Skip to main content

Criminal Defense Challenges in Computer Forensics

  • Conference paper

Abstract

Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations of knowledgeable possession; misuse of time stamps and metadata; control and observation of the discovery process; authentication issues; deficiencies and the lack of verification for proprietary software tools; deliberate omission or obfuscation of exculpatory evidence; and inadvertent risks resulting from the use of legitimate services. Examples in the author’s caseload are used to illustrate these inequities in an effort to encourage reform.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AccessData Corporation, The Rules of Digital Evidence and AccessData Technology, http://www.accessdata.com/downloads/media/Rules_of_Digital_Evidence_and_AccessData_Technology.pdf

  2. Daubert v. Merrill Dow Pharmaceuticals, 509 U.S. 579 (1993)

    Google Scholar 

  3. National Institute of Justice, Test Results for Digital Data Acquisition Tool: FTK Imager 2.5.3.14, NCJ 222982 (2008)

    Google Scholar 

  4. National Institute of Justice, Test Results for Digital Data Acquisition Tool: EnCase 4.22a, NCJ 221168 (2008)

    Google Scholar 

  5. National Institute of Justice, Test Results for Disk Imaging Tools: dd Provided with FreeBSD 4.4, NCJ 203095 (2004)

    Google Scholar 

  6. United States General Accounting Office, Child Pornography Is Readily Accessible over Peer-to-Peer Networks, GAO-03-537T (2003)

    Google Scholar 

  7. Caloyannides, M.A.: Forensics Is So “Yesterday”. IEEE Security & Privacy 7(2) (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Mercuri, R. (2010). Criminal Defense Challenges in Computer Forensics. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11534-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11533-2

  • Online ISBN: 978-3-642-11534-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics