scholarly journals Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations

Author(s):  
Thein Tun ◽  
Blaine Price ◽  
Arosha Bandara ◽  
Yijun Yu ◽  
Bashar Nuseibeh
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Philip J. Cook ◽  
Anthony Berglund ◽  
Matthew Triano

PurposeThe purpose of this study is to describe the creation, implementation, activities and rationale for the Area Technology Centers (ATCs), an innovation adopted by the Chicago Police Department’s (CPD’s) Bureau of Detectives (BoD) in 2019 for the purpose of supporting investigations of crimes of serious violence by deploying specialized teams of officers to gather and process video and digital evidence.Design/methodology/approachThis case study utilizes historical information and descriptive data generated by a record-keeping system adopted by the ATCs.FindingsThe ATCs were developed as a collaboration between the CPD and the University of Chicago Crime Lab (a research center). The start-up was funded by a gift from the Griffin Foundation. Detectives have made extensive use of the services provided by the ATCs from the beginning, with the result that homicide and shooting investigations now have access to more video and digital evidence that has been processed by state-of-the-art equipment. The CPD has assumed budget responsibility for the ATCs, which is an indication of their success. The ATC teams have been assembled by voluntary transfers by sworn officers, together with an embedded analyst from the University of Chicago.Practical implicationsThe ATC model could be adopted by other large police departments. The study finds that ATCs can be effectively staffed by redeploying and training existing staff and that their operation does not require a budget increase.Social implicationsBy arguably making police investigations of shooting cases more efficient, the ATCs have the potential to increase the clearance rate and thereby prevent future gun violence.Originality/valueThe ATCs are a novel response to the challenges of securing and making good use of video and digital evidence in police investigations.


2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


Author(s):  
Matthew N.O. Sadiku ◽  
Adebowale E. Shadare ◽  
Sarhan M. Musa

Digital chain of custody is the record of preservation of digital evidence from collection to presentation in the court of law. This is an essential part of digital investigation process.  Its key objective is to ensure that the digital evidence presented to the court remains as originally collected, without tampering. The chain of custody is important for admissible evidence in court. Without a chain of custody, the opposing attorney can challenge or dismiss the evidence presented. The aim of this paper is to provide a brief introduction to the concept of digital chain custody.


2020 ◽  
Author(s):  
Sagar Rao ◽  
Shalomi Fernandes ◽  
Samruddhi Raorane ◽  
Shafaque Syed

J-Institute ◽  
2017 ◽  
Vol 2 (1) ◽  
pp. 7-12
Author(s):  
Burmshik Kim ◽  
Keyword(s):  

2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


Sign in / Sign up

Export Citation Format

Share Document