This is but one small example of how computer forensics are playing a vital role in investigations. Never before has information been so vital to companies – and the impact from its loss so great.
Is such information subject to misuse and/or being stolen? The answer is yes! According to criminal law you cannot steal 'information', but that's probably just as well because company security managers are much more likely to catch an information thief and recover data, etc through civil proceedings.
Worryingly, the DTi reports that only 10% of companies have drafted detailed guidelines on how to deal with evidence and investigations. It's not uncommon for companies to address these issues for the first time immediately after they've become a victim. Reactionary as opposed to proactive.
Monitoring e-mail traffic
The law allows for covert investigative measures that might include monitoring the suspect's e-mails, and checking for any data on their computer which shouldn't be there. Having identified where the stolen information may be located, the evidence is then presented to the Court without the knowledge of the suspect. Civil Courts are issuing more and more search orders these days, allowing investigators to enter the premises and seize a suspect's computer(s).
In turn, this can lead to an interesting series of events – such as the time when the computer in question was "formatted" as the Court officials entered the building. Unfortunately for the suspects, forensic analysis recovers data after formatting. Not only was the data recovered, but also the user of the computer at the time the formatting took place was identified, providing hugely valuable evidence for the complainant.
Having seized computers from the suspect, forensic analysis will show whether the information does in fact belong to the complainant and, if this is proved, the evidence will be used in legal proceedings where damages can be pursued.
As the scope of insurance cover reduces and basic internal misuse by employees remains prevalent, it's understandable that companies are increasingly likely to undertake internal investigations using their own staff. It's therefore vital that Boards of Directors and their in-house security specialists use staff that have the appropriate experience and training.
Forensic principles should apply to any internal investigation. A disciplinary process and indeed dismissal can always be contested, and companies might find themselves needing to defend their actions in court.
Source
SMT
Postscript
Adrian Reid is managing director at computer forensics consultancy DataSec
No comments yet