12.11.2012 Views

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Kuncik states that counter forensic <strong>to</strong>ols have become more common and<br />

more powerful. None <strong>of</strong> these methods however guarantee <strong>to</strong> eliminate all<br />

evidence <strong>of</strong> their use and are more likely <strong>to</strong> leave some evidence <strong>of</strong> their<br />

use on computers, networks and servers (22). Any attempt <strong>to</strong> destroy<br />

evidence indicates an intention <strong>to</strong> hide data and is likely <strong>to</strong> destroy the<br />

credibility <strong>of</strong> those who employ it. Unfortunately an incentive <strong>to</strong> destroy<br />

evidence remains due <strong>to</strong> the fact that the penalty for evidence tampering<br />

may not be as severe as the penalty for being caught with the original<br />

evidence.<br />

Chval states that while evidence that is obtained during a cyberinvestigation<br />

through the application <strong>of</strong> computer forensic techniques may<br />

be untainted, the reality is that anti-forensic applications are pervasive and<br />

becoming more accessible <strong>to</strong> the general public with each passing day,<br />

both in terms <strong>of</strong> their general availability and their ease <strong>of</strong> use (23).<br />

Attempts <strong>to</strong> employ anti-forensic strategies by someone who is unfamiliar<br />

with them would likely leave a trail <strong>of</strong> evidence that could result in<br />

significant sanctions, particularly if the evidence itself is evidence <strong>of</strong> the<br />

use <strong>of</strong> anti forensic technologies. In contrast, Chval states that a thorough<br />

anti-forensic attack may <strong>of</strong>ten render data-mining through computer<br />

forensics a practice in futility. Equally, a comprehensive attack can trick<br />

investiga<strong>to</strong>rs by leaving evidentiary trails that may well lead <strong>to</strong> injustices for<br />

the innocent resulting in the loss <strong>of</strong> property or liberty (24). Sophisticated<br />

users, on the other hand, will be able <strong>to</strong> wreck havoc with little concern <strong>of</strong><br />

consequence.<br />

Chval concludes that while many courts continue <strong>to</strong> accept computer<br />

forensics' <strong>to</strong>ols, techniques and concomitant evidence as presumptively<br />

reliable, both the developments in anti-forensics and research coming out<br />

<strong>of</strong> related fields point <strong>to</strong> a reality where computer forensic <strong>to</strong>ols and<br />

techniques merit far greater scrutiny (25). While many courts have not yet<br />

adopted standards for addressing these concerns, others are busy at work<br />

laying that foundation (26).<br />

2.5 Social networking<br />

During the reporting period the world has seen a growth in social<br />

networking web sites such as Facebook and Myspace through Web 2.0<br />

enabling peer <strong>to</strong> peer communication and self expression through the<br />

sharing <strong>of</strong> au<strong>to</strong>biographical information.<br />

Facebook describes its mission <strong>to</strong> give people the power <strong>to</strong> share and<br />

make the world more open and connected. The site boasts that millions <strong>of</strong><br />

people use Facebook everyday <strong>to</strong> keep up with friends, upload an<br />

unlimited number <strong>of</strong> pho<strong>to</strong>s, share links and videos, and learn more about<br />

the people they meet (27). The site has over 400 Million users (28).<br />

MySpace is also an online community that lets users “meet their friends'<br />

friends” (29). The site boasts that a user can create a community on<br />

403

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!