25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2.1 Legal Constraints<br />

The law can be defined as “the rules of a legal system”[Griffiths, 1979]; since<br />

society adapts alongside the development of law it is suggested they may have<br />

a symbiotic relationship. For a forensic analyst the legal framework ensures<br />

evidence is handled in a fair and appropriate manner. The legal framework also<br />

allows an analyst to understand what constitutes the evidence required for<br />

conviction.<br />

To be guilty of an offence it is generally necessary to prove that a physical act<br />

was committed (actus reus), and that there was a guilty mind (mens rea) [Reed,<br />

2005]. A guilty mind is generally defined as acting with intent; therefore an<br />

analyst is not simply looking for the evidence of the crime, such as abusive<br />

images of children, but is trying to establish whether they were intentionally put<br />

on the system or are present without the users consent. This highlights the<br />

requirement for an analyst to show the system behaviour which led to an<br />

artefact being in its current state as well as the artefact which demonstrates an<br />

act occurred.<br />

When a user is completing an activity, they will use any technique they feel is<br />

appropriate to fulfil their objectives. A forensic analyst must follow appropriate<br />

methodologies when looking for evidence of a user’s actions; this ensures any<br />

findings can be used as evidence. There are numerous resources on legislation<br />

regarding acquiring computer based evidence that document what evidence<br />

can be collected and appropriate methods for obtaining it [Thomas, 2004];<br />

Forensic Computing methodologies are discussed in Chapter 2. Whilst such<br />

legislation constrains the actions of those investigating a case, it also ensures<br />

that the evidence being examined after acquisition has not been altered and is<br />

likely to be admissible in Court; the methodologies assist in preventing breaks in<br />

the chain of evidence that may prejudice the outcome of a case.<br />

Page 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!