Research Article
Criminal Defense Challenges in Computer Forensics
458 downloads
@INPROCEEDINGS{10.1007/978-3-642-11534-9_13, author={Rebecca Mercuri}, title={Criminal Defense Challenges in Computer Forensics}, proceedings={Digital Forensics and Cyber Crime. First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, proceedings_a={ICDF2C}, year={2012}, month={5}, keywords={Computer Forensics Forensic Investigation Criminal Defense Expert Witness Digital Evidence}, doi={10.1007/978-3-642-11534-9_13} }
- Rebecca Mercuri
Year: 2012
Criminal Defense Challenges in Computer Forensics
ICDF2C
Springer
DOI: 10.1007/978-3-642-11534-9_13
Abstract
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations of knowledgeable possession; misuse of time stamps and metadata; control and observation of the discovery process; authentication issues; deficiencies and the lack of verification for proprietary software tools; deliberate omission or obfuscation of exculpatory evidence; and inadvertent risks resulting from the use of legitimate services. Examples in the author’s caseload are used to illustrate these inequities in an effort to encourage reform.
Copyright © 2009–2024 ICST