Digital Forensics and Cyber Crime. First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers

Research Article

Criminal Defense Challenges in Computer Forensics

Download
457 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11534-9_13,
        author={Rebecca Mercuri},
        title={Criminal Defense Challenges in Computer Forensics},
        proceedings={Digital Forensics and Cyber Crime. First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers},
        proceedings_a={ICDF2C},
        year={2012},
        month={5},
        keywords={Computer Forensics Forensic Investigation Criminal Defense Expert Witness Digital Evidence},
        doi={10.1007/978-3-642-11534-9_13}
    }
    
  • Rebecca Mercuri
    Year: 2012
    Criminal Defense Challenges in Computer Forensics
    ICDF2C
    Springer
    DOI: 10.1007/978-3-642-11534-9_13
Rebecca Mercuri1,*
  • 1: Notable Software, Inc.
*Contact email: notable@notablesoftware.com

Abstract

Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations of knowledgeable possession; misuse of time stamps and metadata; control and observation of the discovery process; authentication issues; deficiencies and the lack of verification for proprietary software tools; deliberate omission or obfuscation of exculpatory evidence; and inadvertent risks resulting from the use of legitimate services. Examples in the author’s caseload are used to illustrate these inequities in an effort to encourage reform.