29.10.2014 Views

Six Articles on Electronic - Craig Ball

Six Articles on Electronic - Craig Ball

Six Articles on Electronic - Craig Ball

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Craig</strong> <strong>Ball</strong> © 2007<br />

The coup de grace dem<strong>on</strong>strating the premeditated nature of the theft emerged from a review of<br />

files used to synchr<strong>on</strong>ize the laptop with a “smart ph<strong>on</strong>e” PDA. These held records of cell<br />

ph<strong>on</strong>e text messaging between the employee and a c<strong>on</strong>federate in the firm discussing what files<br />

needed to be spirited away. Though the messages weren’t created <strong>on</strong> or sent via the laptop,<br />

they transferred to the laptop’s hard drive unbeknownst to the employee when he synched his<br />

PDA. Armed with this evidence, the boss c<strong>on</strong>fr<strong>on</strong>ted the still-employed c<strong>on</strong>federate, who<br />

tearfully c<strong>on</strong>fessed all to the sadder-but-wiser employer. Case closed, but no happy ending.<br />

Computers, like crime scenes, have stories to tell. Data and metadata in their registries, logs,<br />

link files and aband<strong>on</strong>ed storage serve as Greek chorus to the tragedy or comedy of the user’s<br />

electr<strong>on</strong>ic life. Most cases d<strong>on</strong>’t require the “CSI” treatment, but when the computer takes<br />

center stage, d<strong>on</strong>’t overlook the potential for computer forensic analysis—and Dr. Locard’s<br />

Exchange Principle--to wring decisive evidence from the machine.<br />

90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!