Forensics - E-Mail and Social Media Investigations

Total Page:16

File Type:pdf, Size:1020Kb

Load more

CompTIA Cybersecurity Analyst (CySA+) Forensics - E-mail and Social Media Investigations Introduction Exercise 1 - Using OSForensics to Recover E- mail Exercise 2 - Email Examination Example Exercise 3 - Image Examination Example Exercise 4 - FaceBook Forensics Summary Introduction The Forensics - E-mail and Social Media Investigations lab provides you with the instructions and devices to develop your hands on skills in the following topics. Using OSForensics to Recover E-mail Email Examination Example Image Examination Example Facebook Forensics Lab time: It will take approximately 1 hour to complete this lab. Exam Objectives The following exam objectives are covered in this lab: CS0-001 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes. CS0-001 3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation. CS0-001 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management. Lab Diagram During your session you will have access to the following lab configuration. Depending on the exercises you may or may not use all of the devices, but they are shown here in the layout to get an overall understanding of the topology of the lab. Connecting to your Lab In this module you will be working on the following equipment to carry out the steps defined in each exercise. PLABWIN810 (Windows 8.1 - Standalone Workstation) Each exercise will detail which device you are required to work on to carry out the steps. To start, simply choose a device and click Power on. In some cases, the devices may power on automatically. For further information and technical support, please see our Help and Support page. Copyright Notice This document and its content is copyright of Practice-IT - © Practice-IT 2017. All rights reserved. Any redistribution or reproduction of part or all of the contents in any form is prohibited other than the following: 1. You may print or download to a local hard disk extracts for your personal and non-commercial use only. 2. You may copy the content to individual third parties for their personal use, but only if you acknowledge the website as the source of the material. You may not, except with our express written permission, distribute or commercially exploit the content. Nor may you transmit it or store it in any other website or other form of electronic retrieval system. Exercise 1 - Using OSForensics to Recover E-mail OSForensics isn’t task or file specific, as other tools are. However, it indexes data on a disk image or an entire drive for faster data retrieval. It can also filter or find files specific to e-mail clients and servers. To get a better understanding of this technology, please refer to your course material or use your preferred search engine to research this topic in more detail. In this exercise you will complete the following tasks. Extract Drive Image Recover E-mail Messages Task 1 - Extract Drive Image To extract the drive images that will be used by OSForensics, perform the following steps: Step 1 Ensure that you have powered on the required devices and connect to PLABWIN810. Click File Explorer on taskbar. Expand Local Disk (C:) > Work > Data files > Ch09. Right-click gcfi-ntfs-dd application and select Open. Step 2 On the WinRAR self-extracting archive. Type in the Destination folder C:\Work\Data files\Ch11\Drives folder. Click Extract. Figure 1.0 Screenshot of PLABWIN810: WinRAR Self Extracting Archive Please wait while the drive image is being processed. Close File Explorer window when the file is successfully extracted. Figure 1.1 Screenshot of PLABWIN810: WinRAR Self Extracting Archive Keep the devices powered on in their current state and proceed to the next task. Task 2 - Recover E-mail Messages You can configure these filters when you enter search parameters. In this activity, you will learn how to use OSForensics to recover e-mails. Step 1 Access the Start screen then type: osforensics Select OSForensics in the Search fly out menu. Figure 1.2 Screenshot of PLABWIN810: App Search Click Continue Using Free Version in the welcome screen. Under Case Management section, select Create Case. Figure 1.2 Screenshot of PLABWIN810: OSForensics Step 2 In the New Case dialog box, for the case name, type: InChap11 Enter your name in the Investigator field. Fill in the Contact Details and the Organization with your custom information. Click OK. Figure 1.3 Screenshot of PLABWIN810: OSForensics starting a new case On the Manage Case window, click the Add Device… button. Figure 1.4 Screenshot of PLABWIN810: OSForensics Manage Case Step 3 On the Select device to add dialog box, select Image File option button. Then click […] button. Figure 1.5 Screenshot of PLABWIN810: OSForensics selecting a device Navigate to C:\Work\Data files\Ch11\Drives path. Figure 1.6 Screenshot of PLABWIN810: OSForensics selecting an image Step 4 Click the hard drive file gcfi-ntfs.dd, and click Open. Figure 1.7 Screenshot of PLABWIN810: OSForensics selecting an image Click OK to close Select device to add dialog box. Figure 1.8 Screenshot of PLABWIN810: OSForensics selecting a device to add Step 5 Back on the Manage Case window, click the Create Index button in the left pane to start the Create Index Wizard. In the Step 1 of 5 window, click the Use Pre-defined File Types option button, if necessary. Click the Emails and Attachments check boxes then click Next. Figure 1.9 Screenshot of PLABWIN810: OSForensics creating an index In the Step 2 of 5 window, click the Add button. Figure 1.10 Screenshot of PLABWIN810: OSForensics creating an index Step 6 In the Add Start Location dialog box, click the Whole Drive option button, if necessary. Click the list arrow, click gcfi-ntfs-0:\, and then click OK. Figure 1.11 Screenshot of PLABWIN810: OSForensics creating an index Back in Step 2 of 5 page, click Next. Figure 1.12 Screenshot of PLABWIN810: OSForensics creating an index In the Step 3 of 5 window, click Start Indexing. Figure 1.13 Screenshot of PLABWIN810: OSForensics creating an index Please wait while indexing is in progress. Figure 1.14 Screenshot of PLABWIN810: OSForensics creating an index Step 7 When the indexing has finished, click OK in the message box informing you that errors reading some files might have occurred in the indexing process, if necessary. Figure 1.15 Screenshot of PLABWIN810: OSForensics creating an index Click Search Index in the left pane. Figure 1.16 Screenshot of PLABWIN810: OSForensics creating an index In the Enter Search Words text box, type: money Click Search. Figure 1.17 Screenshot of PLABWIN810: OSForensics search index Step 8 Click the Emails tab, if necessary. The search should have returned an e-mail. Right-click the first e-mail and click Open. Figure 1.18 Screenshot of PLABWIN810: OSForensics search index Note: If you get a scripting error dialog box, click Yes. To see more details, click View, Headers from the menu. Figure 1.19 Screenshot of PLABWIN810: OSForensics Email Viewer Step 9 Additional information about this email can be viewed in the headers. When you’re finished examining the e-mail, close the Email Viewer window, and exit OSForensics. Figure 1.20 Screenshot of PLABWIN810: OSForensics Email Viewer Before proceeding with the Hands-on projects, open File Explorer. Create a C:Work\Data files\Ch11\Projects folder on your system for this chapter’s projects. Exercise 2 - Email Examination Example For this project, you use Aid4Mail to examine an Enron employee’s e-mail. You will use PLABWIN810 lab workstation to complete this project. In this exercise you will complete the following tasks. Email Search Task 1 - Email Search We will now perform an email search to examine data key to strings searches. Step 1 First, create a subfolder under work folder C:\Work\Data files\Ch11 called HandsOn11-1. Then start your Web browser, on the Tools and resources intranet, click Tools > Data Forensics. Download and unzip Aid4Mail_Setup.zip and install Aid4Mail using default settings. Step 2 Open the Downloads folder and you will see en_office_professional_2007.zip, extract the zip file in the folder path. Double-click en_office_professional_2007 folder. Double-click setup. Install Office using default settings. Figure 2.0 Screenshot of PLABWIN810: Office Professional 2007 setup file On the Enter your Product Key page, click Continue. When Setup asks again to enter a Product Key, click No. Figure 2.1 Screenshot of PLABWIN810: Office Professional 2007 setup Step 3 Follow the screen prompts for a successful installation of Office 2007. Click Close and exit from File Explorer windows Keep Internet Explorer open. Figure 2.2 Screenshot of PLABWIN810: Office Professional 2007 setup Step 4 Open a new web browser tab. Then go to https :// en . wikipedia . org / wiki / Enron _ scandal to read more on the Enron scandal. Eric Saibi was a trader for Enron, which gives you some clues for search keywords. Note: Traders are responsible for making prices and executing trades in equities, bonds, commodities and foreign exchange, dealing on behalf of or for the benefit of investment banks.~www.targetjobs.co.uk Go back to the tab where you have Tools and resources intranet open. You will be in the [..] > Tools > Data Forensics page. Step 5 Click eric_saibi.zip file. Save the file in c:\Work\Data files\Ch11 folder. Close Internet Explorer when download is successfully completed. Then uncompress eric_salbi.zip file in the C:\Work\Data files\Ch11\eric_saibi\ folder. Start Aid4Mail. Click Next button when it becomes available in the Welcome window. Figure 2.3 Screenshot of PLABWIN810: Aid4Mail setup When asked about checking for Internet updates and announcements, click No.
Recommended publications
  • A Case of Corporate Deceit: the Enron Way / 18 (7) 3-38

    A Case of Corporate Deceit: the Enron Way / 18 (7) 3-38

    NEGOTIUM Revista Científica Electrónica Ciencias Gerenciales / Scientific e-journal of Management Science PPX 200502ZU1950/ ISSN 1856-1810 / By Fundación Unamuno / Venezuela / REDALYC, LATINDEX, CLASE, REVENCIT, IN-COM UAB, SERBILUZ / IBT-CCG UNAM, DIALNET, DOAJ, www.jinfo.lub.lu.se Yokohama National University Library / www.scu.edu.au / Google Scholar www.blackboard.ccn.ac.uk / www.rzblx1.uni-regensburg.de / www.bib.umontreal.ca / [+++] Cita / Citation: Amol Gore, Guruprasad Murthy (2011) A CASE OF CORPORATE DECEIT: THE ENRON WAY /www.revistanegotium.org.ve 18 (7) 3-38 A CASE OF CORPORATE DECEIT: THE ENRON WAY EL CASO ENRON. Amol Gore (1) and Guruprasad Murthy (2) VN BRIMS Institute of Research and Management Studies, India Abstract This case documents the evolution of ‘fraud culture’ at Enron Corporation and vividly explicates the downfall of this giant organization that has become a synonym for corporate deceit. The objectives of this case are to illustrate the impact of culture on established, rational management control procedures and emphasize the importance of resolute moral leadership as a crucial qualification for board membership in corporations that shape the society and affect the lives of millions of people. The data collection for this case has included various sources such as key electronic databases as well as secondary data available in the public domain. The case is prepared as an academic or teaching purpose case study that can be utilized to demonstrate the manner in which corruption creeps into an ambitious organization and paralyses the proven management control systems. Since the topic of corporate practices and fraud management is inherently interdisciplinary, the case would benefit candidates of many courses including Operations Management, Strategic Management, Accounting, Business Ethics and Corporate Law.
  • Official Versions Vs Facts

    Official Versions Vs Facts

    1 This text below is inspired by a translation from a French text that was published on the website of Paul Jorion in late June 2017, ie about only 2 weeks after this website would go live. I answered here a very straight question: “how do you differ from the official version?” And here is my “story”, the only one that have conveyed since 2012. It was then meant to summarize how my website differs from all the reports that the bank and the authorities have made on the “London Whale” case. It was 143 pages long for Paul Jorion. Now it is 29 pages long. What I have added are further details on key topics like ‘profits’, like ‘orders’, like ‘valuation’, like ‘mismarking’…. Needless to say, this account vastly differs from any media reporting although some outlets are closer than others. This text below thus predated by a month or so the decisions of the DOJ as disclosed on July 21st 2017. It may well have been the “recent statements and writings” that would shake the tree. It contradicted ahead of times the WSJ subsequent article of August 3rd 2017. Yet it corroborated the statements of Dimon on August 8th 2017 to some extent and clarified ahead of times the context of the ultimate decision of the SEC in late August 2017. But, back in June 2017, this text was also displaying my ‘story’ as an anchor amid all the changing stories that would have been conveyed since 2012 and onwards… In sharp contrast to what all the authorities and the bank would do between 2012 and 2018, I will deploy only one “story” to tell all along, be that on the public stage or confidentially towards the authorities.
  • 2 Bureaucratic Autonomy: Logic, Theory, and Design 18 2.1 Introduction

    2 Bureaucratic Autonomy: Logic, Theory, and Design 18 2.1 Introduction

    Charting a Course to Autonomy: Bureaucratic Politics and the Transformation of Wall Street by Peter Joseph Ryan A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Political Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor Paul Pierson, Chair Professor J. Nicholas Ziegler Professor Neil Fligstein Spring 2013 Charting a Course to Autonomy: Bureaucratic Politics and the Transformation of Wall Street Copyright c 2013 by Peter Joseph Ryan Abstract Charting a Course to Autonomy: Bureaucratic Politics and the Transformation of Wall Street by Peter Joseph Ryan Doctor of Philosophy in Political Science University of California, Berkeley Professor Paul Pierson, Chair Over the past three decades, federal regulators have been at the heart of transformations that have reshaped the financial services industry in the United States and by definition, global markets. It was, for example, the Federal Reserve that initiated and developed risk- based capital standards, rules that are now at the heart of prudential regulation of financial firms across the globe. Federal regulators played a central role in preventing regulation of the emerging ‘over-the-counter’ derivatives market in the late 1980s and early 1990s, actions that later had dramatic consequences during the 2007-2008 financial crisis. The Securities and Exchange Commission took critical decisions regarding the prudential supervision of investment banks, decisions that greatly contributed to the end of the independent invest- ment banking industry in the United States in 2008. Finally regulators played an important role in setting the agenda and shaping the outcomes of the Dodd-Frank Wall Street Reform Act of 2010, the most sweeping and comprehensive piece of legislation affecting the industry since the New Deal.
  • Do You Work in a Creative Industry? in the Digital Age, the Answer Is ‘Yes,’ Whatever Your Profession

    Do You Work in a Creative Industry? in the Digital Age, the Answer Is ‘Yes,’ Whatever Your Profession

    Do you work in a creative industry? In the digital age, the answer is ‘yes,’ whatever your profession. All you need to do is understand your potential – and then unlock it. WORDS BY Monisha Rajesh ILLUSTRATIONS BY Malika Favre he digital revolution has “Creativity isn’t restricted to types of profession popped the cork on creativity. – it appears in every discipline,” Dr Root-Bernstein Filmmakers no longer need to continues. “Look at lawyers and accountants. Why rely solely on studios to release did we have the Enron scandal? Why are we their movies when YouTube having these problems with banks? This is people and Vimeo reach an audience of being creative, looking for loopholes and trying millions. Writers can choose traditional publishers, to push boundaries.” or newer options like Amazon and eBooks. In his book, Dr Root-Bernstein describes the Musicians can skip six months in a studio for five creative process as requiring 13 tools that include minutes in a bedroom with a laptop. We have more observing, abstracting, imaging, and kinesthetic outlets for creativity than ever before, but how (i.e. multi-sensory) thinking amongst others. do we harness the tools at our fingertips to make the “Like carpenters’ tools, you have to learn when it’s most of our potential? Does it take a certain type appropriate to use each one,” he says. “Everybody of brain to produce these results, or can we learn has these tools to some degree but none of them are to be creative, no matter what field we work in? taught in any curriculum.
  • The Financial Collapse of the Enron Corporation and Its Impact in the United States Capital Market by Prof

    The Financial Collapse of the Enron Corporation and Its Impact in the United States Capital Market by Prof

    Global Journal of Management and Business Research: D Accounting and Auditing Volume 14 Issue 4 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 2249-4588 & Print ISSN: 0975-5853 The Financial Collapse of the Enron Corporation and Its Impact in the United States Capital Market By Prof. Edel Lemus, M.I.B.A Carlos Albizu University, U nited States Abstract- The purpose of this article is to review the collapse of the Enron Corporation and the collapse’s effect on the United States financial market. Enron Corporation, the seventh largest company in the United States, misguided its shareholders by reporting $74 billion profit of which $43 billion was detected as fraud. Moreover, according to the association of fraud examiners $2.9 trillion was lost because of employee fraud. For example, as presented by Kieso, Weygandt, and Warfield (2013), in a global survey study that was conducted in 2013, it was reported that 3,000 executives from 54 countries were involved in fraudulent financial reporting. Therefore, the world of accounting is dominated by the top four accounting firms known as (1). PricewaterhouseCoopers (PwC), (2). Deloitte & Touche (DT), (3). Ernst & Young (EY) and (4). KPMG which represent a combined income of $80 billion. Keywords: enron corporation, bankruptcy, securities and exchange commission (sec), generally accepted accounting principles (gaap), sarbanes-oxley act of 2002, section 404, corporate governance, auditing, and economic crime. GJMBR-D Classification : JEL Code: M49 TheFinancialCollapseoftheEnronCorporationand Its ImpactintheUnitedStatesCapitalMarket Strictly as per the compliance and regulations of: © 2014. Prof. Edel Lemus.
  • Lifting the Veil of Sarbanes-Oxley

    Lifting the Veil of Sarbanes-Oxley

    LIFTING THE VEIL OF SARBANES -OXLEY REVELATIONS THROUGH DECEMBER 1, 2002 By ∗ Byron F. Egan, Dallas, TX Sabrina A. McTopy, Houston, TX On July 30, 2002 President Bush signed the Sarbanes -Oxley Act of 2002 (H.R. 3763) (the “SOB ”) intended to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws. This is the “tough new corporate fraud SOB” being trumpeted by the politicians and in the media. Among other things, the SOB amends the Securities Exchange Act of 1934 (the “ 1934 Act ”) and the Securities Act of 1933 (the “ 1933 Act ”). Although the SOB does have some specific provisions, and generally establishes some important public policy changes, it will be implemented in large part through rules t o be adopted by the Securities and Exchange Commission ( “SEC” ) in various designated periods of time after July 30, 2002 – generally, 30 days (August 29, 2002), 180 days (January 26, 2003) and 270 days (April 26, 2003). As is always the case with broad gr ants of authority to a regulatory body, the rules may well contain some surprises. Further, the SEC will have opportunity through rulemaking under the SOB, as well as action on corporate governance proposals of the stock exchanges, to delve much farther i nto corporate governance than it has in the past. SUMMARY To What Companies Does SOB Apply . The SOB is generally applicable to all companies required to file reports with the SEC under the 1934 Act (“ reporting companies ”) or that have a registration state ment on file with the SEC under the 1933 Act, in each case regardless of size (collectively “ public companies ”).
  • Enron Scandal: the Fall of a Wall Street Darling

    Enron Scandal: the Fall of a Wall Street Darling

    Enron Scandal: The Fall of a Wall Street Darling The story of Enron Corp. is the story of a company that reached dramatic heights, only to face a dizzying fall. Its collapse affected thousands of employees and shook Wall Street to its core. At Enron's peak, its shares were worth $90.75; when it declared bankruptcy on December 2, 2001, they were trading at $0.26. To this day, many wonder how such a powerful business, at the time one of the largest companies in the U.S, disintegrated almost overnight and how it managed to fool the regulators with fake holdings and off-the-books accounting for so long. Enron's Energy Origins Enron was formed in 1985, following a merger between Houston Natural Gas Co. and Omaha-based InterNorth Inc. Following the merger, Kenneth Lay, who had been the chief executive officer (CEO) of Houston Natural Gas, became Enron's CEO and chairman and quickly rebranded Enron into an energy trader and supplier. Deregulation of the energy markets allowed companies to place bets on future prices, and Enron was poised to take advantage. In 1990, Lay created the Enron Finance Corp. To head it, he appointed Jeffrey Skilling, whose work as a McKinsey & Co consultant had impressed Lay. Skilling was at the time one of the youngest partners at McKinsey. Why Enron Collapsed Skilling joined Enron at an auspicious time. The era's regulatory environment allowed Enron to flourish. At the end of the 1990s, the dot-com bubble was in full swing, and the Nasdaq hit 5,000.
  • Clear Vision for Your Documents

    Clear Vision for Your Documents

    Clear vision for your documents Document management from Spielberg The problem – or why DMS pays you back Put an end to lengthy searches 2 It can become costly • One in every 20 dOcuments gOes missing • every year, the number Of files increase by 50% • each dOcument stOred cOsts an average Of 30 dOllars The benefits of an intelligent document compliance with statutory requirements, management solution are self-evident since we help your organisation to minimise REASONS FOR A DOCUMENT MANAGEMENT SYSTEM: if you think, for instance, of the impro- the financial or legal risks which can be ved efficiency: documents are located, caused by lost, damaged or improperly • Shorter response times to stored and distributed more quickly. used information. Thanks to Spielberg inquiries What’s more, staff do not waste time solutions, complying with the data • No unnecessary duplication of or money on duplicating or distributing protection requirements on retention data documents. Digitising avoids all these periods and destruction of documents • Higher data integrity unnecessary steps and gives your staff becomes much easier. • Compliance with all statutory more time to concentrate on the essentials. requirements On top of this, document storage costs Whether you choose FileDirector SBE or are reduced because a considerably smaller FileDirector Enterprise — Spielberg has storage area is required. the right solution for you. Talk to us about how we can make your documents more SPIELBERG HAS THE SOLUTION: What is less well-known, but nevertheless secure, while saving you money. • FileDirector Enterprise for at least just as relevant, are factors such SMBs and large companies as better security control, or new options You can find detailed information on our • FileDirector for monitoring use of documents.
  • CRIMINAL JUSTICE in AMERICA FIFTH EDITION Cja Unit1a:Layout 1 7/10/2012 2:10 PM Page 1

    CRIMINAL JUSTICE in AMERICA FIFTH EDITION Cja Unit1a:Layout 1 7/10/2012 2:10 PM Page 1

    CRIMINAL JUSTICE IN AMERICA FIFTH EDITION cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 1 CRIMINAL JUSTICE IN AMERICA FIFTH EDITION Developed by Marshall Croddy Bill Hayes cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 2 601 South Kingsley Drive T. Warren Jackson, Chair Los Angeles, California 90005 Marshall P. Horowitz, Chair, (213) 487- 5590 Publications Committee www.crf-usa.org Jonathan Estrin, President Marshall Croddy, Vice President Developed by Subject Matter Consultants Marshall Croddy and Bill Hayes (Various Editions) Richard Chrystie, Deputy District Attorney, Board Reviewers Los Angeles County Marshall P. Horowitz, Lisa Rockwell, Val Cole, Deputy District Attorney, Patrick Rogan, K. Eugene Shutler, Los Angeles County Douglas Thompson, Lois Thompson Star French, Deputy Probation Officer, Editor Los Angeles County Bill Hayes John Hud, Criminal Defense Attorney, Bozeman, Montana Contributing Writers (Various Editions) Daniel E. Lewis, Attorney, Los Angeles Bill Hayes, Marshall Croddy, Todd Clark, Julia Rider, Luce, Forward, Hill, Jeffer & Teri Engler, Lucy Eisenberg, Damon Huss, Mangels Sandy Kanengiser, Carlton Martz, Betsy Devallis Rutledge, Special Counsel to the Salzman, Eden Kusmiersky, Coral Suter, District Attorney, Los Angeles County Charles Tremper, Michelle Ng, Roy Kim, Richard Simonian, Superintendent, C.K. Shruti Modi, Anjelica Sarmiento, Sophia Khan, Wakefield School, Fresno County Probation Marianna Muratova Department Researchers Captain Robert Taylor, Commanding Officer, (Various Editions) Juvenile Division, Los Angeles Police Rick Bhasin, Luke Delgado, and Michael Sokolson Department Kerry White, Head Deputy District Attorney, Production Juvenile Division, Los Angeles County Andrew Costly, Designer Library of Congress Cataloging-in-Publication Data Criminal justice in America / developed by Marshall Croddy and Bill Hayes ; edited by Bill Hayes ; written by Bill Hayes ..
  • Responses by the Federal Communications Commission to Worldcom's Accounting Fraud

    Responses by the Federal Communications Commission to Worldcom's Accounting Fraud

    Federal Communications Law Journal Volume 58 Issue 3 Article 21 6-2006 Responses by the Federal Communications Commission to WorldCom's Accounting Fraud Warren G. Lavey Skadden, Arps, Slate, Meagher & Flom Follow this and additional works at: https://www.repository.law.indiana.edu/fclj Part of the Administrative Law Commons, Antitrust and Trade Regulation Commons, Communications Law Commons, Legislation Commons, and the Securities Law Commons Recommended Citation Lavey, Warren G. (2006) "Responses by the Federal Communications Commission to WorldCom's Accounting Fraud," Federal Communications Law Journal: Vol. 58 : Iss. 3 , Article 21. Available at: https://www.repository.law.indiana.edu/fclj/vol58/iss3/21 This Article is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Federal Communications Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Responses by the Federal Communications Commission to WorldCom's Accounting Fraud Warren G. Lavey* I. INTRODUCTION ............................................................................. 615 II. How DID THE FCC RESPOND IN THE DAYS AND WEEKS FOLLOWING WORLDCOM'S DISCLOSURE? .................. .. .. .. .. 619 A. WorldCom's Disclosure of Accounting Fraud..................... 619 B. FCC's Public Statements Responding to WorldCom's D isclosures............................................................................ 624 C.
  • The Enron Corpus: Where the Email Bodies Are Buried?

    The Enron Corpus: Where the Email Bodies Are Buried?

    The Enron Corpus: Where the Email Bodies are Buried? Dr. David Noever Sr. Technical Fellow, PeopleTec, Inc. www.peopletec.com 4901-D Corporate Drive Huntsville, AL 35805 USA [email protected] Abstract To probe the largest public-domain email database for indicators of fraud, we apply machine learning and accomplish four investigative tasks. First, we identify persons of interest (POI), using financial records and email, and report a peak accuracy of 95.7%. Secondly, we find any publicly exposed personally identifiable information (PII) and discover 50,000 previously unreported instances. Thirdly, we automatically flag legally responsive emails as scored by human experts in the California electricity blackout lawsuit, and find a peak 99% accuracy. Finally, we track three years of primary topics and sentiment across over 10,000 unique people before, during and after the onset of the corporate crisis. Where possible, we compare accuracy against execution times for 51 algorithms and report human-interpretable business rules that can scale to vast datasets. Introduction The 2002 Enron fraud case uncovered financial deception in the world’s largest energy trading company and at the time, triggered the largest US bankruptcy and its most massive audit failure [1]. For the previous six years, Fortune magazine had named Enron “America’s most innovative company.” By 1999, Enron was brokering a quarter of all electricity and natural gas deals [1]. Piggybacking on the internet bubble, Enron devised methods to sell everything and own nothing. Problematically, the company could assign its own revenue (mark-to-market) and then bury its losses using off-book debt in shell companies (or Special Purpose Entities called Raptor and Chewco).
  • Distributed Ledgers for the Prevention of Accounting Fraud

    Distributed Ledgers for the Prevention of Accounting Fraud

    ALBERT-LUDWIGS-UNIVERSITÄT FREIBURG Distributed Ledgers for the Prevention of Accounting Fraud Blockchains Between Expectations and Reality Inaugural-Dissertation zur Erlangung der Doktorwürde der Wirtschafts- und Verhaltenswissenschaftlichen Fakultät der Albert-Ludwigs-Universität Freiburg i. Br. vorgelegt von Nadine Rückeshäuser aus Bad Soden am Taunus Sommersemester 2017 II Albert-Ludwigs-Universität Freiburg im Breisgau Wirtschafts- und Verhaltenswissenschaftliche Fakultät Kollegiengebäude II Platz der Alten Synagoge Dekan: Prof. Dr. Alexander Renkl Erstgutachter: Prof. Dr. Dr. h.c. Günter Müller Zweitgutachter: Prof. Dr. Dieter K. Tscheulin Datum der Einreichung: 19.05.2017 Datum des Promotionsbeschlusses: 03.07.2017 Acknowledgments III Acknowledgments I am deeply grateful to several people, who guided and supported me throughout the journey of writing this dissertation and contributed in many different ways to it. I want to express my sincere gratitude to them. I want to express my deepest gratitude to my doctoral supervisor Professor Dr. Dr. h.c. Günter Müller for his excellent guidance and caring over the past 2 years, proving me with an excellent atmosphere for doing research. I also want to emphasize his role for my personal development, for which I am truly indebted and thankful. What I have learned goes far beyond specialized knowledge and technical competences. Overall, I found my time as doctoral student at the Institute of Computer Science and Social Studies as espe- cially pleasant, very productive and creative. Thank you for all the encouragement! I want to show my gratitude to Professor Dr. Dieter K. Tscheulin, who was the second reviewer of my dissertation as well as an examiner at my Rigorosum.