Computer Forensics and Jurisprudence
Computer Forensics and Jurisprudence
Computer Forensics and Jurisprudence
Jurisprudence
Introduction
History of computer forensics
Definition of what is computer forensics
Need for Computer forensics
Developing Computer forensics Resources
Preparing for computer investigation
Understanding enforcement agency investigation
Understanding corporate investigation
Investigation Process
Role of Formulating Policies and Warning Banner
Introduction
Continued
Its Different..
the goal is to ensure that the recovered data is
valid so that it can be used as evidence.
Evidence are of two type:
inculpatory or exculpatory
method of rounding up
law enforcement agencies were not exposed
Continued
In 1990s
specialized tools for computer forensics were available
( IACIS) Introduced training on currently available
software for forensics investigations
the Internal Revenue Service created a search warrant
programs
ASR Data created expert witness for mackintosh
One of the partner left ASR Data and developed
Encase
Criminal
Prosecutors
Civil
Litigations
Individuals
Computer
Forensics
Law
Enforcement
Officials
Insurance
Companies
Corporations
Explanation
Civil litigations can readily make use of personal and business records found on
computer systems that bear on: fraud, divorce, discrimination, and harassment cases.
Contact List
Supported Example
which a person has molested young girl by intoxicating
them by alcohol , after a search and seizure it reaveled
that he was using CoCoDos, an OS that has been not
being in use for many years. The investigator posts it on
a public user group, which supplied the standard
command desired information needed to gain access to
the system. On the suspect system the investigator
found diary detailing the suspect action over the past 15
year including the molestation of 400 young women. As
the result, the suspect received a much longer sentence
that he would have if he had molested only one child.
Academic Purpose - Internal Use
Public
Continued
Academic Purpose - Internal Use
E-mail Harrasment
Falsification of Data
Gender and Age Discrimination
Embezzlement
Sabotage and Industrial Espionages Disgruntle Employees
Investigation Process
Inves
tigati
on
Com
plaint
Pros
ecuti
on
Investigation Process Dependencies Parameter
Local Custom
Legislative Structure
Rules of Evidence
Academic Purpose - Internal Use
Complaint
Step 1
Cognizance of illegal Act
Step 2
Lodged complaint with the police
Step 3
Framed Allegation an accusation or supposition of fact that
a crime has Been Committed
Step 4
Interview by the police officer followed by report finalization
Step 5
Process the report & start the investigation or log the
information in the blotter
Academic Purpose - Internal Use
Investigation
Step 1
Assessment of the scope
OS
Hardware, Peripheral
Step 2
Assessment of Resources
Proper Tool
Specialists are Required
Delegation of roles and Initiation of Work
Step 3
Hand over it to the prosecutor
Step 4
Report with evidence to government attorney
Step 5
In case of public seeking search warrant which directs upon to submit
affidavit duly notarized. The affidavit should exhibit information that support
allegation to justify warrant.
Academic Purpose - Internal Use
Prosecution
Continued.
Access Restricted
For official Use only
Owner has the right to Monitor
Penalizing for Unauthorized Access
Admissibility of Evidence
Daubert Guidelines
Do You Know?
Company property if Yes
New Topics
Systematic Approach
Assessing the Case
Planning Your Investigation
Securing Your Investigation