Complete 2012 forensic audit documents - Kansas Bioscience ...
Complete 2012 forensic audit documents - Kansas Bioscience ...
Complete 2012 forensic audit documents - Kansas Bioscience ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Mr. Abdullah contacted BKD via email on April 26 th and indicated that he had received the<br />
computer. BKD <strong>forensic</strong>ally imaged the computer on April 26, 2011.<br />
Forensic tools are capable of extracting formerly deleted files as well as a host of residual data<br />
(such as Internet-based email, chat, document fragments, etc.) and operating system artifacts that<br />
provide evidence of user activities from the free space of a computer. Free space or “unallocated<br />
space” is the area of the hard drive not currently in use for active files. It is the area on the hard<br />
drive where deleted information not overwritten in the normal use of the computer may reside.<br />
This type of information is commonly utilized in internal investigations where allegations of<br />
abuse or misuse of assets or funds have been made.<br />
Forensic analysis of Thornton’s KBA-owned computer indicated that information had been<br />
removed from the computer, essentially all of the user-created content had been deleted, and that<br />
the free space had been wiped making the recovery of deleted items impossible. This occurred<br />
before the computer was returned to KBA. Forensic analysis revealed the following:<br />
• On April 21, 2011, a USB device was connected to the computer. USB devices are<br />
commonly used to transfer files between computers and other media storage devices.<br />
• On April 21, 2011, the control panel applet “Add or Remove Programs” was last<br />
accessed. This applet can be used to delete programs from a computer.<br />
• On April 21, 2011, RegEdit (Microsoft Windows Registry Editor) was run. RegEdit can<br />
be used to remove the path to specific programs after they have been removed through<br />
the “Add or Remove Programs” applet.<br />
• On April 22, 2011, at 8:23 a.m. CCleaner was run. CCleaner is a computer cleanup tool<br />
that cleans a number of common areas that track user activity. Analysis of user activity<br />
areas on the computer such as the Internet Cookie Directory, the Temporary Internet File<br />
Directory and the Recent Files folder shows those directories to be empty. CCleaner also<br />
has the ability to wipe Free Space.<br />
• On April 22, 2011, at 8:42 a.m. Eraser was installed on the computer and was run twice.<br />
Eraser is a Free Space and drive wiping tool which can wipe individual files as well as<br />
Free Space.<br />
• On April 22, 2011, at 10:12 a.m. the computer was last shut down.<br />
• On April 25, 2011, the computer was placed with United States Postal Service Express<br />
Mail for shipment to KBA.<br />
While some evidence has been recovered that illustrates the former existence of files and folders<br />
on the laptop, a typical characteristic of wiping tools is that they do not provide a log of exactly<br />
what was erased or cleaned. Therefore, a complete quantification of what activities, files and<br />
folders existed on the computer prior to the use of the wiping tools is not possible. Importantly,<br />
BKD cannot determine whether or not Thornton’s KBA-owned computer held any possible<br />
evidence of misuse or abuse of KBA assets or funds such as the improper granting of funds to<br />
client companies; the improper contracting of any vendor or consultant; the preferential<br />
treatment or payment of any vendor or consultant; or the improper payment or reimbursement of<br />
expenses of any current or former KBA employee or BOD member.<br />
101