UMUC Digital Forensics in The Criminal Justice System Discussion Response
Description
Having Trouble Meeting Your Deadline?
Get your assignment on UMUC Digital Forensics in The Criminal Justice System Discussion Response completed on time. avoid delay and – ORDER NOW
Please respond to this discussion post
“Steganography use in the past was not as sophisticated as the methods used today to embed messages in digital pictures, but they were clever. In the 5th century BC, Histaiacus shaved a head of a messenger and wrote a note to Aristagoras of Miletus [Jam01]. Once the hair grew back, the messenger was off to deliver his message hidden in plain sight. Another example would be the use of invisible ink. German spies in England used invisible ink to send hidden messages [Kri14]. They were not very successful due to the skills of the agents, many of them getting caught with the materials in hand.
Cryptology used by Julius Caesar in 100 BC was not nearly as secure as Advanced Encryption Standard (AES) we use today to secure military communication, but his method of simple substitution of shifting the letters in the alphabet was effective in a time when many people were illiterate[SAN01]. In 1970, American Thomas Jefferson devised a wheel cipher to encode diplomatic communications [RAC09]. It contained 26 cylinders with letters of the alphabet on the outside in a random order. Another interesting case is when the Frenchman Blaise de Vigenere designed a cipher that uses an encryption key in the 16th Century [Huz13]. The use of an encryption key is what modern systems use today.
Steganography is used in art today [Jam01]. I am sure many of you have seen a picture made of several smaller pictures. The effect is quite cool to look at. It could also be used to smuggle information. A seemingly innocent digital picture file could have confidential corporate information embedded in it [Gin07].
Encryption is widely used today to secure confidential information. From bank transactions to phone calls. Encryption keeps information in the hands of the right people and helps protect from fraud and theft.
As a digital forensic investigator, encryption and steganography can be used by a suspect to hide potential evidence. The most recent and widely publicized example of this was the San Bernardino shooter’s iPhone and Apple’s refusal to attempt to hack it [Ass161]. Criminals have access to sophisticated encryption software that can make the information it protects virtually inaccessible. The debate of allowing the government backdoor access to encryption programs is something that will be debated more and more as encryption technology progresses and improves.”