This federal law protects digital records related to wildlife trafficking, ensuring electronic documentation of imports and exports is accurate.
What is the Lacey Act?
This is the primary purpose of Wireshark, allowing analysts to inspect network activity in real time or from saved captures.
What is packet analysis?
This initial step in evidence collection ensures that investigators do not accidentally alter data on a device.
What is isolating and securing the scene (or securing the device)?
This U.S. law makes it illegal to access a computer without authorization or to exceed authorized access.
What is the Computer Fraud and Abuse Act (CFAA)?
This ancient cipher used by Julius Caesar shifted letters a fixed number of positions down the alphabet.
What is the Caesar cipher?
Digital evidence used in environmental investigations must follow this “golden rule” to remain admissible in court.
What is maintaining the chain of custody?
This Wireshark feature lets you narrow down captured traffic by specifying conditions like IP addresses, ports, or protocols.
What are display filters?
Investigators use this hardware device to prevent data from being written to a suspect’s drive during acquisition.
What is a write blocker?
This privacy law gives consumers control over the personal data that businesses collect, especially in the state of California.
What is the California Consumer Privacy Act (CCPA)?
Invented in the 15th century, this device used multiple rotating disks to create one of the first polyalphabetic ciphers.
What is the Alberti cipher disk?
This international agreement relies on digital permitting systems to regulate the trade of endangered species across borders.
What is CITES (the Convention on International Trade in Endangered Species)?
This protocol analyzer field shows the hierarchical breakdown of packet contents, making it easy to view headers and payloads.
What is the Packet Details pane?
This type of forensic copy captures every bit of data on a storage device, including deleted files and slack space.
What is a bit-by-bit (forensic) image?
This international regulation governs how organizations handle EU citizens’ personal data and imposes strict breach reporting requirements.
What is the GDPR (General Data Protection Regulation)?
Used by Germany in World War II, this electro-mechanical machine’s encryption was famously broken by Alan Turing’s team at Bletchley Park.
What is the Enigma machine?
Conservation officers often retrieve GPS data, photos, and timestamps from seized devices. To ensure legality, they must comply with this constitutional amendment.
What is the Fourth Amendment?
Wireshark can automatically reconstruct web browsing, VoIP calls, and file transfers by using this tool to reassemble data streams.
What is “Follow TCP Stream”?
This log-tracking process documents who collected the evidence, when it was collected, and every transfer thereafter.
What is the chain of custody?
Companies must notify affected individuals after a breach of sensitive information under these types of U.S. state-level regulations.
What are data breach notification laws?
Published in 1977 by Rivest, Shamir, and Adleman, this algorithm became the first widely used public-key encryption system.
What is RSA?
This U.S. agency uses digital forensics to investigate illegal poaching and trafficking, including examining online sales and digital communications.
What is the U.S. Fish and Wildlife Service (FWS) Office of Law Enforcement?
This file format is the most common export type for Wireshark capture files, enabling cross-compatibility with other network analysis tools.
What is PCAP or PCAPNG?
When collecting evidence from volatile sources like RAM or live network connections, investigators follow this rule stating, “Collect the most fleeting data first.”
What is the Order of Volatility?
Passed in 1986, this federal law protects the privacy of electronic communications stored on servers, including emails and messages.
What is the Electronic Communications Privacy Act (ECPA)?
Developed by the U.S. government in the 1970s, this encryption standard eventually became obsolete and was replaced by AES due to its 56-bit key length.
What is DES (Data Encryption Standard)?