Research Paper on "Digital Evidence Forensics and the Law"

Research Paper 12 pages (3398 words) Sources: 10

[EXCERPT] . . . .

Forensics

Digital evidence/forensics and the law.

Digital Forensics

"How does Carrier's (2005) digital forensics process of preservation, isolation, correlation and logging (PICL) compare to the United States Department of Justice's (USDOJ) digital forensic analysis methodology? These methodologies will be compared on the basis of multiple criteria, including their ability to maintain evidence integrity, management of lead information, ability to apply context to evidence presented, and realization of the return on investment in the forensics process."

Computers and digital tools and resources have been used by criminals to increase crime. In response, different methods and resources have also been successfully used to combat this type of crime. Central to this usage is the field of digital forensics. As one study on this subject notes," In an effort to fight this new crime wave, law enforcement agencies, financial institutions, and investment firms are incorporating computer forensics into their infrastructure" (Forensic Examination of Digital Evidence: A Guide for Law Enforcement, 2004).

This is a relatively new field. In 2003 digital evidence was recognized as an acknowledged and fully fledged forensic discipline by the American Society of Crime Laboratory Directors -- Laboratory Accreditation Board (ASCLD -- LAB (Carrier, 2005). This led to the formation of the Computer Forensic Educator's Working Group, which was formed "…to assist educators in developing programs in this field" (Carrier, 2005). There are now numerous colleges and institutions that provide research and programs in this field.
Continue scrolling to

download full paper
>

In essence, computer or digital forensics has to provide two important tasks. The first is to be technically capable and robust to meet the needs of the complete recovery of data and information; secondly it must "… meet the legal requirement of conducting these examinations in a manner that is entirely consistent with the rules of evidence" (Noblett And Feldman). Furthermore, "An informal and ad hoc approach to computer forensics will not likely meet the mandates of the judicial system" (Noblett And Feldman). It is for this reason that a more formal sense of process and methodology was seen as being an increasingly important part of this developing field of expertise.

In other words, the discussion of various methods involved in computer and digital forensics revolves around the central issue of developing standards of examination and legal process. It was to this end that in 1993 an international conference was hosted by the FBI, which led to agreement that "...standards for computer forensic science were both lacking and necessary"(Noblett And Feldman). This was to lead to further conferences and to the creation of the International Organization on Computer Evidence (Noblett And Feldman). This brief background foreshadows the following discussion of two central methodologies.

2. Models and Methodologies

There are a number of methodological aspects involved in digital forensics which are essential to the investigative as well as the legal process. The basic methodology that is used in forensic investigations includes the following three foundational facets. These are; the acquisition of evidence while ensuring that the source is not damaged or altered; integrity and authentication of forensic evidence and comparison with the source; and analyse of data without any alteration of the data source ( Sansurooah, 2006). There are however variations on these themes that will be discussed and compared in the sections below.

2.1. Carrier's Methodology

The first methodology under consideration in this paper is promulgated by Carrier (2005). Carrier posited an integrated digital investigation process, which consisted of five phases; a readiness phase, deployment phase, physical crime scene investigation phase, a cyber crime scene investigation phase and review phase. However critics note that this methodological procedure does not include various factors that influence evidence compilation and comparison; for example, it is asserted by pundits that this methodology does not include a process for classifying cyber crime or for psychological profiling investigation methods, among others (Shin, 2011). These are aspects that will be more fully explored in subsequent sections of this paper.

Carrier (2006) makes the following important conceptual distinctions. He refers to the difference between digital investigation and digital forensic investigation. This distinction is important as it has a bearing on the digital forensics methodologies that are deemed to be more effective and appropriate. A digital investigation, in Carrier's terms, is a "…process to answer questions about digital states and events" (Carrier, 2006). A basic example of a digital investigation is searching for a file on a computer. As Carrier states "…In general, digital investigations may try to answer questions such as "does file X exist?," "was program Y run?," or "was the user Z. account compromised?" (Carrier, 2006).

On the other hand a digital forensic investigation is considered as being a special case of a digital investigation where"… the procedures and techniques that are used will allow the results to be entered into a court of law" (Carrier, 2006). This is a more complex and complicated process in a sense and goes beyond a digital investigation per se. In addition it must take into account legal issues relating to court admissibility as well as legal verification processes, viability, cost factors etc. It is important to remember in this regard that the term 'forensics' means "...to bring to the court" and that "Forensics deals primarily with the recovery and analysis of latent evidence"(Carrier, 2006).

In essence, this distinction emphasises the importance of a comprehensive and inclusive methodological process that includes both the concept of digital investigation and digital forensic investigation. This distinction is also evident in Carrier's definition of digital evidence. Digital evidence is "…data that supports or refutes a hypothesis that was formulated during the investigation. This is a general notion of evidence and may include data that may not be court admissible because it was not properly or legally acquired" (Carrier, 2006).

Carrier's methodology is based on the physical crime scene investigation process. This process included three main phases, which are; system preservation, evidence searching, and event reconstruction which do not necessarily have to occur in that order ( Carrier, 2005).

Figure 1.

( Source: http://dubeiko.com/development/FileSystems/BOOKS/FileSystemAnalysis.pdf)

Within this basic framework there is also a distinction made between live and dead analysis. This refers to a live analyse where "…you use the operating system or other resources of the system being investigated to find evidence"( Carrier, 2005). A dead analysis on the other hand refers to "…when you are running trusted applications in a trusted operating system to find evidence"( Carrier, 2005). The difference between the two lies in the greater risk involved in the live analysis.

This basic framework is extended by Carrier in his PICL Procedure, which refers to preservation, isolation, correlation, and logging. In this system of the first concern is the preservation of the state of the digital crime scene.

As carrier puts it;

The motivation behind this guideline is that you do not want to modify any data that could have been evidence, and you do not want to be in a courtroom where the other side tries to convince the jury that you may have overwritten exculpatory evidence.

(Carrier, 2005)

Carrier also acknowledges that different variables and factors that affect this stage and notes that,

The actions that are taken in this phase vary depending on the legal, business, or operational requirements of the investigation For example, legal requirements may cause you to unplug the system and make a full copy of all data. On the other extreme could be a case involving a spyware infection & #8230;.

(Carrier, 2005)

The isolation guideline is intended to "...Isolate the analysis environment from both the suspect data and the outside world"(Carrier, 2005). This refers to isolation from the suspect data that may corrupt the data and jeopardize the forensic process. Carrier also notes that this phase is difficult when undertaking live analysis.

The third aspect or guideline is the correlation of data with various independent sources. One of the purposes of this method is to reduce the risk of forged data. An example of correlation that Carrier provides is as follows; "...timestamps can be easily changed in most systems. Therefore, if time is very important in your investigation, you should try to find log entries, network traffic, or other events that can confirm the file activity times"(Carrier, 2005).

Logging in this methodology refers to the process of documenting all relevant actions. This process helps to keep track of activities such as searches and to keep a thorough record of results. This phase is also intended to reduce the overwriting of evidence.

The evidence research phase as described by Carrier (2005) is the phase that initiates a search for data that "...support or refute hypotheses about the incident" (Carrier, 2005). This process is described as follows:

We define the general characteristics of the object for which we are searching and then look for that object in a collection of data. For example, if we want all files with the JPG extension, we will look at each file name and identify the ones that end with the characters JPG.

(Carrier, 2005)

The last phase of Carrier's methodology is the Event… READ MORE

Quoted Instructions for "Digital Evidence Forensics and the Law" Assignment:

This is my 5th or 6th time using your service. In each use I have always requested the ***** *****"*****". I am requesting that he once again write this paper.

This order can be completed in TWO installments:

1) I need the bibliography/resources that will be used sent to me by Monday (September 19th at 8:00 am eastern time). The resources need a small review of each of them consisting of 3-4 sentences.

2) I need the completed research paper sent to me by October 3rd.

This request is not unusual as I have asked for this on nearly all my other orders with your service.

*****

*****

How to Reference "Digital Evidence Forensics and the Law" Research Paper in a Bibliography

Digital Evidence Forensics and the Law.” A1-TermPaper.com, 2011, https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001. Accessed 5 Oct 2024.

Digital Evidence Forensics and the Law (2011). Retrieved from https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001
A1-TermPaper.com. (2011). Digital Evidence Forensics and the Law. [online] Available at: https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001 [Accessed 5 Oct, 2024].
”Digital Evidence Forensics and the Law” 2011. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001.
”Digital Evidence Forensics and the Law” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001.
[1] ”Digital Evidence Forensics and the Law”, A1-TermPaper.com, 2011. [Online]. Available: https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001. [Accessed: 5-Oct-2024].
1. Digital Evidence Forensics and the Law [Internet]. A1-TermPaper.com. 2011 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001
1. Digital Evidence Forensics and the Law. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/forensics-digital-evidence/9838001. Published 2011. Accessed October 5, 2024.

Related Research Papers:

Digital Forensics Thesis

Paper Icon

Digital Forensics Technology:

Why Open Source Forensic Software Is a Significant Development

Of the many new technologies introduced into digital forensics in the last five years, open source forensic software… read more

Thesis 8 pages (2402 words) Sources: 10 Style: APA Topic: Computers / IT / Internet


Digital Forensics: Issues and Developments Case Study

Paper Icon

The regional teams has to work with the U.S. Secret Service and gather evidence to create forensic pictures and to analyze that data with a particular network of computers known… read more

Case Study 4 pages (1284 words) Sources: 4 Topic: Computers / IT / Internet


Incident Response and Computer Forensic Investigation Research Paper

Paper Icon

Computer Forensic investigation

Making an initial assessment about the case.

Identifying the risks.

Mitigating or minimizing the risks.

Determining a preliminary design or approach to the case.

Creating a detailed… read more

Research Paper 12 pages (3228 words) Sources: 7 Topic: Computers / IT / Internet


Digital Forensics Research Paper

Paper Icon

Cloud Computing Digital Forensics

The pace at which technology develops in today's world makes inventions and discoveries very temporary and short-lived. Digital forensics is an area of technological development that… read more

Research Paper 4 pages (1273 words) Sources: 4 Topic: Computers / IT / Internet


Computer Forensic Investigation Tools Thesis

Paper Icon

Forensic Tools

Computer-Based Forensics Tools and Criminal Justice

On any given day, millions of dollars in corporate or stock ownership may be lost or compromised due to hacker attacks that… read more

Thesis 2 pages (605 words) Sources: 2 Style: APA Topic: Crime / Police / Criminal Justice


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!