97 Educational provision for the study of computer forensics
It is no longer adequate to depend on individuals as governments own and control
vast databases with sensitive information both private to individuals and relevant to
national security in general. It is becoming necessary to understand and manage the
computer forensics process.
Some research (
EURIM-IPPR, 2004; Taal, 2007
) has formulated a set of prin-
ciples and has suggested a high level methodology for this purpose. All procedures
and guidelines for the collection and handling of computer evidence are based on
the Association of Chief Police Officers (ACPO) guidelines; many follow the ACPO
Guidelines including those in the private sector. ACPO is an independent, profes-
sionally led strategic body, they lead and coordinate the direction and development
of the police service in England, Wales and Northern Ireland.
This guidance was created to assist law enforcement in dealing with computer
evidence (
ACPO Guidelines, 2009
). This came in the form of four principles as
follows:
Principle 1: No action taken by law enforcement agencies or their agents
should change data held on a computer or storage media which may
subsequently be relied upon in court.
Principle 2: In exceptional circumstances, where a person finds it necessary to
access original data held on a computer or on storage media, that person must
be competent to do so and be able to give evidence explaining the relevance and
the implications of their actions.
Principle 3: An audit trail or other record of all processes applied to computer-
based electronic evidence should be created and preserved. An independent third
party should be able to examine those processes and achieve the same result.
Principle 4: The person in charge of the investigation (the case officer) has
overall responsibility for ensuring that the law and these principles are adhered to.
In the private sector, the guidelines are usually incorporated into their internal pro-
cedures as most computer forensic companies in the private sector deal with defense
work and civil matters where the guidelines may not always apply. Only a few may
have contracts with the Metropolitan Police, Scotland Yard and other prosecution
authorities in which case their procedures have to be followed and not that of the
private sector.
From the above it is clear that the guidelines are necessary but without the suc-
cessful use of the guidelines requires proper training and understanding of the
guidelines. Most law enforcement agents found themselves in this field somewhat
reluctantly, because of the heavy demand to tackle e-crime.