Forensic Investigation

Improved Essays
For this specific case, I would need forensic tools that allow me to conduct an efficient incident investigation. The two main software I would use for this forensic investigation case are EnCase by Guidance Software and the Forensic Toolkit by AccessData which both provide hard drive imaging, graphics searching, keyword searches, and MD5 & SHA checksums (Albrecht, n.d.). Other tools I would use including FTK Imager, SANS Investigative Forensic Toolkit, Helix 3 Pro, Volatility, PTK, COFEE, and other specialized tools for this investigation (Tabona, 2013).
- EnCase: can be used for e-Discovery and analytics.
- FTK Imager: use to inspect documents, files, and folders that are stored on hard drives.
- Volatility: can be used to extract digital
…show more content…
One of the best reasons why the use of data mining technique is vital in the investigation is that it provides the investigator (myself) a timeline of all events including when irregularities started to occur. For example, I might verify in the year of 2014 and earlier, there may have no peculiar transactions. However, starting from 2014 to present date, I might find various financial transactions or exchanges that appear to be fraud in nature. Therefore, I can start reviewing data from all assets starting from 2014. This search should include inspecting the AMS financial records going from 3 to 5 years. During this time, I will look for any significant changes or any suspicious activities in the marketing and accounts receivable departments.
Verification
One of the steps in the digital forensic investigation is verification step. The verification step is to check an incident has occurred and to discover the size and extent of the occurrence (Rocha, 2014). In AMS situation, this is impractical in any case. As AMS hired me to discover a skimming operation that they think is happening I should check that there is an inconsistency amongst marketing department and accounts receivable.
In proceeding this check, I need to have a good understanding how the marketing department and account receivable operate

Related Documents

  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    While the Cole memo does give peace of mind to those business owners acting in good faith within Colorado, it does not change the federal laws related to use, sale, and distribution of the product. As stated in the Cole memorandum, this is merely a guide to instruct the attorneys potentially prosecuting these cases cannot be used as a defense in the event of an indictment. The memorandum also allows the attorneys to evaluate special circumstances on a case by case basis to see if an exception can be made. If the circumstances warrant action, the attorney should prosecute the case regardless of the presence of any of the above eight priorities. In essence, the memo instructs prosecutors look the other way in relation to legal, regulated marijuana…

    • 968 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Risk: Undetected, unusual and suspicious activity Mitigation Strategies: A. All wires are reviewed monthly, and placed on a spreadsheet that is reviewed quarterly, by the BSA Committee for any suspicious activity. B. Consumer international wires are monitored by the Compliance Manager to assure that the Bank remains exempt from the Remittance Transfer Rule. C. Periodic internal/external audits are performed by third party firms. D. The Bank’s Customer Identification Program (CIP) and Customer Due Diligence (CDD) Program enables the Bank to effectively monitor, identify, and report unusual and suspicious funds transfer activities.…

    • 1287 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    1. From what sources might the incident response team gather evidence? The incident response team should be alert to any electronic devices as they begin gathering evidence from different sources. For example, they see a gaming system.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The NYC computer forensics investigative procedures contain eight stages with electronic tools that are used to support an investigation. The first step that is taken is obtaining a search warrant, & in order to do this there must be probable cause to present to a magistrate. How probable cause is identified is by an investigation, or information obtained in a legal standard& documented by the officer who is seeking the evidence, & he/she must prepare an affidavit that defines the area to be searched, & the evidence being sought (Volonino pp 56). The reason for obtaining a search warrant is so that a defendants Fourth Amendment is not violated.…

    • 652 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    At times, there are certain cases where investigators run into dead ends or obstacles depending on the circumstances at hand. As in this case of the kidnapping and murder of special agent Enrique Camarena and Captain Alfredo Zavala, the DEA and forensic investigators faced many hurdles. The processing of significant evidence was constantly put to a halt. The DEA and investigators were unable to do things in the way that they wanted to. This put them through many challenges and hurdles in the investigative process.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    If any changes do occur, they must all be documented. Comply with the rules of evidence. These are the rules investigators must follow when examining and or handling evidence. They follow these rules to make sure that the evidence they do seize is accepted by the court of law. The last is do not exceed your knowledge.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    It would also be important to look into transaction descriptions. It is often the case that a fraudulent transaction will be paired with very little or no description at all. Through pattern and frequency analysis we could single out transactions that prove whether or not this type of entry was in fact fraudulent or not. Understanding industry regularities could also prove to help us in successfully identifying the fraudulent entries in…

    • 1732 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    1. Fire scenes are different than the regular crime scenes because as for the evidence of a fire scene was most likely destroyed or burned, the person who committed the crime does not usually the crime scene. This makes it a little more difficult to piece together the suspect and convict someone of their crimes. 2. The blast effect is what happens when a rush of gasses from the source of the bomb blows outward.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Advancements in technology help the Criminal Justice System to detect a series of events that take place before, during, and after at a crime scene. Further, crime investigators apply general reasoning, physical, deductive and inductive and other scientific methods. Solving a crime scene is becoming a minor problem because crime scene engineers can use the forensic science to find out the events that took place when a crime scene occurred to get clear details concerning the crime scene (Cole 264). Some of these new technologies include the Laser Ablation Inductively Coupled Plasma Mass Spectrometry machine, High-Speed Ballistic photography machine, and the Video spectral comparator, which drastically impact crime scene investigations and opens more doors when investigating a scene. Laser Ablation…

    • 627 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Loss Of Evidence

    • 1706 Words
    • 7 Pages

    Preserving and maintaining evidence in a forensic lab that was collected at a scene is crucial when conducting an investigation. A device that is suspected to contain digital evidence should be packaged in a proper way; it should be packaged based on sizes and sensitivity. Collection process should be documented by using photograph or video camera at the scene. Storage drives should be well labelled to indicated details such as the date, time and location where it was collected and the nature of the case to be investigated. This will prevent mix-up of evidence and loss of evidence.…

    • 1706 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Any valuable information/evidence such as potential email messages will be brought forward to the attorney. All storage hardware will be compensated for investigation with the acceptation of the warrant and granted access from the compliant. The evidence will be presented in a report to the chief of the investigation, and attorney. Task 6)…

    • 711 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Steps include identifying what crime was committed, gathering records and evidence, reviewing facts etc. As time moves forward technology is constantly being updated and enhanced. Technology is very important in our everyday lives and extremely important in the investigative field. Advancements in technology not…

    • 882 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays