1.A.In the phone call from the CEO, the initial details of the problem have been learnt. However, without viewing the evidences, suitable actions cannot be taken. Hence, the initial advices for the CEO should be as follows.
Keep the Workstation On – The first advice to be given to the CEO will be to keep the workstation on unless someone from the forensics department visits the office and seizes the machine (Gilani, Kozak and Innes 2016). This is mainly because the workstation may have a password set and if it is switched off, it will require additional effort to reopen the workstation by breaking the pass code.
Seal the Office Room – The next advice will be to keep the office room sealed with nobody inside. This is a precautionary measure considering the fact that there may be an insider who is actually working for Mortimer Smith. This person may try to access the workstation and delete all the relevant evidences that the present in the computer.
Keep All Evidences As They Are – The CEO also should ensure the evidences including the flash drive, CDs and others are kept as they are before handing over to the forensic personnel (Prayudi and Sn 2015). The CEO should also ensure nobody takes away the evidences or even come near the workstation for that matter.
No Leave for Employees before Experts Arrive – Another major step that the CEO needs to take is to not allow any of the employees to leave the office premises or even use communication devices to contact anyone except family before the forensic experts arrive at the scene. This is required in order to ensure the employees are not able to communicate with Mortimer Smith before official investigation starts and leak out important information (Lillis et al. 2016). With the slightest of hints of information, Mortimer Smith may escape and travel to another country or place before the investigation is officially opened.
All these advices will be given to Mr. Sanchez so that all the evidences of the case can be taken and a suitable chain of custody can be prepared before the actual investigation starts. Furthermore, as a part of the investigation, all the employees of the company will be interviewed so that suitable information may be extracted that will help the case and prepare a suitable charge against Mortimer Smith.
B.In the meeting, a detailed interview will be taken of the CEO, HR and a member of the IT department. The following questions will be asked to each of them.
CEO
HR
IT Department Member
These are the main questions that will be asked to the three persons but some other questions will also be asked in order to ensure each and every bit of information is gathered regarding the case. All these data and information will add up to development of a suitable case with evidences and eye witnesses (Van Baar, Van Beek and van Eijk 2014). In addition to these three personnel, other employees and stakeholders of the company will also be interviewed for any piece of information that might be useful in the case. Without sufficient evidence, motive and eye witnesses (if possible), the case against Mortimer Smith cannot be arranged that can be presented in the court for continuing the charge of Needful Things Ltd. However, there may be several issues arising during this interview meeting. These are as follows.
No Cooperation – Although Ricardo Sanchez is willing to build up a case against Mortimer Smith for trying to defame and reduce the business of the company, other board members may not be willing to proceed further in the case against Smith due to a large number of reasons. One reason may be the company is not willing to spend significant amount of funds for suing only one individual while another reason maybe the company is not willing to make internal affairs public (Dang-Nguyen et al. 2015). Whatever be the reason, some of the board members may not cooperate during the interview session and provide fake information regarding the case. This can be a serious problem as it will be very hard to extract necessary data and will need strong convincing to finally open them up.
Spy – As previously discussed, there might be a spy or a person inside the organization who is actually working for Mortimer Smith and leaks internal information to him. If the interview is called with the knowledge of all other employees, such persons may leak the information to Smith and he will get careful and may escape before a case with solid evidence can be set up.
Wrong Person – There can be another serious issue regarding this case. Although it is apparently clear that Mortimer Smith violated the company’s policies and used the CEO’s faith and trust on him for his own personal benefit. However, another possible explanation is that Mortimer Smith is not the wrongdoer at all. Each and every evidence found may be set up by Ricardo Sanchez himself or one of his employees in order to take revenge on Smith for leaving the organization (Agarwal and Kothari 2015). This possibility arises because in most of the cases related to crime, the wrongdoer generally tries to hide all the evidences after committing the crime whereas in this case, all the circumstantial evidences are left open (including the workstation) after Mortimer Smith left the organization, which is a bit unusual for an efficient employee as Smith. This issue will require detailed investigation and it can be done using the interview process as nobody will admit that Mortimer Smith has been set up and he is not the wrongdoer.
C.After the phone and the desktop are presented, they will be carefully handled as preservation of fingerprints will be required for the purpose of the investigation. Investigation will be stated on the spot for gathering sufficient evident that may lead to the conclusion of the case. The evidences will be sent to the forensic lab for the following tests.
Fingerprint – As discussed previously, there are two possible explanations to the case. Hence, finding the fingerprints on the devices is necessary that may lead to a strong trail in the project. However, it is unlikely that if the board members and Sanchez are trying to set up Smith, there will be any relevant fingerprints on the devices as they will remove any prints before setting Smith up (Bartol and Bartol 2018). Hence, to analyze the possibility in this investigation, extraction of fingerprints will be necessary.
Contents of Phone – The phone will be sent to the IT forensics for checking its contents by unlocking it by breaking its password. However, the problem is that the phone is not provided by the company and should be Mortimer Smith’s personal property. The phone can only be analyzed for checking its calls and other important files or messages that may lead to the charge against Smith. Another possible charge that can be brought against Smith is that he misused the company’s resources (bill payments for the mobile phone usage) to make his personal work as well as trying the damage the company’s business while working in it.
Contents of the Workstation – This is by far the biggest evidence that can be used to prepare the case against Smith. The suspicious contents found in the workstation of Smith are password protected and hence, the forensic department will need to break through the passwords and then check the contents of the files. If the files really have the contents that Sanchez thinks, then it will be significant evidence to set up the case against Mortimer Smith. However, some other subtle details need to be checked before the case is set up against Smith (Thethi and Keane 2014). These details include the properties of the files (date created, author and source of the file). These details can entirely turn the case in a different direction and Smith may be proved to be not guilty. It is a possibility that the files have been created elsewhere and transferred to Smith’s system in order to set him up. Hence, checking the source and contents of the files are all necessary.
Other Evidences – Other evidences for the case includes the USB memory key and the CDs that also have some suspicious files. These will also be checked for the contents in order to set up the case against Smith. In addition to the material evidences, the interview results will be used to prepare the entire case before prosecuting Smith.
The chain of custody is prepared as follows.
EVIDENCE CHAIN OF CUSTODY TRACKING FORM
Case Number: 2565 Offense: IT Fraud
Submitting Officer: (Name/ID#) PLEASE FILL
Victim: Needful Things Ltd.
Suspect: Mortimer Smith, Ex-Employee
Date/Time Seized: 15/02/2018 Location of Seizure: Needful Things Ltd. Office
Description of Evidence |
||
Item # |
Quantity |
Description of Item (Model, Serial #, Condition, Marks, Scratches) |
1 |
1 |
Mobile Phone used by Mortimer Smith, Samsung GY5 Pro, Vodafone connection, working condition, no marks or scratches on the surface, contents locked by password. |
2 |
1 |
Kingston 16 GB USB memory key, working condition, few small scratches on the surface, contains suspicious excel files, CLIENTS2017.xls |
3 |
5 |
Compact Discs, working as of now, no scratch marks, some documents to be investigated, contents locked by password. |
4 |
1 |
Desktop workstation, 5 years old, owned by organization, no damage or scratch marks, working condition, contains numerous password-protected files, possible evidence against Mortimer Smith |
5 |
– |
Mails for Mortimer Smith’s inbox |
All evidences left open, suspect did not hide any evidence, workstation and email id logged in even after suspect left the organization |
Chain of Custody |
||||
Item # |
Date/Time |
Released by |
Received by |
Comments/Location |
1 |
15/2/2018 |
Ricardo Sanchez |
PLEASE FILL |
Needful Things Ltd. |
2 |
15/2/2018 |
Ricardo Sanchez |
PLEASE FILL |
Needful Things Ltd. |
3 |
15/2/2018 |
Ricardo Sanchez |
PLEASE FILL |
Needful Things Ltd. |
4 |
15/2/2018 |
Ricardo Sanchez |
PLEASE FILL |
Needful Things Ltd. |
Evidence Chain-Of-Custody Tracking Form
Chain of Custody |
||||
Item # |
Date/Time |
Released by |
Received by |
Comments/Location |
1 |
15/2/2018 |
PLEASE FILL |
Forensic Department |
Needful Things Ltd. |
2 |
15/2/2018 |
PLEASE FILL |
Forensic Department |
Needful Things Ltd. |
3 |
15/2/2018 |
PLEASE FILL |
Forensic Department |
Needful Things Ltd. |
4 |
15/2/2018 |
PLEASE FILL |
Forensic Department |
Needful Things Ltd. |
Final Disposal Authority |
Authorization for Disposal Item(s) #: __________ on this document pertaining to (suspect): ____________________________________________ |
Witness to Destruction of Evidence Item(s) #: __________ on this document were destroyed by Evidence Custodian ___________________________ID#:______ Name & ID# of Witness to destruction: ________________________ Signature: ______________________Date: _______________ |
Release to Lawful Owner Item(s) #: __2, 3, 4 ________ on this document was/were released by Evidence Custodian ________________________ID#:_________ to Signature: ______________Ricardo Sanchez_________________________________________ Date: ________15/2/2018______ Copy of Government-issued photo identification is attached. ? Yes ? No |
This Evidence Chain-of-Custody form is to be retained as a permanent record by the Police Department. |
2.Alex Pritchard
Director
Central Bureau of Forensic Investigation
London, UK
<NAME>
Head of IT Forensics
Central Bureau of Forensic Investigation
London, UK
Re: Case No. 2565, IT Fraud Case, Needful Things Ltd., London
Sir,
The Department of IT Forensics, Central Bureau of Forensic Investigation has been able to attend the call made by Mr. Ricardo Sanchez, CEO, Needful Things Ltd., a maintenance services company based in London. Mr. Sanchez has reported a case of IT fraud where an ex-employee of the organization has been found to have misused the IT resources of the organization for personal work as well as steal important confidential and strategic information of the organization that he will possibly use for the development and growth of his own company. Following are the details known till now.
Background
Needful Things Ltd. is a small business organization that provides maintenance services for industrial batteries. There are 20 staff members and 5 board members including Ricardo Sanchez, the CEO. Mortimer Smith was a trusted and efficient employee of the company who recently resigned from the organization stating the reason that wants to open and run his own company. Within few days of Smith’s leave, another employee, Avon Burman also resigned from his post. Mr. Sanchez has reported that both of these two employees are now directors of a new company that provides the same services as Needful Things Ltd. After both of them left, Mr. Sanchez found certain evidences in Mortimer Smith’s desk that lead to a possible conclusion that Smith planned his resignation from a long time ago and only used the organization’s IT resources in order to set up his own company and he also used and stole confidential information of the organization (like client data) for benefitting the growth of his own company.
The Evidences
Several evidences have been found on site including a mobile phone used by Mortimer Smith, the workstation used by Smith, a flash USB drive and 5 CDs. The workstation, USB drive and the discs contain several password protected files that may contain very important information regarding the case and that can be enough to frame Mr. Smith guilty. The flash drive contains an excel file named CLIENTS2017.xls, which is password protected. Mr. Sanchez suspects that this file contains the list of all existing clients of the company and Mr. Smith will try to use this list to get customers in his company that will result in loss of customer base of Needful Things. All the evidences found at the desk of Mortimer Smith have been collected and sent to forensic lab for further analysis and extraction of information. Some data and information have also been collected from the interview with the CEO, HR and an IT member and noted down for further investigation.
There is one lack of continuity in the evidences gathered. Mr. Sanchez told that he found the workstation of Mr. Smith in open mode with the email id logged in. However, generally it is seen that the criminal tries to hide evidences as much as he can before leaving the scene. Here, it is seen that the Mr. Smith apparently left the evidences wide open to be viewed by anyone who visits his desk. This is a very unusual behavior from the criminal and it is a possibility that Mr. Smith has been framed by Mr. Sanchez or any other board member of Needful Things. However, further investigation is needed be sure whether any possibility is accurate and true.
The evidences will be sent directly to the forensic lab for analysis including gathering of fingerprints, collection of data from the documents found by breaking the passwords, call history checking, mails sent and received and others. After collection of data, the workstation will be returned to Mr. Sanchez promptly.
Possible Information
There can be various types of information that may be found in the workstation and the flash drive. As Mr. Sanchez reported, the contents of the files can help to prepare a suitable case against Mr. Smith if these documents are found to contain confidential information of the organization. Furthermore, the mailbox of Mr. Smith will be checked to find out whether he had sent the organization’s confidential information to some other sources or entities. Also, the source of the documents, creation date, author and other minor details can also lead the case to be framed against someone else inside the organization who might have tried to frame Mr. Smith
Suspects and Motives
Mr. Mortimer Smith – Mortimer Smith has a strong motive to have committed this particular fraud crime. He can use the company’s confidential information, client list and other statistics for the development of his own organization and also hurting the reputation and business of the organization. So far, the available evident are all against Mr. Smith.
Mr. Ricardo Sanchez – Mr. Sanchez may be lying all the time and trying to frame and defame Mr. Smith who is rivaling Mr. Sanchez’s company. The way the evidences are left wide open and the workstation and mail id are logged in even after Mr. Smith left, it is possible that Mr. Sanchez or one of his delegates has inserted the files in the system and kept it logged in so that it becomes apparent that Mr. Smith has committed the fraud.
Further investigation to follow
Sincerely,
<NAME>
Head of IT Forensics
Central Bureau of Forensic Investigation
London, UK
References
Ab Rahman, N.H. and Choo, K.K.R., 2015. Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model.
Agarwal, R. and Kothari, S., 2015. Review of digital forensic investigation frameworks. In Information Science and Applications (pp. 561-571). Springer, Berlin, Heidelberg.
Bartol, C.R. and Bartol, A.M., 2018. Introduction to forensic psychology: Research and application. Sage Publications.
Chabot, Y., Bertaux, A., Nicolle, C. and Kechadi, M.T., 2014. A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation, 11, pp.S95-S105.
Damshenas, M., Dehghantanha, A. and Mahmoud, R., 2014. A survey on digital forensics trends. International Journal of Cyber-Security and Digital Forensics, 3(4), pp.209-235.
Dang-Nguyen, D.T., Pasquini, C., Conotter, V. and Boato, G., 2015, March. Raise: A raw images dataset for digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp. 219-224). ACM.
Daryabar, F., Dehghantanha, A. and Choo, K.K.R., 2017. Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences, 49(3), pp.344-357.
Elyas, M., Ahmad, A., Maynard, S.B. and Lonie, A., 2015. Digital forensic readiness: Expert perspectives on a theoretical framework. Computers & Security, 52, pp.70-89.
Evison, M.P. and Bruegge, R.W.V. eds., 2016. Computer-aided forensic facial comparison. CRC Press.
Gilani, H.R., Kozak, R.A. and Innes, J.L., 2016. The state of innovation in the British Columbia value-added wood products sector: the example of chain of custody certification. Canadian Journal of Forest Research, 46(8), pp.1067-1075.
Ho, A.T. and Li, S. eds., 2015. Handbook of digital forensics of multimedia data and devices. John Wiley & Sons.
Karie, N.M. and Venter, H.S., 2015. Taxonomy of challenges for digital forensics. Journal of forensic sciences, 60(4), pp.885-893.
Khan, S., Ahmad, E., Shiraz, M., Gani, A., Wahab, A.W.A. and Bagiwa, M.A., 2014, September. Forensic challenges in mobile cloud computing. In Computer, Communications, and Control Technology (I4CT), 2014 International Conference on(pp. 343-347). IEEE.
Lang, A., Bashir, M., Campbell, R. and DeStefano, L., 2014. Developing a new digital forensics curriculum. Digital Investigation, 11, pp.S76-S84.
Lee, C. and Chung, M., 2015. Digital Forensic Analysis on Window8 Style UI Instant Messenger Applications. In Computer Science and its Applications (pp. 1037-1042). Springer, Berlin, Heidelberg.
Lillis, D., Becker, B., O’Sullivan, T. and Scanlon, M., 2016. Current challenges and future research areas for digital forensic investigation. arXiv preprint arXiv:1604.03850.
Patel, J., Singh, H.P., Paresh, M. and Verma, C., 2018. Forensic odontology in the era of computer and technology. International Journal of Medical and Dental Sciences, 2(1), pp.59-64.
Perumal, S., Norwawi, N.M. and Raman, V., 2015, October. Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 19-23). IEEE.
Prayudi, Y. and Sn, A., 2015. Digital chain of custody: State of the art. International Journal of Computer Applications, 114(5).
Quick, D. and Choo, K.K.R., 2014. Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive.
Shariati, M., Dehghantanha, A., Martini, B. and Choo, K.K.R., 2015. Ubuntu one investigation: detecting evidences on client machines.
Thethi, N. and Keane, A., 2014, February. Digital forensics investigations in the cloud. In Advance Computing Conference (IACC), 2014 IEEE International (pp. 1475-1480). IEEE.
Van Baar, R.B., Van Beek, H.M.A. and van Eijk, E.J., 2014. Digital Forensics as a Service: A game changer. Digital Investigation, 11, pp.S54-S62.
Watson, S. and Dehghantanha, A., 2016. Digital forensics: the missing piece of the Internet of Things promise. Computer Fraud & Security, 2016(6), pp.5-8.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download