SlideShare a Scribd company logo
1 of 10
Digital Forensics Case
Wendell Rush
Justin S. Korber
CSSS 5230
9/30/2014
Digital Forensics Case Study Report
1. Real Case Detail
This is a case of fraud by stealing information of persons
about their credit cards then transfer the amount from credit
cards to victim’s current/ saving accounts and then further
transfer this money to some other county’s bank account and
then enjoy the luxury life style. The main guilty person in this
story is Mr. Onwuhara lives in Dallas (Taxas) was prison for 70
months.
2 Summary of Event
This is a case of fraud by stealing information of persons
about their credit cards then transfer the amount from credit
cards to victim’s current/ saving accounts and then further
transfer this money to some other county’s bank account and
then enjoy the luxury life style. This case is taken from the
official website of FBI USA.
The case is about the person who committed frauds in the line
of credit cards and steals near about 38 million dollars and
caused losses near about 13 million losses. He is now prison for
the period of 70 months. Following is the detail of FBI team
members who worked on this case and trace out the guilty
person, following ishe detail of the team.
1. Dana J. Boente ( Acting USA Attorney district of eastern
Virginia )
2. Valerie Parlave ( Assistant director and incharge FBI field
office)
3. Kathy A. Michalko (Special agent field office USA)
4. Earl L. Cook (Chief Police Officer)
5. Robert Mathieson (USA FBI Marchel officer in Virginia)
6. Claude M. Hilton. (USA district judge)
He has been escaped for near about 4 years and during this
course of time Onwuhara was the American’s most Wanted
person. He was arrested from Australia and then Govt. of
Australia handed over him to the Govt. of America. He has been
legally announced guilty on 21-06-2013. After the assessment
of the evidences and by hearing the victims the district court of
USA announced 70 months prison for him and gives the
immediate implementation orders (Casey, Eoghan, 2004).
As per press release in Texas USA it was published that Mr.
Onwuhara was a ring dealer and have a group of people and
with the help of those people they successfully committed crime
and did not left any kind of proof to be traced out so that the
victim is really unable to find out the guilty person or even the
victims do not have the idea who is the actual person behind
this scene (Warren G. Kruse; Jay G. Heiser, 2002). One of the
victims in Washington D.C has logged complaint regarding
these fraudulent activities which make the FBI department alert
regarding this crime. Than continuous instances were came into
front and day by day number of complaints increased.
Mr. Onwuhara’s pattern of committing crime is very smart and
well planned. First he gathered information by using fee-based
database web search and trace out potential victims or you can
say account holders who have huge amount of balances in their
(HELOC) accounts (Warren G. Kruse; Jay G. Heiser, 2002).
The information he has searched about is account holder’s
name, their address, their DOB and the SS number (Social
Security). When they successfully gathered this information
than they were able to proceed further and convert their plan
into action. This was not the act of only one person that was a
group of people who did this the whole task very smartly
(Casey, Eoghan, 2004).
Once they select a victim and gathered the relevant information
than now they started gathered victim’s other information by
using online database system to obtain information like mother
name or maiden name and then they use this information in
security questions. The next step was to gathered reports of
credit and balances of accounts for the purpose of verify
personal information. By going through this procedure now they
were equipped of all information about the victim they needed
to be successful in their plan (Gunsch, G 2002).
By implementing the plan and progressed further now those
conspirators have called the financial institutions and behaved
like a genuine account holder and gave instructions to the
victim’s financial institution to transfer the maximum money
from HELCO accounts to victim’s daily used accounts (Current
/ Savings). And then from victim’s daily used accounts they
have transferred money to some domestic or to some overseas
accounts (Gunsch, G 2002).
And from those accounts conspirators withdrawal the whole
amount and escaped from scene (Warren G. Kruse; Jay G.
Heiser, 2002). Those criminals used caller ID and services of
spoofing, mobiles with prepaid connections, wireless PC access
cards and they transferred the landline numbers of the victims
to save themselves from tracing by the Police department. Once
they withdrawal the money and transferred it to the desired
place they distribute it according to decided ratios among all
conspirators. Following are names of criminals who have been
found guilty in this fraudulent activity (Warren G. Kruse; Jay
G. Heiser, 2002).
1. “Obinna” Orji (He is the one who lead the team and yet not
founded by the law enforcement departments of district Virginia
(USA) till has been charged in August 2008, then arrested in
DEC 2012 founded guilty and sentenced 72 months prison. Date
was 17 May 2013.
2. “Henry” lived in Florida was punished for 88 months prison
date was 11 Sep 2009.
3.” Abel Nnabue “lived in Dallas was punished for 54 months
on 30 Jan 2009.
4. “Precious Matthews” prison for 51 months on 13 Feb 2009.
5. “Brandy Anderson” lived in Dallas sentenced for 24 months’
probation under supervision and 2 months of confinement under
community on 20 Feb 2009.
6. Ezenwa Onyedebelu also lived in Dallas was punished for 37
months on 27 February 2009.
7.” Ezenwa Onyedebelu” lived in Nigeria was punishes for 42
months date was 6 March 2009.
8. Paula Gipson lived in Dallas was Punished for 15 months
date was 4 September 2009.
This case was investigated by FBI’s situated at US Secret
Service Field Office Washington and the Department of Police
Alexandria. US Marshals Service also provide assistance. That
was really a team effort and continuous focused on target and to
approach conspirators all the team members put their efforts day
by night. This could be possible by the genuine efforts and
coordination of all mentioned above departments.
Contribution of Federal Police department Australia is also
appreciable because they have traced out the conspirator’s
locations who hided in Sydney and helped in evidence recovery.
A copy of this case and relevant details are also available at
http:www.justice.gov/usao/ and you can read the case from
http://www.fbi.gov/news/stories3. How was it detected??
After receiving so many complaints from the poor victims
the FBI has been alerted and started to research the case with
the coordination of different law enforcement departments. First
they check the calls record that have been made by the
conspirators to the victims financial institutions by tracing
those calls they came to know that all the techniques used by
the conspirators are well planned because they did not leave any
kind of proof. They take the IP addresses of the system from
which amounts have been transferred from victim’s account to
conspirator’s accounts (Leigland, R, 2004).
By tracing location of wireless PC connection FBI was
able to access all the record and information used in their
system. Those conspirators also used mobile phones with
prepaid connection. FBI special digital Forensic labs have
successfully recovered all the numbers where phone calls have
been made by these conspirators. Then they recover the data of
their wireless PCs and review mobile calls history. With the
help of this FBI department understand the techniques of their
fraud that how they plan, trap and make a fraud (Gunsch, G
2002).
Forensic digital lab helps the team in tracing out those
accounts where conspirators transfer the money for the purpose
of distribution among them. By tracing the particular bank they
have also traced out all the relevant details of conspirators. This
detail included their names, physical appearance, from where
they were actually belonging and onward detail of their families
(Leigland, R, 2004).
With the help of this detail now police was able to trace
them out more effectively. Now next action was to catch them
and for this they deputed a full team. Some of those have been
caught early and some of those ran away promptly from the
country. One of the members named onwuhara was run away
from USA and ran away to Sydney (Australia) but he also have
been caught with the help of Australian Police department. They
have traced him out and handed over to the USA authorities and
further he sentenced to prison.4. Key pieces of digital evidences
Digital evidences include all those evidences which are
being used by the criminals while committing crimes. Court of
law also accepting those evidences basis on the sensitivity and
intensity of their use. For example Emails, telephonic calls, face
book, any other social media have been used for this,
telecommunications and all such things which have been
observed for the purpose of investigation. From last few years
use of digital evidences has been increased due to excessive use
of them by the criminals. Court of law accepts these evidences
if those are authenticated by the digital forensic lab (Warren G.
Kruse; Jay G. Heiser, 2002).
In the above mentioned case the digital evidences that are
being used are prepaid connection mobile phones, wireless
internet connections and personal wireless PCs of conspirators
(Casey, Eoghan, 2004). And with the help of these digital
evidences FBI came to know all the details about criminals and
caught them accordingly. First they collect raw data from these
digital evidences just like their systems IP’s addresses, their
mobile calls history and all the information available in their
PCs. And with the help of this information they have traced out
their bank accounts and so forth all their relevant details. Those
digital evidences also work as a source of proof against them
because all fraudulent banking transactions details and all fake
calls made by them have been restored by the forensic digital
lab of FBI (Warren G. Kruse; Jay G. Heiser, 2002).5. Volume
Of digital evidences
Crimes relevant to digital forensic are basically its self-
evident for all because retrieve data and collect the relevant
information is too much easy for forensic labs. In this case
volume of digital evidences is vast because multiple sources
have been used. If we particularly talking about the above case
then criminals used multiple digital devices to commit the crime
just like landline numbers, prepaid connection mobile phones,
PCs with wireless connections, fee based websites and online
bank accounts transactions.
Those criminals had taken all the precautions when
planning and implementing this but digital devices are very easy
to traced and easy to recover even deleted data from these
devices. So this could be considered advantage of the day that
now if crimes are increasing by using the modern technology
then the other aspect is that it has also the solution for the every
existing problem.6. Attribution
This Cybercrime is particularly relevant to individuals who
have been victimized and their money have been stolen by
fraudulently gathering their information and then use this
information to transfer their money from HOSL accounts to the
victims checking accounts and then further transfer those funds
into the desired accounts from where it was drawled near about
36 million dollars have been transferred by conspirators
fraudulently and their victims spread over the state (Leigland,
R, 2004).
Although Govt. have played recognized role in tracing them out
and put them behind the bars with the coordination of different
law enforcement departments in the district of Virginia. 7.
Main concepts of the case
By doing detail analysis of this case it is now very easy for me
to discuss its core elements and elaborate it more appropriately.
I have gone through many sites and articles to develop level
best understanding regarding Cybercrimes and role of digital
forensic labs.
In that real case the digital crime was fraudulently
transferred money from the victim’s account in to conspirator’s
account. And to commit this crime the group of all criminals
used digital devices such as PC’s, landline, mobile phones
online banking system etc.
The main target area were those people who has sufficient funds
in their accounts and those who are using loan facility with
HOSL accounts, first they identified those people by using fee
based site and collect information about those people who have
millions of deposit in their account . And have started to collect
information regarding their statement of accounts and credit
card statements (Michael G. Noblett; Mark M. Pollitt; Lawrence
A. Presley, 2000). First they collect raw data from these digital
evidences just like their systems IP’s addresses, their mobile
calls history and all the information available in their PCs. Then
target a particular person and stole all the money that he/she has
in account (Michael G. Noblett; Mark M. Pollitt; Lawrence A.
Presley, 2000). So this could be considered advantage of the
day that now if crimes are increasing by using the modern
technology then the other aspect is that it has also the solution
for the every existing problem.
When victims started to complaint than FBI department have
alert. They firstly take the details from their accounts and
investigate from relevant financial organization. By checking
the details FBI came to know that it’s a cybercrime and certain
group of people doing this from past few years. FDL (Forensic
Digital Lab) play an important role in identifying the ways of
fraud activity and also trace out the conspirators. And have
started to collect information regarding their statement of
accounts and credit card statements. Then target a particular
person and stole all the money that he/she has in account. If we
particularly talking about the above case then criminals used
multiple digital devices to commit the crime just like landline
numbers, prepaid connection mobile phones, PCs with wireless
connections, fee based websites and online bank accounts
transactions (Gunsch, G 2002).
Role of digital evidences never been ignored because those were
the main source of tracing the guilty people. By using the data
that were used by those criminals FBI was able to catch them,
by tracing the mobile calls FBI realized that there were a group
of people involved in that case who successfully made victims
fool, stole their money and ran away. Suppose if no digital
evidences were available than that’s nearly impossible for the
Police department to catch them and put all of them behind the
bars. And with the help of these digital evidences FBI came to
know all the details about criminals and caught them
accordingly (Michael G. Noblett; Mark M. Pollitt; Lawrence A.
Presley, 2000).
Forensic analysis was conducted to collect proper evidences
that can be helpful and useful in the investigation of this event.
USA Forensic lab is equipped with all modern technology that
is demanded now days. So with the help of other law
enforcement departments first they structured the case made
line of action and then implemented all the techniques that have
been required to sole this matter. This group was created trouble
for almost all the state, different complaints have been logged
on weekly basis but nobody knows who is actually involved
behind this illegal activity (Warren G. Kruse; Jay G. Heiser,
2002).
By analyzing digital data FBI have found success and all the
criminals sentenced to prison, in district court of law all digital
evidences were presented on the basis of those evidences court
make decision about their crucial crime. So in this case’s
importance of digital evidences are self-evident nobody can
ignore their importance in the modern era (Warren G. Kruse;
Jay G. Heiser, 2002). So we can say that fast
telecommunication, internet, social sites and cell phones make
easier for criminals to influence the people life badly but on the
other side of picture it’s also a very helping tool to trace the
garbage of society and put them all at their place.
References
· Michael G. Noblett; Mark M. Pollitt; Lawrence A. Presley,
(2000). "Recovering and examining computer forensic
evidence". Retrieved September 17, 2014
· Leigland, R, (2004). "A Formalization of Digital Forensics".
· A Yasinsac; RF Erbacher, DG Marks, MM Pollitt (2003).
"Computer forensics education". IEEE Security & Privacy.
CiteSeerX: 10.1.1.1.9510.
· Warren G. Kruse; Jay G. Heiser, (2002). Computer forensics:
incident response essentials. Addison-Wesley. p. 392. ISBN0-
201-70719-5. Retrieved September 17, 2014
· Gunsch, G (2002). "An Examination of Digital Forensic
Models".
· Adams, R. (2012). "'The Advanced Data Acquisition Model
(ADAM): A process model for digital forensic practice".
· Casey, Eoghan, (2004). Digital Evidence and Computer Crime,
Second Edition. Elsevier. ISBN0-12-163104-4.

More Related Content

Similar to Digital Forensics Case Wendell RushJustin S. Korbe.docx

Psychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementPsychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementDoug Aaron
 
Concerned citizens for legalization of marijuana copy - copy
Concerned citizens for legalization of marijuana   copy - copyConcerned citizens for legalization of marijuana   copy - copy
Concerned citizens for legalization of marijuana copy - copyWeedlyNews
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Thermo Fisher Scientific
 
Excerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law ReviewExcerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law Reviewmdespardmoore
 
Note du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainNote du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainLaLibre
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docxdrennanmicah
 
Executing The Innocent 1
Executing The Innocent 1Executing The Innocent 1
Executing The Innocent 1guest11b6ef
 
052311 doj (conspiracy to kidnap)
052311   doj (conspiracy to kidnap)052311   doj (conspiracy to kidnap)
052311 doj (conspiracy to kidnap)VogelDenise
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docxteresehearn
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
 

Similar to Digital Forensics Case Wendell RushJustin S. Korbe.docx (10)

Psychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementPsychological Issues Within Law Enforcement
Psychological Issues Within Law Enforcement
 
Concerned citizens for legalization of marijuana copy - copy
Concerned citizens for legalization of marijuana   copy - copyConcerned citizens for legalization of marijuana   copy - copy
Concerned citizens for legalization of marijuana copy - copy
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014
 
Excerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law ReviewExcerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law Review
 
Note du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainNote du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américain
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
Executing The Innocent 1
Executing The Innocent 1Executing The Innocent 1
Executing The Innocent 1
 
052311 doj (conspiracy to kidnap)
052311   doj (conspiracy to kidnap)052311   doj (conspiracy to kidnap)
052311 doj (conspiracy to kidnap)
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 

More from duketjoy27252

Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxDiscussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxduketjoy27252
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxDiscussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxduketjoy27252
 
Discussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxDiscussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxduketjoy27252
 
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxDiscussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxduketjoy27252
 
Discussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxDiscussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxduketjoy27252
 
Discussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxDiscussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxduketjoy27252
 
Discussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxDiscussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxduketjoy27252
 
Discussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxDiscussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxduketjoy27252
 
Discussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxDiscussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxduketjoy27252
 
Discussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxDiscussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxduketjoy27252
 
Discussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxDiscussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxduketjoy27252
 
Discussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxDiscussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxduketjoy27252
 
Discussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxDiscussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxduketjoy27252
 
Discussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxDiscussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxduketjoy27252
 
Discussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxDiscussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxduketjoy27252
 
Discussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxDiscussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxduketjoy27252
 
Discussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxDiscussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxduketjoy27252
 
Discussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxDiscussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxduketjoy27252
 
Discussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxDiscussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxduketjoy27252
 

More from duketjoy27252 (20)

Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxDiscussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxDiscussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
 
Discussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxDiscussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docx
 
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxDiscussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
 
Discussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxDiscussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docx
 
Discussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxDiscussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docx
 
Discussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxDiscussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docx
 
Discussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxDiscussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docx
 
Discussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxDiscussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docx
 
Discussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxDiscussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docx
 
Discussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxDiscussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docx
 
Discussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxDiscussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docx
 
Discussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxDiscussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docx
 
Discussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxDiscussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docx
 
Discussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxDiscussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docx
 
Discussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxDiscussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docx
 
Discussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxDiscussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docx
 
Discussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxDiscussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docx
 
Discussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxDiscussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Digital Forensics Case Wendell RushJustin S. Korbe.docx

  • 1. Digital Forensics Case Wendell Rush Justin S. Korber CSSS 5230 9/30/2014 Digital Forensics Case Study Report 1. Real Case Detail This is a case of fraud by stealing information of persons about their credit cards then transfer the amount from credit cards to victim’s current/ saving accounts and then further transfer this money to some other county’s bank account and then enjoy the luxury life style. The main guilty person in this story is Mr. Onwuhara lives in Dallas (Taxas) was prison for 70 months. 2 Summary of Event This is a case of fraud by stealing information of persons about their credit cards then transfer the amount from credit cards to victim’s current/ saving accounts and then further transfer this money to some other county’s bank account and then enjoy the luxury life style. This case is taken from the official website of FBI USA. The case is about the person who committed frauds in the line of credit cards and steals near about 38 million dollars and
  • 2. caused losses near about 13 million losses. He is now prison for the period of 70 months. Following is the detail of FBI team members who worked on this case and trace out the guilty person, following ishe detail of the team. 1. Dana J. Boente ( Acting USA Attorney district of eastern Virginia ) 2. Valerie Parlave ( Assistant director and incharge FBI field office) 3. Kathy A. Michalko (Special agent field office USA) 4. Earl L. Cook (Chief Police Officer) 5. Robert Mathieson (USA FBI Marchel officer in Virginia) 6. Claude M. Hilton. (USA district judge) He has been escaped for near about 4 years and during this course of time Onwuhara was the American’s most Wanted person. He was arrested from Australia and then Govt. of Australia handed over him to the Govt. of America. He has been legally announced guilty on 21-06-2013. After the assessment of the evidences and by hearing the victims the district court of USA announced 70 months prison for him and gives the immediate implementation orders (Casey, Eoghan, 2004). As per press release in Texas USA it was published that Mr. Onwuhara was a ring dealer and have a group of people and with the help of those people they successfully committed crime and did not left any kind of proof to be traced out so that the victim is really unable to find out the guilty person or even the victims do not have the idea who is the actual person behind this scene (Warren G. Kruse; Jay G. Heiser, 2002). One of the victims in Washington D.C has logged complaint regarding these fraudulent activities which make the FBI department alert regarding this crime. Than continuous instances were came into front and day by day number of complaints increased. Mr. Onwuhara’s pattern of committing crime is very smart and well planned. First he gathered information by using fee-based database web search and trace out potential victims or you can say account holders who have huge amount of balances in their (HELOC) accounts (Warren G. Kruse; Jay G. Heiser, 2002).
  • 3. The information he has searched about is account holder’s name, their address, their DOB and the SS number (Social Security). When they successfully gathered this information than they were able to proceed further and convert their plan into action. This was not the act of only one person that was a group of people who did this the whole task very smartly (Casey, Eoghan, 2004). Once they select a victim and gathered the relevant information than now they started gathered victim’s other information by using online database system to obtain information like mother name or maiden name and then they use this information in security questions. The next step was to gathered reports of credit and balances of accounts for the purpose of verify personal information. By going through this procedure now they were equipped of all information about the victim they needed to be successful in their plan (Gunsch, G 2002). By implementing the plan and progressed further now those conspirators have called the financial institutions and behaved like a genuine account holder and gave instructions to the victim’s financial institution to transfer the maximum money from HELCO accounts to victim’s daily used accounts (Current / Savings). And then from victim’s daily used accounts they have transferred money to some domestic or to some overseas accounts (Gunsch, G 2002). And from those accounts conspirators withdrawal the whole amount and escaped from scene (Warren G. Kruse; Jay G. Heiser, 2002). Those criminals used caller ID and services of spoofing, mobiles with prepaid connections, wireless PC access cards and they transferred the landline numbers of the victims to save themselves from tracing by the Police department. Once they withdrawal the money and transferred it to the desired place they distribute it according to decided ratios among all conspirators. Following are names of criminals who have been found guilty in this fraudulent activity (Warren G. Kruse; Jay G. Heiser, 2002). 1. “Obinna” Orji (He is the one who lead the team and yet not
  • 4. founded by the law enforcement departments of district Virginia (USA) till has been charged in August 2008, then arrested in DEC 2012 founded guilty and sentenced 72 months prison. Date was 17 May 2013. 2. “Henry” lived in Florida was punished for 88 months prison date was 11 Sep 2009. 3.” Abel Nnabue “lived in Dallas was punished for 54 months on 30 Jan 2009. 4. “Precious Matthews” prison for 51 months on 13 Feb 2009. 5. “Brandy Anderson” lived in Dallas sentenced for 24 months’ probation under supervision and 2 months of confinement under community on 20 Feb 2009. 6. Ezenwa Onyedebelu also lived in Dallas was punished for 37 months on 27 February 2009. 7.” Ezenwa Onyedebelu” lived in Nigeria was punishes for 42 months date was 6 March 2009. 8. Paula Gipson lived in Dallas was Punished for 15 months date was 4 September 2009. This case was investigated by FBI’s situated at US Secret Service Field Office Washington and the Department of Police Alexandria. US Marshals Service also provide assistance. That was really a team effort and continuous focused on target and to approach conspirators all the team members put their efforts day by night. This could be possible by the genuine efforts and coordination of all mentioned above departments. Contribution of Federal Police department Australia is also appreciable because they have traced out the conspirator’s locations who hided in Sydney and helped in evidence recovery. A copy of this case and relevant details are also available at http:www.justice.gov/usao/ and you can read the case from http://www.fbi.gov/news/stories3. How was it detected?? After receiving so many complaints from the poor victims the FBI has been alerted and started to research the case with the coordination of different law enforcement departments. First they check the calls record that have been made by the conspirators to the victims financial institutions by tracing
  • 5. those calls they came to know that all the techniques used by the conspirators are well planned because they did not leave any kind of proof. They take the IP addresses of the system from which amounts have been transferred from victim’s account to conspirator’s accounts (Leigland, R, 2004). By tracing location of wireless PC connection FBI was able to access all the record and information used in their system. Those conspirators also used mobile phones with prepaid connection. FBI special digital Forensic labs have successfully recovered all the numbers where phone calls have been made by these conspirators. Then they recover the data of their wireless PCs and review mobile calls history. With the help of this FBI department understand the techniques of their fraud that how they plan, trap and make a fraud (Gunsch, G 2002). Forensic digital lab helps the team in tracing out those accounts where conspirators transfer the money for the purpose of distribution among them. By tracing the particular bank they have also traced out all the relevant details of conspirators. This detail included their names, physical appearance, from where they were actually belonging and onward detail of their families (Leigland, R, 2004). With the help of this detail now police was able to trace them out more effectively. Now next action was to catch them and for this they deputed a full team. Some of those have been caught early and some of those ran away promptly from the country. One of the members named onwuhara was run away from USA and ran away to Sydney (Australia) but he also have been caught with the help of Australian Police department. They have traced him out and handed over to the USA authorities and further he sentenced to prison.4. Key pieces of digital evidences Digital evidences include all those evidences which are being used by the criminals while committing crimes. Court of law also accepting those evidences basis on the sensitivity and intensity of their use. For example Emails, telephonic calls, face book, any other social media have been used for this,
  • 6. telecommunications and all such things which have been observed for the purpose of investigation. From last few years use of digital evidences has been increased due to excessive use of them by the criminals. Court of law accepts these evidences if those are authenticated by the digital forensic lab (Warren G. Kruse; Jay G. Heiser, 2002). In the above mentioned case the digital evidences that are being used are prepaid connection mobile phones, wireless internet connections and personal wireless PCs of conspirators (Casey, Eoghan, 2004). And with the help of these digital evidences FBI came to know all the details about criminals and caught them accordingly. First they collect raw data from these digital evidences just like their systems IP’s addresses, their mobile calls history and all the information available in their PCs. And with the help of this information they have traced out their bank accounts and so forth all their relevant details. Those digital evidences also work as a source of proof against them because all fraudulent banking transactions details and all fake calls made by them have been restored by the forensic digital lab of FBI (Warren G. Kruse; Jay G. Heiser, 2002).5. Volume Of digital evidences Crimes relevant to digital forensic are basically its self- evident for all because retrieve data and collect the relevant information is too much easy for forensic labs. In this case volume of digital evidences is vast because multiple sources have been used. If we particularly talking about the above case then criminals used multiple digital devices to commit the crime just like landline numbers, prepaid connection mobile phones, PCs with wireless connections, fee based websites and online bank accounts transactions. Those criminals had taken all the precautions when planning and implementing this but digital devices are very easy to traced and easy to recover even deleted data from these devices. So this could be considered advantage of the day that now if crimes are increasing by using the modern technology then the other aspect is that it has also the solution for the every
  • 7. existing problem.6. Attribution This Cybercrime is particularly relevant to individuals who have been victimized and their money have been stolen by fraudulently gathering their information and then use this information to transfer their money from HOSL accounts to the victims checking accounts and then further transfer those funds into the desired accounts from where it was drawled near about 36 million dollars have been transferred by conspirators fraudulently and their victims spread over the state (Leigland, R, 2004). Although Govt. have played recognized role in tracing them out and put them behind the bars with the coordination of different law enforcement departments in the district of Virginia. 7. Main concepts of the case By doing detail analysis of this case it is now very easy for me to discuss its core elements and elaborate it more appropriately. I have gone through many sites and articles to develop level best understanding regarding Cybercrimes and role of digital forensic labs. In that real case the digital crime was fraudulently transferred money from the victim’s account in to conspirator’s account. And to commit this crime the group of all criminals used digital devices such as PC’s, landline, mobile phones online banking system etc. The main target area were those people who has sufficient funds in their accounts and those who are using loan facility with HOSL accounts, first they identified those people by using fee based site and collect information about those people who have millions of deposit in their account . And have started to collect information regarding their statement of accounts and credit card statements (Michael G. Noblett; Mark M. Pollitt; Lawrence A. Presley, 2000). First they collect raw data from these digital evidences just like their systems IP’s addresses, their mobile calls history and all the information available in their PCs. Then target a particular person and stole all the money that he/she has in account (Michael G. Noblett; Mark M. Pollitt; Lawrence A.
  • 8. Presley, 2000). So this could be considered advantage of the day that now if crimes are increasing by using the modern technology then the other aspect is that it has also the solution for the every existing problem. When victims started to complaint than FBI department have alert. They firstly take the details from their accounts and investigate from relevant financial organization. By checking the details FBI came to know that it’s a cybercrime and certain group of people doing this from past few years. FDL (Forensic Digital Lab) play an important role in identifying the ways of fraud activity and also trace out the conspirators. And have started to collect information regarding their statement of accounts and credit card statements. Then target a particular person and stole all the money that he/she has in account. If we particularly talking about the above case then criminals used multiple digital devices to commit the crime just like landline numbers, prepaid connection mobile phones, PCs with wireless connections, fee based websites and online bank accounts transactions (Gunsch, G 2002). Role of digital evidences never been ignored because those were the main source of tracing the guilty people. By using the data that were used by those criminals FBI was able to catch them, by tracing the mobile calls FBI realized that there were a group of people involved in that case who successfully made victims fool, stole their money and ran away. Suppose if no digital evidences were available than that’s nearly impossible for the Police department to catch them and put all of them behind the bars. And with the help of these digital evidences FBI came to know all the details about criminals and caught them accordingly (Michael G. Noblett; Mark M. Pollitt; Lawrence A. Presley, 2000). Forensic analysis was conducted to collect proper evidences that can be helpful and useful in the investigation of this event. USA Forensic lab is equipped with all modern technology that is demanded now days. So with the help of other law
  • 9. enforcement departments first they structured the case made line of action and then implemented all the techniques that have been required to sole this matter. This group was created trouble for almost all the state, different complaints have been logged on weekly basis but nobody knows who is actually involved behind this illegal activity (Warren G. Kruse; Jay G. Heiser, 2002). By analyzing digital data FBI have found success and all the criminals sentenced to prison, in district court of law all digital evidences were presented on the basis of those evidences court make decision about their crucial crime. So in this case’s importance of digital evidences are self-evident nobody can ignore their importance in the modern era (Warren G. Kruse; Jay G. Heiser, 2002). So we can say that fast telecommunication, internet, social sites and cell phones make easier for criminals to influence the people life badly but on the other side of picture it’s also a very helping tool to trace the garbage of society and put them all at their place. References · Michael G. Noblett; Mark M. Pollitt; Lawrence A. Presley, (2000). "Recovering and examining computer forensic evidence". Retrieved September 17, 2014 · Leigland, R, (2004). "A Formalization of Digital Forensics". · A Yasinsac; RF Erbacher, DG Marks, MM Pollitt (2003). "Computer forensics education". IEEE Security & Privacy. CiteSeerX: 10.1.1.1.9510. · Warren G. Kruse; Jay G. Heiser, (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ISBN0- 201-70719-5. Retrieved September 17, 2014 · Gunsch, G (2002). "An Examination of Digital Forensic Models". · Adams, R. (2012). "'The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice".
  • 10. · Casey, Eoghan, (2004). Digital Evidence and Computer Crime, Second Edition. Elsevier. ISBN0-12-163104-4.