Monday, September 9, 2019

Digital forensic investigation Essay Example | Topics and Well Written Essays - 5000 words

Digital forensic investigation - Essay Example icated and the information blocked or writer blocked so as to prevent the information on the hard drive from being altered or modified (Kaliski, 2006). Analysis: In this process the information which was found in the hard drive is looked at carefully. The investigators try to piece things together at this stage so that they may come up with the necessary evidence which can be presented in the court (Pereira, 2009). This evidence can be retrieved by using various techniques such as key word searches, whereby things such as the list of the names or account numbers and such like things are searched. This report main task was to look at the involvement of Clyde Barrow in fraud. The investigation also looked at the fact of Clyde Barrow and Bonnie Parker had been communicating. In the investigation we were able to establish that Clyde Barrow was involved in the fraud and that the two suspects had been communicating with each other. It was also established that Clyde Barrow was involved in terrorism activities as well. The evidential facts are as follows: Clyde Barrow was dealing in counterfeit money. This can be proven by the fact that there were images of the counterfeit money in his hard drive. The images upon investigation, were found to be illegal, i.e. they were not legal tender. Clyde Barrow and Bonnie Parker not only knew about each other, they had been communicating via e-mail. In our investigations we were able to establish that the two had in fact sent each other an e-mail. If for instance we had found an e-mail from Bonnie Parker to Clyde Barrow and then Clyde Barrow had not replied it, Clyde Barrow could have stated that he did not know Bonnie Parker. In such a case we would not have had proof of the two individuals having prior knowledge about the others existence. Fortunately for us these two had sent each other e-mails about a certain deal meaning they were business partners in the fraud. This is as shown in the appendices we have put forth. How can we

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.