Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidential data which may be recoverable from a range of devices, considering issues relating to reliability and usefulness of those data.
- Includes worked case examples, test questions and review quizzes to enhance student understanding - Solutions provided in an accompanying website - Includes numerous case studies throughout to highlight how digital evidence is handled at the crime scene and what can happen when procedures are carried out incorrectly - Considers digital evidence in a broader context alongside other scientific evidence - Discusses the role of digital devices in criminal activities and provides methods for the evaluation and prioritizing of evidence sources - Includes discussion of the issues surrounding modern digital evidence examinations, for example; volume of material and its complexity - Clear overview of all types of digital evidence
Digital Forensics: Digital Evidence in Criminal Investigations is an invaluable text for undergraduate students taking either general forensic science courses where digital forensics may be a module or a dedicated computer/digital forensics degree course. The book is also a useful overview of the subject for postgraduate students and forensic practitioners.
1.1 Key developments.
1.2 Digital Devices in Society.
1.3 Technology and Culture.
2. Evidential Potential of Digital Devices.
2.1 Closed vs. Open Systems.
2.2 Evaluating Digital Evidence Potential.
3. Device Handling.
3.1 Seizure Issues.
3.2 Device Identification.
3.3 Networked Devices.
4. Examination Principles.
4.3 Continuity and Hashing.
4.4 Evidence locations.
5. Evidence Creation.
5.1 A 7-element security model.
5.2 A developmental model of digital systems.
5.5 Audit and Logs.
6. Evidence Interpretation.
6.1 Data Content.
6.2 Data Context.
7. Internet Activity.
7.1 A little bit of history.
7.2 The ISO/OSI model.
7.3 The Internet Protocol Suite.
7.5 Internet Applications.
8. Mobile Devices.
8.1 Mobile Phones & PDAs.
8.3 Other Personal Technology.
9.1 Device usage.
9.2 Profiling and Cyberprofiling.
9.3 Evaluating Online Crime: Automating the Model.
9.4 Application of the formula to Case Studies.
9.5 From success estimates to profiling.
10. Case Studies and Examples.
10.2 Copyright Violation.
10.3 Missing person and Murder.
10.4 The view of a defence witness.
A The "Aircraft Carrier" PC.
B Additional Resources.
C SIM card data report.