Page 42 - cyber law new
P. 42
Cyber Crime and Law Investigators use a variety of techniques and proprietary software forensic
applications to examine the copy, searching hidden folders and unallocated disk space
for copies of deleted, encrypted, or damaged files. Any evidence found on the digital
Notes copy is carefully documented in a “finding report” and verified with the original in
preparation for legal proceedings that involve discovery, depositions, or actual litigation.
1.32 Objectives of Cyber Forensics
The objective of Cyber forensics is to identify digital evidence for an investigation with
the scientific method to draw conclusions. Examples of investigations that use cyber
forensics include unlawful use of computers, child pornography, and cyber terrorism.
The area of cyber forensics has become prominent field of research because:
1. Forensics systems allow the administrator to diagnose errors
2. Intrusion detection systems are necessary in avoiding cyber crimes
3. Change detection can be possible with proactive forensics
Cyber forensics can be used for two benefits:
To investigate allegations of digital malfeasance
To perform cause analysis
1.33 Legal Scenario
Forensic evidence is only as valuable as the integrity of the method that the evidence was
obtained. The methods applied to obtain evidence are best represented if standards are
known and readily established by the digital forensics community. The Fourth Amendment
limits the ability of government agents to perform search and seizure evidence tactics
without a warrant, including computers.
The Fourth Amendment states: The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and the persons or
things to be seized.
The Fourth Amendment question that typically comes up in digital evidence cases
asks whether an individual has a reasonable expectation of privacy having electronic
information stored on electronic devices under that individual’s control.
Computer evidence can present a challenge for both prosecutors and defendants
alike. A guide to offering mobile device data as evidence is beyond the scope of this
research but a few examples of some digital forensics issues in real life situations are
described below.
42 Self Learning Material