Preview

Computer Forensics Analysis Project

Better Essays
Open Document
Open Document
799 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Forensics Analysis Project
Computer Forensics I (FOR 240-81A)
Project #3

Case Background
The Suni Munshani v. Signal Lake Venture Fund II, LP, et al suit is about email tampering, perjury, and fraud. On December 18, 2000, Suni Munshani (Plaintiff) filed a suit against Signal Lake Venture Fund. Mr. Munshani claimed that he was entitled to warrants in excess of $25 million dollars from Signal Lake. In February 2001, Signal Lake Venture Fund II, LP, et al. (Defendant) became privy to the court filings in this case. Within the filings there was an email provided by Mr. Munshani from Hemant Trivedi, CEO of one of the portfolio companies, stating he was indeed entitled to the warrants. Mr. Trivedi denied any knowledge of the email, or any such communication with Mr. Munshani. In an effort to prove their innocence, Signal Lake hired a computer forensic group to conduct a private investigation. The investigation did not show any evidence of the supposed email provided to the court by Mr. Munshani.
Mr. Trivedi filed an affidavit stating that the email was forged, while Mr. Munshani filed an affidavit stating the email was real. In March 2001, a computer forensics expert, Kenneth R. Shear, was appointed by the court to perform a forensic examination on the questioned message (the message provided by Mr. Munshani) and the comparative message (a second message from Mr. Trivedi found on Mr. Munshani’s computer). Mr. Shear worked for a company called Electronic Evidence Discovery, Inc. (EED).
Mr. Shear’s forensic analysis involved the examination of 33 drives of both Mr. Munshani and Mr. Trivedi. The drives included laptops, personal computers, tape disks, and SCSI backups. In addition, multiple CDROM’s were analyzed. The report was written in a format that explained complicated details so that a layman could understand. A variety of software and techniques were used in the imaging and evaluation of the drives. Duplicate “mirror” copies of the computer hard drives were performed using a computer



References: Shear, Kenneth. Report of Kenneth Shear. 12 September 2001. <http://www.signallake.com/litigation/shear_report_munshani.pdf>. Suni Munshani v. Signal Lake Venture Fund II, LP, et al. 1-7. No. 00-5529. Suffolk County Superior Court. 9 October 2001. <http://www.signallake.com/litigation/ma_order_munhshani.pdf>. Weigarten, Michael and Adam Weingarten. Email Tampering - This Time, The Good Guys Won. January 2002. Business Communications Review. <http://www.signallake.com/litigation/emailtampering.pdf>.

You May Also Find These Documents Helpful

  • Good Essays

    The next day and over the course of a month Fiore had people to make efforts from Nevada to show that the money was indeed legit and have not been earned illegally. The petitioner helped draft an affidavit to show probable cause for forfeiture of the funds. Fiore filed a lawsuit against Walden in the district court of Nevada saying Walden had no probable cause to search and seize the money and for him keeping the money even why he found out that the money was indeed legit. The District Court granted Walden motion to dismiss the case because Nevada had no jurisdiction over the case, for the seizer of the money took place in Georgia. During the appeal a divided panel ended up coming to the verdict that the search and seizer of the money could not support Nevada jurisdiction, however the Nevada had jurisdiction over the alleged false affidavit for knowing it would be a significant connection o Nevada also that delaying the funds would cause foreseeable harm which made this jurisdiction…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Brief No 1

    • 699 Words
    • 3 Pages

    Facts: In year 2000, Narnia Investments, Ltd. sued Harvestons Securities, Inc. and several defendants in trial court of Texas. The trial court then granted a default judgment against Harvestons and in favor of Narnia that Harvestons has to pay $365,000, plus attorney’s fees, prejudgment interest, and postjudgment interest. Harvestons claimed that it had no actual knowledge of the pending litigation before November 15, 2004 and filed a timely restricted appeal. Harvestons contends that the service of process was defective due to the process was delivered to someone different than the one name in the citation, the person to which the process was delivered, JoAnn Kocerek, did not have a authority to accept the process on behalf of Harvestons or the Texas Securities Commissioner and the return of service does not show a valid manner of service. At last, the appellate court of Texas reverse the trial court’s default judgment and remand this case for further proceedings.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Forensic 10.07

    • 842 Words
    • 3 Pages

    What is a questioned document? Describe at least one example of something that might be a questioned document.…

    • 842 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    the results of each. FTP is a protocol that is used extensively in business and social…

    • 381 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Csi Essay Example

    • 3977 Words
    • 16 Pages

    Technology is rapidly changing every aspect of the criminal justice system as computers make possible the streamlining of many procedures, shortening their time span and increasing their accuracy. Techniques used in the collection, processing and storage of evidence benefit from these recent developments.…

    • 3977 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Ncr Corp V Korala

    • 4724 Words
    • 19 Pages

    ALICE M. BATCHELDER, Circuit Judge. Page 807 512 F.3d 807 (6th Cir. 2008) 85 U.S.P.Q.2d 1481 NCR CORPORATION, Plaintiff-Appellant, v. KORALA ASSOCIATES LTD., Defendant-Appellee. No. 06-3685. United States Court of Appeals, Sixth Circuit. Jan. 16, 2008 Argued: Feb. 1, 2007. Appeal from the United States District Court for the Southern District of Ohio at Dayton. No. 04-00407-Michael R. Merz, Magistrate Judge. Page 808 [Copyrighted Material Omitted] Page 809 [Copyrighted Material Omitted] Page 810 ARGUED: Paul R. Gupta, Orrick, Herrington & Sutcliffe, New York, New York, for Appellant. Paul M. Fakler, Moses & Singer, New York, New York, for Appellee. ON BRIEF: Paul R. Gupta, Orrick, Herrington & Sutcliffe, New York, New York, John D. Luken, Joshua A. Lorentz, Dinsmore & Shohl, Cincinnati, Ohio, Clifford R. Michel, Mayer Brown, New York, New York, for Appellant. Paul M. Fakler, Moses & Singer, New York, New York, William F. Patry, Thelen, Reid & Priest, New York, New York, for Appellee. Before: KENNEDY, BATCHELDER, and CLAY, Circuit Judges. OPINION Plaintiff NCR Corporation ("NCR") appeals Page 811 the order of the district court[1] compelling NCR and defendant Korala Associates Ltd. ("KAL") to arbitrate NCR's claims against KAL, pursuant to 9 U.S.C. § 206[2] part of Chapter 2 of the Federal Arbitration Act, see 9 U.S.C. § 201, et seq., which implements the United Nations Convention on the Recognition and Enforcement of Foreign Arbitral Awards, June 10, 1958, 21 U.S.T. 2517, 330 U.N.T.S. 38. I. BACKGROUND NCR is one of the largest providers of Automatic Teller Machines ("ATM") equipment, integrated hardware and software systems, and related maintenance and support services in the world. NCR's ATMs use either the Windows operating system or the OS/2 operating system. NCR installs its APTRA XFS software ("APTRA XFS") on those ATMs using the Windows operating system and its S4i software ("S4i") on those ATMs using the OS/2 operating system. NCR owns a registered…

    • 4724 Words
    • 19 Pages
    Good Essays
  • Better Essays

    McMahon, R. J. (2009). Forensic & Law Enforcement. Principles of Investigation. Taylor and Francis Group, LLC.…

    • 2064 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for triple damages for pain and suffering. Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. You have been employed by SSB as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Trace Evidence

    • 963 Words
    • 4 Pages

    Deedrick, D. W. (2000). Forensic Science Communications. Retrieved from The FBI Federal Bureau of Investigations: http://www.fbi.gov/about-us/lab/forensic-science-communications/fsc/july2000/deedric1.htm…

    • 963 Words
    • 4 Pages
    Better Essays