12.11.2012 Views

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

indexes and s<strong>to</strong>res Web pages <strong>to</strong> allow researchers <strong>to</strong> access discarded or<br />

since-altered versions. Such a capability may be an asset for the<br />

prosecution also <strong>to</strong> prove the contents <strong>of</strong> a particular website a specific<br />

point in time. According <strong>to</strong> Eltgroth, however, some courts have excluded<br />

evidence obtained via the Wayback Machine, citing both authentication<br />

and hearsay concerns. As a result, parties who rely on the content <strong>of</strong> a<br />

Web page currently face an unclear evidentiary standard for the admission<br />

<strong>of</strong> what may serve as the only available record <strong>of</strong> since vanished content<br />

(51). Once a party removes content from a website, the current case law<br />

fails <strong>to</strong> provide a clear standard for how <strong>to</strong> authenticate archived Web<br />

pages <strong>of</strong>fered in lieu <strong>of</strong> the missing original (52). The skepticism that courts<br />

have displayed with respect <strong>to</strong> archived Web content appears <strong>to</strong> result<br />

from a combination <strong>of</strong> reluctance <strong>to</strong> attribute archived content <strong>to</strong> a content<br />

provider and concerns about accuracy and the potential for intermeddling<br />

(53).<br />

Berman states that in order properly <strong>to</strong> preserve a webpage, it must be<br />

captured at the exact moment in time in which the preservation is desired<br />

(54). It may also require multiple captures <strong>to</strong> produce a series <strong>of</strong><br />

"snapshots," showing how a site changed over time which is especially<br />

useful in instances where the very fact <strong>of</strong> habitually updating a website, or<br />

the dates and times <strong>of</strong> the updates, are <strong>of</strong> evidentiary significance (55).<br />

Once content on a social networking site, blog or wiki has been identified<br />

as relevant, it must be preserved in such a way that it can later be<br />

authenticated for use as evidence in litigation, as well as <strong>to</strong> show that a<br />

complete preservation was performed (56). Preservation must be done<br />

completely <strong>to</strong> ensure that all website information including that which<br />

might be contradic<strong>to</strong>ry <strong>to</strong> the stance <strong>of</strong> a party is captured (57).<br />

4.3 Operating systems<br />

Sommer states that all operating systems, applications and services are in<br />

very wide use and within all are forensic traces that have significant<br />

potential for a very wide range <strong>of</strong> investigations (58). He states that the<br />

arguments about speed <strong>of</strong> change in relation <strong>to</strong> personal computers can be<br />

applied with at least equal force <strong>to</strong> cellphones, where major manufacturers<br />

release new models with new features and new opportunities for digital<br />

footprints <strong>to</strong> be created every 3 or 4 months. He states that digital<br />

evidence will have <strong>to</strong> be at least a year perhaps more behind the ways in<br />

which computers are used by organizations and individuals and criminals.<br />

4.4 Hand held devices including mobile (cell) phones<br />

Marshall describes technical assistants such as smart phones as<br />

“unsleeping witnesses”(59). Stillwagon describes them as portable<br />

microcomputers embedded in public spaces (60). Even though the device<br />

itself may not have played any role in the crime, its very presence at the<br />

crime scene, or use by one <strong>of</strong> those involved, <strong>of</strong>ten leads <strong>to</strong> it being a<br />

potential source <strong>of</strong> information or images <strong>of</strong> evidentiary value (61).<br />

408

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!