...A digital forensics investigation is conducted after a significant security incident has been identified. The goal of a forensic investigation is to answer why, when, where, what and who though a meticulous scientific process of identifying, preserving, documenting and analyzing extracted information from digital evidence (Marcella & Menendez, 2008, Chapter 1). The following are examples of activities which may warrant a forensic investigation (Marcella & Menendez, 2008, Chapter 1): Fraud Hacking Embezzlement Compromise to a customer’s electronic privacy data Peer-to-peer file sharing Leak or unauthorized disclosure of confidential information Theft of trade secrets, intellectual property Unlawful access to a computer Use of a company’s information technology resources for personal gain Violation of acceptable use policies Launching denial of service attacks against a competitor The Federal Rules of Civil Procedure (FRCP) e-discovery...
Words: 531 - Pages: 3
...Somewhere in the world tonight there is a forensic scientist shaking their head while watching the latest episode of the CSI franchise. The reason why this may be is because in the real world things are handled and done very differently oppose to how it is shown on crime shows such as CSI: Miami and its other popular spinoffs. That is right, contrary to popular belief those who work within crime scene investigation do not go cruising down south beach in Miami, in their brand new hummer or have clever one liners, and dramatic music playing in the background. This field requires thorough examination and investigations of crime scenes and the scientific tools to allow each case to be solved. This obviously means that it is extremely tedious and...
Words: 1206 - Pages: 5
...This case report was created Wednesday, September 03, 2014 at 3:56:30 PM. Both an Investigator/Forensic Examiner Jeremy Muraskiis assigned to investigate this Forensic Software Report. Investigator Jeremy Muraskiis received a tip coming from a woman who claims her ex-husband told her about a crime he had committed. Investigator Muraskiis questions the woman for more information involving the crime the ex-husband is said to have told her about it. It has come to the investigator attention that the crime that her ex-husband has been involved in, is a crime that is formerly known as computer crime. The ex-wife goes on and begins to give certain details about what her ex-husband has told her. Upon probable cause, Investigator Muraskiis called out the computer forensic examiner to examine the computer that is known to be used in this computer crime. Upon investigating this case, this Forensic Software Report contained 2 evidence, which are JPEG file which is known as images files. These two images files are Andromeda Galaxy M31 and Southern Pinwheel which are the 2 evidence that needs to be recover and sent to the lab to be examine and used in the court of law to prosecute the lady’s ex-husband....
Words: 565 - Pages: 3
...of misuse of company property due to that staff bragging about gaining access to privileged information to his colleagues that he should have otherwise not have gotten access to. The issue first came to the attention of Mr. Ali, the Enterprise Systems Administrator of TT Bank who had investigated silently to discover the identity of the staff and that the person was a member of the Loans Department and his name was Mr. Mike. What became particularly disturbing was that Mike worked in the Loans Department and should not have any access whatsoever to any Human Resources (HR) department files. The Enterprise System Administrator decided that the case should be investigated properly and hired a computer forensic expert from the APIIT FORENSIC LABOROTARY. Upon arrival, the forensic investigator was issued full...
Words: 1635 - Pages: 7
...ACCT 2211: Forensic Accounting Individual Test 1 Baldor Electric Singapore The finance manager, See Lay See, of Baldo Electric, embezzled nearly $227,000 over a 4 year period (200-2004). Through deliberate falsification of the company accounts, she successfully covered her crime. Required: 5 + 5 = 10 Marks 1. Using the elements of fraud, explain how this case of employee embezzlement would be deemed as fraud. (5 Marks) __________________________________________________________________________________Comments: students should consider the 7-elements (not the fraud triangle here). – “Fraud” is deception that includes the following elements 1. A representation 2. About a material point 3. Which is false 4. And intentionally or recklessly so, 5. Which is believed 6. And acted upon by the victim 7. To the victim’s damage This was a case of employee embezzlement (some might also suggest senior management fraud, as See Lay See was a senior manager; however, this was a non-collusive fraud situation). The 7-elements are required for this to be deemed fraud (but note some jurisdictions take a wide interpretation of “victim” to include potential shareholders or society at large. 1. Representation – this was a claim made by See about the company accounts being true and fair 2. Material point – this was proven to be material as...
Words: 528 - Pages: 3
...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...
Words: 246885 - Pages: 988
...Welcome to Homicide Forensic Science is a fundamental component of the justice system. Forensic scientists use scientific techniques and knowledge to assist law enforcement in investigations and solving crimes. They collect and analyze numerous types of evidence, including blood, body fluids; DNA; and human tissue. Forensic scientists assist the decision makers by showing the prosecutor if the issue has merit before it reaches the courtroom thereby reducing the number of cases having to be heard. Their decisions are based on scientific investigations and not circumstantial evidence or unreliable witnesses. Forensic scientists can restore faith in the judicial system with the use of science and technology for facts in criminal and civil investigations. The legal system is established on the belief that the legal process results in justice for all. History of forensic science The history of Forensic science or the applying of scientific principles to legal questions has a lengthy and interesting history. The first recorded autopsy was reported in 44 B.C was on Julius Caesar, where the Roman physician, Antistius proclaimed that he had 23 wounds on his body but only one was fatal. In 1248, a Chinese book entitled “His Duan Yu” (meaning The Washing Away of Wrongs) explaining how to tell apart a drowning from a strangulation. This was also the first recorded use of medicine to assist in solving crimes. In 1590, the first microscope was developed. In 1775, Karl...
Words: 2382 - Pages: 10
...Assessment Worksheet Documenting a Workstation Configuration Using Common Forensic Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed a forensic analysis of a Windows 2012 machine using three commonly available tools: WinAudit, DevManView, and Frhed. You reviewed the forensic capabilities of each tool, using the sample files provided, to determine any clandestine threats or vulnerabilities such as viruses and malicious software. You also recovered a file that was altered to hide its native file format. You documented your findings in a forensics report. Lab Assessment Questions & Answers 1. What is the main purpose of a software tool like WinAudit in computer forensics? 2. Which item(s) generated by WinAudit would be of critical importance in a computer forensic investigation? 3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation? 4. Why would you use a tool like DevManView while performing a computer forensic investigation? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual ...
Words: 295 - Pages: 2
...In the article it was discussing all the different types of forensics there are. People think there is just one type of forensics, but there’s a wide range of all different types. I also picked this article because I think people should realize that forensics is a very hard field to go into. You really have to really have heart to be able to go into this field. Investigator’s really have to go into detail about every little thing. In the investigations you really cannot miss a single detail. The article also goes in depth about what sciences are required to take, and for that person to really know. To be in the field you really have to love what you do. Many people often misunderstand Forensic Science and believe it is much more capable than it really is. People typically think that what they watch on T.V. is 100% true. Actually what you see on T.V. is mainly false or over exaggerated in some way. Criminal Investigation is the largest and most known form of Forensic Science. More of the known areas that people know about Forensics are; Fingerprinting, DNA Identification, Fiber Samples, Computer Animation, etc. What people see on T.V. is that it takes about an hour for the people on the NCIS, or Law & Order to figure everything. Typically it takes months at a time, and most of the time aren’t even accurate concepts. This article relates to my life, because forensics is really all about a puzzle. I feel like my life is like a puzzle. But in a good way. This article was...
Words: 314 - Pages: 2
...000/Yr Title: Forensics Managing Specialist –Security JOB DESCRIPTION All Forensics Candidates are encouraged to apply. Jr. to Sr. level positions are available from 2 years to 10+ years experience. Salary based on experience. A Bachelor's Degree in Forensics or related is a plus. This is a full time perm position. Must be willing to travel nationwide. Our client’s computer forensics team is a comprehensive solution for global data collections and forensic analysis. They offer best-in-class security. From small to large matters, they provide easy to understand interpretations of findings and a single point of contact. The Managing Consultant utilizes state of the art techniques that enable the recovery and use of critical electronic evidence for litigation, investigations and other fact-finding exercises. The Computer Forensics Managing Consultant establishes whether evidence has been erased or modified; analyzes electronic content and patterns of Internet and e-mail usage; recovers deleted data; and assesses and explains metadata within recovered files. RESPONSIBILITIES Manage day to day activities for projects involving computer forensics, information security or rapid response data breach matters. Manage large data preservation and collection activities to ensure that accepted forensic protocols; create and maintain Chain of Custody; document the handling of evidence. Analyze log files from firewalls, web servers and computers. Conduct forensic analysis and write...
Words: 585 - Pages: 3
...utilizing it. On the flip side, it can also be as bad; incredibly harmful at best. When a crime has been committed, in this day in age, a computer is often the accomplice. That being said, the sooner the evidence within the computer accomplice is collected by the attending computer forensics specialists, the more likely the data that has been accessed, even if deleted, is remaining evidence on the computer; whether only in part or true to form detail. The longer the forensic team takes to collect this invaluable data, the more likely it is that the computer will overwrite key pieces of evidence, which would ultimately result in the prosecution or release of a potential criminal mind. Even partial data is extracted from the hard drive of the accomplice computer; it can still be very much useful in a prosecution, as partial data is also admissible in court today (Krehel, 2011). Securing the hard drive in the exact manner in which the computer has been found is absolutely vital to any forensic expert hoping to do their job with attention to detail and accuracy. This can be done by duplicating or replicating the hard drive at the onset of any said investigation when a computer is involved. Because forensic specialists are not attorneys, it is nearly impossible for this professional to know which data to keep and what to leave behind for overwrite. In this case, the choice is clear. There isn’t one. Every shred of data on the accomplice computer must be collected ((Biles, 2010). Just...
Words: 691 - Pages: 3
...FSCJ 4340 Final Exam Tasks of Preliminary Investigation A preliminary investigation is the actions taken at the scene of a crime immediately following its detection and report to the police. This may include; receiving the information about the crime and initial response, providing emergency care to victims, crime scene control, putting out BOLO alerts, crime scene determination, gathering evidence, and the report. So, a preliminary investigation basically consists of securing the crime scene, determining where exactly the crime scene is going to be, controlling the crime, and all the little things in between. The senior officer and his partner are responsible for this. The first and most important step in any crime scene investigation is to secure the scene. The crime scene should be approached in a manner that maximizes the safety of any potential victims, witnesses, others in that area, and the officers on the scene. Officers should work to preserve and protect any evidence that could potentially be lost or compromised from weather; (footprints and tire tracks). Once the crime scene is secured, officers should control the scene by identifying and removing people that don’t belong from the crime scene. Controlling the crime scene is described as the actions which the first arriving officer(s) at the crime scene take to make sure that the integrity of the scene is maintained. This can prevent contamination of any evidence, and/or destroying physical...
Words: 1353 - Pages: 6
...Forensic Science and Murder: The Ted Bundy Case Sheila Hawkins Criminalistics Abstract Forensic science is the foundational element of all crime investigation procedures. Recent advances in forensic technologies make possible to resolve even the most challenging crimes. This paper tells a story of Ted Bundy, a serial killer, whose case was solved with the help of forensic science. Implications and possible changes in case investigation are proposed. Keywords: forensic science, Ted Bundy, serial killer, case, solve. The Ted Bundy Case Forensic science is at the heart of all crime investigation procedures. Recent advances in forensic science make possible to solve even the most challenging cases. The contribution of forensic science to crime investigation is difficult to overestimate: according to Ribaux, Walsh and Margot (2006), forensic science facilitates accreditation, standardization, and interpretation of forensic evidence and ensures the scientific efficiency and objectivity of crime data. The case of Ted Bundy, a serial killer, is no exception: it is with the help of forensic science that the crimes committed by Ted Bundy were solved. The story of Ted Bundy is believed to have started between 1973 and 1974, when he committed his first murders. In just two years, Bundy managed to kill almost two dozens of girls (Ramsland, n.d.). Victims’ age ranged from 12 to 20; some of them were reported to be missing, whereas others vanished from their rooms, leaving...
Words: 854 - Pages: 4
...Abstract: Rising era of computer and other technologies as internet and gadgets, explosively increase in number of cybercrime or other crimes using technologies. The growth of computer forensic has taken as huge success to control those crimes which are committed using computers. The main task of computer forensic is to examining and collecting electronic data as evidence from a crime scene. The work of computer forensic is to recover the data which has been hacked or lost by the criminals using different system. The growing dependency on computer forensic has decreased the cybercrime and professionals have to understand the computer technology that is used in computer forensic. Introduction Forensic roots from a Latin word, “forensic” which...
Words: 870 - Pages: 4
...Introduction Hair is among the most commonly used evidences in the crime investigations. Hair analysis is based on its chemical characteristics and physical structure which aid during investigations. It is notable that hairs are easily transferred hence can be left as evidence after a criminal activity. Hair analysis can be of great use in forensic analysis during an investigation since it can help prove crime in various ways. First, hair analysis can easily link a suspect to a crime scene. It can also show the association or link between the suspect and the victim. Hair analysis can also help single out a particular suspect from other suspects in the case. It is important to note that hair is a great resource to forensic science. The presence of the suspects ‘ hair on the victim’s body can help determine his or her sex and race. Hair analysis can also be used to determine the DNA of a suspect in a crime scene. The forensic problem to be solved is identification of the murder suspect in the Ford Heights Four case. A couple was robbed and murdered in Ford Heights in East Chicago. According to witnesses, four men were seen leaving the crime scene after the incident. The four men were later convicted and sentenced to prison despite their insistence on being innocent. However, after some years, DNA testing was conducted and the four suspects proved to be innocent before being released from prison. The forensic problem is relevant to the course since hair left on the victims’ body...
Words: 771 - Pages: 4