Computer Forensics And Electronic Evidence - Failure of Competent Computer Forensic Analysis And Other Computer-Related Acts As Ineffective Assistance Of Counsel

Author(s):  
Michael Martin Losavio ◽  
Deborah Wilson Keeling
2018 ◽  
Vol 14 (18) ◽  
pp. 40
Author(s):  
Iván Mesias Hidalgo Cajo ◽  
Saul Yasaca Pucuna ◽  
Byron Geovanny Hidalgo Cajo ◽  
Víctor Manuel Oquendo Coronado ◽  
Fanny Valeria Salazar Orozco

The aim of this research is to compare the different standards and methodologies of computer forensic analysis used in the examination of data in digital media. The research was developed based on the scientific method, and a standard and two analysis methodologies were specifically used, which were applied to ten researchers. The analysis variables were based on the feasibility of use and on the time of extracting information from the computer. Among the comparison results of the different methodologies analyzed, it was determined that for the Methodology UNE 71506: 2013, 60% of the researchers used it due to the feasibility of use because it is made up of a robust process (contains the most detailed steps of computer forensics). Reliable and applicable in any field necessarily supervised by specialists working in the area, compared to the National Institute of Standards and Technology that selected 30%, Integrated Digital Investigation Process 10%. Regarding the time of analysis in the examination of digital media with different methodologies (Case study: Extraction of a file of 100 Mb, of a hard disk of 20 Gb in off mode. It is revealed that in the UNE 71506: 2013 it took less than 1 hour compared to the National Institute of Standards and Technology, which took between 1 and less than 2 hours, the Integrated Digital Investigation Process, which lasted longer than 3 hours. In addition, with the use of the Methodology UNE 71506: 2013, it was possible to have greater feasibility in the examination of digital media, since it is composed of four stages such as the preservation, acquisition, analysis and presentation of information results.


2015 ◽  
Vol 12 (2) ◽  
pp. 1092
Author(s):  
İlker Koç ◽  
Huseyin Çakır

<p>Wide usage of information technologies in banking, finance, health and other commercial sectors requires performing of audit of these sectors through information systems. Collecting and protecting electronic evidence is critically important for both judicial process and results of audit activities. Gathering electronic evidences from an information system is a subject for computer forensics and requires special expertise and equipment. Conversely, in Turkey, most of the  institutions responsible for  supervision of financial and other relevant sectors have not enough knowledge and experience about forensic audit. Due to the absence of technical knowledge and tools, there would be deficiencies in collecting electronic evidence in accurate manner. In order to prevent these deficiencies, some alternative solutions are offered in this study. These solutions are adapting the computer forensic techniques to audit processes, providing appropriate training to auditors, establishing a legal environment, sharing of information system audit resource and outsourcing of forensic audit activities.</p><p> </p><p><strong>Özet</strong></p><p>Bankacılık, finans, sağlık ve diğer ticari sektörlerde bilgi teknolojilerinin kullanımının artması, denetim faaliyetlerinin de bilgi sistemleri üzerinden gerçekleştirilmesi gereksinimini doğurmaktadır. Elektronik ortamlardan dijital delil elde edilmesi ve korunması hem denetim faaliyetinin sonuçları hem de adli süreç açısından önem taşımaktadır. Dijital delillerin elde edilmesi ve korunması adli bilişim faaliyeti kapsamına girmektedir. Adli bilişim faaliyeti uzmanlık ve özel donanımların kullanımını gerektirmektedir. Ancak, Türkiye’de dış denetimle görevli kurumların faaliyetlerinde, adli bilişim yöntemlerine ilişkin yeterli teknik bilgi ve donanım bulunmamaktadır. Bu durum nedeniyle kamu denetim faaliyetlerinde dijital ortamlardan delil elde edilmesi ve korunmasında çeşitli eksiklikler söz konusudur. Bahse konu eksiklikler, denetim sonuçlarının adli sürece taşınması durumunda, çeşitli problemlere yol açabilecek niteliktedir. Bu çalışmada, adli bilişim teknik ve donanımlarına ilişkin eksikliklerin neden olabileceği olası problemlerin önlenebilmesi için çeşitli çözüm önerileri sunulmaktadır. Çözüm önerileri, adli bilişim sürecinin denetim faaliyetlerine uyarlanması, denetçilere eğitim verilmesi, uygun bir yasal altyapı oluşturulması, bilgi sistemi denetim uzman ve araçlarının ortak kullanımı ve dış kaynak sağlanmasıdır.</p>


2012 ◽  
pp. 1221-1236
Author(s):  
Gregory H. Carlton ◽  
Hill Zhou

Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.


Author(s):  
Chris K. Ridder

Computer forensic software is used by lawyers and law enforcement to collect and preserve data in a “forensic image” so that it can be analyzed without changing the original media, and to preserve the chain of custody of the evidence. To the extent there are vulnerabilities in this software, an attacker may be able to hide or alter the data available to a forensic analyst, causing courts to render judgments based on inaccurate or incomplete evidence. There are a number of legal doctrines designed to ensure that evidence presented to courts is authentic, accurate and reliable, but thus far courts have not applied them with the possibility of security weaknesses in forensic software in mind. This article examines how courts may react to such claims, and recommends strategies that attorneys and courts can use to ensure that electronic evidence presented in court is both admissible and fair to litigants.


Author(s):  
Jolita Kančauskienė

Jolita Kančauskienė, a Prosecutor of the Criminal Prosecution Department, Prosecutor General’s Office in the Republic of Lithuania, examines the role and development of electronic evidence in criminal legal proceedings in Lithuania. Since the ultimate objective is to use evidence to prove or disprove disputed facts, electronic evidence must be obtained in compliance with existing legislation and best practice to ensure admissibility at trial. Index words: Evidence law, criminal procedure, Electronic evidence law and legislation, Lithuania


2015 ◽  
Author(s):  
Thomas Sloan ◽  
Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.


Author(s):  
Firmansyah Gustav Hikmatyar ◽  
Bambang Sugiantoro

As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.


Sign in / Sign up

Export Citation Format

Share Document