Question

How is being familiar with digital forensic best practices and criminal justice standards benefit you, even...

How is being familiar with digital forensic best practices and criminal justice standards benefit you, even if you worked in a non-criminal justice digital forensics position?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

As technology has become more portable and powerful, greater amounts of information are created, stored, and accessed. Modern devices can serve as huge repositories of personal information yet be carried in a pocket and accessed with a single hand or even voice command.

It has become very necessary to adapt certain practices in order to secure your digital information . Bad guys are waiting to exploit you in a crime.

One has to be very careful and aware of the digital forensic best practices & criminal justice standards that will help him not trap in any unwanted uncalled situation.

I am outlining certain aspects of Digital forensic & criminal justice standards :

Integrity & authenticity of data:

Integrity ensures that the information presented is complete and unaltered from the time of acquisition until its final disposition. Files that are copied from storage and processed result in new files. These files also must have their integrity maintained.

Integrity differs significantly from authentication. Authentication is the process of substantiating that the content is an accurate representation of what it purports to be. For example, authentication of a digital image of a gun on a table could be authenticated by a person at the scene stating that the picture fairly and accurately represents the gun on the table. The integrity of the image can be established by methods covered in this document. For further information on image authentication.

The integrity of a digital image or video file is best demonstrated through a combination of methods. Maintaining integrity requires both documentation and security of the files throughout the work flow. A standard operating procedure (SOP) should describe the work flow.

Maintaining and Demonstrating Integrity

When working with digital image and video files, one needs to maintain the integrity of the files and also demonstrate that the steps taken were effective. Maintaining integrity requires security of the files during transport and storage. Demonstrating integrity uses methods to show that the file has not changed.

When a digital image or video file is obtained, a reference is created for future demonstrations of integrity.

The file is then transported to a storage device or location. When it is removed from storage for use, the integrity is demonstrated by the method used to create the reference.

We have to think of the file , data stored are secure .

Forensics & standard:

Computer forensics is a cutting edge technology discipline that can literally change from week to week. Computer forensics training, education, and analysis is widespread among forensic crime laboratories, law enforcement agencies, corporate America, the private sector, and colleges and universities. Computer forensic story lines have even become part of popular television shows.

Just what is computer forensics? The name implies (rightly or wrongly) that it refers to computers and the subsequent analysis of their hard drives (where the digital data resides). However, it is much more complicated. Many personal digital assistants, cellular telephones and digital cameras contain smart media cards that also store digital data. By definition, they are not computers. Likewise, compact discs and USB thumb drives also store digital data. They are not computers either.

The commonality between what we normally identify as a computer and the aforementioned devices is that they all store or contain digital data. Digital data is a series of zeroes and ones, stored in a particular sequence on some sort of media (computer hard drive, CD, etc.). Generally, the forensic software used to analyze a computer hard drive may be the same software that is used to analyze a CD, a smart media card or a personal digital assistant. Thus, a definition of computer forensics that encompasses all these devices could be “the application of specialized scientific techniques to the preservation, recovery and analysis of digital or electronic data that may be used in legal matters.”

However, even with this definition, not every type of digital analysis can necessarily be placed under computer forensics. For instance, does the analysis of analog or digital video fall under the heading of computer forensics? Analog video tapes are digitized prior to analysis and the software and analytical techniques used in video analysis are different from those used to analyze a computer’s hard drive. Is enhancing the digital audio track on a digital video tape a type of computer forensics? Again, software and analytical techniques used for audio enhancement and analysis are different from those used in computer analysis and video analysis.

To take it further, can the comparison of images of suspects on a digital video tape to known digital images of suspects also be considered a part of computer forensics? Image analysis techniques are different from those for computer analysis, video analysis and audio analysis. As previously stated, all the data being examined for possible evidentiary value is digital. Thus, a better way to categorize these diverse types of analyses would be to group them under a single discipline, which is exactly what the U.S. Department of Justice’s Scientific Working Group on Digital Evidence recommended several years ago. They named it the digital and multimedia evidence discipline, comprising four sub-disciplines: computer forensics, forensic audio, image analysis, and video analyse.
A computer forensic examiner has to find, recover, analyze, and evaluate digital data that may represent evidence from such diverse crimes as employee fraud, financial corruption, embezzlement, extortion, identity theft, bribery, theft of intellectual property or trade secrets, or pornography. Courtroom testimony often results from this analysis. The evidence in these cases consists primarily of the digital data itself and it is commonly referred to as digital evidence. Since it is evidence, it must be treated similarly to other physical evidence found at the scene of a crime. However, there is no actual physical evidence to visually assess for relevance as it is digital and may reside on almost any type of media. Although it cannot be seen by the naked eye, all the scientific principles related to the data’s collection, processing, and analysis must be followed to ensure both a proper chain of custody and accurate analytical results.

Forensic examiners use an array of methods or tools for discovering digital data that resides on a particular medium. Digital data may be active, deleted, hidden, encrypted, or, as is sometimes the case, partially overwritten. Any or all of this data may be necessary for litigation. For court purposes, the judicial system has to be assured of accurate, reliable, verifiable, and repeatable results. This involves more than just finding, collecting, and analyzing the data, generating a report and testifying in court. Although examiner testimony may become critical for successful prosecution, the testimony can be very technical and complex. Most jurors do not have the technical knowledge to assess the accuracy of the testimony provided. Thus, expert witness testimony often sounds credible and believable to jurors. However, from the perspective of the requirements of forensic science, many concerns can arise from expert witness testimony:

• Was the evidence tainted or compromised regarding how or where it was collected or stored?
• Is the chain-of-custody record for the digital data accurate and complete?
• Can an examiner automatically qualify as an expert for court purposes based on on-the-job experience only?
• Do written procedures exist such that another examiner can recreate the results of the analysis?
• What was the competence of the examiner?
• How are the forensic computers maintained?
• Are all the software tools used during an analysis legitimate (licensed copies, authorized copies, etc.) and were they validated and verified prior to use?
• Did the software tools (a) contain bugs? (b) alter or change the evidentiary data?
• Were scientific principles followed during the analysis of the data?

All these concerns need to have acceptable, accurate, and complete answers before convicting a suspect of a crime. Further, depending upon the case, the testimony may have to meet the requirements of Frye1 or Daubert2 regarding the admissibility of scientific expert testimony. In the United States most states have adopted one or the other of the rulings pertaining to the admissibility of scientific evidence into legal proceedings.

This then raises the question of what standards or best practices are in place in the computer forensics community that can address these complex issues. Other forensic disciplines faced similar issues, however, they were or have been alleviated or mitigated somewhat by:

• Formalized, documented training programs;
• Competency testing examiners;
• Annual proficiency testing of examiners to evaluate competence and the quality performance of the section and laboratory;
• Documented, validated procedures that include the use of appropriate standards and/or controls;
• Policies and procedures for the identification, collection, preservation and protection of evidence from loss, alteration or change;
• Having discipline-recommended written standards (best practices) and recognized, accepted testing standards and methodology; and
• Attaining American Society of Crime Laboratory Directors/ Laboratory Accrediting Board accreditation.

ASCLD/LAB Accreditation — Standards and Criteria
The American Society of Crime Laboratory Directors/Laboratory Accrediting Board has been accrediting forensic crime laboratories since 1982. Voluntary accreditation is offered in the forensic disciplines of biology (DNA), controlled substances, crime scene, digital and multimedia evidence, firearms and toolmarks, latent prints, questioned documents, toxicology, and trace evidence. Attaining accreditation allows a laboratory to demonstrate that its management, operations, personnel, procedures, equipment, physical plant, security, and health and safety procedures all meet established national and international standards. One of the objectives of accreditation is to identify those laboratories that have demonstrated that they can meet established standards. Both of ASCLD/LAB’s accreditation programs consist of standards that have to be met to attain accreditation. The uniqueness of these standards is that they are applicable and adaptable to virtually any laboratory of any size. Specifically, to attain accreditation in the legacy program, a stand-alone computer forensics section or unit would have to document and demonstrate compliance with at least 102 standards.

Reference:http://www.astm.org , www.fbi.gov

Thanks

Add a comment
Know the answer?
Add Answer to:
How is being familiar with digital forensic best practices and criminal justice standards benefit you, even...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please explain part C. I get how you get the median by it being even you...

    Please explain part C. I get how you get the median by it being even you go to position n/2 & n/2+1 and take the average of those positions but how do you 2+2/2 when putting it increasing order ? I would think it would be 22+27/2. 10. A sample of 100 adult women was taken, and each was asked how many children she had. The results were as follows: Children 0 1 2 3 45 Number of Women 27...

  • What is the big picture according to best practices in family involvement in early education? Case...

    What is the big picture according to best practices in family involvement in early education? Case 4 Developmentally Appropriate Practices in Head Start The Teacher city. Home-based programs are also a part of the New Rock Head Start. With a population of about variety of communities economically prosperous than others. Also, some neighborhoods are more cultur- ally diverse than others. All of the Head Start pre schools are held in churches and agency buildings in the downtown area. Transportation is...

  • You said it would be interesting, but I didn’t realize just how interesting it was going...

    You said it would be interesting, but I didn’t realize just how interesting it was going to be,” said Damario. “Well,” replied Sofia, “This resort is not unique. In a lot of properties I’ve worked, there is an ongoing conflict between managers in charge of covering costs and those directly responsible for getting and satisfying guests.” “Like Mark and Pam,” interrupted Damario. “Yes, like Mark and Pam. That’s why things got a little animated. I’m convinced they both have the...

  • For each multiple-choice question choose one answer that best answers the question. You must also provide...

    For each multiple-choice question choose one answer that best answers the question. You must also provide your rationale for choosing the answer you did. Based on research on factors that increase informational social influence, which game contestant is most likely to yield to informational social influence provided by teammates or the audience? Joan, playing in the grand prize round of a television game show, who answers a question, whose answer she is uncertain of Jay, playing in the grand prize...

  • Subject: HRM Introduction and Instructions You have recently been hired as the Director of Human Resources...

    Subject: HRM Introduction and Instructions You have recently been hired as the Director of Human Resources for Wilson Brothers Canada and have HR responsibility for all of the company’s Canadian operations. Bob and John Wilson have asked you to prepare a report for their review focusing specifically on organizational behavior within the company. Review the Wilson Brothers Case Scenario in depth and address the required topic listed below in your analysis report. Marks are allocated for thoroughness of coverage of...

  • A) Analyze the need for managing change in the case attached. B) How would you distribute...

    A) Analyze the need for managing change in the case attached. B) How would you distribute change roles you would consider if you were a decision maker in the project? Note: Not more than 100 Words. Complexities of Large-Scale Technology Project Failure: A Forensic Analysis of the Seattle Popular Monorail Authority Introduction History shows that large scale innovative technology projects, financed with public funds, are fraught with dangers and often fail to deliver the product or the results promised at...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • Putting Your Best Cyberface Forward By STEPHANIE ROSENBLOOMJAN. 3, 2008 your nails? Have you pierced your...

    Putting Your Best Cyberface Forward By STEPHANIE ROSENBLOOMJAN. 3, 2008 your nails? Have you pierced your tongue? Is your tote bag emblazoned with the words "I'm not a plastic bag"? at the way they do for reasons too numerous to fit into any therapist's notebook. Yet we commonly shape People look and act the way they do for reasons too ir behavior or tweak our appearance in an attempt to control how others perceive us i m mon sense. Social...

  • Hi can you help me make a summary about this short article and how it affects...

    Hi can you help me make a summary about this short article and how it affects me economically as US citizen ? Supported by Federal Shutdown’s Uneven Toll: Some Americans Are Devastated, Others ObliviousFederal Shutdown’s Uneven Toll: Some Americans Are Devastated, Others Oblivious “It has been terrible,” said Andrea Caviedes, a furloughed loan processor in the Agriculture Department’s rural development program.CreditMichael B. Thomas for The New York Times Image “It has been terrible,” said Andrea Caviedes, a furloughed loan processor...

  • How could one improve the questions asked in the survey by the Agency for Healthcare Research...

    How could one improve the questions asked in the survey by the Agency for Healthcare Research and Quality (AHRQ) on Patient Safety Culture from 2004? SECTION A: Your Work Area/Unit In this survey, think of your “unit” as the work area, department, or clinical area of the hospital where you spend most of your work time or provide most of your clinical services. What is your primary work area or unit in this hospital? Select ONE answer.  a. Many...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT