CORPORATE EMBEZZLEMENT 2Corporate EmbezzlementIntroductionCorporate embezzlement occurs when trusted employees in a company make bad use or steal money from the corporation. When there is an incident of corporate embezzlement in a company, the digital forensics department can play a vital role. In this assignment, I am to act as a digital forensic leader in a large city police department where the department is contacted to investigate the Chief Financial Officer (CFO) of a company who has been suspected to be involved in corporate embezzlement. I am required to conduct digital forensic investigations based on the bank statements, emails, a laptop, cancelled checks, and a mobile device that the corporation’s security director believes to be the potential sources of evidence to prove the suspicion for corporate embezzlement.Explain the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence. The manner in which digital evidence is seized, gathered, stored, and transported significantly impacts on the credibility of the evidence. It is for this reason that the digital evidence is to be carefully handled from the point it is seized and transported (National Institutes of Justice (U.S.), 2010). The process I would follow is as follows:The process would start with securing the scene and getting the required legal authority for seizing the required evidence as well as the devices for the digital forensic investigation. Here, the passwords, PINs, and codes from the CFO are to be gathered in addition to their peripherals, chargers, manuals for the devices, and cables for the devices. The devices are to be kept in the state they were found in, on or off, when they are seized so that vital information in
CORPORATE EMBEZZLEMENT 3the devices is not altered. However, it is crucial that any potential transmission of signals from the mobile device is prevented to avoid alteration of the digital evidence through potential automatic update of the device and remote destruction commands that could alter the data[Dig161].During the collection of the digital evidence and the targeted devices, care has to be ensured for integrity of the evidence to be maintained for the forensic investigation. The data anddevices then need to be properly packaged for transportation with communication devices being secured to prevent any transmission or receiving of signals during the forensic investigation process as noted above. It is also required that every activity done in this stage be documented toavoid potential alteration of the evidence particularly during the evidence collection stage (National Institutes of Justice (U.S.), 2010).