Preview

Computer Forensics Case Projects Chapter 2

Good Essays
Open Document
Open Document
799 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Forensics Case Projects Chapter 2
Case Project 2-1 * Receive the equipment from the Seattle Police Department with the chain of custody form * Enter my company information on form and secure the evidence * Request statements from officers on the condition of the computer on time of raid * Request a list of keywords to search * Transport Gateway computer to our secured forensics lab * Prepare a forensics workstation specifically for this case * Make two images of hard drive using two different tools * Examine drives for evidence by running keyword searches and checking URL’s for Internet searches. * Search registry for keywords * Identify specialty applications * Organize and consolidate in file and folders all recovered data from evidence

Case Project 2-2
I need to determine whether an investigation is necessary. First, I will advise Jonathan to interview the other person who has access to the company accounting program, then review the company computer and the accounting program and see any relevant documents, including the company checkbook and ledger, and contact the bank for a current bank statement, any information about the check, if it has cleared and the amount. He needs to locate itemized details of the subcontractor’s job amounting to $10,750 and the facts of the check for the amount $12,750. He needs to find the facts of the $2,000 difference, if available by comparing bank statements, the accounting program, etc. I will advise him to be mindful that any information may eventually be evidence in a criminal case of employee theft/embezzlement. If his suspicions are immediate that a crime, not just an accounting error, has taken place, I would advise him to allow my investigation company to step in at the beginning.

Case Project 2-3
The former employee should be asked if she has every shared her password with anyone or written it down for someone else to find? Has anyone ever used her computer at work or remotely? Has she ever received

You May Also Find These Documents Helpful

  • Powerful Essays

    Philip B. Royster Case

    • 934 Words
    • 4 Pages

    On Tuesday, 01/03/207, at 1442 hours, I, Deputy Stacy Stark #1815 was dispatched to take a telephone report for a theft. I spoke to the victim, Philip B. Royster (M/W, DOB: 05/04/1961). Royster stated someone stole numerous tools from his shop trailers parked on Boat Dock Rd. I requested to meet Royster in person at the location to take the report, he agreed.…

    • 934 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Ashely Mervyn Coulston is known as the ‘Burwood triple murderer’ he murdered three innocent victims in cold blood on 29 July 19921. Coulston had gone to a Burwood house under the guise of renting a room in the house that had been ‘advertised in the Herald Sun’2. Coulston had a bag that contained a .22 rifle, ammunition, a homemade silencer and plastic cable ties. Coulston bound, gagged and covered the victim’s heads (using a towel or dressing gown) and shot each in the back of the head at point blank range3.…

    • 1606 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On Friday July 31st 2015 at approximately 11:55pm, I Karl O’Brian Dent Sr. Badge # 920, A Sworn Peace Officer operating under the authority entrusted in me by the Cripple Creek Police Department, County of Teller, State of Colorado for an Agency Assist requested by the Teller County Sheriff’s Department at 11235 Independence Avenue, Goldfield Colorado 80860. While in route I was advised by dispatch that I would be meeting with Deputy A to assist with finding and apprehending Mr. Rock Star DOB 11/15/1981. Dispatch advised me that Mr. Star was a Native American male wearing blue jeans, black shoes and no wearing a shirt. I was also advised by dispatch that the victim was a Caucasian female Ms. Red Bull DOB 10/07/1987 and was wearing a blue short, white t - shirt and flip flops. I arrived at 11235 Independence Avenue, Goldfield Colorado 80860 Saturday August 01st 2015 at approximately 00:21am…

    • 1170 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Disaster Plan It

    • 1313 Words
    • 6 Pages

    123 Textiles Corporation is located in a high-crime area that also experiences occasional earthquakes. A new network was set up with the server by a window. All systems are backed up once a month on an exterior drive. One night, a thief entered through the window and stole the server.…

    • 1313 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Provincial Offences act

    • 3379 Words
    • 14 Pages

    10. Bail, probation, or other court or administrative orders or agreements in effect, with contact person to confirm compliance, if necessary.…

    • 3379 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Chapter 5 is called "Searches for Electronically Stored Information and Electronic Surveillance." It examines how technology has changed the way information is exchanged and stored. Electronically Stored Information (ESI) searches follow the Fourth Amendment, like traditional searches do, and require a warrant. This type of information includes data such as computer files, computer programs, memory cards and sticks, CDs and DVDs, servers, floppy disks, tablets, thumb and jump drives, tape media, cell phones, PDAs, external hard drives, cameras, iPods, voice-mail systems, fax machines, and copy machines. Computer forensics is constantly evolving as technology evolves.…

    • 580 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Another ethical issue surrounding a digital forensic investigation is how personal information about a suspect can create a bias for the investigator. Bias is a very large issue during a forensic investigation, it can change how well an investigator performs and how they will use the evidence to influence a case. During every investigation an investigator will come across information about a suspect that does not involve the crime, but may influence the investigator’s actions. These factors can be both good or bad depending on the situation. For example, an investigator could determine that a suspect was cheating on their wife through emails located on a computer, thereby creating a negative bias. Consequently, they could determine that a suspect…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Case 4-2 In this case project I need made a fast disk image of the suspect hard drive.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    System Audit

    • 12719 Words
    • 51 Pages

    7) COBIT: Control Objectives for Information and related Technology, definition, release history, cobit framework, COBIT structure, other standards.…

    • 12719 Words
    • 51 Pages
    Powerful Essays