99
Conclusions
gave evidence in more than 700 police cases, some of them involving rape and drink-
driving, Morrison, 48, of Hyde, Tameside, was found guilty of 22 counts of perjury at
Minshull Street Crown Court in Manchester and given a 5-year jail sentence. His claims
to be a forensic scientist were bogus, and the BSc and PhD qualifications he claimed
were in fact bought from a university that existed only on the internet.
One thing is for sure having a form of accreditations will force government, aca-
demics, researches and those working in the field of computer forensics to set more
appropriate standards and controls for those who handle, analyze and investigate
computer evidence.
THE CFM METHODOLOGY
The CFM consists of four phases namely Identify, Acquire, Preserve and Report:
1.
Identify:
Source of digital evidence.
2.
Acquire:
Taking an image of the media as it was found.
3.
Preserve:
Chain of custody as well as the integrity of the data itself making
sure no information has been added or altered.
4.
Report:
To report all findings and processes used.
The persons carrying out the above must adhere to standard evidence rules, i.e.,
Police and Criminal Evidence Act (PACE) 1984 in criminal matters, that are admis-
sible in a court of law. The Home Office current PACE codes came into effect on 27th
of October 2013 (
The Police and Criminal Act, 1984
).
Stage 4 requires more detailed decomposition into the necessary methods for the
analysis and classification of the data for use as evidence and as a historical record.
In the field of computer forensics there is still a lot to be done, i.e., standardizing pro-
cedures, etc. The field in itself has various branches of digital forensics, for example,
Internet Forensics, Network Forensics and Mobile phone Forensics to name but a
few. Customized guidelines for these branches will enable the scientists to ensure the
quality of both the process and the data collected.
It is also important to extend the CFM to include a fifth phase that of Review and
Improve in the light of empirical data which can be classified, organized and mined
for maximizing the effectiveness of the processes.
CONCLUSIONS
With all the above the most important thing people forget and this is by all, is that
in this field the practical experience and the theoretical skills you acquire from aca-
demic institutes go hand-in-hand. You cannot call yourself an expert if you have all
the experience in the world and lack the basic understanding of computer science.
There is concern within law enforcement, government and the private sector as to
the lack of consensus to a standardize approach to training courses and lack of funds
for research.
Do'stlaringiz bilan baham: |