Digital Conservation Law
WireShark
Digital Evidence Collection
Cyber Law
History of Encryption
100

This federal law protects digital records related to wildlife trafficking, ensuring electronic documentation of imports and exports is accurate.

What is the Lacey Act?

100

This is the primary purpose of Wireshark, allowing analysts to inspect network activity in real time or from saved captures.

What is packet analysis?

100

This initial step in evidence collection ensures that investigators do not accidentally alter data on a device.

What is isolating and securing the scene (or securing the device)?

100

This U.S. law makes it illegal to access a computer without authorization or to exceed authorized access.

What is the Computer Fraud and Abuse Act (CFAA)?

100

This ancient cipher used by Julius Caesar shifted letters a fixed number of positions down the alphabet.

 What is the Caesar cipher?

200

Digital evidence used in environmental investigations must follow this “golden rule” to remain admissible in court.

What is maintaining the chain of custody?

200

This Wireshark feature lets you narrow down captured traffic by specifying conditions like IP addresses, ports, or protocols.

What are display filters?

200

Investigators use this hardware device to prevent data from being written to a suspect’s drive during acquisition.

What is a write blocker?

200

This privacy law gives consumers control over the personal data that businesses collect, especially in the state of California.

What is the California Consumer Privacy Act (CCPA)?

200

Invented in the 15th century, this device used multiple rotating disks to create one of the first polyalphabetic ciphers.

What is the Alberti cipher disk?

300

This international agreement relies on digital permitting systems to regulate the trade of endangered species across borders.

What is CITES (the Convention on International Trade in Endangered Species)?

300

This protocol analyzer field shows the hierarchical breakdown of packet contents, making it easy to view headers and payloads.

What is the Packet Details pane?

300

This type of forensic copy captures every bit of data on a storage device, including deleted files and slack space.

What is a bit-by-bit (forensic) image?

300

This international regulation governs how organizations handle EU citizens’ personal data and imposes strict breach reporting requirements.

What is the GDPR (General Data Protection Regulation)?

300

Used by Germany in World War II, this electro-mechanical machine’s encryption was famously broken by Alan Turing’s team at Bletchley Park.

What is the Enigma machine?

400

Conservation officers often retrieve GPS data, photos, and timestamps from seized devices. To ensure legality, they must comply with this constitutional amendment.

What is the Fourth Amendment?

400

Wireshark can automatically reconstruct web browsing, VoIP calls, and file transfers by using this tool to reassemble data streams.

What is “Follow TCP Stream”?

400

This log-tracking process documents who collected the evidence, when it was collected, and every transfer thereafter.

 What is the chain of custody?

400

Companies must notify affected individuals after a breach of sensitive information under these types of U.S. state-level regulations.

What are data breach notification laws?

400

Published in 1977 by Rivest, Shamir, and Adleman, this algorithm became the first widely used public-key encryption system.

What is RSA?

500

This U.S. agency uses digital forensics to investigate illegal poaching and trafficking, including examining online sales and digital communications.

What is the U.S. Fish and Wildlife Service (FWS) Office of Law Enforcement?

500

This file format is the most common export type for Wireshark capture files, enabling cross-compatibility with other network analysis tools.

What is PCAP or PCAPNG?

500

When collecting evidence from volatile sources like RAM or live network connections, investigators follow this rule stating, “Collect the most fleeting data first.”

What is the Order of Volatility?

500

Passed in 1986, this federal law protects the privacy of electronic communications stored on servers, including emails and messages.

What is the Electronic Communications Privacy Act (ECPA)?

500

Developed by the U.S. government in the 1970s, this encryption standard eventually became obsolete and was replaced by AES due to its 56-bit key length.

What is DES (Data Encryption Standard)?