SL DATA MANAGEMENT
  • Home
  • About
  • RESOURCES

Fraud Investigations - Completeness

1/1/2020

 
Don't get caught short! Consider all sources of digital evidence. 
Picture
It is imperative that evidence is collected and preserved from a pool of suspects who could potentially be involved in the fraud. A corporate employee hierarchy chart can help determine all possible suspects. Consider administrative assistants and/or individuals who reported the fraud, they could be involved. Once you have pinpointed the suspects, collect and preserve data from their desktops, laptops, smartphones and corporate/personal emails in a forensically sound manner.
 
Moreover, cloud storage such as Dropbox, Google and iCloud are potential places where evidence may be found. To identity an individual’s cloud storage provider, check their expense reimbursements or vendor payments. Remember to obtain a release if data will be pulled from personal accounts.
 
Lastly, consider email archive systems if available. It’s a good source to collect and preserve from because archive systems retain all emails even if the user has deleted them from their mailbox.
 
In conclusion, don’t get caught short, consider all sources of digital evidence and be ready to defend your decisions. 
​​
The items above are considered friendly advice. Not all computer fraud investigations are the same. 

Fraud Investigations - Preservation

1/1/2020

 
Be sure to preserve data from all laptops, desktops, smartphones, servers and emails!
Picture
There are a few preservation techniques and tools I use to make sure the IT portion of the project is done right. Check out my recommendations below.
 
Corporate Emails - They are usually stored in an Outlook Exchange email server controlled by the entity or in Office 365 on the cloud controlled by the entity’s IT provider. Prior to email preservation, e-Discovery hold feature should be enabled for the individual(s) whose emails are being preserved to avoid accidental or purposeful spoliation. There is a process within Office 365 which allows you to export emails to a PST file through the Security & Compliance section under the Administration Center menu. This is the most forensically sound way to acquire emails from Office 365.
 
Internet Emails - In regards to email preservation from popular internet email providers such as Gmail, Yahoo and AOL, I recommend using “Aid4Mail” – this software exports emails from the subject's web-mail to a PST file. Although it is possible to “POP” emails to a desktop from the Microsoft Outlook application, this process is more labor intensive and not as accurate.
 
Desktops & Laptops - The best way to preserve data from computers is to create forensic image (bit-for-bit copy). If the hard drive is not encrypted, I prefer to use forensic duplicator hardware from Guidance software. If the hard drive is encrypted, the computer first needs to be turned-on/logged-in state in order for data to be preserved. While there are a dozen forensic software tools available in the marketplace, I like using applications from EnCase, AccessData or X-Ways.
 
Servers - To preserve servers, the forensic software above will work well. Given that data capture may take a long time due to large storage capacity of servers, it’s best to start this process on a Friday night (if possible) and let it run over the weekend. Make sure all users are off-line prior to starting this process because if there are files that are active, they will not be preserved. 
 
Smartphones - If a smartphone is involved in fraud investigation, the best mobile forensic tool to perform forensic data capture is called UFED Ultimate from Cellebrite.
 
There are many effective forensic tools available in the marketplace to preserve data in a forensically sound manner. The key is to ensure the data collection process, tools and documentation is defendable in court.

The items above are considered friendly advice. Not all computer fraud investigations are the same.

Fraud Investigations - Timeliness

1/1/2020

 

Do you suspect fraud?  What you should know to take immediate action.

Picture
The bulk of fraud investigations require careful consideration of three important technical steps. In this write-up, I will highlight the importance of timeliness, followed by information on completeness and preservation techniques in my next articles.

Here are my top three reasons for immediate action if you suspect fraud in order to reduce the risk of spoliation.
​
  1. If your company’s email system is Outlook, deleted emails by default will only remain in the Exchange database for 15 days. After 15 days, they will be unretrievable.
  2. Other web mail providers such as Gmail, iCloud, Hotmail, Yahoo, AOL, etc. vary in their restoration process and likelihood of retrieval.
  3. While the popularity of Solid State Drives (SSDs) are due to their recent affordability and robust capabilities, the downside is that data is seldom recoverable due to the “trim” command, which immediately wipes the storage space being erased.

In conclusion, the longer you wait, the higher the risk of data loss.

The items above are considered friendly advice. Not all computer fraud investigations are the same.​
  • Home
  • About
  • RESOURCES