Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence
Authors: Lilian Noronha Nassif
Abstract:
Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field.
Keywords: Digital evidence, digital forensic processes and procedures, mobile forensics, cloud forensics.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1129279
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1217References:
[1] Technology Working Group for Investigative Uses of High Technology. Investigative uses of technology: Devices, tools, and techniques. NIJ Special Report NCJ213030. Washington, DC: National Institute of Justice (2007).
[2] IDC. Available at http://www.idc.com/prodserv/smartphone-os-market-share.jsp. (Accessed: 30 Sep 2016).
[3] Electronic CSI, A Guide for First Responders, 2nd Edition, National Institute of Justice, (2008).
[4] Zhang, Li, Xu, Chao, Pathak, Parth H., Mohapatra, Prasant. Characterizing Instant Messaging on Smartphones. Volume 8995. Lecture Notes in Computer Science pp 83-95. 2015
[5] Mell, P., Grance, T. “Draft NIST working definition of cloud compuing-v15”, 21. Aug (2009).
[6] Zhang, Q., Cheng, L. Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Application. 1(1), 7-18. (2010)
[7] Google. Google Drive. Available at https://drive.google.com (Accessed 08 Jan 2015).
[8] Rackspace. Focus on your business. Available at http://www.rackspace.com (Accessed 03 Jan 2015).
[9] Azure. Windows azure. Available at http://www.windowsazure.com (Accessed 10 Jan 2015).
[10] GAE. Google App Engine. Available at http://appengine.google.com (Accessed 10 Jan 2015).
[11] Amazon. Amazon Elastic Computing Cloud. Available at htt://aws.amazon.com/ec2 (Accessed 10 Jan 2015).
[12] GoGrid. Cloud Hosting, Cloud Computing and Hybrid Infrastructure from GoGrid. Available at http://www.gogrid.com (Accessed 09 Jan 2015).
[13] Zawoad, S., Hasan R. Cloud Forensics: A meta-Study of Challenges, Approaces, and And Open Problems. arXiv preprint arXiv:1302.63.12, pp 1-15, (2013).
[14] Bosack et al. Social Media Evidence: Ethical and Practical Considerations for Collecting and Using Social Media Evidence in Litigation. Corporate Conseul CLE Seminar (2014)
[15] Murphy, J., Fontecilla, A. Social Media Evidence in Criminal Proceedings: An Uncertain Frontier.Richmond Journal of Law & Technology. Volume XIX, Issue 3. 2013
[16] How to Gather Social Media Evidence. Avoid Legal Disasters and Win More Cases. Available at http://i-sight.com/how-to-gather-social-media-evidence. (Accessed: 10 Nov 2014).
[17] Camtasia. Available at http://www.techsmith.com/camtasia.html (Accessed: 03 Jan 2015).
[18] Screencast-O-Matic. Available at http://screencast-o-matic.com/ (Accessed: 05 Jan 2015).