Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Need advice on discovering and restoring maliciously deleted files

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU
 
sybylla Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-27-10 09:56 AM
Original message
Need advice on discovering and restoring maliciously deleted files
Employee deleted evidence of their embezzlement crimes from the office computer. Can't get the police involved until we have evidence to show.

I'm guessing there are some standard procedures and tools to use that won't "taint" the evidence and might even help the police.
Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
struggle4progress Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-27-10 01:14 PM
Response to Original message
1. if this will produce a lawsuit or prosecution, pay for professional help
I hope the computer is currently not being used at all. What you can get back may depend on exactly how and when stuff was deleted and what's happened since. Call around and get some recommendations about people who know what they're doing; maybe law enforcement or the DAs office can make some suggestions. I'd guess it may cost you a few grand, depending
Printer Friendly | Permalink | Reply | Top
 
canetoad Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-27-10 01:26 PM
Response to Original message
2. Yep, I'm with Struggle here
You need to be able to document the recovery process and authenticity of the deleted files, so get it done professionally and keep all the paperwork.
Printer Friendly | Permalink | Reply | Top
 
MyNameGoesHere Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-27-10 02:40 PM
Response to Original message
3. Well I hate to say it but you're probably too late.
Computer forensics is very complicated and has strict standards. Having been involved in a number of incidents from kiddy porn to corporate espionage, I can tell you that if you haven't already secured the evidence and contacted a forensics specialist, you have tainted the evidence. A smart lawyer would tear it to pieces.
Printer Friendly | Permalink | Reply | Top
 
RoyGBiv Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-27-10 03:41 PM
Response to Reply #3
4. Ditto ...

This is the kind of thing you have to have a plan for prior to the fact of needing it done. It needs to be a part of a firm's standard operating procedures.

Printer Friendly | Permalink | Reply | Top
 
sybylla Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-27-10 10:10 PM
Response to Reply #3
5. I realize that, but this will hopefully lead to other evidence.
The computer hasn't been used since the employee left. It's still in the custody of the business owner. And the police won't touch the case until you have some modicum of evidence something has happened. But when you keep your books on computer with no backup or paper records, (not me but a friend who didn't know better), you need a place to start. I think the best we can hope for is that this hard drive analysis will lead to other hard, unimpeachable evidence.

We've been contacted by this friend because we have our own computer/controls business, but have not had need to engage in this kind of forensic work before. How that will affect our credibility in trial would need to be sorted out.

Expensive forensic work is out. My friends have been essentially bankrupted by these actions and cannot afford it.

On the other hand, I know the DA and can probably give his office a call to see what he recommends is the proper way to proceed and what value if any the recovered materials will have in a trial.

That doesn't change the fact that I will probably need to make a basic attempt to at least see what's on the hard drive.

So, we will begin by using an Ubuntu utility to copy the hard drive byte for byte and start work on the copy, leaving the original untouched.

I still need suggestions, depending the the advice of the DA's office, for software and tools to analyze the files on the copied drive and attempt to retrieve the deleted work.

Can you help?
Printer Friendly | Permalink | Reply | Top
 
MyNameGoesHere Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-28-10 06:51 AM
Response to Reply #5
6. These guys are the standard on tools
http://www.cftt.nist.gov/

Also the National Computer Forensics Institute sometimes has cheap or free information. However I must say again, this system sounds like it has already violated the minimum data and probably worse. Just turning it off, can be construed in court as causing tainted data.

I wish you luck but once again, I STRONGLY suggest you get professionals. I mean REALLY strongly suggest.
Printer Friendly | Permalink | Reply | Top
 
sybylla Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-03-10 08:21 AM
Response to Reply #6
10. Looks like a good one.
Thanks for posting it.
Printer Friendly | Permalink | Reply | Top
 
canetoad Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-28-10 08:05 PM
Response to Reply #5
7. I found this by accident
browsing an oil spill related link from GD. It may be of interest.

The Know-IT-All’s Guide to eDiscovery (ebook)

Overview: eDiscovery refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. eDiscovery can be carried out offline on a particular computer or it can be done on the network. Recent amendments to the Federal Rules of Civil Procedure (FRCP) highlighted that electronically stored information (ESI) is a discoverable record type and should be treated as any other type of evidence.
http://www.informationweek.com/whitepaper/Internet/E-Business-E-Commerce/the-know-it-all-s-guide-to-ediscovery-ebook-wp1274287152571;jsessionid=2V4IFW0F4BK13QE1GHPCKHWATMY32JVN?articleID=143800006&cid=well1_wp_govt
Printer Friendly | Permalink | Reply | Top
 
sybylla Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-03-10 08:20 AM
Response to Reply #7
9. Thanks
I'll look into it.
Printer Friendly | Permalink | Reply | Top
 
EvolveOrConvolve Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-30-10 10:35 AM
Response to Original message
8. Call a good forensics analyst ASAP to take custody of the machine
That's the only way you're going to adequately protect the chain of custody (which may already be tainted).

Embezzlement doesn't happen in a bubble - there are other ways to find evidence of the crime. Financial transactions at the business's bank is a good starting point. Anything suspicious can be used as probable cause by law enforcement or a prosecutor to get a subpoena for the suspect's personal and financial information. These crimes are actually fairly easy to put together since everything is tracked now. Unless you're in a business that keeps huge amounts of cash laying around, there's a trail somewhere.
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri May 24th 2024, 03:09 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC