12.11.2012 Views

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

government labs could be counterproductive, exhausting their limited<br />

resources and driving them out <strong>of</strong> business.<br />

5.2 Limitations in the Court’s understanding <strong>of</strong> digital evidence<br />

Edmund argues that police, investigative and security agencies,<br />

prosecu<strong>to</strong>rs and federal and state courts have not developed principled<br />

approaches <strong>to</strong> the use and admissibility <strong>of</strong> emerging technologies, their<br />

products and the different forms <strong>of</strong> expertise and opinion based upon them<br />

(72). Edmund argued that these developments are unfortunate because<br />

relatively few <strong>of</strong> the new techniques have been tested or independently<br />

reviewed (73). It is inevitable that courts will impose more demanding<br />

admissibility standards and that those involved in e-forensics, biometrics<br />

and identification should begin <strong>to</strong> respond <strong>to</strong> the anticipated interest in the<br />

validity and reliability <strong>of</strong> their systems and opinions (74).<br />

6 Future trends<br />

6.1 The future <strong>of</strong> digital forensics<br />

Technological advances in virtualisation <strong>to</strong>ols have and will continue <strong>to</strong><br />

create difficulty for digital forensic examiners. Barrett states that we are<br />

moving <strong>to</strong>wards a dynamic operating environment where organizations are<br />

streaming applications virtual operating systems from remote servers <strong>to</strong><br />

desk<strong>to</strong>ps on an as needed basis (75). The virtual user environment can be<br />

deleted hence providing a challenge <strong>to</strong> the digital forensic examiner <strong>to</strong><br />

research and implement methods <strong>to</strong> find virtualization artifacts and identify<br />

virtual activities that affect the examination process <strong>of</strong> certain virtualized<br />

user environments (76).<br />

6.2 Investigative management<br />

SO/IEC JTC 1/SC 27 Information Technology - Security Techniques,<br />

Guidelines for identification, collection and/or acquisition and preservation<br />

<strong>of</strong> digital evidence is an international standard <strong>to</strong> ensure that responsible<br />

individuals manage digital evidence in accordance with practical ways that<br />

are acceptable worldwide, with the objective <strong>to</strong> preserve its integrity and<br />

authenticity (77). The International Standard provides guidelines for digital<br />

evidence management. It describes the processes <strong>of</strong> identification,<br />

collection, acquisition and preservation <strong>of</strong> potential digital evidence that<br />

may be <strong>of</strong> evidentiary value. The objective is <strong>to</strong> assist organizations in their<br />

disciplinary procedures, and <strong>to</strong> facilitate the exchange <strong>of</strong> potential digital<br />

evidence between jurisdictions. This standard deals with common<br />

situations encountered throughout the digital management process. The<br />

potential digital evidence may be sourced from any type <strong>of</strong> media, and<br />

refers <strong>to</strong> data that is already in a digital format. This International Standard<br />

does not attempt <strong>to</strong> cover the conversion <strong>of</strong> analog data in<strong>to</strong> digital format<br />

(78).<br />

411

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!