Steps For An Effective Investigation Process For IT Fraud At Needful Things Ltd.

Advising the CEO to keep the workstation on

1.A.In the phone call from the CEO, the initial details of the problem have been learnt. However, without viewing the evidences, suitable actions cannot be taken. Hence, the initial advices for the CEO should be as follows.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Keep the Workstation On – The first advice to be given to the CEO will be to keep the workstation on unless someone from the forensics department visits the office and seizes the machine (Gilani, Kozak and Innes 2016). This is mainly because the workstation may have a password set and if it is switched off, it will require additional effort to reopen the workstation by breaking the pass code.

Seal the Office Room – The next advice will be to keep the office room sealed with nobody inside. This is a precautionary measure considering the fact that there may be an insider who is actually working for Mortimer Smith. This person may try to access the workstation and delete all the relevant evidences that the present in the computer.

Keep All Evidences As They Are – The CEO also should ensure the evidences including the flash drive, CDs and others are kept as they are before handing over to the forensic personnel (Prayudi and Sn 2015). The CEO should also ensure nobody takes away the evidences or even come near the workstation for that matter.

No Leave for Employees before Experts Arrive – Another major step that the CEO needs to take is to not allow any of the employees to leave the office premises or even use communication devices to contact anyone except family before the forensic experts arrive at the scene. This is required in order to ensure the employees are not able to communicate with Mortimer Smith before official investigation starts and leak out important information (Lillis et al. 2016). With the slightest of hints of information, Mortimer Smith may escape and travel to another country or place before the investigation is officially opened.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

All these advices will be given to Mr. Sanchez so that all the evidences of the case can be taken and a suitable chain of custody can be prepared before the actual investigation starts. Furthermore, as a part of the investigation, all the employees of the company will be interviewed so that suitable information may be extracted that will help the case and prepare a suitable charge against Mortimer Smith. 

B.In the meeting, a detailed interview will be taken of the CEO, HR and a member of the IT department. The following questions will be asked to each of them.

Sealing the office room

CEO

  • When did Mortimer Smith join the company?
  • How was he as an employee?
  • What were his duties as an employee?
  • Have you ever noticed any suspicious activity from him?
  • When did you come to know that he wants to resign?
  • What did he say when he submitted his resignation letter?
  • Anything you want to say that may be valuable in this investigation?

HR

  • How often do you recruit your employees?
  • What method do you follow during the recruitment process?
  • How to you test the skills of the job applicant?
  • How did Mortimer Smith perform during the interview?
  • Did he say anything about future planning during the interview or anytime later?
  • How to do you monitor the employees during work?
  • Do you penalize the employees who fail to abide by the company’s policies?
  • Anything else you want to say that may help the investigation?

IT Department Member

  • What is your network configuration that you use in the company?
  • How many systems are connected to the server during working hours?
  • Are there any restrictions of visiting websites while working?
  • Do you have any firewalls to block access to some specific websites from the office workstation?
  • Do you have any online monitoring system to check the websites accessed by the employees from their workstations?
  • Did you ever monitor Mortimer Smith’s activities in his workstation?
  • Anything else you want to say that may help the investigation?

These are the main questions that will be asked to the three persons but some other questions will also be asked in order to ensure each and every bit of information is gathered regarding the case. All these data and information will add up to development of a suitable case with evidences and eye witnesses (Van Baar, Van Beek and van Eijk 2014). In addition to these three personnel, other employees and stakeholders of the company will also be interviewed for any piece of information that might be useful in the case. Without sufficient evidence, motive and eye witnesses (if possible), the case against Mortimer Smith cannot be arranged that can be presented in the court for continuing the charge of Needful Things Ltd. However, there may be several issues arising during this interview meeting. These are as follows. 

No Cooperation – Although Ricardo Sanchez is willing to build up a case against Mortimer Smith for trying to defame and reduce the business of the company, other board members may not be willing to proceed further in the case against Smith due to a large number of reasons. One reason may be the company is not willing to spend significant amount of funds for suing only one individual while another reason maybe the company is not willing to make internal affairs public (Dang-Nguyen et al. 2015). Whatever be the reason, some of the board members may not cooperate during the interview session and provide fake information regarding the case. This can be a serious problem as it will be very hard to extract necessary data and will need strong convincing to finally open them up.

Spy – As previously discussed, there might be a spy or a person inside the organization who is actually working for Mortimer Smith and leaks internal information to him. If the interview is called with the knowledge of all other employees, such persons may leak the information to Smith and he will get careful and may escape before a case with solid evidence can be set up.

Wrong Person – There can be another serious issue regarding this case. Although it is apparently clear that Mortimer Smith violated the company’s policies and used the CEO’s faith and trust on him for his own personal benefit. However, another possible explanation is that Mortimer Smith is not the wrongdoer at all. Each and every evidence found may be set up by Ricardo Sanchez himself or one of his employees in order to take revenge on Smith for leaving the organization (Agarwal and Kothari 2015). This possibility arises because in most of the cases related to crime, the wrongdoer generally tries to hide all the evidences after committing the crime whereas in this case, all the circumstantial evidences are left open (including the workstation) after Mortimer Smith left the organization, which is a bit unusual for an efficient employee as Smith. This issue will require detailed investigation and it can be done using the interview process as nobody will admit that Mortimer Smith has been set up and he is not the wrongdoer.

Preserving the evidentiary items

C.After the phone and the desktop are presented, they will be carefully handled as preservation of fingerprints will be required for the purpose of the investigation. Investigation will be stated on the spot for gathering sufficient evident that may lead to the conclusion of the case. The evidences will be sent to the forensic lab for the following tests.

Fingerprint – As discussed previously, there are two possible explanations to the case. Hence, finding the fingerprints on the devices is necessary that may lead to a strong trail in the project. However, it is unlikely that if the board members and Sanchez are trying to set up Smith, there will be any relevant fingerprints on the devices as they will remove any prints before setting Smith up (Bartol and Bartol 2018). Hence, to analyze the possibility in this investigation, extraction of fingerprints will be necessary.

Contents of Phone – The phone will be sent to the IT forensics for checking its contents by unlocking it by breaking its password. However, the problem is that the phone is not provided by the company and should be Mortimer Smith’s personal property. The phone can only be analyzed for checking its calls and other important files or messages that may lead to the charge against Smith. Another possible charge that can be brought against Smith is that he misused the company’s resources (bill payments for the mobile phone usage) to make his personal work as well as trying the damage the company’s business while working in it.

Contents of the Workstation – This is by far the biggest evidence that can be used to prepare the case against Smith. The suspicious contents found in the workstation of Smith are password protected and hence, the forensic department will need to break through the passwords and then check the contents of the files. If the files really have the contents that Sanchez thinks, then it will be significant evidence to set up the case against Mortimer Smith. However, some other subtle details need to be checked before the case is set up against Smith (Thethi and Keane 2014). These details include the properties of the files (date created, author and source of the file). These details can entirely turn the case in a different direction and Smith may be proved to be not guilty. It is a possibility that the files have been created elsewhere and transferred to Smith’s system in order to set him up. Hence, checking the source and contents of the files are all necessary.

Interviewing personnel

Other Evidences – Other evidences for the case includes the USB memory key and the CDs that also have some suspicious files. These will also be checked for the contents in order to set up the case against Smith. In addition to the material evidences, the interview results will be used to prepare the entire case before prosecuting Smith. 

The chain of custody is prepared as follows.

EVIDENCE CHAIN OF CUSTODY TRACKING FORM

Case Number: 2565 Offense: IT Fraud

Submitting Officer: (Name/ID#) PLEASE FILL

Victim: Needful Things Ltd.

Suspect: Mortimer Smith, Ex-Employee

Date/Time Seized: 15/02/2018       Location of Seizure: Needful Things Ltd. Office

Description of Evidence

Item #

Quantity

Description of Item (Model, Serial #, Condition, Marks, Scratches) 

1

1

Mobile Phone used by Mortimer Smith, Samsung GY5 Pro, Vodafone connection, working condition, no marks or scratches on the surface, contents locked by password.

2

1

Kingston 16 GB USB memory key, working condition, few small scratches on the surface, contains suspicious excel files, CLIENTS2017.xls

3

5

Compact Discs, working as of now, no scratch marks, some documents to be investigated, contents locked by password.

4

1

Desktop workstation, 5 years old, owned by organization, no damage or scratch marks, working condition, contains numerous password-protected files, possible evidence against Mortimer Smith

5

Mails for Mortimer Smith’s inbox

All evidences left open, suspect did not hide any evidence, workstation and email id logged in even after suspect left the organization

Chain of Custody

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

1

15/2/2018

Ricardo Sanchez

PLEASE FILL

Needful Things Ltd.

2

15/2/2018

Ricardo Sanchez

PLEASE FILL

Needful Things Ltd.

3

15/2/2018

Ricardo Sanchez

PLEASE FILL

Needful Things Ltd.

4

15/2/2018

Ricardo Sanchez

PLEASE FILL

Needful Things Ltd.

Evidence Chain-Of-Custody Tracking Form

Chain of Custody

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

1

15/2/2018

PLEASE FILL

Forensic Department

Needful Things Ltd.

2

15/2/2018

PLEASE FILL

Forensic Department

Needful Things Ltd.

3

15/2/2018

PLEASE FILL

Forensic Department

Needful Things Ltd.

4

15/2/2018

PLEASE FILL

Forensic Department

Needful Things Ltd.

Final Disposal Authority

Authorization for Disposal

Item(s) #: __________ on this document pertaining to (suspect): ____________________________________________
is(are) no longer needed as evidence and is/are authorized for disposal by (check appropriate disposal method)
? Return to Owner          ? Auction/Destroy/Divert
Name & ID# of Authorizing Officer: ____________________________ Signature: ______________________Date: _______________

Witness to Destruction of Evidence

Item(s) #: __________ on this document were destroyed by Evidence Custodian ___________________________ID#:______
in my presence on (date) __________________________.

Name & ID# of Witness to destruction: ________________________ Signature: ______________________Date: _______________

Release to Lawful Owner

Item(s) #: __2, 3, 4  ________ on this document was/were released by Evidence Custodian ________________________ID#:_________ to
Name _________Ricardo Sanchez____________________________________________________________________
Address: ________Needful Things Ltd.________________________________________ City: ____________________State: _______ Zip Code: __________
Telephone Number: (_____) ___________________________________
Under penalty of law, I certify that I am the lawful owner of the above item(s).

Signature: ______________Ricardo Sanchez_________________________________________ Date: ________15/2/2018______

Copy of Government-issued photo identification is attached. ? Yes  ? No

This Evidence Chain-of-Custody form is to be retained as a permanent record by the Police Department.

2.Alex Pritchard

Director

Central Bureau of Forensic Investigation

London, UK

<NAME>

Head of IT Forensics

Central Bureau of Forensic Investigation

London, UK

Re: Case No. 2565, IT Fraud Case, Needful Things Ltd., London

Sir,

The Department of IT Forensics, Central Bureau of Forensic Investigation has been able to attend the call made by Mr. Ricardo Sanchez, CEO, Needful Things Ltd., a maintenance services company based in London. Mr. Sanchez has reported a case of IT fraud where an ex-employee of the organization has been found to have misused the IT resources of the organization for personal work as well as steal important confidential and strategic information of the organization that he will possibly use for the development and growth of his own company. Following are the details known till now. 

Background

Needful Things Ltd. is a small business organization that provides maintenance services for industrial batteries. There are 20 staff members and 5 board members including Ricardo Sanchez, the CEO. Mortimer Smith was a trusted and efficient employee of the company who recently resigned from the organization stating the reason that wants to open and run his own company. Within few days of Smith’s leave, another employee, Avon Burman also resigned from his post. Mr. Sanchez has reported that both of these two employees are now directors of a new company that provides the same services as Needful Things Ltd. After both of them left, Mr. Sanchez found certain evidences in Mortimer Smith’s desk that lead to a possible conclusion that Smith planned his resignation from a long time ago and only used the organization’s IT resources in order to set up his own company and he also used and stole confidential information of the organization (like client data) for benefitting the growth of his own company.

Potential issues during the interview

The Evidences

Several evidences have been found on site including a mobile phone used by Mortimer Smith, the workstation used by Smith, a flash USB drive and 5 CDs. The workstation, USB drive and the discs contain several password protected files that may contain very important information regarding the case and that can be enough to frame Mr. Smith guilty. The flash drive contains an excel file named CLIENTS2017.xls, which is password protected. Mr. Sanchez suspects that this file contains the list of all existing clients of the company and Mr. Smith will try to use this list to get customers in his company that will result in loss of customer base of Needful Things. All the evidences found at the desk of Mortimer Smith have been collected and sent to forensic lab for further analysis and extraction of information. Some data and information have also been collected from the interview with the CEO, HR and an IT member and noted down for further investigation.

There is one lack of continuity in the evidences gathered. Mr. Sanchez told that he found the workstation of Mr. Smith in open mode with the email id logged in. However, generally it is seen that the criminal tries to hide evidences as much as he can before leaving the scene. Here, it is seen that the Mr. Smith apparently left the evidences wide open to be viewed by anyone who visits his desk. This is a very unusual behavior from the criminal and it is a possibility that Mr. Smith has been framed by Mr. Sanchez or any other board member of Needful Things. However, further investigation is needed be sure whether any possibility is accurate and true.

The evidences will be sent directly to the forensic lab for analysis including gathering of fingerprints, collection of data from the documents found by breaking the passwords, call history checking, mails sent and received and others. After collection of data, the workstation will be returned to Mr. Sanchez promptly.

Possible Information

There can be various types of information that may be found in the workstation and the flash drive. As Mr. Sanchez reported, the contents of the files can help to prepare a suitable case against Mr. Smith if these documents are found to contain confidential information of the organization. Furthermore, the mailbox of Mr. Smith will be checked to find out whether he had sent the organization’s confidential information to some other sources or entities. Also, the source of the documents, creation date, author and other minor details can also lead the case to be framed against someone else inside the organization who might have tried to frame Mr. Smith

Forensic handling of the evidence

Suspects and Motives

Mr. Mortimer Smith – Mortimer Smith has a strong motive to have committed this particular fraud crime. He can use the company’s confidential information, client list and other statistics for the development of his own organization and also hurting the reputation and business of the organization. So far, the available evident are all against Mr. Smith.

Mr. Ricardo Sanchez – Mr. Sanchez may be lying all the time and trying to frame and defame Mr. Smith who is rivaling Mr. Sanchez’s company. The way the evidences are left wide open and the workstation and mail id are logged in even after Mr. Smith left, it is possible that Mr. Sanchez or one of his delegates has inserted the files in the system and kept it logged in so that it becomes apparent that Mr. Smith has committed the fraud.

Further investigation to follow

Sincerely,

<NAME>

Head of IT Forensics

Central Bureau of Forensic Investigation

London, UK 

References

Ab Rahman, N.H. and Choo, K.K.R., 2015. Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model.

Agarwal, R. and Kothari, S., 2015. Review of digital forensic investigation frameworks. In Information Science and Applications (pp. 561-571). Springer, Berlin, Heidelberg.

Bartol, C.R. and Bartol, A.M., 2018. Introduction to forensic psychology: Research and application. Sage Publications.

Chabot, Y., Bertaux, A., Nicolle, C. and Kechadi, M.T., 2014. A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation, 11, pp.S95-S105.

Damshenas, M., Dehghantanha, A. and Mahmoud, R., 2014. A survey on digital forensics trends. International Journal of Cyber-Security and Digital Forensics, 3(4), pp.209-235.

Dang-Nguyen, D.T., Pasquini, C., Conotter, V. and Boato, G., 2015, March. Raise: A raw images dataset for digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp. 219-224). ACM.

Daryabar, F., Dehghantanha, A. and Choo, K.K.R., 2017. Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences, 49(3), pp.344-357.

Elyas, M., Ahmad, A., Maynard, S.B. and Lonie, A., 2015. Digital forensic readiness: Expert perspectives on a theoretical framework. Computers & Security, 52, pp.70-89.

Evison, M.P. and Bruegge, R.W.V. eds., 2016. Computer-aided forensic facial comparison. CRC Press.

Gilani, H.R., Kozak, R.A. and Innes, J.L., 2016. The state of innovation in the British Columbia value-added wood products sector: the example of chain of custody certification. Canadian Journal of Forest Research, 46(8), pp.1067-1075.

Ho, A.T. and Li, S. eds., 2015. Handbook of digital forensics of multimedia data and devices. John Wiley & Sons.

Karie, N.M. and Venter, H.S., 2015. Taxonomy of challenges for digital forensics. Journal of forensic sciences, 60(4), pp.885-893.

Khan, S., Ahmad, E., Shiraz, M., Gani, A., Wahab, A.W.A. and Bagiwa, M.A., 2014, September. Forensic challenges in mobile cloud computing. In Computer, Communications, and Control Technology (I4CT), 2014 International Conference on(pp. 343-347). IEEE.

Lang, A., Bashir, M., Campbell, R. and DeStefano, L., 2014. Developing a new digital forensics curriculum. Digital Investigation, 11, pp.S76-S84.

Lee, C. and Chung, M., 2015. Digital Forensic Analysis on Window8 Style UI Instant Messenger Applications. In Computer Science and its Applications (pp. 1037-1042). Springer, Berlin, Heidelberg.

Lillis, D., Becker, B., O’Sullivan, T. and Scanlon, M., 2016. Current challenges and future research areas for digital forensic investigation. arXiv preprint arXiv:1604.03850.

Patel, J., Singh, H.P., Paresh, M. and Verma, C., 2018. Forensic odontology in the era of computer and technology. International Journal of Medical and Dental Sciences, 2(1), pp.59-64.

Perumal, S., Norwawi, N.M. and Raman, V., 2015, October. Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 19-23). IEEE.

Prayudi, Y. and Sn, A., 2015. Digital chain of custody: State of the art. International Journal of Computer Applications, 114(5).

Quick, D. and Choo, K.K.R., 2014. Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive.

Shariati, M., Dehghantanha, A., Martini, B. and Choo, K.K.R., 2015. Ubuntu one investigation: detecting evidences on client machines.

Thethi, N. and Keane, A., 2014, February. Digital forensics investigations in the cloud. In Advance Computing Conference (IACC), 2014 IEEE International (pp. 1475-1480). IEEE.

Van Baar, R.B., Van Beek, H.M.A. and van Eijk, E.J., 2014. Digital Forensics as a Service: A game changer. Digital Investigation, 11, pp.S54-S62.

Watson, S. and Dehghantanha, A., 2016. Digital forensics: the missing piece of the Internet of Things promise. Computer Fraud & Security, 2016(6), pp.5-8.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP