Digital Forensics Briefing: Narcos Investigation

Generated from prompt:

Create a master's-level forensic investigation presentation (10 minutes, ~8 slides) titled 'Digital Forensic Case Briefing – Narcos Investigation'. Audience: senior investigators. The presentation synthesizes evidence from three suspects (John Fredricksen, Jane Esteban, Steve Kowhai) but emphasizes the Jane Esteban forensic findings provided in the report. Slides should be visually professional with headings, concise bullets, and placeholders to insert screenshots from the report exhibits. Slides structure: 1. Title Slide – Digital Forensic Case Briefing: Narcos Investigation (KV5041 Digital Forensics Incident Response). 2. Case Overview – seizure of methamphetamine at NZ Customs, suspects John Fredricksen, Jane Esteban, Steve Kowhai, objective of digital forensic investigation. 3. Investigation Methodology – tools used (Autopsy, FTK Imager, Volatility 3, Kali Linux, hash verification) and evidence sources (disk image, memory dump, artefact recovery). 4. Jane Esteban – Web History & Behavioural Evidence – searches about smuggling, customs evasion, undercover survival; use of ProtonMail and Discord; Quasar RAT download (insert screenshot placeholders from report exhibits). 5. Digital Artefacts & Deleted Evidence – recovered files (bag_contents.jpg showing suitcase concealment, contact_list.txt, travel_plans.docx), meth images (crys1–3), deleted AFP logo; significance for intent and knowledge. 6. Device Interaction & Coordination – USB device history, shellbags showing external drives and folder 'John', contact card files; suggests collaboration and data exchange. 7. Memory Forensics – Quasar RAT running, command-and-control connection to 202.2.12.15:4782, suspicious ManagementAgent spawning cmd.exe, implications for remote coordination. 8. Synthesised Case Analysis – unified timeline, links between suspects, corroboration across disk, memory and deleted artefacts; evidence of conspiracy and coordination. 9. Overall Evidential Strength & Conclusion – strong digital evidence, contradiction of innocent courier defence, recommendations for further investigation (email warrants, C2 IP analysis, cross-device correlation). Design guidance: dark professional forensic theme, icons for evidence types, space for screenshots, diagrams for timeline and network connection. Ensure content suitable for a 10‑minute group presentation where three members each present sections.

Comprehensive briefing on digital forensic analysis of devices seized in a methamphetamine smuggling case at NZ Customs. Covers investigation methodology, web history, recovered artefacts, device coordination, memory forensics, and synthesized case結論

April 30, 20269 slides
Slide 1 of 9

Slide 1 - Digital Forensic Case Briefing: Narcos Investigation

Digital Forensic Case Briefing: Narcos Investigation

KV5041 Digital Forensics Incident Response | Senior Investigator Briefing

---

Photo by Giannis Skarlatos on Unsplash

Slide 1 - Digital Forensic Case Briefing: Narcos Investigation
Slide 2 of 9

Slide 2 - Case Overview

  • Incident: Seizure of methamphetamine at NZ Customs.
  • Primary Suspects: John Fredricksen, Jane Esteban, Steve Kowhai.
  • Investigation Objective: Analyze digital devices to determine involvement, intent, and cross-suspect coordination.
  • Focus: Synthesis of forensic evidence across three separate digital footprints.
Slide 2 - Case Overview
Slide 3 of 9

Slide 3 - Investigation Methodology

PhaseMethods & Tools
Evidence AcquisitionFTK Imager (Disk Imaging), Memory Dumping
VerificationHash Verification (MD5/SHA-256) for chain of custody
Data AnalysisAutopsy (File System), Volatility 3 (Memory Analysis)
Advanced InvestigationKali Linux (Network/Artefact Analysis)
Slide 3 - Investigation Methodology
Slide 4 of 9

Slide 4 - Jane Esteban – Web History & Behavioural Evidence

  • Web History: Evidence of research into smuggling, customs evasion, and survival tactics.
  • Communication: Use of encrypted/privacy-centric platforms (ProtonMail, Discord).
  • Malware: Confirmed download of Quasar RAT.
  • Implications: Direct link between suspect behavior and intent to subvert law enforcement.

---

Photo by Nebular on Unsplash

Slide 4 - Jane Esteban – Web History & Behavioural Evidence
Slide 5 of 9

Slide 5 - Digital Artefacts & Deleted Evidence

  • Recovered Evidence: bagcontents.jpg (concealment method), contactlist.txt, and travel_plans.docx.
  • Visual Evidence: High-resolution images of methamphetamine (crys1–3).
  • Deleted Artefacts: Discovery of deleted AFP logo (potential for impersonation/forgery).
  • Significance: Demonstrates premeditated knowledge and active concealment planning.
Slide 5 - Digital Artefacts & Deleted Evidence
Slide 6 of 9

Slide 6 - Device Interaction & Coordination

  • Device History: USB connection logs and Shellbag analysis confirming external drive interaction.
  • Linkage: Folder structure 'John' found within external media mapped on Jane Esteban's device.
  • Coordination: Analysis of contact card files (VCF) and shared document synchronization.
  • Evidence of Conspiracy: Proactive data exchange and device inter-compatibility between suspects.
Slide 6 - Device Interaction & Coordination
Slide 7 of 9

Slide 7 - Memory Forensics

  • Active Malware: Quasar RAT identified in memory state.
  • C2 Communication: Active socket connection to 202.2.12.15:4782 detected.
  • Suspicious Execution: ManagementAgent process spawning shell command (cmd.exe).
  • Implications: Proof of real-time command-and-control access facilitating remote suspect coordination.
Slide 7 - Memory Forensics
Slide 8 of 9

Slide 8 - Synthesised Case Analysis

  • Unified Timeline: Correlating disparate suspect activities into a single criminal operation.
  • Cross-Corroboration: Disk imagery, volatile memory, and deleted files validating suspect links.
  • Conspiracy Mapping: Evidence of shared planning, mutual tools, and coordinated execution.
  • Defense Rebuttal: Evidence directly undermines 'innocent courier' claims via technical proof of knowledge.
Slide 8 - Synthesised Case Analysis
Slide 9 of 9

Slide 9 - Conclusion & Recommendations

Strong evidential findings demonstrate high probability of criminal coordination and intent.

Recommendations: Proceed with targeted email warrants, C2 IP infrastructure analysis, and cross-device digital forensics.

Slide 9 - Conclusion & Recommendations

Discover More Presentations

Explore thousands of AI-generated presentations for inspiration

Browse Presentations
Powered by AI

Create Your Own Presentation

Generate professional presentations in seconds with Karaf's AI. Customize this presentation or start from scratch.

Create New Presentation

Powered by Karaf.ai — AI-Powered Presentation Generator