top of page
Typing on a Computer

Computer Forensics

Digital Forensic Examination Project

In the digital forensics project, our goal is to uncover a suspicious user on a device and investigate any substantial evidence of illegal activities found on it. I also investigated the user's digital footprints to uncover any suspicious activities that may have occurred. Furthermore, I identified any possible plans or bad actors that may provide crucial leads for the ongoing investigation of the suspicious user.

01

Identification of Primary User

In the forensic investigation of the recovered computer linked to the Perry Winkler case, we conclusively identified Perry Winkler as the primary user. Using tools like FTK Imager and Registry Explorer, we traced user profiles and system metadata, including the computer's name ("PERRYWINKLER-PC") and specific user identifiers (SID), affirming his association with the device.

02

Evidence of Illegal Activities

The examination unearthed compelling evidence suggesting involvement in illegal activities. I discovered incriminating images such as drugs, money, and credit cards, along with a detailed Excel file cataloging customers and transactions. Additionally, the presence of software like "Eraser" and the Tor Browser indicated attempts to erase traces of illicit behavior and engage in activities potentially linked to the dark web.

03

Attempts to Cover Tracks

Furthermore, the findings revealed deliberate efforts to cover tracks and delete evidence. Emails discussing the removal of sensitive files, alongside deleted items recovered from the recycle bin, underscored systematic attempts to conceal incriminating activities.

©2024 by Michael Ly

bottom of page