Criminal Defense Challenges in Computer Forensics
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations of knowledgeable possession; misuse of time stamps and metadata; control and observation of the discovery process; authentication issues; deficiencies and the lack of verification for proprietary software tools; deliberate omission or obfuscation of exculpatory evidence; and inadvertent risks resulting from the use of legitimate services. Examples in the author’s caseload are used to illustrate these inequities in an effort to encourage reform.
KeywordsComputer Forensics Forensic Investigation Criminal Defense Expert Witness Digital Evidence
Unable to display preview. Download preview PDF.
- 1.AccessData Corporation, The Rules of Digital Evidence and AccessData Technology, http://www.accessdata.com/downloads/media/Rules_of_Digital_Evidence_and_AccessData_Technology.pdf
- 2.Daubert v. Merrill Dow Pharmaceuticals, 509 U.S. 579 (1993)Google Scholar
- 3.National Institute of Justice, Test Results for Digital Data Acquisition Tool: FTK Imager 22.214.171.124, NCJ 222982 (2008)Google Scholar
- 4.National Institute of Justice, Test Results for Digital Data Acquisition Tool: EnCase 4.22a, NCJ 221168 (2008)Google Scholar
- 5.National Institute of Justice, Test Results for Disk Imaging Tools: dd Provided with FreeBSD 4.4, NCJ 203095 (2004)Google Scholar
- 6.United States General Accounting Office, Child Pornography Is Readily Accessible over Peer-to-Peer Networks, GAO-03-537T (2003) Google Scholar
- 7.Caloyannides, M.A.: Forensics Is So “Yesterday”. IEEE Security & Privacy 7(2) (2009)Google Scholar