scispace - formally typeset
Open Access

An Historical Perspective of Digital Evidence: A Forensic Scientist's View

TLDR
In the case of as mentioned in this paper, a Postal Inspector submitted a computer to examine for the presence of specific evidence he had enumerated in the letter of request and the evidence technician logged in the computer, assigned it a case number, and brought the request to me, inquiring “What should we do with this?” That was the beginning of an odyssey that I still pursue.
Abstract
Author’s Comments During my tenure as director of the Postal Inspection Headquarters Laboratory (1988-1992), a Postal Inspector submitted a computer to examine for the presence of specific evidence he had enumerated in the letter of request. The evidence technician logged in the computer, assigned it a case number, and brought the request to me, inquiring “What should we do with this?” That was the beginning of an odyssey that I still pursue. The Inspection Service Laboratory had a Questioned Document Section. Since a computer seemed to be an obvious evolution of paper documents, I called the manager of that section, Drew Somerford, and asked him to take the case. He was reluctant to sign for the evidence. Even though there might have been “documents” on the hard drive, it was outside his expertise. How do you secure and preserve the evidence? How do you collect it without changing it? What are the accepted practices related to computer evidence that would stand the scrutiny of court? What are the examination protocols? It was technology that we did not know how to handle in the crime laboratory. We submitted the computer evidence to the Federal Bureau of Investigation (FBI). The FBI Laboratory had a unit for computer evidence, and they worked the case. The Postal Inspection Service had a team of inspectors who were trained to work computer crime cases, but the laboratory was not equipped to assist them in processing evidence at that time.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

The future of computer forensics: a needs analysis survey

TL;DR: The results indicated that education/training and certification were the most reported issue and lack of funding was the least reported, which further support the criticism that there is a disproportional focus on the applied aspects of computer forensics, at the expense of the development of fundamental theories.
Book

Computer and Intrusion Forensics

TL;DR: A comprehensive and broad introduction to computer and intrusion forensics, this practical book helps you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and corporate fraud.
Journal ArticleDOI

Challenges in digital forensics

TL;DR: Cybercrime differs from traditional crime and presents a variety of unique challenges including the variety of electronic devices available, amount of data produced by these devices, the absence of standard practices and guidelines for analyzing that data, the lack qualified personnel to perform investigations and the lack of resources to provide on-going training.
Journal ArticleDOI

Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM)

TL;DR: The suggested model is supposed to provide guidance for thorough and secure implementation of digital forensic procedures at a crime scene, which is not possible to cover every aspect of crime scene digital forensics, but the proposed procedure model was supposed to be a general guideline for practitioners.

Computer Forensics - Past, Present And Future

TL;DR: The emergence and evolution of computer crime and computer forensics, as well as the crisis computerForensics is now facing, are examined, and new directions and approaches which better reflect the current objectives of this discipline are proposed.