12.11.2012 Views

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Navigation devices are increasingly being examined in criminal cases <strong>to</strong><br />

identify data <strong>of</strong> evidential value. The evidential value <strong>of</strong> such devices are<br />

obvious and becoming increasing available with the growth in the<br />

availability <strong>of</strong> this technology particularly outside <strong>of</strong> traditional applications.<br />

This technology is now a common feature within smart phones <strong>to</strong> provide<br />

not only a traditional navigation function but <strong>to</strong> geographically record the<br />

location at which a pho<strong>to</strong>graph was taken, or report the location <strong>of</strong> the<br />

nearest teller machine. Obviously such evidence may provide a strong<br />

indication between the user and a particular address. In any <strong>of</strong>fence<br />

where a person’s movements are <strong>of</strong> interest, the analysis <strong>of</strong> a GPS device<br />

<strong>to</strong> retrieve the s<strong>to</strong>red locations may be evidentiary value. Forensic<br />

analysis may recover deleted location records and identify where the<br />

device has been in addition <strong>to</strong> destinations which may have been entered<br />

in the device (62).<br />

4.5 Forensic <strong>to</strong>ols<br />

Limongelli states that there is a tendency among many proponents <strong>of</strong><br />

open-source s<strong>of</strong>tware <strong>to</strong> assert that proprietary s<strong>of</strong>tware applications<br />

should be evaluated by courts by different, and higher, standards than<br />

those applied <strong>to</strong> scientific or technical evidence generally (63). He states<br />

that although there is case law regarding the proper standards for the<br />

admission <strong>of</strong> technical or scientific evidence, none <strong>of</strong> that case law<br />

supports a distinction between proprietary s<strong>of</strong>tware and open-source <strong>to</strong>ols.<br />

He submits that if a particular proprietary s<strong>of</strong>tware is unreliable, the<br />

appropriate remedy is already embodied in existing case law and the rules<br />

<strong>of</strong> evidence.<br />

Lei pan submits that correctness testing methodology enables the tester <strong>to</strong><br />

achieve testing results <strong>of</strong> high quality from a manageable number <strong>of</strong><br />

observations and in a dynamic but controllable way (64). This is <strong>of</strong><br />

particular interest <strong>to</strong> forensic testers who do not have access <strong>to</strong><br />

sophisticated equipment and who can allocate only a small amount <strong>of</strong> time<br />

<strong>to</strong> testing. Lei Pan stated that the focus <strong>of</strong> the testing should be on the<br />

verification <strong>of</strong> the user’s desired features and prioritise frequently used<br />

features. One concern however with <strong>to</strong>ol validation is the assumption that<br />

the tester and ultimate end user have operated the <strong>to</strong>ol correctly according<br />

<strong>to</strong> the user manual. A further concern for the reliance on <strong>to</strong>ol validation is<br />

that CFT are using the <strong>to</strong>ol on a wide variety <strong>of</strong> hardware and s<strong>of</strong>tware, not<br />

necessarily the hardware and s<strong>of</strong>tware employed for the validation<br />

process. The question may arise “Was the <strong>to</strong>ol validated for the Asus<br />

Lap<strong>to</strong>p model XYZ? If not, is the <strong>to</strong>ol reliable? A further question also<br />

relates <strong>to</strong> the release <strong>of</strong> new versions <strong>of</strong> a <strong>to</strong>ol. For example what were<br />

the changes between version 1.5 and 1.4 and does version 1.5 invalidate<br />

1.4? The practitioner should expect these questions in cross examination.<br />

4.6 Managing investiga<strong>to</strong>rs and prosecu<strong>to</strong>rs expectations<br />

409

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!