Preview

Forensic Investigation Of A USB Flash Drive Provided By Practical Gaming Solutions

Good Essays
Open Document
Open Document
974 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Forensic Investigation Of A USB Flash Drive Provided By Practical Gaming Solutions
This report has been generated for the external forensic investigation of a USB Flash drive provided by Practical Gaming Solutions. The USB drive was received in a sealed envelope with profile data and registry content of a former employee, Mr. George Dean. PAGS would like to verify the contents of the USB drive to determine if there is any indication of activities by him which would violate the company’s employment agreement.

After validating the integrity of the image by comparing the MD5 hash, the USB image was processed using the Forensic Tool Kit and WinHex. In the USB drive traces of pornography, narcotics and online gambling was found in carved/deleted data. There were unexpected virtual machines, and uncommon associated software downloads,
…show more content…
The president, James Randell, and HR lead, Mr. Singh, initially provided a recovered USB drive found in a laptop case which was examined and reported thoroughly. Being the ACSO, Mr. Dean had access to a variety of sensitive data in the state gaming commissions. During the briefing, the policies of ethical standards and expectations, were explained and understood, due to the nature of security consulting with in the gaming community. This continuation of the previously submitted forensic report one, is to examine a new piece of evidence. Mr. Singh provided a sealed envelope containing a USB drive created by the IT support technician Mrs. Valentina Reyes. The company standards require that profiles directories and registry files are copied when re-imaging devices. The sealed USB, PAGS03_USB, contained this data in need of …show more content…
Consent to search and monitoring of computers, media, and communications used by the employee in the performance of his or her duties for the company.

3. Immediately before his departure, Mr. Dean was using a company issued laptop in the office as a temporary replacement for his workstation; an empty soft-sided laptop case was found under Mr. Dean’s desk but the company issued laptop was not found in the office.

4. Mr. Dean’s company provided workstation was sent out for repair earlier in the week; the repair ticket listed repeated operating system crashes as the primary symptom. The IT Support Center reported that the workstation had been infected with a “nasty rootkit” which required a complete wipe and reload of the hard disk (operating system and software applications).

5. The IT Support technician, Ms. Valentina Reyes, has already re-imaged the hard drive for Mr. Dean’s workstation. Per company standard practice, she saved a copy of Mr. Dean’s profile (entire directory) and the user registry file. Ms. Reyes copied the user profile from Mr. Dean’s workstation hard drive to a USB which she provided to Mr. Singh at his request. This USB was placed in a sealed envelope by Mr. Singh.

Case Objectives /

You May Also Find These Documents Helpful

  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    : ACC 571 - Strayer. Tags: acc 571, acc 571 strayer, acc 571 strayer tutorials, acc571, assignment 1, Assignment 1: Corporate Fraud Schemes, assignment 2, Assignment 2: Cybercrimes and Computer Security Systems, Assignment 3, Assignment 3: Fraud Schemes and Fraud Investigations, Assignment 4, Assignment 4: Asset Misappropriation and Corporate Governance, Forensic Accounting.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    2. Which item(s) generated by WinAudit would be of critical importance in a computer Forensic investigation?…

    • 664 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    I believe what this is saying is that companies will have the right to monitor their employees as long as they have just cause to suspect the employee is not abiding by the company policy on private internet and phone call usage.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Random Shi

    • 592 Words
    • 3 Pages

    You are a desktop technician for Contoso, Ltd., working at the Windows 7 help desk. When a user calls or emails you with a computer problem, it is your job to travel to that user’s workstation and resolve it. To account for your time and to build up a company troubleshooting database, you must document each of your calls as well as the troubleshooting process for each computer on which you work.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    week 8 IT

    • 943 Words
    • 7 Pages

    Appendix C Collaborative Troubleshooting Operating Systems Paper Work collaboratively with another student in your class. You will both read the following scenarios, and discuss how each of you would handle the problems. Be aware that sometimes, there is more than one right answer when troubleshooting an operating system. You will individually prepare a 1,400- to 1,750-word paper that addresses each scenario. The paper may contain additional diagrams and pictures if they help support your arguments. In the paper, consider troubleshooting theory, methods of troubleshooting diagnosis, utilization of Help files, Internet research, and your experiences. All references, citations, and quotations must be documented in APA format, and a full reference list must be included. Scenarios Scenario 1 You have begun a new technical support role in the IT department of a major manufacturing organization. Your first support call is from a client who is using Windows 7 and has encountered stability problems. Discuss the process you would undertake to identify his or her problem and the operating system tools you would use to do so. Scenario 2 Your next call is from a user whose Windows 7 machine will not boot. Outline the steps you would complete to identify the source of the users problem and list the tools provided in Windows 7 that might be useful in your analysis. Scenario 3 The organization has clearly not adopted an operating system standard as a result, numerous products and versions are in use throughout the company. Consider the operating systems, and discuss which of these you would recommend and why. Which of them would you recommend replacing if they were in use in your organization Appendix C IT/286 Version 3 PAGE MERGEFORMAT 1 Y, dXiJ(x( I_TS 1EZBmU/xYy5g/GMGeD3Vqq8K)fw9…

    • 943 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Workstation domain consist of workstations (any electronic device that a user can connect to the companies IT infrastructure) to gain access to personal data using multiple resources4. The areas affected by workstations, consist of: Unauthorized access because an employee did not lock their workstation, did not log off, or their user ID and password were compromised; A virus, malicious code or malware infected the workstation from a user downloading non-business material from the internet; and a user violated the Acceptable User…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Scientific Working Groups

    • 984 Words
    • 4 Pages

    Scientific Working Group on Digital Evidence (SWGDE) “brings together organizations actively engaged in the field of digital and multimedia evidence to foster communication and cooperation as well as to ensure quality and consistency within the forensic community.” The SWGDE works to bring together associations that are actively focused on the field of digital and multimedia evidence to bring communication and collaboration as well as…

    • 984 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Darrow, J, Mary, JD, Pope, Matt, CPP, & Avery, Tom. (2006). Technology Crimes & Forensics. San Clemente, CA. Law Tech Custom Publishing.…

    • 1644 Words
    • 7 Pages
    Better Essays