scispace - formally typeset
Open AccessBook ChapterDOI

Automated construction of a false digital alibi

Reads0
Chats0
TLDR
The results of this work demonstrate that court rulings should not be based only on digital evidence, with it always being correlated to additional information provided by the various disciplines of Forensics Sciences.
Abstract
Recent legal cases have shown that digital evidence is becoming more widely used in court proceedings (by defense, accusation, public prosecutor, etc.). Digital tracks can be left on computers, phones, digital cameras as well as third party servers belonging to Internet Service Providers (ISPs), telephone providers and companies that provide services via Internet such as YouTube, Facebook and Gmail. This work highlights the possibility to set up a false digital alibi in a fully automatic way without any human intervention. A forensic investigation on the digital evidence produced cannot establish whether such traces have been produced through either human activity or by an automated tool. These considerations stress the difference between digital and physical - namely traditional - evidence. Essentially, digital evidence should be considered relevant only if supported by evidence collected using traditional investigation techniques. The results of this work should be considered by anyone involved in a Digital Forensics investigation, due to it demonstrating that court rulings should not be based only on digital evidence, with it always being correlated to additional information provided by the various disciplines of Forensics Sciences.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Understanding the Information-Based Transformation of Strategy and Society

TL;DR: In this framework, a picture of the transformation of information-based strategy in the future is painted and three determinants for the modes of their operations of consumers, producers, markets, and society are examined.
Proceedings ArticleDOI

A Novel Anti-forensics Technique for the Android OS

TL;DR: This paper proposes a new anti-forensics technique for mobile devices with the Android OS that makes it possible to modify and erase, securely and selectively, the digital evidence on an Android device without having to use any cryptographic primitives or make any file system changes.
Proceedings ArticleDOI

On the Construction of a False Digital Alibi on the Android OS

TL;DR: Novel techniques to create a false digital alibi on a smart phone equipped with the Android OS are presented, which simulate human interaction with a mobile device using a software automation, with the produced traces being indistinguishable post-mortem from those left by a real user.
Proceedings ArticleDOI

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome

TL;DR: In this article, the authors suggest an alternative: supplying coherent data designed in such a way as to mimick as closely as possible a different browser, and demonstrate a proof-of-concept implementation as an extension for the Chrome browser.
Proceedings ArticleDOI

Automatic, Selective and Secure Deletion of Digital Evidence

TL;DR: This work introduces a methodology to delete a predetermined data set from a digital device in a secure and fast way, for example, with a single click of the mouse, which is also able to remove traces about its execution and presence on the system.
References
More filters
Journal ArticleDOI

Anomaly detection: A survey

TL;DR: This survey tries to provide a structured and comprehensive overview of the research on anomaly detection by grouping existing techniques into different categories based on the underlying approach adopted by each technique.

Operating System Concepts

TL;DR: In this article, Abraham Silberschatz and Peter Galvin discuss key concepts that are applicable to a variety of operating systems and present a large number of examples taken from common operating systems, including WindowsNT and Solaris 2.
Book

Operating System Concepts

TL;DR: This best-selling book provides a solid theoretical foundation for understanding operating systems while giving the teacher and students the flexibility to choose the implementation system.
Proceedings Article

Secure deletion of data from magnetic and solid-state memory

TL;DR: This paper covers some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult.
Journal ArticleDOI

Forensic identification using skin bacterial communities

TL;DR: A series of studies introduces a forensics approach that could eventually be used to independently evaluate results obtained using more traditional forensic practices, and can use a high-throughput pyrosequencing-based approach to quantitatively compare the bacterial communities on objects and skin to match the object to the individual with a high degree of certainty.
Related Papers (5)