25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

To minimise the possibility of fraudulent evidence being admitted, authentication<br />

procedures are required to analyse the chain of evidence [Kenneally, 2004].<br />

The analysis must account for any movement of the evidence, or interpretation<br />

of the data. This may be a physical change such as from the custody of an<br />

individual to another; or it may be a change in the interpretation of the data, for<br />

example locating and extracting deleted files. Justification for any action taken<br />

which alters the state of the original evidence needs to be provided to show an<br />

analyst understands how the evidence being presented in their report was<br />

obtained [National Center for Forensic Science, 2003]. The documentation of<br />

these actions shows clearly what has happened to the data and assists with<br />

establishing that any evidence produced is an accurate representation of the<br />

original data.<br />

To ensure the ACPO guidelines are complied with, it is necessary to understand<br />

the consequences of any action performed ensuring the relationship with the<br />

original data is maintained. It is also necessary to justify the behaviour of the<br />

software being used during examinations, to ensure that any changes made to<br />

the evidence do not affect its integrity [ACPO, 2010]. In the UK, the ACPO<br />

guidelines are a significant part of a good practice approach to investigating<br />

computer crime. However as computer crime is a global problem and may<br />

involve several legal jurisdictions in a single case it may also be necessary to<br />

consider what constraints affect procedures elsewhere in the world. The USA<br />

has produced a set of guidelines based upon their legal requirements [NIST,<br />

2004], which when compared to the UK’s guidelines highlight the common<br />

theme of ensuring the integrity of the evidence by producing a clear chain of<br />

evidence.<br />

4.2.5 Human Behavioural Constraints<br />

A forensic computing analyst examines digital media, from which they produce<br />

evidence related to the issue under investigation. Whilst it is not their job to<br />

Page 55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!