Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The role of digital evidence
The role of digital evidence
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The role of digital evidence
The Best Evidence Rule
With the increasing advances in technology, it has become difficult for the law to keep up with the changes in technology and the various digital media formats, since the best evidence rule was develop in the 18 century when copies were made by hand. The best evidence rule was originally designed to provide a guarantee against inaccuracies and fraud by requiring that the original document be produced. This was predicated on the assumption that, if the original was not produced, there was a significant chance of error or fraud in relying on such a copy.
The article or blog discusses a case (Midkiff v. Commonwealth) where an attorney for the defendant is arguing that the digital image and movie files that were introduced into evidence was in violation of the best evidence rule because the data stored on the defendant’s computer was at least third generation removed from the defendant’s computer. From the defendant attorney’s point of view, when the examiner made a copy of the defendant’s five hard drives, and later made additional copies of those hard drives to provide to the investigator, this process somehow violated the best evidence rule.
I would disagree with the attorney’s argument that a bit for bit copy of the defendant’s computer hard drives is the same as making photo copies from an original document because the bit for bit copy is an exact copy of the defendant’s hard drives each time it is copied, were as, a photocopy of document loses information each time that it is copied. Furthermore, a bit for bit copy of the defendant’s hard drives is essentially a clone of the defendant’s drives, for example, everything is copied identically, such as, the operating system, the hidden directory files,...
... middle of paper ...
... destroyed. The chain of custody log will be the only proof that no changes had occurred after the State has made copies of the digital evidence. As an additional back-up, I would have the fraud examiner make a video tape of the evidence being displayed on the defendant's computer, just in case the original hard drives became damage or were missed placed.
In conclusion, utilizing digitized evidence in court allows the prosecution to secure the original evidence and to protect it from damage, loss, or theft. Currently, under the Federal Rules of Evidence any printout or readable output of data stored in a computer reflecting the original is deemed to be an ‘original’ and admissible in evidence, however, the fraud examiner will still need to maintain detailed records of the chain of custody, just in case the defendants attorney challenges the best evidence rule.
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
If handled with care the evidence can be the best assistance to the crime investigator and can be used as a major proof in court. To improve the investigation any detective or expert has to admit the necessity of the non-movable items observation and processing apart from the regular movable evidence collection.
Unless someone is very familiar with the rules and laws that govern the way evidence in case is used it will be hard to comprehend what is allowed and not allowed in the court system. Anyone that works in the court room will understand the Federal Rule of Evidence 404(b) or FER 404(b): The Fictitious Ban on Character Reasoning from Other Crime Evidence (Broderick 2008).
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
The last type of evidence I will discuss are documents. Everyone has a different handwriting and different characteristics that make it unique. Computers are also unique in the way they type and print out things. Document examiners can look over these and establish the similarities in the handwriting and computer forensic specialists can extract logs and other data from most devices.
Investigators must ensure the integrity of all evidence collected, analyzed, processed and presented to a courtroom and jury. The reason that this is important is because the improper collection and analysis of evidence can lead to compromised data and potential damage to a prosecution. The seizure and analysis of digital evidence can be particularly challenging but is just as critical to a case as physical evidence. There are specific procedures that must be met to ensure the successful collection and analysis of digital media and guidelines or best practices for collection of all evidence, both physical and digital that must be followed. Conducting the proper steps in an investigation regarding the collection and processing of evidence and the proper chain of custody requirements can ensure a successful outcome in solving a case and a successful prosecution.
Evidence essentially comes in two forms: verbal or physical. For instance, verbal evidence could be spoken evidence acquired from a wiretap. Physical evidence could include DNA, blood, or bodily samples. Another reliable origin evidence is digital documentation. “As technology has become more portable and powerful, greater amounts of information are created, stored, and accessed” (GEDJ). Over the past few decades, technology has advanced to extreme levels! The most common technology used to find digital evidence are cell phones, computers, tablets, external storage devices, GPS locators, and various other devices (GEDJ). Text messages, social media posts, pictures, etc. are becoming more common data in investigations of the modern era. “Digital evidence can come from both suspects and victims, as all involved parties may have their own personal devices that are relevant to the investigation” (GEDJ). If they are available, computers, phones, social media and much more are very useful sources of gathering data for a criminal case. For instance, both the suspect and the victim may have text messages on their cell phones that could add to the search. “In some criminal cases, digital evidence can be useful if the suspect had associated with it. In some cases it can lead you in the wrong direction or to the wrong people. Or it could simply be useless if the suspect didn 't use anything
In order to understand how to compile evidence for criminal cases, we must understand the most effective types of evidence. This topic is interesting because there are ample amounts of cases where defendants have gotten off because of the lack of forensic evidence. If we believe forensic evidence is so important and it affects our decisions, then maybe we need to be educated on the reality of forensic evidence. If we can be educated, then we may have a more successful justice system. If we have a more successful justice system than the public could gain more confidence that justice will be served. In order to do this, we must find what type of evidence is most effective, this can be done by examining different types of evidence.
Evidence collection is a crucial part of forensics. Its reliability can be compromised by input bias from law
In this position paper I have chosen Bloodsworth v. State ~ 76 Md.App. 23, 543 A.2d 382 case to discuss on whether or not the forensic evidence that was submitted for this case should have been admissible or not. To understand whether or not the evidence should be admissible or not we first have to know what the case is about.
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
Forensic evidence is “evidence obtained by scientific methods …. and used in court.” Most evidence collected can be classified as either transient evidence or tangible evidence. Common types of transient evidence includes hair, fibers and glass, fingerprints, shoe prints, bare foot impressions and tire impressions, bodily fluids and skin cells, as well as gunshot residue. Some forms of tangible evidence would be firearms, fired and unfired bullets and cartridges, tool marks, drugs and drug paraphernalia, physical documents such as checks and receipts, and computers, cell phones and other devices.
The collection, custody and preservation of forensic evidence is a vital aspect of evidence integrity, without proper adherence to these procedures, crucial evidence that could potentially have great impact on a court case could be rendered useless. In the case of criminal proceedings, a skilled defence lawyer will look to scrutinise every step taken by forensic practitioners’ involved within the case in regards to the continuity of the evidence, in doing this they attempt to undermine the practitioner’s ability to properly carry out strict evidence collection, protection and preservation procedures and also look to find fault in the techniques they used to carry out these procedures.
Physical evidence is any physical object that contains reliable information that supports a hypothesis about the incident. Digital evidence is physical or electronic information (such as a written or electronic documentation, computer log files, data, reports, physical hardware, software, disk images, objects and so on) are collected during the investigation conducted computer. Evidence includes, but is not limited to, computer files (such as log files or generated reports) and human-generated files (such as spreadsheets, documents, or eail
The process of gathering evidence largely depends on the role of discretion by the police. Once police have decided to pursue a reported crime, they then begin the process of gathering evidence. To ensure that the process of gathering evidence is lawful, the police must follow the procedure outlined in the Evidence Act 1995 (NSW), which describes the manner in which evidence can be collected. This act imposes certain limits on the way police can gather evidence and the types of evidence that can be used. The Act is able to protect the rights of citizens by making it a requirement for the police to gain necessary legal documentation, such as search warrants, in order to obtain some types of evidence and thus, protects the rights of ordinary systems. In more recent times, the use of technology has come to play a major role in the gathering of evidence and with this comes complications in the law. New technologies in relation to the criminal investigation process are mainly in reference to DNA evidence, genetic material that can place a suspect at the scene of a crime. The introduction of DNA evidence into the criminal investigation process has been extremely effective in achieving justice, as it is able to secure convictions. Initially, there were some setbacks to the use of DNA evidence