Paper on The Use of Data Analytics in Forensic Investigations

Prepare a paper analyzing the use of digital analytics in forensic investigations and how these techniques may be utilized to solve financial crimes. The paper’s focus is the use of data driven analytics and big data.  Please look at the use of digital data & information and the forensic techniques used to retrieve the information and data analytics used to assist in solving crime. Many crimes are solved by analyzing digital data from numerous sources. This type of forensic analysis is also helpful in analyzing business operations and preparing reports related not just to crimes but also to operations and other types of analysis important to forensic accountants. The paper is to be six to nine pages long, double spaced. The page count does not include the Works Cited page(s).

File Directions Please read the attached instructions carefully. The assignment is to prepare a six to nine page paper, not including the Works Cited pages, analyzing the use of digital analytics in forensic investigations and how these techniques may be utilized to assist in the analysis of operations, how they are used to solve financial crimes, and the information is used for other reporting purposes. The paper’s focus is the use of data driven analytics and big data. Link Popular Computer Forensics Top 21 Tools [Updated for 2019] For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team. These computer forensics tools can also be classified into various categories: Disk and data capture tools, File viewers, File analysis tools, Registry analysis tools, Internet analysis tools, Email analysis tools, Mobile devices analysis tools, Mac OS analysis tools, Network forensics tools, and Database forensics tools. Link 5 Financial Forensics Trends to Watch in 2019 File Forensic Accountants in the Digital Age This research paper aims at studying the dramatic changes that are occurring in the accounting environment such as: the new technologies which have an impact on many financial statement filings, new services that accountants are involved in and the need for specialized online database research skills which are continuously expanding. In response to these changes in the accounting environment, accountants need to have the ability to cope with these changes: the need to develop skills in thinking and writing, the need to practice knowledge application of research to problems, and the need to use online databases as tools in gathering and organizing the evidence for the investigation of an accounting issue. File New Forensics Link Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers This paper uses the theory of abstraction layers to describe the purpose and goals of digital forensic analysis tools. Using abstraction layers, we identify where tools can introduce errors and provide requirements that the tools must follow. Categories of forensic analysis types are also defined based on the abstraction layers. Abstraction layers are not a new concept, but their usage in digital forensic analysis is not well documented. Link Cyber-Crimes Pose 'Existential' Threat, FBI Warns To highlight the growing threat, Henry cited several recent FBI investigations, such as one involving a smaller company that went out of business after hackers stole $5 million from accounts, another concerning a larger firm that "virtually overnight" lost a decade of research and development worth $1 billion, and still another regarding hackers who encrypted millions of records of a health services company and demanded money for the password. Link How a Remote Town in Romania Has Become Cybercrime Central Among law enforcement officials around the world, the city of 120,000 has a nickname: Hackerville. It’s something of a misnomer; the town is indeed full of online crooks, but only a small percentage of them are actual hackers. Most specialize in ecommerce scams and malware attacks on businesses. According to authorities, these schemes have brought tens of millions of dollars into the area over the past decade, fueling the development of new apartment buildings, nightclubs, and shopping centers. Râmnicu Vâlcea is a town whose business is cybercrime, and business is booming. File Searches and Seizures in a Digital World This Article offers a normative framework for applying the Fourth Amendment to searches of computer hard drives and other storage devices. It begins by exploring the basic differences between physical searches of tangible property and electronic searches of digital evidence. It then considers how the Fourth Amendment should apply when a government investigator retrieves evidence from a person's computer, and concludes that exposing data to an output device such as a monitor should be a Fourth Amendment "search" ordinarily requiring a warrant. Although copying data should not be deemed a "seizure" of that data, imaging a computer should be regulated by the Fourth Amendment and searches of copies should be treated the same as searches of the original. In the final section, the Article considers ways to limit the scope of computer searches. The plain view exception may need to be narrowed or even eliminated in digital evidence cases to ensure that digital warrants that are narrow in theory do not devolve into general warrants in practice. Tailoring the doctrine to the realities of computer investigations will protect the function of existing Fourth Amendment rules in the new environment of digital evidence. (For Educational Purposes Only) Link Commit a crime? Your Fitbit, key fob or pacemaker could snitch on you. With no witnesses other than Richard Dabate, detectives turned to the vast array of data and sensors that increasingly surround us. An important bit of evidence came from an unlikely source: the Fitbit tracking Connie's movements. Others from the home's smart alarm systems, Facebook, cellphones, email and a key fob allowed police to re-create a nearly minute-by-minute account of the morning that they said revealed Richard's story was an elaborately staged fiction. Undone by his data, Richard was charged with his wife's murder. He has pleaded not guilty. Link The Time Bandits of Southern California Less than two weeks later, on March 22, four masked men stormed into the Westime watch store in Malibu, squirting pepper spray into the store manager's eyes. “I thought at that moment that I was going to be shot,” he'd recall, “and that I'd never see my kids again.” The foursome grabbed at least $1.4 million in Franck Mullers, Hublots, Omegas, Breitlings, and Audemars Piguets (one of which was worth $250,000) and fled. By this point, data from the suspects' cell phones was beginning to yield results: Stanley Ford's phone had pinged off towers near three jewelry stores around the time each was being robbed. And Stearman could see that all of the suspects talked to one another a lot on the days a robbery went down. Meanwhile, he had gotten authorization to put “pole cams” on telephone poles outside of some suspects' residences, so he could watch them come and go. File Data Analytics - Lecture Notes In general, data analytics is defined as the process of examining data sets in order to draw conclusions about the information they contain. Accountants already work with data and data analytic outputs to assess business performance within the framework of accounting principles and methods and to identify trends and unusual items requiring further investigation.