Digital Forensic Examination of Counterfeit Documents

Introduction

A concerned citizen has contacted the police regarding the selling of counterfeit public documents. He told the police that he was going to the state residents to apply for a driver’s license. When he was almost reaching the office, he was approached by a man who told him he could create registration cards for vehicles at an affordable price to evade tax. Undercover officers met with the suspect, and after providing them with registration cards, he was arrested. A search warrant was obtained, and two computers from his home and a flash drive were seized. The investigator contacted the computer forensic laboratory to examine the evidence. Figure 1 below provides a snapshot of the investigation timeline and plan. Also, a budget in Appendix 1 was created and submitted to the Police Department for review. It was approved, and an investigation of the case began.

Investigation Timeline.
Figure 1: Investigation Timeline.

Interview Protocols

Before starting the interview process, the digital forensic examiner must first ensure that they are provided with the required legal documentation. These comprise verifying consent, search authority, warrant, and subpoena. These documents will help identify what legal level of analysis and the files that the examiner can examine. In this case, a copy of the evidence chain of custody and consent form may suffice, as in the appendix. To further compound the legal extent of the investigations, digital forensic examiners can review the case in regard to possible concerns related to the relevant Federal statutes (the Cable Communications Policy Act (CCPA) and the Electronic Communications Privacy Act of 1986 (ECPA), State statutes, and local laws and policies (United States Department of Justice, 2017). After the forms were reviewed and determined to align with the legal mandate, meetings were scheduled with the victim and case investor.

Case Investigator Meeting Agenda

Date: 5/4/2021.

Time: 11:00 AM – 1:00 PM.

Attendees: Case investigator and digital forensic examiner.

Meeting Objective

To determine the state of the crime scene and how evidence was collected.

Agenda

  • Review the documentation on the state of the crime scene (40 mins)
  • Review the victim’s allegations (40 mins)
  • Discuss possible investigative avenues regarding the type of evidence files sought (40 mins)

The following questions would be asked:

  1. What was the location of the computers? Were they found powered on or off?
  2. How were the computers collected?
  3. What was the location USB thumb drive? What is found plugged in the processor?
  4. How was the USB thumb drive collected?
  5. Were there any copies of public documents retrieved from the crime scene, for instance, driving licenses?

Notes and Decisions

The two computer drives and USB thumb drive were collected and preserved appropriately. The picture of the crime scene is represented in Figure 2.

Overview picture of the crime scene.
Figure 2: Overview picture of the crime scene.
  • There were no gaps in the victim’s statement
  • Digital forensic analysis should focus more on identifying graphic design files

Next Step

Interview the victim to re-evaluate their statement.

Victim Meeting Agenda

Date: 5/7/2021.

Time: 11:00 AM – 12:00 NOON.

Attendees: Victim and digital forensic examiner.

Meeting Objective

To review the victim’s testimony. This would be achieved by creating a comfortable and calm environment for them throughout the interview. I would also try to be emphatic to motivate the victim.

Agenda

  • Victim narration of his encounter with the suspect (40 mins)
  • Determines if there are gaps that need clarification (20 mins)

The following would be asked to the victim;

  1. What type of public document did the suspect offer to create?
  2. What personal data did he claim he needed, that is, fingerprints, and passport photo size?

Notes and Decisions

  • Suspect approached him and offered to create a driving license
  • No gaps were identified

Next Step

Compare the victim’s statement with the information collected by the case investigator.

Proposed keywords: They were created from the available background data and additional information from the suspect and investigator. This list of words will be searched on the computer to look for matches, and they are “vehicle title”, “vehicle registration”, and “car title”.

Tools and Software Needed

This investigation aims to determine whether the suspect used the two computers to commit crimes of forgery and uttering false documents. Therefore, data collection in the context of image files, documents, and applications will prove effective in investigations. This information can be harvested by using tools and software that are specifically designed for this purpose. These include (the United States Department of Justice, 2017):

  • Forensic Tool Kit (FTK). It is used to perform keyword and index searches
  • EnCase. It is a software developed by Guidance and is used by digital forensic experts to triage systems, collect files, decrypt encrypted files, and index information such that it is easily accessible.
  • DIGit. It will then be utilized in carving images from the unallocated space.

Plan for Conducting the Investigation

The primary aim of the analysis is to determine their origin, and where and when data was created, modified, uploaded, downloaded, and the possible connection of files to storage devices, either physical or cloud-based. Generally, four types of analyses will be performed on the computers; ownership and possession, time frame, application and file, and data hiding (Gurjar, 2018).

Imaging

  1. Examination and photography of the hardware
    1. A thorough visual inspection of the physical make-up of the computers will be performed to determine the type.
    2. This will be followed by removing the CPU case and examining the internal circuitry and notating all media, including hard drives, removable media drives and flash memory. Identify them by model, capacity and condition.
    3. A controlled boot disk will be placed in the computer’s floppy drive. The devices will then be powered on and the BIOS setup program inputted. Information from the BIOS will be documented and the time on the computer compared to that from a trusted source, then be noted. The computers’ will be booted from the floppy drive and the boot sequenced verified and recorded.
    4. The computers will then be powered off without making alterations to the BIOS.
  1. Installed programs are scanned to determine if the computers have graphic design applications.
  2. Encase will be employed in creating an evidence file containing an image of the computer’s hard drive.
    1. Through their parallel ports, computers will be linked to the laboratory computer via a null-modem cable.
    2. The computers will then be booted to the DOS prompt using a controlled boot disk and EnCase started in server mode.
    3. The laboratory computer containing a magneto-optical drive for file storage will be booted to the DOS prompt using a controlled boot disk. EnCase will then be started in server mode and potential evidence files from the two computers obtained and written on the magneto-optical disks.
  1. After collecting the required files, the computers will be turned off, and the magneto-optical disks containing evidentiary files write-protected and stored.

Analysis

  1. The laboratory computers will be prepared with Windows 98 and EnCase for Windows, among other forensic software programs.
  2. The evidence files in the magneto-optical disks will be copied into the computer’s hard drive.
  3. Graphic design application file data consisting of file names, physical and logical size, date and times, and the complete path will be recorded.
  4. Keyword text searches will be conducted based on the information collected from the interview. All hits will be reviewed.
  5. The files are scanned for insertions.
  6. Metadata is examined for created files and insertions.
  7. Files deemed to be of evidentiary value will be copied from the EnCase file onto a compact disk.
  8. Encrypted and password-protected files will be copied onto a floppy disk. The FTK will be run on such files to open for viewing.

Conclusion

Digital forensic analysis is essential for the investigation of fraud cases. Using useful tools such as the FTK and AccessData scientists can easily retrieve data that is of vital importance and hold evidentiary value. Nevertheless, before beginning an analysis, it is essential that forms are provided to document the legal extent of the examinations. This helps improve the admissibility of evidence in a court of law.

References

Gurjar, C. (2018). Computer forensics investigation – A case study. Infosec, Web.

Moulin, J. (2015). Digital forensics/incident response forms, policies, and procedures. Web.

United States Department of Justice. (2017). Forensic examination of digital evidence: A guide for law enforcement. Web.

Appendices

Appendix 1: Investigation Budget

Investigation Budget.

Cost
Equipment:
  • Cost of computers
  • Software licensing
  • Hard drive expense and peripherals
$500
$80
$300
Labor:
  • Number of examiners
  • Hourly rate
  • Estimated imaging time per drive or electronic media
  • Report writing time
  • Expert witness testimony time
2
$250
14hr

24hr
3hr

TOTAL $2,418

Appendix 2: Application for Search Warrants

Application for Search Warrants

Appendix 2: Evidence Chain of Custody Form

Your Logo Here Your Address Here
[Agency Name] Case #:
Item # Date/Time Removed Reason for Removal of Evidence Signature
Item # Date/Time Returned Comments Signature

Source: Moulin (2015).

Appendix 3: Hard Drive Evidence Worksheet

Hard Drive Evidence Worksheet
Hard Drive Evidence Worksheet

Appendix 4: Removable Media Worksheet

Removable Media Worksheet

Cite this paper

Select style

Reference

StudyCorgi. (2022, June 21). Digital Forensic Examination of Counterfeit Documents. https://studycorgi.com/digital-forensic-examination-of-counterfeit-documents/

Work Cited

"Digital Forensic Examination of Counterfeit Documents." StudyCorgi, 21 June 2022, studycorgi.com/digital-forensic-examination-of-counterfeit-documents/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Digital Forensic Examination of Counterfeit Documents'. 21 June.

1. StudyCorgi. "Digital Forensic Examination of Counterfeit Documents." June 21, 2022. https://studycorgi.com/digital-forensic-examination-of-counterfeit-documents/.


Bibliography


StudyCorgi. "Digital Forensic Examination of Counterfeit Documents." June 21, 2022. https://studycorgi.com/digital-forensic-examination-of-counterfeit-documents/.

References

StudyCorgi. 2022. "Digital Forensic Examination of Counterfeit Documents." June 21, 2022. https://studycorgi.com/digital-forensic-examination-of-counterfeit-documents/.

This paper, “Digital Forensic Examination of Counterfeit Documents”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.