The Evolution of Computer Forensics

738 views
3 mins read

.

By Rakis Christoforou BBA, CPA/ABV/CFF, CGMA, ACFE

Since the World Wide Web revolution in 1991, there has been significant growth in the use of computers, internet, e-mail, and recently cell phones for committing financial fraud and other criminal activities.
Computer Forensics evolved during the last two decades as the main tool in the application of computer investigation techniques to gather e-evidence suitable for presentation in a court of law. The goal is to perform a structured investigation to find out exactly what happened on a computer and/or other electronic devices and who was responsible for them. The Internet history, web-based email, lost or deleted files, are examples of data the fraud investigator can utilise as evidence in his engagement.
There are some unique aspects relating to computer forensic investigations compared to investigations looking for evidence in the form of paper works.

Paperwork vs. Electronic Evidence
Up until when paper-only discovery was used, forensic accountants and lawyers asked for and received truckloads of paper documents, sometimes brought in from distant places. Their strategy involved finding evidential matter in the form of paper work that would help them prove a matter of fact.
Strategies did not change much since then but the nature of evidence in the form of e-evidence did. E-evidence in our days may fill supertankers if it were to be printed because now many more transactions are computerised than before. Moreover, people nowadays use computers and other electronic devices at work for personal use as well, and therefore much more information is stored electronically.
In our digital world people, including fraudsters, leave digital footprints of their activities from which their actions and intentions can be revealed. Digital evidence comes in many forms, including the hard drives found in personal computers, external drives, telephones, smart phones, personal data assistants, surveillance cameras and telephone voice mail systems.
The amount of information left in each of these devices often proved to be the basic reason that sufficient relevant evidence was collected and financial fraudsters and other criminals were caught and found guilty in a number of known cases. In some, fraudsters thought they had destroyed their digital trails by deleting the relevant files, but this did not prove to be the case.

Deleting a file is not so easy
Modern computer forensic software can find or retrieve evidence much sooner than in the “old days” where the process could take many days. Deleting files from hard drives is not so easy; deleting is in fact a misnomer. Choosing the “delete” option erases the file’s reference from the directory, but it does not erase the file until it is overwritten entirely.
Furthermore, businesses have disaster-recovery systems that perform automatic backups. Therefore, even if a particular file was never saved or it was deleted shortly after it was created, it might still be retained on multiple backup media. Most files usually contain metadata, additional data about original data that can provide the investigator with important relevant information.
When files and messages are saved, modified or sent, computer software automatically creates artifacts or metadata. Normally this information cannot be changed. Most times metadata includes information about the date the document was created, who created the data, when it was modified, etc. This may prove to be important e-evidence to be used in court because metadata can be as revealing as a fingerprint.
When Enron declared bankruptcy in December 2001, much of the investigation relied on computer files and their metadata as evidence. A specialised team of forensic accountants, computer forensic experts and lawyers began to search through hundreds of Enron employee computers and were able to find important e-evidence that was used in court.

Dealing with Electronic Evidence
E-evidence tends to be more complete, can prove intent and is hard to deny. At the same time some aspects must be taken into consideration when dealing with a computer investigation:
– Computer forensic investigations may prove very costly because specialised skills and software may be needed to properly retrieve relevant information;
– It is an area that is constantly evolving;
– We are now experiencing a shift from desktop computers to handheld devices (e.g. cell phones);
– Lawyers and judges involved in a case may not always understand the accounting and technical details of the case without the help of a forensic accountant and/or a computer forensic expert.
In conclusion, electronic evidence (e-evidence) is trace evidence, which is an extremely fragile and often high-value form of evidence that tends to be undetectable to the human eye. Just like other forms of trace evidence, e-evidence must be collected, preserved and handled with care by professionals who know how to collect evidence and prepare it for judicial cases. If evidence is destroyed or modified then the case could be lost in court.

Rakis Christoforou is a Certified Public Accountant (CPA), Accredited in Business Valuation (ABV) and Certified in Financial Forensics (CFF). He is the Vice Chairman of the committee of Economic Crime and Forensic Accounting (ECFA) of The Institute of Certified Public Accountants of Cyprus (ICPAC), member of ICPAC, AICPA (American Institute of Certified Public Accountants) and ACFE (Association of Certified Fraud Examiners).
[email protected]