Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet78/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   74   75   76   77   78   79   80   81   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

CHAPTER
71
7
Seizing, imaging, and 
analyzing digital evidence: 
step-by-step guidelines
David Day
INTRODUCTION
There are a number of approaches that can be taken when creating and subse-
quently executing a plan for a forensic investigation. Those that are selected, or 
created, are done so largely subjectively. However, there are certain criteria which 
should be followed both in terms of meeting best practice, complying with laws 
and regulations, and also ensuring any evidence discovered remains admissible in 
court. It is the purpose of this chapter to offer guidance in how to meet these aims, 
and in addition to discuss some of the more insightful methods used when search-
ing for incriminating evidence. Further, it is intended to provide the examiner with 
an overall view of the processes. From what needs to be considered when applying 
for a search warrant, through to how to seize and acquire evidence appropriately. 
Finally it is discussed how to apply inventive methods to uncover crucial evidence 
via forensic analysis, including evidence that may have been obfuscated via anti-
forensic techniques.
ESTABLISHING CRIME
Forensic evidence is usually gathered by a search of a suspect’s premises and sei-
zure of the relevant equipment. To do this legally it is typically necessary to obtain 
a search warrant. The details of this process differ depending on the laws of the 
country and the jurisdiction in which the alleged offence took place; however, in 
most instances warrants are supplied by a judge who has been convinced that enough 
evidence exists to justify its issue. For example, in the UK a judge needs to be satis-
fied that there are “reasonable grounds” for believing that an offence has occurred 
(
Crown, 1984
). Normally this offence would be listed under the computer misuse act. 
In the United States, the process is similar with the fourth amendment’s inclusion 
of the term “probable cause” being cited (
FindLaw, 2014
). It is beyond the scope of 
this work to fully explore what is meant by both “reasonable grounds” and “prob-
able cause” but in either case it is clear that significant evidence is need, and that the 
request to search a premises is not based on simply a suspicion or a hunch. Further, 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   74   75   76   77   78   79   80   81   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish