Monday, July 18, 2016

New France



<br /> Interesting Essay on "New France"<br />


Location


The location of New France was North America. North America was an area colonized by France which stretched from New Foundland to Hudson Bay to the Rocky Mountains all the way down to the Gulf of Mexico. All the territory was divided into 5 different colonies and those colonies were: Canada, Acadia, Hudson Bay, New Foundland(Plaisance), and Louisiana.




Why Did Settlers Come to New France?


Some settlers came for jobs and others came because either the king was going to give them money. For example “ les Filles du Roi”. “Les files du roi” were approximately 800-900 young french single woman aged 15-30 who came by themselves or were recruited by the king because there were barely any woman and the king wanted to keep populating New France. The woman themselves would find a man and see if she would get along, if so they would get married and the king would pay them to have large families. Another example some settlers also came because of their interests in North America such as wanting to trade for spices, skills, and jewels. Settlers that were men also came because they needed a job or needed to make a living off of something. In the 1400`s European countries tried to find new water routs to Asia which led them to the finding of the Americans.


Housing and Shelter


The homes in New France were commonly built of felled timber or rough-hewn stone, solid, stocky buildings, usually about twenty by forty feet or there about in size with only one doorway. The rooves were steeped pitched with a dormer window or two on either side. Also the eaves were well projecting over the walls, and behind each house there was a storage room. Most inhabitants had their own bake ovens set a good distance behind the house rising about 4 or 5 ft. From the ground. A lot of the time the inhabitant would close off a small area of land surrounding the house or the shed, barn, or storage room(etc.) with a fence of piled stones or split rails and in a corner he would plant his kitchen garden. In the house on the main floor there were usually one or two rooms but never more then three. When the door was first opened it led to a huge room of the house. It opened to the parlor, dinning room, and kitchen combined, but the room was split up, with the kitchen separated from the rest. The upstairs was reached by a ladder which led to a soft loft. A woolen rug of bright colors or several of them covered most of the floor. The floor was made of timber, the dinner table was made of hewn pine, the chair frames were made from pine saplings, while the seats were made of rushes or woven under bark. A lot of the times a couch that was in a corner was good for an extra bed. At one end of the room was a fire place and it was usually used for cooking and heating the house up. All around it hung pots and pans. Mainly the houses weren't at all like they today.


Social Organization


Men, woman, and also kids had jobs to do. Since most men in New France were farmers they were in charge of producing the food, and that was a hard job. Woman also had to work hard to take of the house, also to take care and cook for her family. When kids were old enough, the girls helped their mom and the boys helped their dad. The girls who were older like around the age of 12 or 13 helped their mom to cook, make clothes, and clean the house. The boys who were older just like the girls age 12 or 13 was able to do a mans work. They cut wood, carried stones from the field, built fences, plowed, mowed the hay, and collected the crops. The children who more older like the age of 14 and 15 would look after the garden, it was practice for when they were adults and had their own farm.


Food


The food that couldn't be grown in New France took quite a while be shipped from France to New France and shipping food was really expensive. The only way to get food was to fish it, hunt it, grow it or collect it wildly. The animals that were hunted were ducks, geese, partridge, passenger pigeons, and turkey. The fish that were caught were eel, pickerel, crab, smelt, stargeon, herring, cod, salmon, and trout. Some of the wild food that was collected was blueberries, strawberries, raspberries, blackberries, curants, and plums. Any other food they needed they grew or raised on the family farm like cattle, pigs, birds, fish, moose, deer, rabbits, porcupines, corn, beans, peas, asparagus, fruits, nuts, berries, bread, wheat, fruit and vegetables, turnips, cabbages, onions, leeks, and beets. The dairy products they had were cream, butter, and cheese. Two of their favorite dishes were either, tourtiere or meat pie as one of them and for the second one sipaille or wild game pie for the second dish.


Values and Religions


In New France religion played a major role of an everyday life. The christianity of New France was Roman Catholic. The Catholic clergy were very influential, and the church alone was very powerful and wealthy. Protestants weren't allowed to get married in New France or bring their families to the colony. The church ran the schools, hospitals, took care of the poor, sick, and homeless. Not many people in the colony were educated. A few amongst the educated were the priests. The priests cared for people from marriage to baptism and even to death. The priests made announcements that all had a religious message in them. All catholics had to give some of their income that they got or some or their food that they grew every year, that was called a tithe and it was to support the church. The church also tried to make sure that everyone lived a pure, decent, respectable, sinless life, which controlled everything basically to what clothes they wore to what language they used.


Clothing


The clothing that people wore in New France was all made at home. Also most of the footwear was homemade and was usually made from deer hides. In some years beaver skins were cheap, so they used that for clothes, caps, and mittns. In the winter furs were used for men and woman, also boys and girls of all ages. Everyone also wore the “ bottles seavages” or oiled moccasins laced half way up or more to the knees. They were warm against the cold weather and able to work with snowshoes. Underneath them the inhabitant wore at least two pairs of heavy woolen socks if not he would wear more pairs of socks. In cold weather people wore tuqes that were bright colored. To get through the harsh winters a man would wear mittens, moose leather boots lined with beaver fur and also a fur coat. In the summers woman and children went bare foot out side. Men would sometimes do the same thing, but mostly in the fields. In the forests the men would wear clogs made of cowhide. In the summers woman and children went bare foot outside, men would sometimes do the same thing , but mostly in the fields, and in the forests the men would wear clogs made of cowhides. On a hot summers week days everyone wore straw hats and the children wore one piece of clothes, it was sleeveless, but it went down to the knees just good enough to cover what was need to be covered. On Sundays a man would wear better textured clothes and high beaver hats, while a woman would wear brightly colored feathered dress with ribbons and laces. Also on regular days woman would wear shirts and skirts made of linen, cotton, and hemp, while on the other hand men would wear pants tied at the knee and jackets, they also wore wide brimmed hats and hats with earflaps.


Government


The government back then was a feudal system here is how it went.

The highest ranking person in authority was the king.

The King: The King was the most important person of all. He owned the land and was in charge of everything and everyone in New France.


The second highest person was the Intendant.

The Intendant: The Intendant was responsible for daily economic affairs of the colony, trade, justice, finance, settlement, and seigneuralism.


The third highest person was the Governor.


The Governor: The Governor represented the king in the colony. He was responsible for the defense of New France and the relations with the english and aboriginals.


The fourth highest person was the Bishop.


The Bishop: The Bishop was in charge of the church which in turn was responsible for the spiritual and social needs of the colony through its church, school, charities, hospitals, and for the conversion of the natives.


The Sovereign Council was the most powerful actually in the colony considering it had the intendand, governor, and bishop in it.


The Sovereign Council: The Sovereign Council consisted of a dozen officials including the intendant, governor and the bishop. It acted as a legislative, administrative, and judicial body, and it was the sole of governing authority in the colony responsible to the king.

The Captains of Militia were military leaders in times of emergency.


The Captains of Militia: The Captains of Militia reported to The Intendant about the concerns of the inhabitants about the Intendant's plans. They were also like an army or police for the colony.


The settlers were the citizens of the colony.


The Settlers: The Settlers supported all of these people. They also had to pay a certain amount of money each year with the income that they got or give some of their crops they had grew to the seigner every year.

What Challenges Did They Face?


They had to face a lot of challenges while living in New France. For example in the summer drought and insects were a problem because crops would fail and people would start to starve. Diseases like scurvy, chicken pox, small pox, whooping cough, cartarrah, cholera, tuberculosis, ague, mumps, scarlet fever, diphtheria, measles, and poliomyelitis(ect.) were a problem because there weren't any cures or medicine for them and people would die from them. Cold winters were also hard because there was no power in the 1800`s and if they couldn't find a way to keep warm then they would freeze to death. The French would feel insecure when the men went out to hunt because the Iroquois might have been in the area and they didn't know, so they could`ve attacked and nobody would have been there to protect. It was also the interactions with the wildlife that was also a challenge because here may have been wolves and things like that around and they may have attacked the French. Trying to build a good strong and warm house in the wild was a challenge because they had to clear the trees and cut them so then they could build a house before winter came or else they would freeze. Trying to keep up with paying all their taxes was a problem because sometimes they wouldn't have enough money and if they didn't have enough money they would get kicked out of their house, then they wouldn't have a house to live in. Trying to find a job or make a living off of something was also hard because not all the time there would be jobs for people who needed them. There was also a lot of presure from the seigneur about the getting the population to grow, pay fines getting water(etc.). Some challenges that were fairly difficult were having to speak a different language, having to learn about a new culture, and having to meet new people.


Interactions With Native Peoples


The finding of the Americans was by exploration trips that were from Portugal, Spain, France and England. Since the British and French were enemies the French decided to become allies with the Algonquin, Huron, and Montagnais tribes, because the Irouquois was the enemy of all three tribes the. The first interaction with the native peoples was with Samuel de Champlain celebrating the victory over the Iroquis tribe. After becoming allies with the aboriginals, the aboriginals taught the french forced germination, how to make and use snowshoes, and toboggans. Also the French started to marry the natives and also started to take part in “Aboriginal Sweating Rituals.” It was where hot stones were laid in a low round tent and in the tent the men would sit in a circle drinking lots of water so they could sweat a lot. After sweating so much they would throw themselves in the river or wash themselves in cold water. It was basically to clean or refresh themselves. The Huron traded goods for metal things like knives, axes, awls(etc.) and because of that the Huron Tribe called the French “Agnonha” and the translation for that is “iron people”. The French encouraged the development of the Huron culture, and the natives adopted french foods like beans, peas, prunes, figs, and bread. They also started to like the European hats, so they started to wear them as a sign of social status.


Technology


Back in the 1600`s in New France there was no power, cars, cell phones, or e-mailing. So people had to use their surroundings for tools, transportation, and all that kind of stuff. For transportation people used horses, canoes, walked by foot or used a wagon(with a horse or two). For writing they used pencils and paper, they also used ink and a feather pen. They used tools like spears, guns, arrows, sling shots, knives(etc.). For each job people used different tools. For example a blacksmith`s tools were anvil, vise, tongs and a water trough. A carpenters tools were a saw, chisle, and molding tool. A farmers tools were a scythe, cultivator, grain shovel, wooden corn planters, the harrow and square harrow, pitchfork, rakes, pulleys, and flail. Last but not lesat a hunters tools were a hatchet, hammer, axe, gun, and knife.

Good Bye for the Next Time


Tools in Wide Distribution Computer Forensics in Taiwan



<br /> Tools in Wide Distribution Computer Forensics in Taiwan<br />


Tools in Wide Distribution Computer Forensics in Taiwan



Back in the days when all computers are pretty much standalone entities in the world, each unit is self-contained and does not pose much threat. Similarly in politics, when patches of little disgruntle tribal groups here and there are kept in isolation, there was not much threat to a dominating foreign government. However, when the internet becomes available to all computer users around the world, it is like uniting all the little tribal groups under one umbrella and the potential threat is much greater. Now the disgruntled group can pool resources and recruit an army to overthrow the foreign government. The government will react to impose more security measures and bring in more knights and better artillery to maintain order. Similarly, cyber criminals can now have access to the world and can communicate with other criminals across the globe in conspiring against certain institute for whatever purposes. Then internet security communities will impose more secure measures such as network secure configurations (DMZ), honey-pots (traps or bait for the unknowing cyber-criminal), or implement more secure software so that cyber attacks is mitigated. These security measures taken both by the government and the internet security community provide preventive measures, at best. What happens when this line of defense is breached? One can take all the vitamin c to prevent from getting a cold, but what happens on the day when a cold is caught? One goes to the doctor and gets antibiotics and cold medicine to combat the virus; the government will try to bring in more troops to combat the rebellion. However, what of the inter world? That is where computer forensics comes in, to treat/fix the hole and bring the culprit to justice. Therefore, where software security bring forth prevention, computer forensics, incidence response, calls for treatment. What exactly is computer forensics? It is a toolbox of science, which contains tools and methodologies to recover both passwords and deleted data, to analyze network traffic and logon/logoff times, to snoop and sniff out, as undercover agents do, rotten apples in the barrel. Due to the nature of each incident, the nature of the case may be legal, political, business, or technical oriented. Consequently, one could gather how much a computer means in people's lifestyles nowadays. Nevertheless, computer forensics team (aka: incident response team) are popping up around the world, due to the global nature of the internet, which makes it a lot harder for local law authorities to oversea and prosecute local crimes executed remotely outside the country. These may be addressed briefly as well. The ethics of computer forensic science can be traced to the ethics of private eye or law enforcement institutions, much debate can be seen on a case by case basis; however there is an overall sense of ethics that may encompass all the little injustices which may encompass each case.


The Basics


Incident Response Methodology consists of seven components: Pre-incident preparation, detection of incidents, initial response, formulate response strategy, investigate the incident, reporting, and finally, resolution. 1


Pre-incident preparation constitutes taking actions to prepare the organization and the cert (computer emergency response team) before an incident occurs, cert can be either in-house or outsourced.1 With the tools in hand, the next thing is to have the ability to detect an incident; detection of incidents involves both the knowledge of known attacks and the nose to sniff out unauthorized, unacceptable, or unlawful events. This stage is the most critical and the experts in computer forensics have the least control.11 Once the incident is detected, then investigators performs an initial investigation, recording the basic details: interview system administrators, interviewing business personnel and other relevant people, understand the topology of the environment, and record any logs and data related to the incident, assembling the team with appropriate expertise towards the nature of the incident, and notifies the people who needs to know about the incident.12 Thereafter, the assembled team will need to formulate a response strategy base on the findings in the initial response stage to obtain approval from the authority and to determine what civil, criminal, administrative, or whatever appropriate actions to take.13 This stage determines the severity of the incident by asking the questions: how critical are the affected systems? What is the apparent skill of the attacker? Who might be the potential perpetrator? Last but not least, What is the overall dollar and productivity loss?14 Much like a business proposal, one determines the ROI of this venture before investing further resources and manpower into this incident, quite an interesting approach given that it is driven by capital, rather than morality.


Once the general direction is set, the investigation efforts (base on what the severity of the incident) begins. The five W's: who, what, when, where, and why of the incident will be determined here. Investigators will collect evidences from pertinent hosts, networks and social environment via traditional and non-traditional means.15 "No matter how you conduct your investigation, you are responding to an incident caused by people. People cause these incidents using things to destroy, steal, access, hide, attack, and hurt other things. As with any investigation, the key is to determine which things were harmed by which people."16 The two processes associated with this step are data collection and forensic analysis. Pertinent data from the host machine may include any logs, deleted or backed-up records, and the state of the host machine: the system date and time, current applications running, current network connections, current sockets, and the state of the network interface (promiscuous or not). From the network, logs from web server, router, firewall, authentication servers, monitor mechanisms, and nonconsensual wiretaps should all be frozen in time. All data collected have to be handled in a forensic-sound manner, meaning that the integrity of the data is protected and that more data than needed is collected.17 Duplication of a whole hard drive is very common, which means other non-pertinent information may be collected if the computer at hand is shared with other members in the house hold. Would it be ethical for the investigators to poke into diaries, financial statements, personal memos, and IRS returns belonging to the other members justified by "better safe than sorry" in terms of looking for relevant evidences? These people's privacy rights are being violated without their knowledge. It is for the common good that these proceedings take place, one would argue. The people surrendered their rights when one of the users on the same hard drive is allegedly accused; what if the hard drive came from an internet cafe? Bottom-line, the authority can trump individual rights when a violation is "suspected"; therefore, not everyone has equal rights, there is a greater entity that trumps all individual ones; namely the rights of everyone else. Sadly, this toggle of rights between individual and authorities still exists today and will forever remain this way, because they are weights on the same scale; there's always a balance. Consequently, the best compromise, as we have seen in the U.S. legislative branch, the law is judged on a case-by-case basis. Armed with the collected data, investigators proceeds with forensic analysis, where all the potential evidences are diced and examined. For example, the list of all the files created, deleted, modified, and printed will be available, most of it anyways. In addition, any email sent, sites browsed, logs deleted, and known techniques to hide data (e.g. in an allocated space on the hard drive not visible to the operation system) will all be available and exposed if utilized. Thereafter, the problem found is discovered and plugged, however, the culprit may not be pursuit base on the monetary value of the loss; because anonymity in cyber space via encryption, spoofed IP addressed, fake email accounts, and anonymous logins makes it expensive to track down the "wolf". Is it ethical to let the bad guys go free because it costs too much for this company to track down? This will be detrimental to the greater good of the internet community; not to mention the dollars lost as a whole. However, one can argue the other way, is it fair for one company to bear the costs, while the others benefit? It would be both utilitarian and ethically fair. The old saying "what goes around comes around" will bring a positive note to this argument; since one will eventually benefit from other companies benevolence, as the other companies once did from this company. Unfortunately, this optimism is not prevalent due to the fact that it is invisible to most people in the capitalistic mind-set; "I really don't see the dollars to support this fact".


With all the findings in hand, the investigators need to file reports of all their hard work. Part of reporting is an ongoing process. For instance, whenever a step is performed or any findings discovered, it is to be documented, not way later since investigators are humans also; humans tends to forget things. The reports have to accurately describe the details of the investigation. Most importantly, it has to be both in a language that the decision makers can understand and be able to withstand legal scrutiny.18 Finally, there is a conclusion, a resolution from this incident. More security measures (preventive) are to be in place, as well as a new security policy.


Tools of the trade


There are many tools that a forensic expert will use base on the system they work upon. In general, there are more tools for Unix/Linux environment than there are for windows. First, the most basic ones is hard drive duplication; there are two types of hard drive duplication mechanisms: one is implemented via hardware; two: via software. The hardware implementation virtually is linking the two hard drives together and the information between them is copied bit by bit in raw format. Some of the software disk duplications tools I have used are Safeback6 for windows and dd6 for UNIX. Safeback is a dos driven program that executes upon computer startup, since raw data are easily captured in dos. The image is stored somewhere else on the system, it could be on the same or different drive (preferable on a different drive). On the other hand, dd comes with any Unix system and does not need to be installed. This command makes a raw bit copy of the drive at hand.


The next most important tool is the checksum tools. These tools are important for two reasons. Firstly, they can be used to validate the tools a forensic expert uses upon arriving to a incident site are not compromised prior to use; otherwise, all the data he/she will be collecting via this set of tools will be invalidate and dismissed. Secondly, these checksum tools can be used to validate the data collected when transporting from one site to another; as to enforce the validity and the integrity of the collected data. Checksum tools, such as md5sum4, works by feeding the desired files into an algorithm (Md5 in this example), and a unique string of code (checksum) is generated for that file. (e.g. 9513f20fed28ee074221066f85da4465 is such a checksum) Any changes to that file, even if it is just one more space in the file will alter this checksum.


Another tool that computer forensic personnel cannot leave home without is the hex editor/reader. Since all data are stored on hard drives as 0's and 1's, that means all the partition information (both visible and invisible to the operation system), and all the data both deleted and undeleted are all stored as such. Then one can use a tool that translates these 0's and 1's into hex numbers that human can understand and interpret. Such tools are Win Hex, binText2,3, and disk investigator2,3. They all work the same way, but some are more user-friendly than others in that the tool will parse the raw hex code for you and you can just jump to a file that you are interested, instead of locating the file via the disk format convention/standards. Using these tools, one can discover deleted file entries and even the content of deleted files as well as files that was just recently printed (in the print spool). In addition, criminals who hide information in the hidden sectors of the hard drive with a hidden partition will be disappointed because the hex editor also displays how many partitions are available on the hard drive. A good question to ask here, are the rights of the file owner violated here? Legally, the file owner owns the file, however, to them the file does not exist anymore, so does this make the file ownerless and is up for the grab? Between the hard drive duplications and the hex editor, one can pretty much have access to everything on the hard drive. A funny thing to notice, same proceeding under two different conditions yields different result in the real world. Say a criminal got a hold of CEO's laptop and duplicated everything that was on it, and proceeded to extract and utilize the information for self-gains. Upon arrests, everyone would think that the rights of the company the CEO represent are violated, as well as the privacy of the CEO (due to personal stuff on the laptop). Now same procedures are done with a husband and a wife in interests of monitoring the spouse's activities for personal reasons. Would anyone yell violation of privacy? The only one is probably the wife. Between a husband and a wife, the boundary of individual rights becomes kind of fuzzy; for good reasons, it should not be ponder too much upon.


Another set of tools that will upset the wife are winDump5 and Snort4, both of these tools attempts to keep track of what the sites served were, as well as capturing passwords. These logs reveal even the email that is sent in some cases. Anything the wife denies have had done, can be viewed in black and white in the logs as well as the time stamp associated with the request. On the other hand, the wife can keep a tab on the sites that the husband goes on late at night, I will just leave the rest of this sentence to your imagination.


However, the husband is smart and clears the cache on the browser before he logs off. He thinks that the coast is clear. Little did he know that the smarter wife has a set of tools: galleta4 and pasco4. These tools can open and view the details of all the cookies that ever existed since the first web address the browser served. This way, the wife will know exactly what time the husband logged on to whatever site, at some instances if the activities done at that site requires a cookie, the wife will have full access to those as well.


Now one has so much data gathered from all different source, be it the wife who wants to sue her husband or the investigator who has the evidence to convict in the law of court, what is one to do to organize all these information? FTK4 to the rescue! FTK is a massive storage and organizing program that was made just for this purpose. In addition to the storage functionality, it also offers analysis capability for the data collected.


Tools in wide distribution


One might think that the scenario with the husband and the wife is just fictional. Not quite so, these tools are available for downloads both paid and non-paid on the internet! I believe it is there for educational purposes, to which I am grateful, since I was able to be exposed to them; thereby introducing them here. However, one has to ask the question, it is available to EVERYONE. That includes the not-so-good people in this country as well as out of the country. In theory, the former is less of a worry because there are laws that governs such things here in the States, however, the same jurisdictions does not extend overseas. What is there to prevent other people overseas to do damage with the very tools that were meant to protect against? One common practice is people would "Trojan" these tools and put them back, then when someone else downloads these "trojaned" tools, valuable information are sneaked back to the modifier. In this scenario, everyone's rights, including the attacker; only the attacker benefits the most - making it unjust and un-utilitarian. Now consider Robert T. Morris, who made the internet worm in 1998 and had brought down the whole DARPA Net (former self of the internet).7 If these tools are used to track down the originator, the whole argument can be turn 180 degrees. So, if the tools are made only available to the few, then problem is solved. Well, that is not quite the case, it will create an environment that the masses will not benefit readily. Furthermore, it will choke competition, and make the few richest people in the world; very unethical. As one can see, it is like a double edge sword where there is still this "balance" to be maintained. However, it would be more fair and better for the common good that these tools are readily available so that people can actually diagnose and catch the bad guys, trusting that everyone is virtuously righteous. The mass will benefit, which is exactly what any utilitarian would like to see.


Computer Forensics in Taiwan


As mentioned earlier, the internet belongs to no one country, person, or thing. Therefore, if computer forensics is bound by the internet (in most cases, not all though) then it becomes a global issue; many countries can be affected. For example, the internet worm of 1998 brought down the whole DARPPA Net (internet's predecessor), it not only affected the States, but also around the world, wherever there is a computer connected to the DARPPA is infected and the worm self replicates the distributes itself; bringing vital servers in other countries to a halt as well. That was the basis for Taiwan and other countries to established organizations such as TWCERT.7 TWCERT was established in September 1998, in an attempt to safeguard against anymore devastating attacks such as the internet worm. Now TWCERT is responsible for incident responses, vulnerability analysis, security assessment, security auditing, and educational training to better serve the people of Taiwan and its government. According to statistics from TWCERT, the number of malicious attacks between Taiwan, China, and United States increased over three hundred percent within four months on windows platform.8 Most people think that Linux is a safer bet will be surprised to know that the number of attacks for Linux servers increased eight hundred percent in the same period of time.9 These figures prompted the need for a computer forensics department in the respective countries. No doubt, other countries encounter such plague as well if the analysis is done. In addition, vulnerability analysis of all the systems is a very important tool in forensic analysis and assessment, which are available for further study at: http://www.cert.org.tw/document/docfile/large%20scan.pdf. On a side note, it is interesting to track the ongoing process of a smaller country in undertaking new technology, such as computer forensics; for the same reason that one can track things in more detail in a smaller startup environment, rather than a bigger company where bureaucracy alone can overwhelm oneself.


A common example


"Last year, a software package came on the market that allows employers to monitor their workers' Internet use. It employs a database of 45,000 Web sites that are categorized as "productive," "unproductive," or "neutral," and rates employees based on their browsing. It identifies the most frequent users and the most popular sites. It's called LittleBrother."10 This particular piece of software at hand utilizes exactly the same techniques used in computer forensics, the employee can monitor and find out what files are on the hard drive of its employees as well as what websites has been served. When privacy issues are raised in courts: "Often, court opinions take the point of view that when the employees are using employers' property-the employers' computers and networks-the employees' expectation of privacy is minimal." 10 One such case is Smyth v. Pillsbury Co., Michael Smyth was wrongly discharged from work when his employer read his personal mail with offensive remarks. When the case was brought to court, the court ruled that Smyth had "no reasonable expectation of privacy" at work and that the "inappropriate and unprofessional conduct" outweighed Smyth's privacy rights.10 On a personal note, a similar situation happened to a close friend, where the message "Did you delete that message you sent about his incompetence? Not good enough. The e-mail trash bin probably still exists on the server, and there are plenty of computer consultants who can retrieve the incriminating message." rings true even today.10 The friend critiqued certain aspects of the manager directly above; mainly his incompetence. This was a mail exchanged between her and another friend outside the company. However, the company read the email and came up with alleged excuses to let her go. In a consultation with an attorney, the battle seemed a lost battle even before it begin due to the statistics of how court favors the employer more times than not. Why is this the case? The company argues that is it on their time using their equipments, of course they can monitor what they like. Then does that mean employees are just part of the company's property at work as well, since they did PAY for the workers. That is treating people as in-animated objects and tossing individual rights out of the window. Making the same argument, do you see people being tossed out of the United States just because they disagree with some of the government's policy? That seems absurd, right? However, that is exactly what is happening here. It is the right of the employee to maintain their alienable rights as constitute by the United State's constitution, be it freedom of speech, or privacy. The employer have the rights to make sure that their properties are not damaged and can implement policy to encourage its employees to be more productive as a parent fosters productivity and learning in children, not by snooping around personal belonging and letters. This will give a better balance to both sides and will achieve goals for both parties, and make both parties happy. Let's look at the fairness approach, is a distribution of balance of benefits and burden? Of course not, people who are higher up tends to have more power and they are not subject to the same scrutiny/monitoring, because the materials involved may be too sensitive. In the case of my friend, she was released due to the manager's revenge against her (to save face?). This occurrence shows that some people are devious and power is one thing that should not be given too freely, especially to those people. Her case is not unique, there must be so many other similar cases, and people would categorize them under politics at work. Sadly it has become an accepted way of life, which will most certainly upset any Utilitarian. The majority of the company is subject to, although not always, people with more power, and such dismissal will make other employees feel restricted and less free at work; which has a counter-productive sense to the "original" intent on paper; in reality, it is just vengeance. The common good is not served.


Conclusion


How does computer forensics measure up with the code of ethics in regards to common good, rights, just/fairness, utilitarian view, and virtue? As a whole, this technology/science brings about a double edged sword; its evaluation really depends on the intent of the user, as have mentioned earlier in the paper. However, on a grand scheme of things, computer forensic techniques is something that every country's CERT should adapt as a defense measure, because they are part of the network-the internet.
Therefore, it is for the common good that this type of technology continues to develop and mature. Though many rights may be violated such as in the case of the employee, and other victims who fall prey to the malicious attacks made using information captured with these very readily available tools. In fact, there are documents available online at http://www.cert.org.tw/document/docfile/ScanTool.pdf that instructs people on how to use these tools. However, on the other side of the same coin, many more people's rights are preserved with governmental agencies like CERT, which utilizes the same techniques to capture criminals and "pull the plug" on them. Consequently, utilitarian would be quite happy, because more people seems to benefit. Since forensic tools are available to everyone, there is fairness in the sense that the benefits and burden associated with this technology are available to everyone. Computer Forensics definitely more prominently brings the good and bad nature in human beings. One sees deviousness to exploit other people, and one sees righteousness to prevent such exploits.

Good Bye for the Next Time


American revolution and its aftermath

<br /> AMERICAN REVOLUTION AND ITS AFTERMATH<br /> The American Revolution marked the divorce of the British Empire and its...