Digital Forensic Investigation

Superior Essays
Digital Forensic Investigation (DFI), LLC has been contracted by American Marketing Systems (AMS) to perform a clandestine investigation of a suspected internal skimming operation involving an unknown number of employees in its marketing department or accounts receivable.
AMS has just become aware of this predicament, but are unaware of the how the skimming operation is being conducted. DFI has been contracted by AMS to ascertain if a skimming operation exists, and if so, who is implicated and how the operation is being conducted.
DFI and AMS agreed to place a digital forensics investigator within its Information Technology (IT) department as a systems administrator so that the investigation can be conducted under cover utilizing this role.
…show more content…
The tools that you will need?
The digital forensics investigator requires several portable tools for conducting the investigation in a forensically sound manner since the investigation will be conducted off site in AMS. Utilizing the list of devices and OS’s that AMS provided, the digital forensics investigator should ensure that the proper forensics tools are taken to the site for the investigation. According to Gogolin (2013), the forensic tools that would be needed for this investigation are a forensic toolkit, a forensic laptop, write blocker, disk imager, and external hard drives.
The forensic toolkit should be able to collect volatile and non-volatile data to ensure collection of all relevant information. Also, the digital forensics investigator should have a forensic laptop available to conduct investigations off site; as well as a hardware write blocker to ensure evidence is not altered. Furthermore, a disk imager and external hard drives should be available when an image is required of a digital
…show more content…
The collection process shall commence utilizing the forensic toolkit necessary for all the devices, conducting either live or dead acquisition, depending the state of the devices. Also, external storage devices shall be imaged for analysis and examination for digital evidence. Furthermore, to gather information from the network ports used to access the network, network forensics must be conducted. However, information can only be collected if there were any prior network security features installed like packet filters, firewalls, and intrusion detection systems (Kizza, 2009). Finally, reviewing log files for the information systems and from network devices will also be conducted for any digital evidence regarding the internal skimming operation.
d. History – how far back will you need to go in your review and how will you determine this?
Creating a timeline is pertinent to identifying how far back the digital forensic investigator must review to gather information regarding the investigation. According to King (2006), the timeline in the forensic plan should include a beginning focal point, validated dates and times, and events. Also, by understanding AMS’s back up policy, the investigator can take the beginning focal point of the internal skimming operation and how long AMS maintains its files to ascertain a

Related Documents

  • Improved Essays

    Blood splatter Collection of item: I would remove the dried blood from the surface by using a sterile cotton swab that is lightly moistened with distilled water that is air dried before being placed in a swab box, then I would place it into a paper or manilla envelope. I would store the evidence in a cool location until it was delivered to the laboratory. Processing of item: The analyst will study the mixed blood and through DNA testing he or she should be able to identify who’s blood belongs to whom 10. Body Collection of item: I would take pictures of the body and write a documentation of evidence on the body.…

    • 746 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Van Dam Home Case Study

    • 665 Words
    • 3 Pages

    Background Forensic technologists play a critical crime scene role, carefully preserving the evidence digitally and physically while maintaining a custody chain for later usage by the prosecution. The best investigative timeline of this case with the greatest degree of details can be found on crime enthusiast Vance Holmes’ Trial Tracker website and the Murderpedia website (n.d.), and evidence specifically from the Reno & Figueroa 2002 Newsweek article. Van Dam Home – Crime Scene 1 Danielle Van Dam was a 7-year-old who was last seen alive on February 1, 2002. Danielle and her siblings went to bed at 10:00 p.m. The Van Dams believed their daughter was safely asleep in her room, but they were mistaken.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1. From what sources might the incident response team gather evidence? The incident response team should be alert to any electronic devices as they begin gathering evidence from different sources. For example, they see a gaming system.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    At times, there are certain cases where investigators run into dead ends or obstacles depending on the circumstances at hand. As in this case of the kidnapping and murder of special agent Enrique Camarena and Captain Alfredo Zavala, the DEA and forensic investigators faced many hurdles. The processing of significant evidence was constantly put to a halt. The DEA and investigators were unable to do things in the way that they wanted to. This put them through many challenges and hurdles in the investigative process.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    a) Consent to Search In R v. Wills (1992) the court found the following criteria necessary for a valid consent search: 1. There was consent, expressed or implied; 2. The giver of the consent had the authority to give the consent; 3. The consent was voluntary (not police coerced); 4. The giver of consent was aware of the police conduct; 5.…

    • 1052 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The fourth amendment protects all citizens from illegal searches and seizure of their possessions and property. The Weeks v. United States case law was established in 1914, which consisted of police entering Fremont Weeks home and illegally seizing evidence of Weeks transporting lottery tickets through the mail. This case is what brought forth the exclusionary rule, which makes any evidence obtained during an illegal search and seizure possibly inadmissible in court. To uphold the fourth amendment, officers need a probable cause to justify the search of someone’s home and other property. To establish probable cause, officers need factual evidence that leads them to believe that the suspect has committed a crime.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In order to establish an effective forensic readiness plan in the private sector, three major requirements need to be fulfilled. The first requirement is appropriate technology. Technology is critical in helping the organisation obtain evidence, preserve and protect…

    • 843 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Widgets “R” US IR Plan The person who discovers the incident will call the grounds dispatch office. List possible sources of those who may discover the incident. The known sources should be provided with a contact procedure and contact list. Sources requiring contact information may be: Helpdesk Intrusion detection monitoring personnel A system administrator…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    The American Academy of Forensic Sciences is a professional website that was founded in 1948. The purpose of this American Academy of Forensic Sciences community is to provide information towards leadership of science, and the knowledge about the legal system. This community was developed to inform and educated everyone about their knowledge about this program, and to help them gather information on that specific subject of forensic science. It is searching for people that will join their community. These people need to have, or had engaged in the field of the forensic science and these people should believe of contribuis tessential to their time to advance the science through videos, newspaper, and articles.…

    • 1192 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Mr. Oliver sent the three photos to a single person whom he deems trustworthy enough to not exploit the photos. Task 2) Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law…

    • 711 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Fraud Triangle Case Study

    • 918 Words
    • 4 Pages

    The 10-10-80 rule of thumb has come a long way as far as fraud examination is concerned. This rule of thumb in the arena of Fraud investigation is still applied. This thumb rule is based on a precondition that 10 percent of the employees will never steal no matter what the circumstances are. Another 10 percent enter the working field just to instigate criminal offences. The 80 percent of the employees tend to steal under the right circumstances which strongly support the notions expressed by the influential criminologists such as Mr. Cressey and his proponents.…

    • 918 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The CSI will walk through taking notes on anything needed for the investigations, things such as fingerprint dusting kit, or blood spatter. After it is noted on what equipment is needed, the true heart of the investigation process beings. “Trace evidence is any material such as hairs, fibers, glass, soil, paint, etc., found at a crime scene on a person or object.” This evidence is then used to help find out more information about the crime committed, such as who was there. When finding the trace evidence it is important the following steps are completed: the written down location, the amount collected, the type of material, the condition of the material, and proper packing to help transport the trace evidence to the lab.…

    • 1708 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays