SlideShare uma empresa Scribd logo
1 de 18
DISCOVERY OF ELECTRONICEVIDENCEAND
IDENTIFICATIONOF DATA
PRESENTED BY
ATUL RAI
M TECH – NIT JALANDHAR
DISCOVERY OF ELECTRONIC
EVIDENCE
 What is Electronic Evidence?
 EE’s Admissibility
 Electronic Evidence Discovery
 Case Study
 Conclusion
ELECTRONIC EVIDENCE
 Electronic evidence or digital evidence is any probative information stored
or transmitted in digital form that a party to a court case may use at trial.
The digital era has increased the dependency organizations and people have
on electronic storage media.
 Files, transactional records, mail communication and data are maintained
electronically in computer systems and on servers.
 All these files and data become potential evidence in case of any incident or
litigation cases.
ELECTRONIC EVIDENCE ADMISSIBILITY
 The use of digital evidence has increased in the past few decades.
 Courts have allowed the use of e-mails, digital photographs, word
processing documents, files saved from accounting programs, spreadsheets
etc.
 Internet browser histories, instant message histories, the contents of
computer memory, computer backups, and digital video or audio files are
also important electronic evidences that are being considered in federal
courts these days.
ELECTRONIC EVIDENCE ADMISSIBILITY
 Many courts in the United States have applied the Federal Rules of
Evidence to digital evidence in a similar way to traditional documents.
 In addition, digital evidence tends to be more voluminous, more difficult to
destroy, easily modified, easily duplicated, potentially more expressive, and
more readily available.
 It is becoming more common for lawyers to seek production of entire
computer hard disk drives, floppy diskettes, Zip disks, CD-ROMs, cell
phones, and palm computer devices.
ELECTRONIC EVIDENCE DISCOVERY
 Since Electronic Evidence can easily be altered, its discovery and
admissibility are subject to the procedure followed in gathering, processing
and presenting them.
 There are certain guidelines like: UK ACPO guidelines, ADAM
Principles proposed in a doctoral thesis etc.
 Electronic evidence is admissible in court only if the above guidelines are
followed and no illegitimate actions or procedure was used in gathering
them.
UK ASSOCIATION OF CHIEF POLICE
OFFICERS GUIDELINES
 Principle 1: No action taken by law enforcement agencies, persons employed within those
agencies or their agents should change data which may subsequently be relied upon in court.
 Principle 2: In circumstances where a person finds it necessary to access original data, that
person must be competent to do so and be able to give evidence explaining the relevance
and the implications of their actions.
 Principle 3: An audit trail or other record of all processes applied to digital evidence should
be created and preserved. An independent third party should be able to examine those
processes and achieve the same result.
 Principle 4: The person in charge of the investigation has overall responsibility for ensuring
that the law and these principles are adhered to.
ELECTRONIC EVIDENCE DISCOVERY
 With businesses and individuals relying on computers for data processing, scheduling,
and communications, it is possible to discover anything from background information
to the “smoking gun” document by investigating what is on your opponent’s computer
systems.
 For evidence discovery, where the basics are concerned, the investigator is occupied
with safeguarding the chain of custody.
 During the planning stage, emphasis is given to understanding the information being
sought.
 Backups of discovered information files are critical to the overall process, and tools
such as revision-control software can be very handy for this task
CASE STUDY
 In Aguimatang v. California State Lottery, the court gave near per
se treatment to the admissibility of digital evidence stating "the computer
printout does not violate the best evidence rule, because a computer
printout is considered an ‘original.’" [234 Cal. App. 3d 769, 798.]
 On November 12, 1980, a grand jury sitting in the Southern District of
Texas' backed up electronic evidence admissibility stating that "computer
data compilations… should be treated as any other record.“[US v. Vela,
673 F.2d 86, 90 ]
CONCLUSION
 Electronic Evidence is any digital document or file that can be used in a case
in court.
 There are certain guidelines that need to be followed in case of evidence
gathering and presentation.
 The case studies we presented define how the Federal law and court
admitted electronic evidence in their ongoing cases.
IDENTIFICATION OF DATA
 What is Data and how is it relevant?
 Importance of time in Data Identification
 Forensic Analysis of data
Conclusion
WHAT IS DATA?
 In computer forensics the preservation, identification, extraction and
documentation of computer evidence stored in the form of magnetically encoded
information is called as a data.
 Data is stored in files as well as dumbs and slack of the device storage.
 User might be accessing and deleting evidence or case related data from the visible
space of the storage media but data still resides in temp files and is never actually
deleted.
 It is this information that benefits law enforcement and military agencies in
intelligence gathering and in the conduct of investigations.
IDENTIFICATION OF DATA?
 Data can be written or hidden in “extra” tracks, sectors, hidden partitions,
unallocated space.
Massive amounts of data may be written to file slack areas or hidden by
diffusion into binary objects or steganography.
 Electronic eavesdropping techniques concerning cellular telephones,
personal pagers, search methodologies are highly helpful in identification of
data.
There can be huge amount of data available, but data relevant to case must
be identified and presented separately.
IMPORTANCE OF TIME IN DATA
IDENTIFICATION
 Time associated with data gathered under any case is highly relevant and can
change the entire meaning of evidences gathered.
Many organizations have a time related to all their transactions which proves
highly beneficial in litigation cases in proving the predecessor or file’s
originality.
Accurate timekeeping is an advanced science, an avocation practiced by
hundreds of scientists around the world.
Clock filters and Autokey methods are widely used for setting up security.
FORENSICS ANALYSIS OF DATA
Forensic Data Analysis (FDA) is a branch of Digital forensics.
It examines structured data with regard to incidents of financial crime.
The aim is to discover and analyse patterns of fraudulent activities.
The analysis of large volumes of data is typically performed in a separate
database system run by the analysis team.
In order to analyse large structured data sets with the intention of detecting
financial crime it takes at least three types of expertise in the team.
FORENSICS ANALYSIS OF DATA
Live systems are usually not dimensioned to run extensive individual analysis
without affecting the regular users.
On the other hand, it is methodically preferable to analyse data copies on separate
systems and protect the analysis teams against the accusation of altering original
data.
The combination of different databases, in particular data from different systems or
sources is highly effective.
These data sources are either unknown to the perpetrator or such that they can not
be manipulated by the perpetrator afterward.
CONCLUSION
 Data preservation, identification and extraction is a necessary part for digital
forensics so analysing it in a proper manner is an important task.
Identification and processing of relevant data is a big and essential task for
digital forensics.
For data analysis timestamp, clock filters, auto keys, clock time are important
factors through which digital forensics evaluation.
QUERIES?

Mais conteúdo relacionado

Mais procurados

Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Vishal Tandel
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 

Mais procurados (20)

Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 

Semelhante a Evidence and data

Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemCSCJournals
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxsmile790243
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 

Semelhante a Evidence and data (20)

Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 

Último

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Último (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Evidence and data

  • 1. DISCOVERY OF ELECTRONICEVIDENCEAND IDENTIFICATIONOF DATA PRESENTED BY ATUL RAI M TECH – NIT JALANDHAR
  • 2. DISCOVERY OF ELECTRONIC EVIDENCE  What is Electronic Evidence?  EE’s Admissibility  Electronic Evidence Discovery  Case Study  Conclusion
  • 3. ELECTRONIC EVIDENCE  Electronic evidence or digital evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. The digital era has increased the dependency organizations and people have on electronic storage media.  Files, transactional records, mail communication and data are maintained electronically in computer systems and on servers.  All these files and data become potential evidence in case of any incident or litigation cases.
  • 4. ELECTRONIC EVIDENCE ADMISSIBILITY  The use of digital evidence has increased in the past few decades.  Courts have allowed the use of e-mails, digital photographs, word processing documents, files saved from accounting programs, spreadsheets etc.  Internet browser histories, instant message histories, the contents of computer memory, computer backups, and digital video or audio files are also important electronic evidences that are being considered in federal courts these days.
  • 5. ELECTRONIC EVIDENCE ADMISSIBILITY  Many courts in the United States have applied the Federal Rules of Evidence to digital evidence in a similar way to traditional documents.  In addition, digital evidence tends to be more voluminous, more difficult to destroy, easily modified, easily duplicated, potentially more expressive, and more readily available.  It is becoming more common for lawyers to seek production of entire computer hard disk drives, floppy diskettes, Zip disks, CD-ROMs, cell phones, and palm computer devices.
  • 6. ELECTRONIC EVIDENCE DISCOVERY  Since Electronic Evidence can easily be altered, its discovery and admissibility are subject to the procedure followed in gathering, processing and presenting them.  There are certain guidelines like: UK ACPO guidelines, ADAM Principles proposed in a doctoral thesis etc.  Electronic evidence is admissible in court only if the above guidelines are followed and no illegitimate actions or procedure was used in gathering them.
  • 7. UK ASSOCIATION OF CHIEF POLICE OFFICERS GUIDELINES  Principle 1: No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court.  Principle 2: In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.  Principle 3: An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.  Principle 4: The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.
  • 8. ELECTRONIC EVIDENCE DISCOVERY  With businesses and individuals relying on computers for data processing, scheduling, and communications, it is possible to discover anything from background information to the “smoking gun” document by investigating what is on your opponent’s computer systems.  For evidence discovery, where the basics are concerned, the investigator is occupied with safeguarding the chain of custody.  During the planning stage, emphasis is given to understanding the information being sought.  Backups of discovered information files are critical to the overall process, and tools such as revision-control software can be very handy for this task
  • 9. CASE STUDY  In Aguimatang v. California State Lottery, the court gave near per se treatment to the admissibility of digital evidence stating "the computer printout does not violate the best evidence rule, because a computer printout is considered an ‘original.’" [234 Cal. App. 3d 769, 798.]  On November 12, 1980, a grand jury sitting in the Southern District of Texas' backed up electronic evidence admissibility stating that "computer data compilations… should be treated as any other record.“[US v. Vela, 673 F.2d 86, 90 ]
  • 10. CONCLUSION  Electronic Evidence is any digital document or file that can be used in a case in court.  There are certain guidelines that need to be followed in case of evidence gathering and presentation.  The case studies we presented define how the Federal law and court admitted electronic evidence in their ongoing cases.
  • 11. IDENTIFICATION OF DATA  What is Data and how is it relevant?  Importance of time in Data Identification  Forensic Analysis of data Conclusion
  • 12. WHAT IS DATA?  In computer forensics the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information is called as a data.  Data is stored in files as well as dumbs and slack of the device storage.  User might be accessing and deleting evidence or case related data from the visible space of the storage media but data still resides in temp files and is never actually deleted.  It is this information that benefits law enforcement and military agencies in intelligence gathering and in the conduct of investigations.
  • 13. IDENTIFICATION OF DATA?  Data can be written or hidden in “extra” tracks, sectors, hidden partitions, unallocated space. Massive amounts of data may be written to file slack areas or hidden by diffusion into binary objects or steganography.  Electronic eavesdropping techniques concerning cellular telephones, personal pagers, search methodologies are highly helpful in identification of data. There can be huge amount of data available, but data relevant to case must be identified and presented separately.
  • 14. IMPORTANCE OF TIME IN DATA IDENTIFICATION  Time associated with data gathered under any case is highly relevant and can change the entire meaning of evidences gathered. Many organizations have a time related to all their transactions which proves highly beneficial in litigation cases in proving the predecessor or file’s originality. Accurate timekeeping is an advanced science, an avocation practiced by hundreds of scientists around the world. Clock filters and Autokey methods are widely used for setting up security.
  • 15. FORENSICS ANALYSIS OF DATA Forensic Data Analysis (FDA) is a branch of Digital forensics. It examines structured data with regard to incidents of financial crime. The aim is to discover and analyse patterns of fraudulent activities. The analysis of large volumes of data is typically performed in a separate database system run by the analysis team. In order to analyse large structured data sets with the intention of detecting financial crime it takes at least three types of expertise in the team.
  • 16. FORENSICS ANALYSIS OF DATA Live systems are usually not dimensioned to run extensive individual analysis without affecting the regular users. On the other hand, it is methodically preferable to analyse data copies on separate systems and protect the analysis teams against the accusation of altering original data. The combination of different databases, in particular data from different systems or sources is highly effective. These data sources are either unknown to the perpetrator or such that they can not be manipulated by the perpetrator afterward.
  • 17. CONCLUSION  Data preservation, identification and extraction is a necessary part for digital forensics so analysing it in a proper manner is an important task. Identification and processing of relevant data is a big and essential task for digital forensics. For data analysis timestamp, clock filters, auto keys, clock time are important factors through which digital forensics evaluation.