Effective Prosecution to Support Digital Forensic Evidence during Investigation and Court Proceedings
Journal Title: INTERNATIONAL JOURNAL FOR ELECTRONIC CRIME INVESTIGATION - Year 2018, Vol 2, Issue 2
Abstract
Firstly, the purpose of this work is to highlight the significance of digital evidence that exists in the form of digital data and is to be presented in the court of law. Secondly, how this evidence (the digital information) can be effectively used during the investigation process by the investigating agency. Thirdly, the essence of keeping up continued liaison by investigating agency with the prosecutor who is to defend the prosecution side in the court. This paper deals with the offences carried out by offenders using the computer, internet, digital media, other electronic devices, hacking and tracking the networks to harm the government agencies or private organizations by violating the network or database or cybersecurity. These offences are normally the frauds related to financial crimes category and illegal transfer of digital currency. Certain crimes of this area are classified as cyber terrorism. The procedure of collection of evidence and presentation in the court is deviant from other criminal cases. The initial digital evidence may consist of data acquisition, databases, data marts, hard disks, computer file systems and records of illegal transfer of money, This paper advocates to employ powerful prosecution in court of law to make the evidence stronger and consistent with the existing law at the investigation stage as well as in court. The focus of this paper is towards banking frauds and cyber crimes requiring forensic evidence to support the task of prosecution.
Authors and Affiliations
DR AFTAB MALIK, ENGR MUJTABA ASAD, WAQAR AZEEM
Enterprise Security of Wi-Fi Networks using Simulation
Wireless network setting is developing into the market, and it is the major way of accessing the internet. Design and security of these networks for an organization need to be considered to ensure mobility and access to...
User Trust on Online Social Network on the basis of Security and privacy
Online social networks have become a popular medium of sharing information and also major source for connecting the people on a network. As we know that the threats related to online social network is affecting people to...
Data Breaches Security Issues for Cloud Based Internet of Things
Now a day’s Internet of Things (IoT) and cloud computing are latest popular technologies. Both technologies have great role in our life. Their adoption and utilization are relied upon increasingly inescapable and making...
In-Demand Skillsets in Cybersecurity
In recent years, a huge shift to digitization has been observed on a global level. Due to the advantage of having easy access and other benefits, digitization is being adopted fast. With digitization, the ever-growing th...
DNA Fingerprints Facial Prints and Other Digital Forensics as Evidence in Criminal Investigation and Court Proceedings
The purpose of this paper is to focus on the legitimacy and importance of digital evidence such as fingerprints, DNA, polygraph, auto-radiography, and facial-prints and their admissibility in investigations and court pro...