Question 5
Case:
Xiaolang Zhang worked as an engineer for Apple's autonomous car division. He had been with the
company 2 ½ years when he announced that he would be resigning and returning to China to take
care of his elderly mother. He told his manager that he would be working for an electric car
manufacturer in China. The conversation left the manager suspicious. Company security started an
investigation. They searched Zhang's two work phones and laptop-but were most alarmed when
they reviewed Zhang's network activity. The story the network data told was that Zhang's activity had
spiked to a two-year high in the days leading up to his resignation. It consisted of "bulk searches and
targeted downloading copious pages of information" taken from secret databases he could access.
When confronted, Zhang admitted to taking company data. The matter was referred to the Authorities,
and Zhang was charged for theft of trade secrets.
Nellis, S. (July 10, 2018). Ex-Apple Worker Charged With Stealing Self-Driving Car Trade Secrets. Reutersavailable
at-https://www.reuters.com/article/us-apple-theft/ex-apple-worker-charged-with-stealing-self-
driving-car-trade-secrets-idUSKBN1K02RR
Suppose you were tasked to investigate this case and you have been instructed to handle the
investigation in a proper manner.
a. Detail how you would initiate the acquisition of evidence for the investigation.
[2]
b. Draft a plan as to where and how you might get evidence for this case.
[10]
c. Detail two ways by which Xiaolang could have covered up the trails of evidence and how you
could still recover the evidence if possible.
[4]
d. Outline two proactive measures that Apple could have employed (Or employed) for the
speedy recovery of digital evidence in this case.
[4]
a. Start with identification i.e. check the nature of the crime and anticipate what tools and
methods you are going to use. Image the drives that need to be used for the
acquisition of information. Setup network monitoring e.g. using a packet filtering or
capturing package like Wireshark.
b. Look for evidence in the following areas: (Any five)
• The mail server and Email attachments
• Intrusion detection information
• Server logs
• Network logs
• Firewall logs
• Router logs
• Logsfor network monitoring software/hardware
c. Any two anti-forensics techniques e.g. Deleting Emails and Internet Browsing History
these can be recovered using software like encase, or through Email Address spoofing
this would be difficult to uncover.
d. Turn on logging features of their networks and keep these logs for a long period. Install
intrusion detection systems to capture malicious traffic.
Page I 4