Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of...

15
Guidelines for Investigation

Transcript of Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of...

Page 1: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

Guidelines for Investigation

Page 2: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

2

Investigation of computer related frauds - Outline

• Reasons

• Ways of committing frauds

• Prevention

• Aids for investigation

• Down side

• Legal issues

• Guidelines for investigation

Page 3: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

3

Reasons• Breach of security protocol

• Improper usage of passwords

• Improved level of access – physical, software

• Lack of technical knowledge at supervisory level

• Multi tasking by single person

Page 4: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

4

Ways of committing frauds

• Parallel package

• Point of sale – booking of articles having prefixed stamps

• Sanchay Post – access to database through SQL

• Sanchay Post- access through ‘Data entry’ module

• Meghdoot - access to database through SQL

• Unauthorised access to server (esp. thru wireless

connectivity)

Page 5: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

5

Prevention

• Effective Monitoring

• Proper inspections

• Vigilant administration

• Low tolerance for breach of security

related issues

Page 6: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

6

Aids for investigation

• Audit trail in the software– Operating system– SQL– Meghdoot– Sanchaya

Page 7: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

7

Downside• Deleted data

• Multiple usage of operator

• Universal knowledge of passwords

• Lack of technical/application knowledge amongst inspectorial staff

• Electronic evidence

• Legal issues

Page 8: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

8

Legal issues

• Fixing of responsibility– Primary – Secondary

• Software user-ids linkage to charged officials

• Memo of Distribution of Work

• Secrecy of password

Page 9: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

Collection of Material Evidence

• Initial enquiries - the usual way • Indications of fraud - material evidence in the form of shift reports etc should be collected• Take back up of all databases in the presence of administrator and head of office• Search office for CD’s/floppies containing data and take possession of the same. Check the material contained in them for a clue to the modus operandi

Page 10: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

Security Environment

• Examine the security environment of the office• List out the names of officials concerned and make enquiries with them• Whether supervisor allowed operators to use his pass word• Whether administrator password is known to operators• Whether password policies are enforced through the system

Page 11: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

Modus Operandi• See whether any programming software are installed and running. Get the help of the administrator or any other specialist as to the function of such software. • Whether the accused has access to any systems both in the office and also outside software with which the frauds were committed in these systems also;

• Whether the accused owns a system and whether it is possible for him to misuse the

departmental applications using his/her system

Page 12: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

Scope of the Fraud• Check all the articles posted on that day/received for delivery on the day with the relevant reports and see whether there are any indications as to fraud• Collect receipts from customers and check with office records• Whether receipts are generated through authorised offices only• Check whether receipts collected are in the form supplied to the office• Check the log on pattern of the user• Check the log files generated in administrator access

Page 13: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

Clues from System Administrator Check the login pattern of the user - whether user was logging in at a time he/ she has not been assigned any work like beyond counter hours/ on holidays etc. Take a back up of all such log files. The administrator’s option generates log files of changes to tariff and other items made by the supervisor; check whether there are any indications in this log.• Check whether frauds committed by manipulating the database • Check the version software installed

Page 14: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.

• Case Study

Exercise

Page 15: Guidelines for Investigation. 2 Investigation of computer related frauds - Outline Reasons Ways of committing frauds Prevention Aids for investigation.