Computer Forensic ‘Expert’ Witnesses – Do You Know Who is Representing You?
First published November 2007 submitted by CY4OR Computer forensic experts deal with some of the most grave and serious of criminal cases that involve digital evidence. However it may be surprising to...
View ArticleMalicious Phone Call Legislation in the UK
First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com It is being noted that there is an exponential growth in harassing and intimidating calls from...
View ArticleServing search warrants in Spain
First published January 2010 The expert witness perspective by Joaquim Anguas Abstract This article describes the most common schema and basic procedure in which search warrants related to computer...
View ArticleMy cat did it – honest, Guv!
and he did it via remote access… by Sam Raincock, IT and telecommunications expert witness When evaluating computer forensics cases the tricky part is often not just evaluating what is found but...
View ArticleIs your client an attorney? Be aware of possible constraints on your...
Significant legal and ethical challenges confront digital forensics investigators, for which some may not be well prepared. Just as many lawyers may be confounded by technology in dealing with digital...
View ArticleIs your client an attorney? Be aware of possible constraints on your...
In my first post several weeks ago, I discussed some of the special obligations that digital forensics investigators may have while in the employ of a lawyer. I elaborated briefly on the duty to...
View ArticleCan Your Digital Images Withstand A Court Challenge?
The term “digital” in law enforcement is almost immediately associated with digital forensics, i.e.; computer crimes, cyber terrorism, child porn on computer hard drives, and other areas that require...
View ArticleAnother Judge Rules Encryption Passphrase not Testimonial Under Fifth...
I previously discussed, on a bar association section blog in 2007 (here) and 2009 (here), the case of In re Boucher, where a U.S. judge for the District of Vermont ruled that requiring a criminal...
View ArticleEleventh Circuit Rules Defendant Cannot Be Compelled to Divulge Encryption...
Barely three weeks after I penned Another Judge Rules Encryption Passphrase not Testimonial Under Fifth Amendment Analysis, the Eleventh Circuit has held that a defendant’s “decryption and production...
View ArticleOvercoming Potential Legal Challenges to the Authentication of Social Media...
By John Patzakis1 Summary: Social media evidence is highly relevant to most legal disputes and broadly discoverable, but challenges lie in evidentiary authentication without best practices technology...
View Article689 Published Cases Involving Social Media Evidence (with full case listing)
The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify...
View ArticleKey Twitter and Facebook Metadata Fields Forensic Investigators Need to be...
Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool. This is just one reason why social media...
View ArticleAuthenticating Internet Web Pages as Evidence: a New Approach
By John Patzakis [1] and Brent Botta [2] Previously, in Forensic Focus, we addressed the issue of evidentiary authentication of social media data (see previous entries here and here). General Internet...
View ArticleUnacceptable Acceptable Use Policy
Official Secrets Act warning sign on quayside at Crouch Corner, Foulness, Essex (Photo credit: Wikipedia) I had an opportunity this week to be on the receiving end of an acceptable use policy (AUP) –...
View ArticleWindows 8: Important Considerations for Computer Forensics and Electronic...
Introduction Documents identified by computer forensic investigations in civil litigation typically require review and analysis by attorneys to determine if the uncovered evidence could support causes...
View ArticleSamsung Galaxy Android 4.3 Jelly Bean acquisition using Joint Test Action...
There have been some issues during data acquisitions with Samsung Galaxy having the Android 4.3, Jelly Bean as the operating system even if using the recommended steps for Logical File Dump, File...
View ArticleDFRWS Europe 2014 Annual Conference – Recap
This article is a recap of some of the main highlights of the Digital Forensics Research Workshop (DFRWS) held in Amsterdam from the 7th – 9th of May; over the next few weeks we will also be bringing...
View ArticleData Recovery As A Medium For Email Forensics
Data Recovery is the technique adopted for salvaging data from an inaccessible state which could have arrived due to deletion, corruption, or failure of the storage medium. On an Operating System, the...
View ArticleInvestigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers...
Abstract The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime. In perusing these avenues of inquiry, the author...
View ArticleMy cat did it – honest, Guv!
and he did it via remote access… by Sam Raincock, IT and telecommunications expert witness When evaluating computer forensics cases the tricky part is often not just evaluating what is found but...
View Article