scispace - formally typeset
Search or ask a question
Author

Oriola Sallavaci

Bio: Oriola Sallavaci is an academic researcher from Anglia Ruskin University. The author has contributed to research in topics: Criminal justice & Criminal investigation. The author has an hindex of 3, co-authored 11 publications receiving 29 citations. Previous affiliations of Oriola Sallavaci include University of Essex & Middlesex University.

Papers
More filters
Journal ArticleDOI
TL;DR: The main aspects of the proposed reform of the admissibility regime for expert evidence in criminal trials in England and Wales are focused on, with a view to discussing how they may impact on digital forensics experts giving opinion evidence incriminal trials.
Abstract: The Law Commission in England and Wales has proposed a reform of the admissibility regime for expert evidence in criminal trials in England and Wales. The proposed reform builds on the US approach to admissibility of expert evidence, and establishes a multi-stage statutory test for admissibility to be applied by trial judges, aided by a set of guidelines. This paper focuses on the main aspects of the proposed reform with a view to discussing how they may impact on digital forensics experts giving opinion evidence in criminal trials.

6 citations

Journal ArticleDOI
TL;DR: In this paper, the authors review the challenges posed by the Prum network and the existing safeguards and argue that, in order to achieve Prum benefits and maximise its potential, it is important to enhance the necessary dialogue and cooperation between member states so as to confront the above concerns and address challenges posing by Prum through balanced measures.
Abstract: The Prum network was established to provide mechanisms and the infrastructure to achieve a closer cooperation between the EU member states in combating terrorism, organised crime and illegal immigration through the cross border exchange of DNA profiles, fingerprints and vehicle registration data. While Prum offers clear benefits for cross-border policing, it continues to present challenges of a technical and scientific nature as well as legal, ethical and socioeconomic concerns. This article reviews these challenges as well as the existing safeguards. It argues that, in order to achieve Prum benefits and maximise its potential, it is important to enhance the necessary dialogue and cooperation between member states so as to confront the above concerns and address challenges posed by Prum through balanced measures.

5 citations

Book
05 Feb 2014
TL;DR: A new regime for the admissibility of expert evidence: the impact on the criminal trial and the interpretation and presentation of DNA evidence.
Abstract: 1. DNA evidence and the criminal trial 2. Challenging the reliability of DNA evidence: lessons to learn from history 3. Towards a new regime for the admissibility of expert evidence: the impact on the criminal trial 4. The interpretation and presentation of DNA evidence 5. Evaluating the weight of scientific evidence 6. The impact of scientific evidence on the criminal trial

5 citations

01 Oct 2013
TL;DR: In this article, the authors argue that there is scope for the continuance of the ultimate issue rule in the context of forensic identification evidence, and they highlight the major contribution of this model by shaping up the role of the expert in a criminal trial to pronouncing on the weight of evidence and not to addressing the ultimate issues.
Abstract: The ultimate issue rule has been widely criticised and has been abandoned in most common law jurisdictions. While its continuance is questioned in English criminal proceedings, this paper argues that there is scope for its survival in the context of forensic identification evidence. This paper refers to the standards for the formulation of evaluative forensic expert opinions referred to as ‘Bayesian approach’. The founding principles of this paradigm, initially associated with the successful use of DNA evidence in criminal trials, today are widely applied in many forensic identification disciplines. This paper highlights the major contribution this model makes by shaping up the role of the expert in a criminal trial to pronouncing on the weight of evidence and not to addressing the ultimate issue. By requiring the expert to evaluate the evidence and report on the probability of the findings under a set of propositions and leaving the determination of the probability of those propositions to the trier of fact, the Bayesian approach conforms not only to logic and reason but to the legal principles too. Keywords: ultimate issue rule, DNA, individualisation, forensic identification evidence, Bayesian approach, prosecutor fallacy

3 citations

Journal ArticleDOI
TL;DR: Streamlined Forensic Reporting (SFR) is a case management procedure recently introduced in the criminal justice system in England and Wales as discussed by the authors, which involves a proportionate use and staged producing of...
Abstract: Streamlined Forensic Reporting (SFR) is a case management procedure recently introduced in the criminal justice system in England and Wales. It involves a proportionate use and staged producing of ...

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This special issue of high-quality research papers provides a view on the latest research advances and results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity.
Abstract: Today’s world’s societies are becoming more and more dependent on open networks such as the Internet – where commercial activities, business transactions, and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the previously mentioned is the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offenses and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders. This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies. In this special issue, we are delighted to present a selection of 14 papers, which, in our opinion, will contribute to the enhancement of knowledge in cyber crime. The collection of high-quality research papers provides a view on the latest research advances and results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. In the first paper, Cyberterrorism targeting the general public through social media, Nicholas Ayres and Leandros A. Maglaras investigate whether a mimetic malware could be a viable method of attack against a population with respect to cyberterrorism. The presented research shows that although people are, in general, aware of cyberterrorism on their current level of fear of being a potential target of attack is relatively low. However, when presented with such a threat, their level of fear increased. The obtained results prove that a targeted mimetic virus can indeed have an effect on a population and is a potential attack method for cyberterrorism. The paper emphasizes also the importance of social media as a vessel of propagation of such threat. Next, in the paper entitled Effectiveness of File-Based Deduplication in Digital Forensics Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl focus on introducing improvements to the standardized forensic process to reduce the amount of storage requirement for forensic investigations by using file whitelisting and cross-device deduplication. Authors approach is shown to be particularly useful in cases where investigation relies on referenced files in the file system. In the exemplary use case authors prove that file deduplication and file whitelisting can be successfully utilized to achieve 78% size reduction compared to the full data set which means saving about 700 gigabytes of storage capacity. Jawwad Shamsi, Sherali Zeadally, Fareha Sheikh, and Angelyn Flowers in Attribution in Cyberspace: Techniques and Legal Implications argue that only a few known cybercrimes have been successfully attributed to the actual attacker. To improve this situation authors propose threelevel attribution framework to indicate various attributes and guidelines through which attribution can be instigated. The proposed framework is an initial step and in order to be successful it requires strong cooperation between different stake holders, government sponsored active cyber unit, existence of cyber laws, and cooperation among international community members. Next, two papers are focused on anomaly detection. In Evolutionary-based Packets Classification for Anomaly Detection in Web Layer, Rafał Kozik, Michał Choraś, and Witold Hołubowicz propose a novel detection method for modern web applications. First, authors observe that the majority of the state of the art solutions make an assumption about the packets’ content, or how the data inside the payload is serialized. Then they propose an evolutionary-based approach to unsupervised and automated packets segmentation. On the top of their approach, authors apply several variants of machine-learned classifiers and statistics to prove that the proposed algorithm can improve the effectiveness of many well-known anomaly detection methods. In the second paper entitled DWT-based Anomaly Detection Method for Cyber Security of Wireless Sensor Networks Łukasz Saganowski, Tomasz Andrysiak, Rafał SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:2861–2863 Published online 15 August 2016 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1603

52 citations

Dissertation
01 Jul 2015
TL;DR: This paper is intended to provide a history of the field and some of the techniques used, as well as some examples of individual cases, that have been used in the field.
Abstract: ................................................................................................................................. ii Acknowledgement ............................................................................................................... iii Table of

38 citations

Journal ArticleDOI
TL;DR: The Framework for Reliable Experimental Design (FRED) is proposed, designed to be a resource for those operating within the digital forensic field, both in industry and academia, to support and develop research best practice within the discipline.

34 citations

Posted Content
TL;DR: In the case of R v T (2010), the Court of Appeal for England and Wales rejected the testimony of an expert who had used likelihood ratios to assess the probative value of shoe-print evidence as discussed by the authors.
Abstract: In the case of R v T (2010), the Court of Appeal for England and Wales rejected the testimony of an expert who had used likelihood ratios to assess the probative value of shoe-print evidence. Because likelihood ratios are widely used in forensic science, and their use has been actively promoted by leaders in the field (Association of Forensic Science Providers, 2009; Cook et al., 1998; Evett, 1998; Robertson and Vignaux, 1995), the court’s opinion has understandably caused consternation in the forensic science community (Berger et al. 2011; Robertson et al. 2011; Redmayne et al. 2011). Recognizing the importance of the issues involved, the editors of Law, Probability and Risk have devoted this issue to articles commenting on the case. At the invitation of Editor Colin Aitken, it is my privilege and honour to review and respond to those articles. In the interest of full disclosure, I will say at the outset that I think R v T is an inept judicial opinion that creates bad law. The opinion went awry because the justices who wrote it misunderstood a key aspect of the evidence they were evaluating. The justices sought to achieve laudable goals, but their misunderstanding of basic principles of inductive logic, and particularly Bayes’ theorem, led them to exclude a type of expert evidence that, in general, is helpful and appropriate in favour of an alternative type of expert of evidence that is fundamentally inconsistent with the goals the court sought to achieve. The case has already received severe criticism1 and will inevitably come to be seen for what it is — a judicial blunder.

22 citations

Dissertation
06 Jul 2017
TL;DR: Contract law plays a central role for the way in which the TC provider interacts with his customers and this thesis contributes in speculating of a contract law that does not result in atomism, rather “brings in” potentially affected third parties and results in holistic networks.
Abstract: This thesis aims to address several issues emerging in the new digital world. Using Trusted Computing as the paradigmatic example of regulation though code that tries to address the cyber security problem that occurs, where the freedom of the user to reconfigure her machine is restricted in exchange for greater, yet not perfect, security. Trusted Computing is a technology that while it aims to protect the user, and the integrity of her machine and her privacy against third party users, it discloses more of her information to trusted third parties, exposing her to security risks in case of compromising occurring to that third party. It also intends to create a decentralized, bottom up solution to security where security follows along the arcs of an emergent “network of trust”, and if that was viable, to achieve a form of code based regulation. Through the analysis attempted in this thesis, we laid the groundwork for a refined assessment, considering the problems that Trusted Computing Initiative (TCI) faces and that are based in the intentional, systematic but sometimes misunderstood and miscommunicated difference (which as we reveal results directly in certain design choices for TC) between the conception of trust in informatics (“techno-trust”) and the common sociological concept of it. To reap the benefits of TCI and create the dynamic “network of trust”, we need the sociological concept of trust sharing the fundamental characteristics of transitivity and holism which are absent from techno-trust. This gives rise to our next visited problems which are: if TC shifts the power from the customer to the TC provider, who takes on roles previously reserved for the nation state, then how in a democratic state can users trust those that make the rules? The answer lies partly in constitutional and human rights law and we drill into those functions of TC that makes the TCI provider comparable to statelike and ask what minimal legal guarantees need to be in place to accept, trustingly, this shift of power. Secondly, traditional liberal contract law reduces complex social relations to binary exchange relations, which are not transitive and disrupt rather than create networks. Contract law, as we argue, plays a central role for the way in which the TC provider interacts with his customers and this thesis contributes in speculating of a contract law that does not result in atomism, rather “brings in” potentially affected third parties and results in holistic networks. In the same vein, this thesis looks mainly at specific ways in which law can correct or redefine the implicit and democratically not validated shift of power from customer to TC providers while enhancing the social environment and its social trust within which TC must operate.

21 citations