Page 173 - Deception at work all chapters EBook
P. 173

174 Deception at Work

COMPUTER EVIDENCE

Legality

Particular attention should be paid to the acquisition and preservation of computer evidence.
Again, the investigator must comply with a raft of new legislation. Computers owned by the
company can be accessed overtly or covertly without the user’s permission when crime is
being investigated. However, it would be illegal to access a laptop computer, Personal Desktop
Assistant (PDA) or mobile telephone memory owned by an individual, even when it is on com-
pany premises, without his permission. If he has used diskettes paid for by the company, even
on his personal computer, there is a strong argument that they can be copied and examined
without his authority.

    The Regulation of Investigatory Powers Act 2000, gives government investigators the right
to demand the production of encryption keys. There is no equivalent in the business world.
Thus businesses should address this issue in their fraud policy (see page [xref]).

Evidence required

Wherever possible, original media, such as disks, diskettes, tapes etc. should be obtained.
There are two main reasons for this:

• Admissibility: The courts in most countries have ruled that, to be held admissible, computer
   evidence must have been produced in the normal course of business and on a machine of
   proven reliability. Copies taken for other than normal processing requirements or special
   reports might be inadmissible.

• Integrity: It is possible original computer media contains data in image or digital form which
   will not be read by a copy program. For example, deleted files remain on the original disk
   until their space is overwritten by new data but are not read by normal copying and back-
   up utilities. Thus computers should only be examined by qualified experts so that full and
   accurate images are obtained.

CONCLUSION

The laws are complex and evolving. It is essential that investigations comply with the highest
legal and ethical standards, while standing a realistic chance of exposing crooks. Balance (or
proportionality) is critical as is good advice from experienced litigation lawyers especially in
difficult or complex cases.

    However, the bottom line is – that despite the cravings of the Information Commissioner
and other jobsworths, the law does not prohibit piercing investigations and interviews when
crime is suspected.

Steps in an investigation

OVERALL PLAN

Most major investigations should be planned in the following stages (see Table 5.7:
    Column 1 shows that time should be taken in planning the first step, which is the point

at which those under suspicion first get to hear that this is the case. The first step must be an
ambush.
   168   169   170   171   172   173   174   175   176   177   178