12.11.2012 Views

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.3 Evidentiary problems with emerging technologies<br />

Nelson states that in spite <strong>of</strong> a concerted effort by law enforcement <strong>to</strong><br />

teach first responders how <strong>to</strong> properly seize electronic evidence, we still<br />

see instances where the last access dates <strong>of</strong> files have been altered by<br />

untrained investiga<strong>to</strong>rs or <strong>of</strong>ficers looking at the evidence post-seizure<br />

(79). She states that it appears <strong>to</strong> be particularly alluring <strong>to</strong> take a look at<br />

anything involving sex, but trampling on the evidence in their eager- ness<br />

<strong>to</strong> see what they have provides for the defence counsel a fortui<strong>to</strong>us result<br />

in which proper forensic procedures were not followed and the dates <strong>of</strong> last<br />

access by the defendant are now permanently lost or altered (80).<br />

6.4 Hand held devices<br />

The Apple iPhone was released in the US in June <strong>2007</strong> and in late 2009<br />

Apple released the 3GS version with 32GB s<strong>to</strong>rage capacity. The iPhone<br />

has internet connectivity, GPS navigation, camera and video capability.<br />

Apple promotes the iPhone feature “Remote Wipe” which can be launched<br />

as its name suggests remotely by the authorized user <strong>to</strong> protect their<br />

private information in the event that the phone becomes lost or s<strong>to</strong>len, or<br />

by inference when it is seized by a law enforcement agency. Apple<br />

promotes this feature stating “Your iPhone contains information you don’t<br />

want in the hands <strong>of</strong> a stranger. So if you lose your iPhone and displaying<br />

a message on it hasn’t resulted in its safe return, you can remotely lock it<br />

with a passcode or initiate a remote wipe and res<strong>to</strong>re fac<strong>to</strong>ry settings (81)”.<br />

6.5 Practitioner welfare<br />

The University <strong>of</strong> New Hampshire, Crimes Against Children Research<br />

Centre published a survey <strong>of</strong> work exposure <strong>to</strong> child pornography in<br />

Internet Crimes Against Children (ICAC) Task Forces and affiliates in<br />

November 2009. The report concluded that the well‐being <strong>of</strong> personnel<br />

who investigate child pornography cases is a matter <strong>of</strong> concern, not just for<br />

compassionate reasons, but also because unrelieved stress can lead <strong>to</strong> a<br />

reduction <strong>of</strong> productivity and retention <strong>of</strong> the specialized and highly trained<br />

staff who investigate these crimes. It recommended the undertaking <strong>of</strong><br />

further research <strong>to</strong> systematically examine what characteristics or<br />

circumstances place some individuals at risk for adverse reactions and<br />

what agency policies and practices best alleviate negative impacts for<br />

those doing this important work (82). The report claimed <strong>to</strong> be the first step<br />

<strong>to</strong> answering critical questions about the impact <strong>of</strong> viewing child<br />

pornography on law en‐ forcement investiga<strong>to</strong>rs. The findings indicated<br />

that some law enforcement personnel suffer ill effects, while others cope<br />

well (83). Application <strong>of</strong> this International Standard requires compliance<br />

with national laws, rules and regulations. The International Standard<br />

outlines the minimum requirements necessary for enabling transfer <strong>of</strong><br />

digital evidence between jurisdictions. It provides a framework for the<br />

development <strong>of</strong> processes and procedures for the identification, collection,<br />

acquisition and preservation <strong>of</strong> digital evidence (84).<br />

412

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!