The use of evidence in criminal investigation is a non-disputable course of justice establishment in any event of criminal activity occurrence. At the same time, evidence requires qualification to warrant charges in the court of law. The case presented here requires a deep understanding of both the victims' concerns. As a firm, we really need to establish the correlation of the subjects presented. The insurer's concerns and the justice establishment process. However, as a common practice, the outlined practice procedures include a series of events in the process. There are several links to the investigative process as presented in the files here.
The following logical framework can, therefore, be used in the course of time. We need to acquire all the relevant physical evidences gathered in the case. By this, there should be a clarity on how they were captured, who handled them and how. In this, it is very crucial to handle the evidence with lots of care to avoid losing data in the due course. The computer parts are normally made of magnetic materials that when poorly handled may easily lose the data and the useful information to link the crime scene may disappear. It is, therefore very important to secure the evidence in its original state without compromising any content in the process.The next step will be to examine the conditions of the presentations besides the physical looks, what other link on the internet and servers can we establish to charge the victim. It shall then be followed by a series of analysis in the forensic laboratory linking all the possible connections to the crime scene. The series shall follow a chronological order. At the same time, the gap in the case can be linked to the facts presented in the case. The files may also prove certain points, the evidence might not have been properly handled. The investigators may have missed the viral content of the scene of arson and its origin by raiding the computer parts without establishing the root origin of the arson. Even then, the laboratory process shall run on all the presented evidence in all the scenes of occurrences in the case (Taylor et al. 2014).
The use of passwords has been established as the effective way of making user accounts very private and protected from the internet threats cyber crimes. However, there has also been established several challenges associated with the users' passwords. This client might be a victim of some of the many challenges faced in the software technology and the cyber protection today. First, human beings are prone to forgetting complex passwords, especially where the password has several elements to be memorized. It is also a common knowledge that when we own several accounts for various reasons, he might have mastered wrongly the different accounts' passwords as they are used in the accounts (Ferreira et al. 2013). For instance, using the same mail account to login into Facebook and other private social accounts may bring confusion in which password was used where in the event of logins.
At the same time, crimes committed on the internet have become a focal point of concern in the use of computers today. Hackers are continuing to use the codes submitted in the password resets to interrupt the private data stored in the various accounts. The other cause of such password problems, may, therefore, be linked to the high numbers of hackers in the internet. The address details may contain very vital information that are useful in the hackers' perception. Such information, may as well be corrupted by a release of a virus into the computer. This in turn might be interfering with the accounts detail retrieval by the connection with the servers. In my opinion, I think the employee needs to consult a specialist to check the server details to determine the root cause and track the reset records in the history of the computer. No single cause should be ruled out in the event of establishing the exact cause of such a crime in the employee's account.
The forensic tools shares common features in being softwares that can be downloaded and run in the Apple products. I strongly recommend the use of the iPhone Annalyzers because they are relatively cheap and commonly accessible to all mobile users globally. It is also easy to use.
References
Hoog, A., & Strzempka, K. (2011). iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices. Elsevier.
Ferreira, A., Correia, R., Chadwick, D., Santos, H. M., Gomes, R., Reis, D., & Antunes, L. (2013). Password sharing and how to reduce it. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications, 22.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.