100
CHAPTER 8
Digital forensics education, training and awareness
Defense lawyers have not been confident enough to challenge computer forensic
findings, the lack of understanding and basic knowledge of computers and lastly
the benefits of instructing computer forensic experts when defending individuals
charged with crimes involving computers.
As defense lawyers become even more confident to challenge computer forensic
findings, then, the prosecution success rate will be different and those of us work-
ing in the field of computer forensics are beginning to see the changes both within
civil matters such as tort, breach of contracts, defamation, employee disputes, etc.,
to criminal matters theft, criminal damage, drugs related offence and criminal of-
fences concerning copyright and theft of intellectual property. The key issue here is
the lack of understanding and basic knowledge of computers and lastly the benefits
of instructing computer forensic experts when defending individuals charged with
crimes involving computers.
The development of one or more major multi-disciplinary research centers, fol-
lowing the model of Centre for Information Technology Research for the Interest
of Society (CITRIS), is necessary to attract private funding and bring together ex-
perts from different academic departments and industry in a more integrated, multi-
disciplinary research effort. It is recommended that the Research Councils take the
lead in initiating discussions with Government, universities and industry with a view
to the prompt establishment of an initial centre in UK.
REFERENCES
ACPO Guidelines, 2009.
http://www.acpo.police.uk/documents/crime/2009/200908CRIECS01.
pdf
(accessed January 2014).
E-crime, House of Commons, Home Affairs Committee, Fifth Report of Session, 2013–14,
http://www.publications.parliament.uk/pa/cm201314/cmselect/cmhaff/70/70.pdf
(accessed
January 2014).
EURIM-IPPR E-Crime study. Supplying the Skills for Justice, 18 May 2004.
Jahankhani, H., Anastasios, B., Revett, K., 2007. Digital Anti Forensics: Tools and Approaches.
In: 6th European Conference on Information Warfare and Security Defence College of
Management and Technology, Shrivenham, UK, 2–3 July 2007.
Jones, A., Valli, C., 2004. Building a Digital Forensic Laboratory: Establishing and Managing
a Successful Facility. Publisher Syngress, ISBN 978-1856175104.
Mitchell, B., 2013. Top Free Anonymous Web Proxy Servers.
http://compnetworking.about.
com/od/proxyserversandlists/tp/anonymousproxy.htm
(accessed January 2014).
Police and Justice Act, 2006.
http://www.legislation.gov.uk/ukpga/2006/48/contents
(accessed
January 2014).
Taal, A., 2007. Report examining the weaknesses in the fight against cyber-crime from within.
Int. J. Electronic Security Digital Forensics 1 (2), Interscience Publishers.
The Police and Criminal Act (PACE), 1984.
http://police.homeoffice.gov.uk/operational-po-
licing/powers-pace-codes/pace-code-intro/
(accessed January 2014).
Watson, D., Jones, A., 2013. Digital Forensics Processing and procedures, meeting the require-
ments of ISO 17020, ISO 17025, ISO 27001 and Best practice requirements. Publisher
Syngress, ISBN 978-1-59749-742-8.
Do'stlaringiz bilan baham: |