Betting Shop computer investigation Essay

Essay Topic: Computer, Credit card, Essay, Investigation, This case,

Paper type: Persona,

Words: 2329 | Published: 11.28.19 | Views: 582 | Download now

The task given to me for the next essay was: – Presume you have been called in investigate thought incidences of computer criminal offense enacted through the computer system at a local gambling office.

Identify how you will conduct the search and seizure procedure. Also describe why you would probably conduct the operation in the way you illustrate. Keywords: – Electronic, Evidence, Investigation, Personal computers, Seizure, Forensic, Computing Advantages I was just lately given the task of Mind of Forensic Computing Investigation into Operation Gamble. Procedure Gamble have been in place for more than 12 several weeks, in this time completely become apparent that there was every probability that some kind of computer criminal activity were being determined on a everyday basis. This job comprises making sure that absolutely nothing is overlooked, that everything is completed in a methodical manner, anything needs logging in one way or another.

There are plenty of things to think about, and many that need acting after, decisions frequently need to be made on web page at the time of the search. Ideally this essay will inform the reader of any little know-how into the regarding forensic computing investigation. Also that it will turn into clear the fact that successful prosecution of offenders means that the investigation must be done thoroughly by start to finish.

ACPO state you will find 4 principles that should be honored at all times, so when reading this must be required into consideration. The four concepts are as follows: – Basic principle 1: Zero action used by law enforcement companies or their particular agents will need to change info held over a computer or storage media which may therefore be depended on in court docket. Principle 2: In extraordinary circumstances, in which a person finds it necessary to access original data held on the computer or perhaps on safe-keeping media, the face must be proficient to do so and also give proof explaining the relevance as well as the implications with their actions.

Principle 3: An audit trek or various other record of processes used on computer primarily based electronic proof should be developed and preserved. An independent third party should be able to examine those techniques and achieve the same effect. Principle some: The person responsible for the analysis (the case officer) has overall responsibility for making sure the law and these guidelines are adhered to. Ruth Sutton’s investigation into a local bets shop.

First of all I was referred to as into the office and was given a new circumstance, which involved investigating a betting shop that may had been involved in some sort of fraud or computer misuse. I wasn’t given any information in detail. With out much comprehensive information I have to prepare the investigation like I i am looking for every kind of digital crime there is.

With an open mind that makes the research much more through and lengthy, maybe arriving more clues to what continues to be occurring through this particular establishment. Also as I have been put in charge with this investigation I make sure that every staff that were drafted directly into help with this kind of investigation had the competence to do so, all of them needed to be conscious how risky forensic info is, just how easily facts can be lost, changed, or perhaps altered and for that reason inadmissible in court.

Merely were to be with all this case and was previously made aware that it absolutely was child pornography that I was looking for this would established my mind pondering, and evolving into the direction of looking for not simply images nevertheless perhaps picture taking equipment, chat logs, email, internet consumption logs. However it is a much different case for scam. Accounting would be looked into addresses books, credit card data, calendars, credit card skimmers, the list simply goes on and.

Having no idea could turn up more things since child adult can often be placed on a ring, perhaps in that diamond ring credit card fraud will be used to order entry to child porn sights, sufficient reason for my open mind which of my colleagues My spouse and i start my personal investigation. Within the ACPO (Association Of Primary Police Officers) guidelines there are 4 phases that are associated with gaining forensic evidence. They are: – 1 . Acquiring the data 2 . Determining the evidence a few.

Evaluating virtually any evidence identified 4. Presenting the evidence. To get the functions of my personal investigation the truth is all forensic computing inspections, the initial 3 guidelines are paramount as they every rely upon the other person being performed correctly. Even though it must be said if any of the rules aren’t followed appropriately this wouldn’t even acquire as far as the presenting Data rule, while there could be simply no successful criminal prosecution.

Preparation Being aware of this is a retail betting shop, the first decision to be made is the period that we will certainly serve each of our warrant to locate the property. After not much deliberation it truly is decided to carry out the search before beginning time, I had been aware that the manager became available every morning at 8am so meeting him as he opened up is the best policy. The reason for this kind of decision is that with much less staff without customers there would be less potential for anyone to be able to tamper with any systems, data, or any other relevant evidence.

Before it has been known for one member of staff to distract an examiner, while an additional removes essential evidence. As time continued 3 various other members of staff showed up for job, they were every taken besides and asked details of what there job involved, high individual workstation was and any email usernames, passwords or perhaps encryption keys that may be relevant to the case. On Entry About entry it was most important to visually determine anything that could be possible facts. The following items were determined and observed down: – 1 . Pc 2 . Notebook computer 3. Usb stick 4. Digital camera five.

Printer six. Scanner several. Mobile Phones almost 8. Cd’s & Dvd’s being unfaithful. PDA All of these items could be relevant in gaining facts as they every may contain relevant data.

My reasons behind each item were the following: – 1 ) Computer – This is evident that looking for forensic data the computer could hold lots of data. 2 . Notebook – Same reasons while above. 3. Usb Stay – This could also consist of data. 5. Digital Camera – may have images and even files of any info 5. Inkjet printer – Machines have their own memory today so this can contain all-important evidence. six. Scanner – May have been used to scan deceitful documents (if there is virtually any damage or perhaps imperfections for the glass this can show that the particular record was created having its use. six.

Mobile Phones – Mobile phones include own operating system, could contain not only contacts but likewise images, documents, and time logs and many others, lots of relevant data. almost eight. Cd’s & Dvd’s – Another item that could include lots of data. 9. PERSONAL DIGITAL ASSISTANT – This like a cellular phone has its own operating system and could provide to store relevant data, connections, time logs etc . Before any searches in drawers or anything was shifted the whole location was took pictures of, picturing wherever all the above products were specifically in relation to the shop.

This really is done to document the evidence within a visual method, that can be checked out after things have been relocated to unsurface probably more hints, for example When a computer mouse was sitting that you write in the cue section hand side of the desk, perhaps the supervisor is right passed so it could lead to a hint that perhaps a kept handed member of staff uses that desk, that the computer is sitting upon. Photographs had been taken of the computer screen when it was on and got the user brands on it, it was also written about by textual content. The computer sensed quite nice so this may give indications as to whether it was left in overnight or perhaps used just before we had gained entry towards the premises.

Photographs were also taken of all the cables at the back of the computer, so as reconstructing at a later level would be much easier, also the cables were labelled. The desktop computer was then switched off by removing the power in the computer certainly not the wall structure socket. The laptop was your next item to be dealt with, it was turned off so removal of the electric battery was next.

Next a search took place which usually would involve looking in drawers, cabinets etc . The products I was looking for were: – 1 . Virtually any paper operate that may offer some clues to any accounts that may have been used 2 . Memory Greeting cards 3. Mastercard Skimmers four. Address ebooks 5. Visit cards/books 6th. GPS SITTING NAV equipment 7. CCTV footage Many of these items were found lurking in and around the vicinity of the desk where desktop computer was located, aside from the CCTV footage that was located in the DVD recorder subsequent to the kitchen door.

The DVD recorders contained a DVD- rw (DVD re- writable), which was left in place until as well photographed and noted whilst in situ. The rest of the things were consequently photographed and logged first was performed. The reasons to get seizing these items were as follows: – 1 . Paperwork – passwords, contacts etc . installment payments on your Memory Playing cards – Info, Images three or more. Credit card skimmers – Facts in itself or maybe more so if you have data comprised on the magnet strip. four.

Address books – Associates 5. Appointment cards/books – verify proof of suspects location 6. GPS NAVIGATION SAT NAV – Travel around logs, past places went to 7. SECURITY CAMERA – Evidence to say who has been in the premises, and once as the camera could have its own time logs. The manger was then asked a few questions regarding any security passwords or encryption keys he might have been aware about, this was done to try and gain any extra information relating to passwords, security etc, because this could every save time when it comes to the image and increasing access to documents. All the questions and answers were noted down in a methodical manner.

Seizing evidence The decision was performed by myself for taking the equipment, instead of live image at the suspected crime field, as there was clearly no network, wireless or perhaps, I experienced this was the very best decision to make as the imaging could possibly be done under labatory circumstances. Also because there was a large amount of electronic data that would need to be imaged, this could take far too long and would not always be efficient to do this. Although it is viewed best for the raw electronic digital data to be accessed least as possible because of volatile mother nature, this would simply have to be done the once in the lab, once imaged they actual items (pc, laptop) would not need to be handled once again as the would be an exact copy.

Fingerprint scanning service would need to be performed, but this might not happen until most equipment had been imaged, as the chemicals applied can be harmful The notebook computer was proven to have Wireless capability, and wifi so this had to be put in a shielded box, as a way that it could not receive virtually any signals via anywhere else. The mobile phone and PDA had been treated in the same manner. The packing containers were marked and everything noted in order to start the chain of evidence for the items.

Everything that had to be carried out now was to actually tote up all the evidence. This has to be completed and sealed in anti static hand bags, and all created down in a methodical manner. This is done item by item individually because each item was tagged and bagged it had to be logged in a chain of evidence. This kind of took a few months but this job cannot be rushed, because anything skipped could be perilous to a prosecution.

Next was the issue of transportation, this may need to be performed strategically as a way not to harm any feasible data evidence. These will have to be stored away from any kind of magnetic fields, e. g. speakers, radios etc, therefore they were removed with a van that had storage packing containers within to be able the grabbed equipment may not get too warm, chilly, or other things happen to all of them. Evaluating the Evidence This is where the real investigation continues, and where more lumination may be shed on the circumstance concerning electric data found. Encase utilized to image the hard travel of the personal computer and notebook computer, and several other software was used for the acquisition of the other electronic items.

When imaged job would begin on searching labouredly through the data. To end this exploration could take quite a few man-hours, while there is a great deal data to work through. Now is the moment this case can be turned over to the different specialists that I work together with.

Conclusion Unfortunately my work has ended right now in this case?nternet site have finished my task of searching the criminal offenses scene and seizing evidence, after a full week of preparation prior to the actual search, I i am quite happy with the result. I am no clearer about any crimes that were or perhaps may have been dedicated, but hopefully due to personally carrying out the investigation completely I have gave the motivation for a powerful prosecution to look ahead.

Related posts

Save your time and get your research paper!