below.

Figure 5. Work Breakdown in MS Project

20
Organize Teams and Resources

Of the three non-project management roles that were originally laid out for this project the

project managers only had the resources to complete tasks under the UI developer role. The planned

graphics designer took a different job shortly after the kickoff meeting so the project managers

needed to adjust plans accordingly. The DxHub invested in a more premium User Interface

program, based on the recommendations of Tanner and Kellie, which provided a more complete

and graphically pleasing prototype. This enhanced software and the rescheduling of the complete

graphics development to a later date allowed the project to continue progress despite deficiencies in

the original plan. The DxHub would look to find a new graphics lead, who would work concurrently

with the developer to finish the project after the user interface prototype was completely validated.

The full developer was not yet needed for the early stages of the project we were in throughout the

academic quarter.

Create and Monitor Communication Channels

We prepared agendas for each meeting and notes were taken and sent out to the team reviewing

open action items and decision that were made. A sample of one of our meeting templates is shown

in Figure 6.

21
22
Figure 6. Meeting Notes Example

Hold Regular Standup Meetings

The project managers held regular standup meetings that kept the project on track. Updates

from the team were given during these meetings and directions of the next steps were brainstormed

and decided upon.

Buildout Project in Project Management Software

The project managers used Asana and Microsoft project as the main project management tools.

Detailed schedules were built out for the near future and an overview schedule for the future was

laid out for future tasks to be completed at the close of the academic quarter. A visual depiction of

the tasks can be seen in both the Asana and Microsoft Project graphics in figures 7 and 8 below.

23
Figure 7. Screen Capture of Asana Project Dashboard

Figure 8. Microsoft Project Gantt Chart of Project Progress up to Present Time

A major delay in this project occurred when there were issues scheduling a validation meeting

with the client. While waiting for this meeting to gather input about the prototype, there simply was

not any other progress that could be made by the team.

Sprint Planning Meetings

Every week the team met for one hour to review the tasks for the week. The process begins

before the meeting, where project managers reviewed the backlog of tasks. Each task is reviewed

24
and ranked for importance relative to the client feedback that occurred during the demo done. The

demo done with the client happens right before the planning meeting as a way to confirm the

product is headed in the right direction. In addition, new items that came up during the week are

added and prioritized during pre sprint planning period. During the meeting, team members are

also asked to review the backlog and add items they feel are crucial to the project and remove or

prioritize items as needed. Milestone tasks are broken down into deliverables that are no more than

1 day. When the team finally meets as a group, the backlog should represent a combined effort to

focus on relevant tasks as they relate to customer needs. During the meeting the project manager

assigns tasks and evaluates the task duration estimate. The project manager also makes sure the total

number of tasks in the queue for the week don’t exceed the amount of time resource allocated.

Hold a Demo / Validation Meeting

Demo done meetings were conducted every 2 weeks to align customer needs with the tasks that

get assigned. Often in software the customer doesn’t know what they need until they have an

opportunity to interact with the product and see a demonstration. These product demos allowed us

to validate the approach and solution we were building aligned with what the customer really wanted

and needed.

25
Conclusion
Information revolution has radically changed the way humans interact with our surroundings.

We now have access to attributes in such large quantities that it has disrupted our legal system and

changed the way we think about crimes. This project will help educate law enforcement how to

navigate this rapidly evolving landscape of potential evidence that could be used to solve crimes in

ways never imagined. To solve the most critical problems facing investigators today, we need to

build a solution that will inform and guide officers to the information they need.

In its current state, the E-Crime Portal project is on track for success. The team was successful

in creating a working prototype that will serve as the groundwork for continued improvements

through iterations created from user feedback in future validation meetings. The kickoff meeting

and other communications led to an organized, smooth assignment of tasks. Subsequent activities

completed by the project managers kept the project on schedule with the exception of a substantial

delay resulting from issues scheduling a prototype validation meeting with the client. In the future,

the team recommends that prototype demos are scheduled well in advance in order to prevent the

client from creating bottlenecks. Overall, the project timeline aligned with the class schedule in a way

that allowed the project managers to walk into the project when needed and have time to realize and

help to overcome obstacles that threatened the on-time completion of the project’s objectives. As

we continue to iterate this solution based on the customers feedback, we will arrive at a minimum

viable product that the customer can use and evaluate the tools effectiveness at overcoming current

problems.

26
Future Research
This project will build on the work that was done thus far and continue to a second phase that

will focus the team on building out a mechanism to help investigators write actual search

warrants. Assuming the phase I deliverable was successful, te tool will need to facilitate the creation

of valid search warrant to actually obtain the data. According to the California Attorney General’s

office several high-profile cases have been thrown out of court due to poorly written search warrants

that contained errors. Phase II will build out a tool that can recommend templatized warrants for

the type of evidence they are trying to collect.

27
References
Angeli, D. H., & Taylor, A. (n.d.). The Impact of Social Networking in Criminal Cases. Retrieved May

11, 2019, from http://www.angelilaw.com/pdf/The-Impact-of-Social-Networking-in-Criminal-

Cases.pdf

Cohen, Fred. “Two Models of Digital Forensic Examination.” 2009 Fourth International IEEE

Workshop on Systematic Approaches to Digital Forensic Engineering, 2009,

doi:10.1109/sadfe.2009.8

Embury-Dennis, T. (2018, January 18). Woman found guilty of killing friend as Facebook photo taken

hours before shows deadly weapon. Retrieved May 11, 2019, from

https://www.independent.co.uk/news/world/americas/woman-kill-friend-belt-selfie-photo-

manslaughter-cheyenne-rose-antoine-brittney-gargol-saskatchewan-a8165261.html

Fares, M. (2016, June 23). Florida man brags about burglary on Facebook, lands him in jail. Retrieved

May 11, 2019, from https://www.reuters.com/article/us-usa-crime-socialmedia/florida-man-brags-

about-burglary-on-facebook-lands-him-in-jail-idUSKCN0Z92NC

Ferreira, Tânia, et al. “Freemium Project Management Tools: Asana, Freedcamp and Ace

Project.” Advances in Intelligent Systems and Computing Trends and Advances in Information

Systems and Technologies, 2018, pp. 1026–1037., doi:10.1007/978-3-319-77703-0_100.

Goode, Steven. "The Admissibility of Electronic Evidence." Review of Litigation , vol. 29, no. 1, Fall

2009, pp. 1-64. HeinOnline, https://heinonline-

org.ezproxy.lib.calpoly.edu/HOL/P?h=hein.journals/rol29&i=3.

Goodison, S. E., Davis, R. C., & Jackson, B. A. (n.d.). Digital Evidence and the U.S. Criminal Justice

System. Retrieved May 11, 2019, from https://www.ncjrs.gov/pdffiles1/nij/grants/248770.pdf

28
Jackson, B. A. (2017, May 11). Using Digital Data in Criminal Investigations: Where and How to Draw

the Line? Retrieved May 11, 2019, from https://www.forensicmag.com/news/2017/05/using-

digital-data-criminal-investigations-where-and-how-draw-line

Kent Beck; James Grenning; Robert C. Martin; Mike Beedle; Jim Highsmith; Steve Mellor; Arie van

Bennekum; Andrew Hunt; Ken Schwaber; Alistair Cockburn; Ron Jeffries; Jeff Sutherland; Ward

Cunningham; Jon Kern; Dave Thomas; Martin Fowler; Brian Marick (2001). "Manifesto for Agile

Software Development". http://agilemanifesto.org

Kerr, Orin S. "Search Warrants in an Era of Digital Evidence." Mississippi Law Journal, vol. 75, no. 1,

Fall 2005, pp. 85-138. HeinOnline, https://heinonline-

org.ezproxy.lib.calpoly.edu/HOL/P?h=hein.journals/mislj75&i=110.`

Leno, Mark (D), Anderson, Joel , ACLU Web site April 2018, https://www.aclunc.org/our-

work/legislation/calecpa

McLaren, J. T., & Calder, J. M. (2017, January 17). Tips for Obtaining and Analyzing Uber Records.

Retrieved May 11, 2019, from https://www.americanbar.org/groups/litigation/committees/family-

law/practice/2017/tips-for-obtaining-and-analyzing-uber-records/

Mosier, Liann The Top 20 Most Popular Project Management Software Report Methodology,

https://blog.capterra.com/20-popular-project-management-software-products-infographic/

Muniz, Joseph. Investigating the Cyber Breach: the Digital Forensics Guide for the Network Engineer.

Chapter 6 Collecting and Preserving Evidence, Pearson Education, Inc., 2018.

Ng, A. (2019, February 21). Uber data helped ID accomplices in Jussie Smollett staged attack, police

say. Retrieved May 11, 2019, from https://www.cnet.com/news/uber-data-uncovered-jussie-

smolletts-staged-attack-police/

Reith, M., Carr, C., & Gunsch, G. (2002, Fall). An Examination of Digital Forensic Models. Retrieved

May 11, 2019, from http://www.just.edu.jo/~Tawalbeh/nyit/incs712/digital_forensic.pdf

29
Siddiqui, F. (2017, January 05). Uber and New York City spar over rider data. Retrieved May 11, 2019,

from https://www.washingtonpost.com/news/dr-gridlock/wp/2017/01/05/uber-and-new-york-

city-spar-over-rider-data/?noredirect=on&utm_term=.bbdd129237bf

Selyukh, Alina Why Apple Says it Won’t Help Unlock that iPhone, In 5 Key Quotes, February 2016

https://www.npr.org/sections/thetwo-way/2016/02/25/468158520/why-apple-says-it-wont-help-

unlock-that-iphone-in-5-key-quotes

Senate Bill 178, Chapter 651 California Electronic Communications Privacy Act (CalEPCA)

October 8th, 2015,

https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB178

Stellman, Andrew, and Jennifer Greene. Learning Agile. OReilly, 2016.

Transparency Report. (n.d.). Retrieved May 11, 2019, from https://www.snap.com/en-

US/privacy/transparency/

Transparency Report (Rep.). (n.d.). Retrieved May 11, 2019, from Lyft website: https://c-

5uwzmx78pmca90x24tgnb-iaambax2ea1x2eiuihwvieax2ekwu.g00.cnet.com/g00/3_c-

5eee.kvmb.kwu_/c-5UWZMXPMCA90x24pbbx78ax3ax2fx2ftgnb-

iaamba.a1.iuihwviea.kwux2fpmtx78kmvbmzx2fTgnb_Qvnw_Zmycmab_Zmx78wzb_0895.x78ln_$/

$/$?i10c.ua=1&i10c.dv=18

Transparency Report. (n.d.). Retrieved May 11, 2019, from https://transparencyreport.uber.com/

Uber Technologies Inc, Uber Privacy Disclosure, https://privacy.uber.com/policy/

30

You might also like