Reconstructing Digital Evidence

Details

Ressource 1Download: 3-s2.0-B9780123864604000175-main.pdf (433.28 [Ko])
State: Public
Version: Final published version
Serval ID
serval:BIB_DFE25458FF8C
Type
A part of a book
Publication sub-type
Chapter: chapter ou part
Collection
Publications
Institution
Title
Reconstructing Digital Evidence
Title of the book
Crime Reconstruction
Author(s)
Casey Eoghan
Publisher
Elsevier
ISBN
9780123864604
Publication state
Published
Issued date
2011
Pages
531-548
Language
english
Abstract
This chapter presents the use of digital evidence to reconstruct actions taken in furtherance of a crime, providing case examples to demonstrate key concepts. Digital evidence is defined as any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that addresses critical elements of the offense, such as intent or alibi. Homicide, sexual assault, and other violent crimes can involve digital evidence from a wide range of sources, including personal computers, handheld devices, servers, and the internet, helping investigators reconstruct events and gain insight into the state of mind of individuals. Computers and networks should be considered an extension of the crime scene, even when they are not involved directly in facilitating the crime. A single computer can contain e-mail communications between the victim and the offender, evidence of intent to commit a crime, incriminating digital photographs taken by the offender as trophies, and software applications used to conceal digital evidence. It is suggested that digital evidence that is handled and interpreted properly can be used to apprehend offenders, authenticate documents, assess alibis and statements, and determine intent.

Create date
16/01/2019 21:54
Last modification date
21/08/2019 6:10
Usage data