Topic
Digital evidence
About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The development of a new Cybercrime Investigation Framework that uniquely integrates and consolidates the technical complexity of investigating the Internet and networked technology with the investigation principles and procedures of mainstream law enforcement is presented.
Abstract: As the Internet continues to evolve and present the motivated cybercriminal with a vast range of opportunities to commit both crime and other undesirable behaviours, then mainstream law enforcement must equally have the capability to react. This paper identifies that cybercrime investigation is much more than just low-level technology examination or digital evidence recovery and requires the specific inclusion of a wide range of technical and non-technical professional disciplines and investigative skills. This paper draws on the author’s earlier research alongside the current challenges and issues of cybercrime and examines the many cybercrime investigation models and frameworks found throughout the literature to identify six guiding research objectives. This paper then presents the development of a new Cybercrime Investigation Framework that uniquely integrates and consolidates the technical complexity of investigating the Internet and networked technology with the investigation principles and procedures of mainstream law enforcement.
16 citations
••
TL;DR: Basic guidelines for report writing are looked at to make sure the evidence is protected and that notes made at the time are professional.
16 citations
••
18 Mar 2012TL;DR: A novel method to create an image of the iDevice (iPhone, iPad, iPod) in a secure and fast manner within 30 minutes or less without jailbreaking compared to the fastest current method which takes up to 20 hours.
Abstract: With boom in mobility technology sector, a new generation of computing devices such as iPhone/iPad/iPod have emerged and immersed itself in the lives of millions and millions of people. With its widespread its fair to say that the use of these devices has created a new source of digital evidence and a need for a fast and trusted method to image and analyze the data has emerged. In this paper we will discuss a novel method that we have developed to create an image of the iDevice (iPhone, iPad, iPod) in a secure and fast manner within 30 minutes or less without jailbreaking compared to the fastest current method which takes up to 20 hours.
16 citations
••
TL;DR: A traceability index is derived as a useful indicator in measuring the accuracy and completeness of discovering the evidence in digital forensic investigation process to present the level of tracing ability, mapping ability and identifying the offender ability.
Abstract: Digital crime inflicts immense damage to users and systems and now it has reached a level of sophistication that makes it difficult to track its sources or origins especially with the advancements in modern computers, networks and the availability of diverse digital devices. Forensic has an important role to facilitate investigations of illegal activities and inappropriate behaviors using scientific methodologies, techniques and investigation frameworks. Digital forensic is developed to investigate any digital devices in the detection of crime. This paper emphasized on the research of traceability aspects in digital forensic investigation process. This includes discovering of complex and huge volume of evidence and connecting meaningful relationships between them. The aim of this paper is to derive a traceability index as a useful indicator in measuring the accuracy and completeness of discovering the evidence. This index is demonstrated through a model (TraceMap) to facilitate the investigator in tracing and mapping the evidence in order to identify the origin of the crime or incident. In this paper, tracing rate, mapping rate and offender identification rate are used to present the level of tracing ability, mapping ability and identifying the offender ability respectively. This research has a high potential of being expanded into other research areas such as in digital evidence presentation.
16 citations
••
TL;DR: An alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key is proposed, based on Power Analysis Attack (PAA), which is non-invasive and presents results obtained in several cases.
16 citations