scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper introduces security personnel to the Federal Rules of Civil Procedure, case law related to preservation and production of digital evidence, international issues with electronic data, how to handle privilege or sensitive information, and the issues surrounding licensing and certification of computer investigators and digital forensics professionals.
Abstract: This paper presents the fundamentals of digital evidence for security practitioners. The modern security landscape is expanding to include a digital forensics and investigative skill set for many professionals, particularly those in the corporate realm. This paper introduces security personnel to the Federal Rules of Civil Procedure, case law related to preservation and production of digital evidence, international issues with electronic data, how to handle privilege or sensitive information, and the issues surrounding licensing and certification of computer investigators and digital forensics professionals.

3 citations

Journal ArticleDOI
TL;DR: In this paper, the authors have made efforts to highlight the range of Smartphone forensics tools which can be used to perform logical acquisition on the internal memory of android based smartphones and then provide the comparison between Smartphone Forensics tools on the basis of their ability to acquire data from the Internal memory of Android smartphones.
Abstract: Due to the rich set of exciting features available in Android smartphones makes it possible to be used vastly by the user around the world and hence android occupies a large share from among other operating system based Smartphone. The popularity of Android smartphones is growing rapidly day by day and it plays a vital role in our daily lives. The feature-rich state of Android smartphones makes it possible to be used in criminal intended activities. The Android smartphones are merely used in criminal activities and hence it can be used as a solid source of digital evidence. A range of Smartphone's forensics tools are available in the market which can be used to recover digital evidence from the Android smartphones. In this paper, authors have made efforts to highlights the range of Smartphone forensics tools which can be used to perform logical acquisition on the internal memory of android based smartphones and then provide the comparison between Smartphone forensics tools on the basis of their ability to acquire data from the internal memory of Android smartphones. It has been found that there no tool available which can extract the complete range of digital evidence from Android-based smartphones.

3 citations

Book ChapterDOI
TL;DR: In this paper, the authors provide an overview of the sudden importance of mutual legal assistance in an age when an increasing amount of criminal evidence is both digital and held by offshore firms.
Abstract: Fifty years ago, a law enforcement agent in India or England or Brazil could effectively do his job—investigating crimes like murder and theft—without ever leaving his country’s territorial borders A theft in New Delhi would typically involve evidence collection in New Delhi There were exceptions, of course, but for the most part, local crimes produced local evidence This is no longer true Today, an Indian law enforcement investigation of an entirely local crime—one with a local suspect, a local victim, and a violation of local law—will typically involve a great deal of digital evidence, much of which is controlled by a foreign internet company and is therefore difficult for local law enforcement to obtain Very often, a local official will need to request mutual legal assistance (MLA) from the country with jurisdiction over the data Typically, this is done in accordance with a mutual legal assistance treaty (MLAT)—whereby one country will provide legal assistance to another country, pursuant to whatever treaty the two countries have negotiated This process worked well enough for physical evidence, extradition requests, and other forms of twentieth century cross-border legal assistance, but today it is buckling under the weight of demands for digital evidence produced by the global internet This chapter provides an overview of the sudden importance of mutual legal assistance in an age when an increasing amount of criminal evidence is both digital and held by offshore firms The chapter begins with a description of the current—regrettable—state of affairs Part two describes some of the easiest ways to improve the existing MLA regime, reforms that may require money or manpower, but will not require legal change These are critical reforms, but even a streamlined and well-oiled MLA regime will never be able to satisfy the needs of local law enforcement demands for digital evidence Part three therefore looks to alternative avenues for obtaining digital evidence controlled by a foreign service provider Regardless of which of these procedural paths reformers take, each will require substantive guidelines for determining the conditions under which a law enforcement agent in Country A can lawfully gain access to digital evidence controlled by a firm in Country B Part four suggests substantive requirements for delimiting that access

3 citations

Journal ArticleDOI
01 Jan 2020
TL;DR: This paper proposes cybercrime forensic investigation tool based on the digital evidence object model to solve the problem of searching for and identifying digital evidence of cybercrime due to the lack of specialized tools and techniques to automate expert investigation.
Abstract: The amount of data stored on computers is growing rapidly every year, which makes time-consuming investigation of digital evidence in cybercrime, because of the need to investigate a large amount of data and extract criminal evidence from it. Expert investigation begins with the collection, copying and authentication of each content on the digital medium. The following steps deal with the findings and extract evidence of crime using a variety of methods and tools. Our research deals with the frameworks, methods, models and tools of the search for digital evidence of cybercrime. However, there is as yet no specialized method and tool available to assist an expert in reducing the size of investigated data and to solve the problem of searching for and identifying digital evidence of cybercrime due to the lack of specialized tools and techniques to automate expert investigation. In this paper we propose cybercrime forensic investigation tool based on the digital evidence object model

3 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111