17.03.2014 Views

Complete 2012 forensic audit documents - Kansas Bioscience ...

Complete 2012 forensic audit documents - Kansas Bioscience ...

Complete 2012 forensic audit documents - Kansas Bioscience ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mr. Abdullah contacted BKD via email on April 26 th and indicated that he had received the<br />

computer. BKD <strong>forensic</strong>ally imaged the computer on April 26, 2011.<br />

Forensic tools are capable of extracting formerly deleted files as well as a host of residual data<br />

(such as Internet-based email, chat, document fragments, etc.) and operating system artifacts that<br />

provide evidence of user activities from the free space of a computer. Free space or “unallocated<br />

space” is the area of the hard drive not currently in use for active files. It is the area on the hard<br />

drive where deleted information not overwritten in the normal use of the computer may reside.<br />

This type of information is commonly utilized in internal investigations where allegations of<br />

abuse or misuse of assets or funds have been made.<br />

Forensic analysis of Thornton’s KBA-owned computer indicated that information had been<br />

removed from the computer, essentially all of the user-created content had been deleted, and that<br />

the free space had been wiped making the recovery of deleted items impossible. This occurred<br />

before the computer was returned to KBA. Forensic analysis revealed the following:<br />

• On April 21, 2011, a USB device was connected to the computer. USB devices are<br />

commonly used to transfer files between computers and other media storage devices.<br />

• On April 21, 2011, the control panel applet “Add or Remove Programs” was last<br />

accessed. This applet can be used to delete programs from a computer.<br />

• On April 21, 2011, RegEdit (Microsoft Windows Registry Editor) was run. RegEdit can<br />

be used to remove the path to specific programs after they have been removed through<br />

the “Add or Remove Programs” applet.<br />

• On April 22, 2011, at 8:23 a.m. CCleaner was run. CCleaner is a computer cleanup tool<br />

that cleans a number of common areas that track user activity. Analysis of user activity<br />

areas on the computer such as the Internet Cookie Directory, the Temporary Internet File<br />

Directory and the Recent Files folder shows those directories to be empty. CCleaner also<br />

has the ability to wipe Free Space.<br />

• On April 22, 2011, at 8:42 a.m. Eraser was installed on the computer and was run twice.<br />

Eraser is a Free Space and drive wiping tool which can wipe individual files as well as<br />

Free Space.<br />

• On April 22, 2011, at 10:12 a.m. the computer was last shut down.<br />

• On April 25, 2011, the computer was placed with United States Postal Service Express<br />

Mail for shipment to KBA.<br />

While some evidence has been recovered that illustrates the former existence of files and folders<br />

on the laptop, a typical characteristic of wiping tools is that they do not provide a log of exactly<br />

what was erased or cleaned. Therefore, a complete quantification of what activities, files and<br />

folders existed on the computer prior to the use of the wiping tools is not possible. Importantly,<br />

BKD cannot determine whether or not Thornton’s KBA-owned computer held any possible<br />

evidence of misuse or abuse of KBA assets or funds such as the improper granting of funds to<br />

client companies; the improper contracting of any vendor or consultant; the preferential<br />

treatment or payment of any vendor or consultant; or the improper payment or reimbursement of<br />

expenses of any current or former KBA employee or BOD member.<br />

101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!