• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Betting Shop computer investigation

Extracts from this document...

Introduction

Date Created Monday 5th May 2008 Ruth Sutton The task given to me for the following essay was: - Assume you have been called in to investigate suspected incidences of computer crime enacted through the computer system at a local betting office. Describe how you would conduct the search and seizure operation. Also explain why you would conduct the operation in the manner you describe. Keywords: - Electronic, Evidence, Investigation, Computers, Seizure, Forensic, Computing Introduction I was recently given the task of Head of Forensic Computing Investigation into Operation Gamble. Operation Gamble had been in place for over 12 weeks, in this time it had become obvious that there was every possibility that some kind of computer crimes were being committed on a everyday basis. This job entails making sure that nothing is overlooked, that everything is done in a methodical manner, everything needs logging in one way or another. There are many things to think about , and many that need acting upon, decisions often need to be made on site at the time of the search. Hopefully this essay will inform the reader of a little knowledge into the world of forensic computing investigation. Also that it will become clear that the successful prosecution of offenders means that the investigation must be done thoroughly from start to finish. ...read more.

Middle

Mobile Phones 8. Cd's & Dvd's 9. PDA All these items could be relevant in gaining evidence as they all may contain relevant data. My reasons for each item were as follows: - 1. Computer - This is obvious that looking for forensic data the desktop computer could hold lots of evidence. 2. Laptop - Same reasons as above. 3. Usb Stick - This could also contain data. 4. Digital Camera - may contain images or even files of any data 5. Printer - Printers have their own memory now so this could contain much needed evidence. 6. Scanner - May have been used to scan fraudulent documents (if there is any damage or imperfections to the glass this could show that a particular document was created with its use. 7. Mobile Phones - Mobile phones have own operating system, could contain not only contacts but also images, files, and time logs etc, lots of relevant data. 8. Cd's & Dvd's - Another item that could contain lots of data. 9. PDA - This like a mobile phone has its own operating system and could be used to store relevant data, contacts, time logs etc. Before any searches in drawers or anything was moved the whole area was photographed, picturing where all the above items were exactly in relation to the shop. ...read more.

Conclusion

Next was the issue of transportation, this would need to be done strategically so as not to damage any possible data evidence. These would have to be kept away from any magnetic fields, e.g. speakers, radios etc, so they were removed with a van that had storage boxes within so as the seized equipment would not get too warm, cold, or anything else happen to them. Evaluating the Evidence This is where the real investigation continues, and where more light may be shed on the situation concerning electronic data found. Encase was used to image the hard drive of the desktop computer and laptop, and various other software was used for the acquisition of the other electronic items. Once imaged work would begin on searching labouredly through the data. To finish this investigation could take quite a few man-hours, as there is so much data to work through. Now is when this case is turned over to the other specialists that I work alongside. Conclusion Alas my work has ended now in this case as I have finished my job of searching the crime scene and seizing the evidence, after a full week of preparation before the actual search, I am quite pleased with the result. I am no clearer about any crimes that were or may have been committed, but hopefully due to myself carrying out the investigation thoroughly I have led the way for a successful prosecution to go ahead. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    A ADHOC connection can be categorized as a peer-to-peer network. Computers connected together in an office or a school classroom using wires can also be classed as a peer-to-peer network. These are physical peer-to-peer networks. Network protocols and applications which set-up connections with other user through the use of a internet are called peer-to-peer applications.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    -Zip drive... -to back up the files, so that important work is not lost if the hard disk crashes. Notice that the question does not specify how many devices should be mentioned. However, each device has to be named and justified (2 marks)

  1. 140 Computing A-Level Revision Questions

    List the advantages to the customer and the management of a supermarket using bar codes and POS terminals. 104. Describe, with examples, one, two and zero address systems for machine code instructions. 105. Outline the steps needed to: add two floating point numbers multiply two floating point numbers 106.

  2. overview of GPS

    There is also the ground uplink antenna facility, which provides the means of commanding and controlling the satellites and uploading the navigation messages and other data. There are also 'sub bases' along the line of the equator. Figure 3 - The Control Segment Position determination Figure 3 http://www.go.ednet.ns.ca/~larry/gps/gps_talk.html 1- Satellite's position is determined relative to the Earth.

  1. AQA Computing CPT3 June 08 Peter's Petrol Pumps

    the Number of Litre Loop from the 1st digit to the last Take the digit and change the LCD digit to this digit With the Amount to pay Loop from the 1st digit to the last Take the digit and change the LCD digit to this digit If number of litres ?

  2. Social Issue Essay

    Honda has spent twenty years developing its ASIMO humanoid robot5 (Honda Online) in an effort to make machine mimic man, while the HipNav system was developed to assist the welfare and treatment of man by aiding surgeons in the field of crucial hip replacements through the use of 3D visionary and robotically guided controls6 (Carnegie Mellon University website, 1999).

  1. Free essay

    Setting up and E-Commerce Site

    * Hooks up with the major on-line credit card providers easily - This is very important as the link with major credit cards will not limit the businesses potential custom. The majority of people buying online will be using a major credit card and this will make it easier for them to buy.

  2. AQA Computing CPT3

    displayPetrol Number 0 - 99.99 21.98 This stores the petrol dispensed total for the current transaction for the customers interface displayPetrol2 Number 0 - 99.99 27.39 This is a duplicate of the displayPetrol variable but for the cashier's console dispensedTotal Number 0 - 100,000 84,290 This displays the total of

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work