.

Wednesday, May 1, 2019

Digital forensic investigation Essay Example | Topics and Well Written Essays - 5000 words

Digital forensic investigation - Essay Exampleicated and the information impede or writer blocked so as to prevent the information on the hard take away from being altered or modified (Kaliski, 2006).Analysis In this process the information which was found in the hard drive is looked at carefully. The investigators try to piece things together at this stage so that they whitethorn come up with the necessary evidence which freighter be presented in the court (Pereira, 2009). This evidence can be retrieved by using various techniques such as key word searches, whereby things such as the list of the names or account numbers and such like things are searched.This report important task was to look at the involvement of Clyde Barrow in caper. The investigation also looked at the position of Clyde Barrow and Bonnie Parker had been communicating. In the investigation we were satisfactory to establish that Clyde Barrow was involved in the fraud and that the twain suspects had been com municating with each other. It was also established that Clyde Barrow was involved in terrorism activities as well. The evidential facts are as followsClyde Barrow was dealing in counterfeit money. This can be proved by the fact that there were images of the counterfeit money in his hard drive. The images upon investigation, were found to be illegal, i.e. they were non legal tender.Clyde Barrow and Bonnie Parker non only knew round each other, they had been communicating via electronic mail. In our investigations we were able to establish that the two had in fact sent each other an e-mail. If for instance we had found an e-mail from Bonnie Parker to Clyde Barrow and then Clyde Barrow had not replied it, Clyde Barrow could have stated that he did not know Bonnie Parker. In such a case we would not have had proof of the two individuals having prior knowledge about the others existence. Fortunately for us these two had sent each other e-mails about a certain deal meaning they were business partners in the fraud. This is as shown in the appendices we have gear up forth. How can we

No comments:

Post a Comment