Can Autopsy 4.2.1 be used to detect intrusive activities originating from the internet.

am new to this aspect of computer technology and am seeking an application to help me determine if intellectual property theft has occurred on my computer. Is Autopsy 4.2.1 capable of doing this? If so, what are the first steps in the process? If not, can anyone on this forum point me in the right direction?

Hi @peacefulnomore. This is a loaded question with much more to it than a simple yes (which is the answer). If there is any chance this will end up in court the first step should be to create a forensic image. And, if you suspect IPT this is not the time to be learning digital forensics, which is the field you are asking about. Digging around in the evidence will likely make it inadmissible.

That said, if this is more of an academic endeavor there are a lot of free resources available to help answer your questions. A completely prepared case with forensic images, questions and answers (with explanations) can be found here: CFReDS - Data Leakage Case. It’s a dated scenario, but still provides a good foundation for this type of situation.