Case study 1: Credit information fraud at Teledata Communications Inc. Coordinate an investigation in a manner that would not arouse suspicion from Cummings and Baptiste. Cummings and Baptiste were online criminals and they were committing a non-contact fraud using technology. It is necessary therefore that technology supported investigation is contacted especially after briefing by victim of the continuous requests from one computer into one clients account is suspicious. First, surveillance is undertaken to identify the computer used in the fraud. Technology can support identification of the Computer being used, location and also ownership.
After confirming this, it is necessary that the fraudsters are confirmed to have been committing crime using the same computer over some time. Secondly, it is imperative that invigilation is undertaken to ensure that the fraudster is actively engaged in fraudulent activities and his actions recorded. Cummings will be found to have access to private information through impersonation. Finally it is necessary that physical evidence like the computers being used in the fraud and other supporting information like contacts of the ring members are collected. Create a vulnerability chart to coordinate the various elements of the possible fraud. What was takenWho had the OpportunityHow fraud was concealedHow are assets convertedRed flagPressuresRationalizationKey internal ControlsCustomer depositsCustomer representativeEntering verified codes to the company databaseChange of address, request of new cheque books, credit cards Changed behaviour of customer representativeExtravagant lifestyleGreedFrequent changes in Access codes.
Restricted access to customer informationAssuming your investigation used surveillance and/or covert investigation techniques, what types of surveillance and/or covert operations would you use? How would technology play a role in this part of the investigation? Stationery or fixed point; this will be applicable at the location where the fraud is being committed.
It me involve use of bugs to recorded occurrences at the scene of crime. A professional investigator can be strategic located at a fixed point where the fraud scene can be easily monitored. Moving or trailing; this will be contacted when the suspects leads away from the scene of crime and should be contacted by the professionals. It involves tracing the suspects movement over time in order to identify other supporting contacts and transactions the suspects happens to partake. Electronic surveillance; Video cameras can be used to record further activities of suspects away from the scene of crime.
Other electronic surveillance will be tracing on the computer location where the physical address of the suspect might positively be identified. Also by use of network monitoring other associated contacts of the suspects in Nigeria might be napped. Finally how would analysis of physical evidence play a part in this investigation? What types of physical evidence would be helpful? Computers; this hardware should be preserved and necessary possession rights for investigation purposes should be requested from the necessary institutions like the courts.
The computer hardware will indicate the device that has been used to send purported clients request for changes in credit data and requests for new cheque books. Without the computer hardware that has been used in the fraud being identified, the prosecution evidence may be weaker but having a computer used in the fraud being positively identified as being owned by the suspect and having been the source of all the fraudulent electronic request then a milestone of positive identification of the suspect.