Page 42 - cyber law new
P. 42

Cyber Crime and Law        Investigators  use  a  variety  of  techniques  and  proprietary  software  forensic
                                  applications to examine the copy, searching hidden folders and unallocated disk space
                                  for copies of deleted, encrypted, or damaged files. Any evidence found on the digital

                  Notes           copy is carefully documented in a “finding report” and verified with the original in
                                  preparation for legal proceedings that involve discovery, depositions, or actual litigation.

                                  1.32  Objectives of Cyber Forensics


                                  The objective of Cyber forensics is to identify digital evidence for an investigation with
                                  the scientific method to draw conclusions. Examples of investigations that use cyber
                                  forensics include unlawful use of computers, child pornography, and cyber terrorism.
                                       The area of cyber forensics has become prominent field of research because:

                                   1.  Forensics systems allow the administrator to diagnose errors
                                   2.  Intrusion detection systems are necessary in avoiding cyber crimes

                                   3.  Change detection can be possible with proactive forensics
                                       Cyber forensics can be used for two benefits:
                                         To investigate allegations of digital malfeasance

                                         To perform cause analysis

                                  1.33  Legal Scenario


                                  Forensic evidence is only as valuable as the integrity of the method that the evidence was
                                  obtained. The methods applied to obtain evidence are best represented if standards are
                                  known and readily established by the digital forensics community. The Fourth Amendment
                                  limits the ability of government agents to perform search and seizure evidence tactics
                                  without a warrant, including computers.

                                       The Fourth Amendment states: The right of the people to be secure in their persons,
                                  houses, papers, and effects, against unreasonable searches and seizures, shall not be
                                  violated, and no Warrants shall issue, but upon probable cause, supported by Oath or
                                  affirmation, and particularly describing the place to be searched, and the persons or
                                  things to be seized.
                                       The Fourth Amendment question that typically comes up in digital evidence cases

                                  asks whether an individual has a reasonable expectation of privacy having electronic
                                  information stored on electronic devices under that individual’s control.
                                       Computer evidence can present a challenge for both prosecutors and defendants
                                  alike. A guide to offering mobile device data as evidence is beyond the scope of this
                                  research but a few examples of some digital forensics issues in real life situations are

                                  described below.

           42   Self Learning Material
   37   38   39   40   41   42   43   44   45   46   47