Setting up an electronic evidence forensics laboratory

نویسنده

  • Hank Wolfe
چکیده

Associate Professor, Computer Forensics & Security, Information Science Dept., Otago School of Business, University of Otago, Corner of Clyde & Union Streets, PO Box 56, Dunedin, New Zealand Tel: +64 3 479-8141 Fax: +64 3 479-8311 Email: hwolfe@infoscience. otago.ac.nz In our last column we took a look at being an expert witness and giving forensic evidence testimony. An added word of cautionary advice for private practitioners: CHARGE A LOT for expert testimony! If you are involved in a highprofile case that drags on and on and you must testify as an expert witness repeatedly at the whim and caprice of the various attorneys, it could disrupt your private practice and cause potential loss of current and future earnings. Your current case load could be seriously delayed and your credibility for future work may also be damaged. The previous discussion, by nature, was very general, however each jurisdiction has a formal set of directives and guidelines specifically to assist expert witnesses so you must also refer to these for more details.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Research of Hybrid Network Electronic Forensics Model Based on Cloud Computing

With the increase of computer network crimes and the changes of the forms, the work of the network electronic forensics is becoming more and more important, and it is required that the technology of electronic forensics should be adapted to the development of complex network crimes. In this paper, the traditional electronic evidence collection technology and the electronic evidence collection m...

متن کامل

Forensic science, genetics and wildlife biology: getting the right mix for a wildlife DNA forensics lab.

Wildlife DNA forensics is receiving increasing coverage in the popular press and has begun to appear in the scientific literature in relation to several different fields. Recognized as an applied subject, it rests on top of very diverse scientific pillars ranging from biochemistry through to evolutionary genetics, all embedded within the context of modern forensic science. This breadth of scope...

متن کامل

Automatically Creating Realistic Targets for Digital Forensics Investigation

The need for computer forensics education continues to grow, as digital evidence is present in more crimes, whether the crimes directly involve computers or not. An essential component of training in computer forensics is hands-on, realistic laboratory assignments. Creating detailed, realistic lab assignments, however, is a difficult task. The “crime” must be played out on the machine, often in...

متن کامل

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility. By A. Jones and C. Valli

Like so many things in our just-in-time world, this book was sent to me just as one of my colleagues was looking for a text for a course he was developing in computer forensics laboratory operations and management. The two lead authors—and contributing author P. Swinburne—bring decades of experience in military and law enforcement environments in Australia and the UK to these topics. The book p...

متن کامل

Authorship Identification in Digital Forensics using Machine Learning Approach

Digital Forensics research field has gained the supreme importance recently due to increase in digital crimes. Many researchers are working on the various issues of digital forensics and they have developed many tools and techniques to deal with digital crimes. Digital forensics is the process of uncovering and interpreting electronic data for use in a court of law. The aim of the process is to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2003