Skip to main content

Criminal Defense Challenges in Computer Forensics

  • Conference paper

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 31)

Abstract

Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations of knowledgeable possession; misuse of time stamps and metadata; control and observation of the discovery process; authentication issues; deficiencies and the lack of verification for proprietary software tools; deliberate omission or obfuscation of exculpatory evidence; and inadvertent risks resulting from the use of legitimate services. Examples in the author’s caseload are used to illustrate these inequities in an effort to encourage reform.

Keywords

  • Computer Forensics
  • Forensic Investigation
  • Criminal Defense
  • Expert Witness
  • Digital Evidence

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-11534-9_13
  • Chapter length: 7 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   74.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-11534-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   99.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AccessData Corporation, The Rules of Digital Evidence and AccessData Technology, http://www.accessdata.com/downloads/media/Rules_of_Digital_Evidence_and_AccessData_Technology.pdf

  2. Daubert v. Merrill Dow Pharmaceuticals, 509 U.S. 579 (1993)

    Google Scholar 

  3. National Institute of Justice, Test Results for Digital Data Acquisition Tool: FTK Imager 2.5.3.14, NCJ 222982 (2008)

    Google Scholar 

  4. National Institute of Justice, Test Results for Digital Data Acquisition Tool: EnCase 4.22a, NCJ 221168 (2008)

    Google Scholar 

  5. National Institute of Justice, Test Results for Disk Imaging Tools: dd Provided with FreeBSD 4.4, NCJ 203095 (2004)

    Google Scholar 

  6. United States General Accounting Office, Child Pornography Is Readily Accessible over Peer-to-Peer Networks, GAO-03-537T (2003)

    Google Scholar 

  7. Caloyannides, M.A.: Forensics Is So “Yesterday”. IEEE Security & Privacy 7(2) (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Mercuri, R. (2010). Criminal Defense Challenges in Computer Forensics. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11534-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11533-2

  • Online ISBN: 978-3-642-11534-9

  • eBook Packages: Computer ScienceComputer Science (R0)