DIGITAL FORENSICS IN LAW ENFORCEMENT: IMPORTANCE AND CHALLENGES BY - KAVYASHREE R & APOORVA SRI A R
DIGITAL FORENSICS IN LAW ENFORCEMENT:
IMPORTANCE AND CHALLENGES
AUTHORED BY
- KAVYASHREE R &
APOORVA SRI A R
ABSTRACT
India is currently in a digital era
where individuals rely on the internet for nearly every aspect of their daily
lives, from waking up to going to bed. As technology evolves rapidly, so do
cybercrime and cyberthreats. In this context, digital forensics, plays a
crucial role. Computer science and legal forensics combine to gather digital
evidence, store it on the computer for case investigation, and then present it
in a court of law. In an earlier period where there was no development, there
were a lot of people working on an investigation, and because there was no
access to the internet, it was time-consuming. However, with the help of
digital advancements, we have improved a lot in solving crimes. A key
development in this regard is the latest legislation, Bharatiya Sakshya
Adhiniyam, 2023, an amendment to the Indian Evidence Act, 1872, which places
considerable focus on electronic evidence and its admissibility and procedural
aspects of presenting in court. While digital forensics offers a powerful tool
for investigation, its complexity in understanding and lack of widespread
knowledge in this field pose significant challenges to its adoption. This paper
will discuss its advantages and disadvantages, its current standing in the
Indian courts, and potential solutions if problems arise. Finally, the paper
also discusses the need for technological adaptation to effectively combat
cybercrime.
KEYWORDS: Digital Forensics, Cybercrime,
Internet, Technology, Investigation.
I.
INTRODUCTION
Digital Forensics is like peering
into digital universe where every bit and byte holds secrets waiting to be
discovered. It holds the key to unlock the hidden secrets. With the help of
this technique detectives can probe the cyberspace to find crucial information,
resolve cases that are extremely complex in nature and prevent digital crimes. Digital
forensics is not just for investigations into malicious software, child
pornography, and white-collar crime, it is an essential part of homeland
security and the fight against terrorism[1]. There
are millions of people using the Internet worldwide, and the number is rising
daily. Computer networks, automated data systems, and the Internet offer an
endless amount of opportunities for illicit activity. Through the use of
computers, crimes are being committed against individuals, groups, governments,
and property[2]. The
evidence backlog has not been significantly reduced in practice, despite the
fact that the digital forensic procedure has advanced significantly in recent
years[3]. With
increase in the rate of cyber-attacks and cyber-crimes there is a necessity to
safeguard a digital data. The use of electronic devices, such as computers,
smartphones, the internet, etc., has led to the growth of this field.
II.
DIGITAL FORENSICS
Digital forensic science focuses on
the investigation and analysis of digital devices like computers, laptops,
smartphones, and storage media to gather evidence for legal purposes. It
involves techniques to recover, preserve, and analyze data from these devices to
uncover digital evidence that can be used in criminal investigations or legal
proceedings[4]. Digital
forensics plays a crucial role in identifying cybercrimes, data breaches, and
other digital incidents by examining digital artifacts and electronic records[5].
It's a fascinating field that combines technology, law, and investigative
skills to solve complex digital mysteries.
Digital forensics is primarily used
for two purposes:
·
Investigation
An investigation will be
started once the crime is committed. So, the common place to look for getting
clues is the smartphone and laptop of a suspect. A Digital forensics specialist
looks for information that is crucial to the investigation after identifying a
suspect and taking their laptop or smartphone into evidence. Evidence must be
handled within legally acceptable standards so that the results they obtain can
be used as proof. Prosecution may then use the material they found during the
investigation whether it be documents, browsing history, or even metadata can
be used to build a strong case against the suspect.
·
Data Recovery
The professionals also
help in the recovery of the data. They retrieve the data that was previously
lost, which is beneficial for those who have lost some necessary data, such as
a business that has had a system crash and that may also be important for
ongoing case[6]. Investigators
can monitor digital footprints, access records, and recreate information with
the aid of data recovery techniques.
III.
IMPORTANCE OF DIGITAL FORENSICS
·
Digital Evidence Collection
To collect digital evidence effectively, it is
crucial to rely on the expertise of a digital forensics specialist. These professionals are
trained to preserve digital evidence while ensuring its integrity, making it admissible
in court. They use various data recovery methods to retrieve information from
digital devices, even when it has been deleted or corrupted.
A key process in this field is forensic imaging,
which creates an exact, bit-by-bit copy of the original device to prevent data
alteration or loss. This allows for detailed analysis through methods such as
keyword searches, metadata reviews, and timeline reconstructions.
Forensic specialists also use a variety of
specialized tools and software designed to make digital evidence collection
more precise and efficient. Their skills and access to advanced technology
allow for the effective gathering and analysis of digital evidence, which plays
a crucial role in investigations and legal proceedings as it can be used in the
Court.
·
Data Recovery
The speedy recovery of data from digital devices is
one of the main benefits of computer forensics. When handling digital evidence,
quick data recovery is essential, and computer forensics makes it possible to
retrieve lost or erased data quickly. Forensic techniques can be used to
retrieve encrypted or destroyed data, which may provide important details
regarding illicit activities.
This involves restoring data from a variety of
devices, including laptops, smartphones, and hard drives, utilizing
sophisticated recovery tools and methodologies. Quick data recovery is
essential for investigations because it enables forensic professionals to
examine the evidence and find important information quickly, which increases
the overall efficacy of digital investigations.
·
Enhanced Investigation Efficiency
Through the use of specialized techniques and tools
for obtaining and evaluating digital evidence, computer forensics greatly
increases the effectiveness of investigations. The preservation of evidence is
a major advantage because, in the wrong hands, digital data can be quickly
changed or destroyed. Maintaining the integrity of the evidence strengthens the
investigation and raises the likelihood of a successful resolution through the
use of appropriate forensic techniques.
Computer forensics which is a branch of Digital forensics also
improves data security by locating weaknesses in systems and suggesting
countermeasures to avoid similar occurrences in the future.
·
Legal Support
When using digital forensics in investigations, strong legal support
can be expected. The digital evidence recovered and analyzed by forensic
experts, such as deleted files, browsing histories, and emails, can withstand
scrutiny in court. This evidence can be instrumental in proving innocence or
guilt, establishing timelines, and uncovering motives in criminal cases.
Additionally, Digital forensics plays a crucial role in identifying
cybercriminals and supporting prosecutions, bolstering the credibility of the
evidence presented in legal proceedings and contributing to a just legal
process.
·
Accurate Data Analysis
Digital forensics
allows for precise analysis of digital data, providing valuable insights for
investigations. Advanced forensic techniques enable investigators to gather and
thoroughly examine digital evidence from sources like hard drives, mobile
devices, and network logs.
Standardized procedures ensure that data is
validated for integrity and reliability. This accurate analysis helps investigators uncover
patterns, establish connections, and generate leads, ultimately supporting
legal proceedings and enabling sound conclusions based on solid evidence[7].
·
Prevention of Cybercrime and future crimes
Digital forensics
is an essential tool for preventing cybercrime by identifying and analyzing
digital evidence. As cyber threats increase in the digital age, cybersecurity
has become more critical than ever.
Digital
forensics helps detect cyber threats through the analysis of digital
footprints like log files and network traffic. It also enables experts to find
system vulnerabilities and strengthen cybersecurity measures. By tracking down
cybercriminals and deterring future attacks, computer forensics is a key weapon
in the fight against cybercrime.
Digital footprints, user accounts, and IP addresses
are among the pieces of evidence that forensic investigation might find that
connect suspects to crimes[8]. Future crimes can be prevented by
leveraging insights from forensic investigations.
·
Effective Fraud Detection
Digital forensics
excels at detecting fraud efficiently. By promoting the use of higher modern
frameworks for digitization techniques, which allows powerful benches to help
investigate seismic cases in many layers of peer oceans. When forensic
investigators examine the digital footprints of financial transactions, emails
and other digital evidence, they hope to find common threads or irregular
activity across them.
Digital forensics
also assists in risk assessment by identifying system vulnerabilities and
suggesting ways to mitigate fraud risks. The use of cutting-edge technologies
like machine learning and artificial intelligence further enhances fraud
detection, making computer forensics a vital tool in combating financial
crimes.
·
Ensuring system integrity
Digital forensics
ensures integrity of computer systems by preserving the data and information at
original state during investigations.
·
In-depth Analysis
To
reconstruct events and create timelines of illegal behaviour, forensic
specialists can examine digital artifacts including emails, log files, and file
metadata.
·
Expert Testimony
In court, forensic
specialists can give reliable testimony that helps juries and judges understand
intricate technical aspects.
IV.
CASES STUDIES AND LEGAL PRECEDENTS
a) BTK Killer case
Digital Forensics played
a key role in this case. Analysts examined the computer device of Rader’s and uncovering
the vital information. They recovered the deleted files, photos of victims, and
detailed logs of his activities all of which helped establish his identity. Investigators
also decoded encrypted messages and uncovered hidden files through advanced
forensic techniques leading to arrest and conviction[9].
Rito Llamas-Juarez was
killed during an attempted robbery that Thomas was convicted guilty of.
Although there were eyewitnesses in the case that attested to Thomas's presence
at the crime scene, digital forensics added even more weight to the evidence.
The authorities
considered the posts made on the offender's Facebook account while conducting
their investigation. They discovered that he had been posting pictures of
himself with an assault rifle on social media under the username
"Slaughtaboi Larro." The gun in Thomas's internet photos and the
ammunition used in the murder case were identical. Additionally, a bracelet
discovered at the crime scene was matched to the images. It was a bracelet
similar to the one Thomas had been sporting in the internet photos. Thomas was
consequently taken into custody and locked up.
c) Krenar Lusha case
The authorities were able
to track down Lusha because he got information from the internet on building
bombs, detonators, search belts, etc. He also expressed his hatred for Jews and
Americans in correspondence with other users on the internet.
Lusha was apprehended by
the police downloading videos on how to make mobile detonators after they
obtained a search order for his flat. Incriminating tangible evidence was also
discovered, such as parts for gasoline bombs, ammunition for guns, and cell
phones used to set off explosives. The police were able to apprehend him before
he could commit any violent or destructive crimes because of digital forensics.
d) State of Tamil Nadu v. Suhas Katti[11]
In this case, a fake email
address was made in order to damage the victim's reputation by disseminating
obscene and disparaging information about her. The accused was charged under
Section 67 of the IT Act and Sections 469 and 509 of the Indian Penal Code,
1860. The Court's severe penalties made it abundantly evident that cyber
harassment and defamation are serious offenses.
e) Nasscom vs. Ajay Sood & Others[12]
In this case, Court held
that phishing on internet is an illegal activity though it is not defined under
any statute. It categorized phishing as passing off which caused damage to
Nasscom trademark rights. The court granted injunction to defendants from using
the Nasscom’s trademark. The local commissioner was appointed to gather the
evidence and two hard disc containing false e-mail were found. The digital evidence
played a crucial role in the case.
f) United States v. Wurie, 2013[13]
In 2007, a drug dealer
was arrested and two cell phones were collected and inspected. Based on
information from the cell phone, the police were able to locate the drug
dealer's residence using digital forensics. They then requested a search
warrant and discovered additional drugs and firearms in the dealer's apartment.
In
this instance, the appellant’s hard drive contained child pornography that was
found using computer forensics. The appellant contended that the Child
Pornography Prevention Act (CPPA), which dealt with the possession of child
pornography, was unconstitutional due to its definition that encompassed images
that "appear to be" children. This might potentially include legal
adult pornography that bore similarities to child exploitation. A district
judge concurred, dismissing the accusations for being too ambiguous. A higher
court reversed this ruling, reiterating the indictment and permitting the
prosecution to move further on the grounds that the appellant's challenge to
the CPPA was inadmissible.
h) The Enron scandal, 2001-2002
Due to the extent of the
financial manipulation and the manner digital forensics was used to reveal the
truth, the Enron incident is still a key case in corporate fraud
investigations. In order to retrieve erased evidence, piece together intricate
financial transactions, and ultimately apprehend corporate offenders, digital
forensic techniques were crucial. The case demonstrated the significance of
digital evidence in contemporary financial crimes and paved the way for
stricter rules and corporate governance compliance requirements.
i) The Boston Marathon bombing, 2013
The Boston Marathon
bombing was terrorist attack which killed 3three people and injured hundreds.
The investigation brought to light how important digital forensics is to
contemporary criminal investigations. Digital forensic techniques were critical
to identifying the suspects, reconstructing the crime, and apprehending the
criminals. These techniques ranged from the collecting and processing of
copious quantities of video and photographic evidence to tracking internet
activities and communications. This case showed how digital forensics may use
technology to help solve complicated, well-known crimes and support public
safety.
j) Pegasus Spyware Scandal, 2010
India became embroiled in
the debate about the deployment of Pegasus spyware in 2021. Experts in digital
forensics were crucial in examining claims of unauthorized monitoring by tracing
the spyware through mobile device analysis. This particular instance
illustrated the significance of digital forensics in revealing intricate cyber
spying operations.
V.
CHALLENGES
IN DIGITAL FORENSICS
The digital forensics is a process of
investigation did in the field of computers and other electronic devices. They
have a prominent place in this digital era as discussed above, still as every
coin has its other side these computer forensics also have their challenges.
The challenges which will be faced by the computer forensics are briefly
explained below
I.
TECHNICAL ISSUES:
1.
Technology Advancement:
Every day, new gadgets
emerge on the scene bringing with them intriguing benefits as well as
drawbacks. Technological advancement may also result in insoluble problems
since humans are constantly seeking out new information and tend to overlook
how it will impact us down the road[15].
This is also what is bound to occur to computer forensics; when they attempt to
look into a crime, more technologically sophisticated criminals will have ways
around them. The task of solving a case will then become indefinite[16].
University of Washington, “Synthesize” software tool issue,
2017:
The University developed
a program called "Synthesize" that was used to generate lifelike
recordings of celebrities performing, conversing, or simply being in the room.
This was another illustration of the deep fake technology that was popular
around the time when artificial intelligence began to develop quickly. The
digital forensic investigators are left wondering whether transparency and
accountability will be provided in light of this software capability[17].
2.
Police not getting warrant and
mishandling:
The admissibility of
digital forensics evidence in court is beset with difficulties since the police
must follow certain procedures in order for it to be accepted, one of which
being obtaining a warrant in advance. In several instances, despite the
effectiveness of the law enforcement's digital forensics investigation, the
admittance of the suspects was denied on the grounds that no warrant had been
granted[18].Police
digital forensics gather, store, and present evidence in court. However, there
are a few instances during this process where evidence is handled improperly,
harming the victim. These occur most frequently in rape cases when texts
discovered on a mobile phone are handled improperly for personal gain[19].
This case highlighted the
need for evidence preservation in law enforcement. The prosecution used Solomon
Dwek, a cooperating witness, to communicate with the defendants under a
pseudonym. The court found that agents Russ and McCarthy were unable to produce
the SMS text communications, leading to the defendants not being found guilty
of conspiracy to commit extortion, attempted extortion, and bribery.
Brighton Associates fired
Director of Business Development, Krumwiede, who later worked for a competing
company. Brighton counterclaimed for breach of contract and misappropriation of
a business opportunity. Krumwiede agreed to have his laptop forensically
analyzed by a neutral expert, who found that he had altered thousands of files
and metadata, leading to willful and bad faith spoliation of evidence. The
court found Krumwiede's conduct contemptuous and warranted a default judgment.
The digital forensic experts were unable to preserve important digital
evidence, leading to the dismissal of the case.
3.
Cross contamination:
Digital evidence that has
been contaminated by other sources loses some of its admissibility, which might
lead to serious issues throughout the legal proceedings as it calls into doubt
the authenticity of the evidence. Data corruption during storage, carelessness
when transferring digital evidence, contaminated computer forensics
workstations, improper handling of digital evidence, and data transfers without
proper protections are some of the ways that investigators can cause
contamination[22].
II.
LEGAL ISSUES:
1.
Privacy concerns:
The primary stage in the
usage of digital forensics is accessing an individual's personal information.
For example, the first step an investigator takes to obtain information
regarding a crime is to learn about the criminal and any relevant facts. In
typical forensic cases, this involves entering someone's property and obtaining
a warrant in order to gather information. However, in computer forensics, there
may be situations in which it is necessary to interfere with a person's
personal information in order to gather information[23].
In these situations, the privacy of the individual may be violated, which may
also compromise the validity of the evidence[24].
The American Society of
Crime Laboratory Directors has created a set of guidelines for digital and
multimedia evidence, which addresses privacy concerns. Another strategy is to
allow forensic specialists, attorneys, and other professionals to work together
and communicate with one another[25].
Apple vs. FBI, 2016[26]
Apple was ordered to
build a covert backdoor by the FBI in order to obtain data from an iPhone that
belonged to one of the San Bernardino attackers. This request was submitted in
order to look into a possible criminal. Here, Apple was asked to provide
digital forensics for an inquiry aimed at opening a backdoor and gathering
data, but they declined due to potential privacy issues it could create.
2.
Admissibility and Reliability
concerns:
Although forensic
evidence is growing in India, there are still problems with its admissibility.
The new amendment act, Bharatiya Sakshya Adhiniyam, 2023, explains in detail
the provisions pertaining to forensic evidence and their procedure which is
under section 61, 62, 63, but case jurisdiction, search and seizure, spoliation
of evidence, and issues with "good faith," evidence preservation,
investigation, and analysis make it difficult for the courts to admit such
evidence[27]. The
solution which can be opted for this issue is a proper protocol need to be
followed for this digital evidence and that includes identification,
collection, acquisition and preservation. If these steps are followed we can
mitigate the admissibility issues[28].
There is no clear explanation in sec 63 of Bharatiya Sakshya Adhiniyam, 2023 on
who can give certificate or if he refuses to give such certificate what could
be done. This is a major backdrop for this section because the certificate given
holds all the authenticity and the person giving it should also be
authenticated.
There are six primary
criteria that they fall under if reliability is an issue: process, tool,
documentation, technique, examiner, and data set. Their absence of standard and
scientific proof makes them all part of the responsibility as well as openness
problem. Their lack of dependability makes it extremely difficult for suspects
and defendants to exercise their legal rights. Numerous nations have responded
to this issue by creating expert commissions and criteria to be improved[29].
Shafhi Mohammad v. State of Himachal Pradesh[30]:
referred to the Ministry
of Home Affairs' (MHA) action plan on the use of videography in police
investigations, which outlines capacity building in terms of forensic
facilities, training, equipment, a plan for necessary funding, and the creation
of Standard Operating Procedures (SOP). "The time is ripe that steps are
taken to introduce videography in investigation, particularly for crime scene
as desirable and acceptable best practice as suggested by the Committee of the
MHA to strengthen the Rule of Law," the Court said, issuing the required
directives. Aside from the production of a certificate, which was reaffirmed in
Anvar, it is quite desirable in such cases that the procedures for
authenticating electronic evidence be further enhanced. With this method, the
forensic elements of electronic or digital record become more crucial.
Tomaso Bruno & Anr
vs State Of U.P[31]:
The
prosecution's electronic evidence, which included hotel CCTV footage, was
deemed untrustworthy by Tomaso Bruno and Elisabetta Boncompagni due to its lack
of certification under Section 65B of the Indian Evidence Act, 1872. The
conditions for using electronic records as evidence in Indian courts are
described in this section. The Court recognized that although Section 65B
certification improves the validity and dependability of electronic evidence,
it does not completely exclude the admission of electronic evidence in the
absence of the certificate. The Court ruled that if the evidence is trustworthy
and its authenticity is shown by other methods, such witness testimony, it may
still be included.
3.
Judicial flexibility:
The most difficult
expertise for judges and attorneys to possess is digital knowledge since it
will significantly affect how justice is administered. There are still
instances where cases are misdirected because to insufficient understanding of
cybercrime and digital forensics. This could only be decreased if aspiring
attorneys and seasoned attorneys in their area are taught the necessary
information about cyber concerns[32].
The other problem in the legal system is that the judicial system have the
authority to decide whether digital evidence is admissible, which might have a
biased impact on one party or the other. The people's loss of trust in the
legal system will result from the courts' abuse of authority[33].
This case
involved Arias being accused of murdering her boyfriend Travis Alexander. The
defense argued that law enforcement's handling of digital evidence, including
child pornography, contributed to Arias' mental state. The court found one claim
of procedural misconduct, including unqualified officer handled digital evidence in search and
seizure, failing department procedure. Arias was convicted and sentenced to
natural life in prison. The case highlights the importance of legal procedures
in digital forensic investigations.
4.
Section 532 of BNSS:
This provision permits
all appeal procedures to be conducted electronically or by electronic
communication, as well as the issuing of summonses and warrants, the
questioning of the complainant and witnesses, the trial before Sessions Court
and High Court, and the recording of evidence. Although this clause permits the
court to conduct all proceedings digitally, which will be mitigate the burden
of courts but artificial intelligence and deep fake technologies will
eventually surpass the electronic processes now employed in courts since they
are more susceptible to manipulation[35].
Digital forensic labs:
Although the law permits
the use of electronics in court hearings, the relatively poor infrastructure
and inefficient labs make it difficult to trust the evidence that digital
forensic investigators find[36].
III.
SOCIAL ISSUES:
1.
Bias and discrimination:
Law enforcement now uses
facial recognition technologies to identify offenders based on factors such as
gender, color, and structure of the face. These may be accurate in many
circumstances, but in a few, they may lead to the erroneous conviction
of common people. Because individuals are being assumed to be offenders
based on racism and sexism, this might lead to a major crisis between the
people and the government[37].
2.
Ethics in digital Forensics:
The philosophical study
of moral good and bad as well as moral right and wrong can be referred to as
ethics. This is important to understand in the field of digital forensics
because, as all digital technology is created by humans, there is a high potential
for manipulation[38]. While
adhering to professional ethics can help bring about justice, working in any
other field may have negative social effects. Since they provide the foundation
for its operation, technical, legal, and social concerns will all be covered by
digital forensics ethics. They should establish appropriate codes to operate in
such a manner and remain impartial throughout[39].
3.
Global issues:
Because the internet is a
global technology, cybercrime primarily occurs between two nations. As a result,
determining the place of jurisdiction of the crime presents several challenges,
to the point where digital forensics are useless. For the case to go with
greater efficiency, both nations' collaboration must be strengthened. In that
scenario, it will be very difficult to accept those evidence because digital
forensics standards vary between nations[40].
VI.
CONCLUSION:
Cybercrimes are on the rise because
to the rising influence of digital technology in today's environment. Digital
forensics is one technique that law enforcement uses to combat crimes that are
committed. Cybercrime experts in the area are in charge of this forensics. The
field of digital forensics is significant and fraught with difficulties that
fall into three categories: technological, legal, and societal. This study has
emphasized the potential answers to all of the problems and previous examples
that addressed the problems in digital forensics. It is clear from the
solutions and precedent cases that more has to be done to enforce the laws in this
area. This may be done by standardizing procedures, establishing clear rules,
and raising the level of understanding of judges and attorneys in this area. As
these changes are implemented, the admissibility and reliability of the digital
evidence gathered by the digital forensic investigators will rise, ultimately
leading to the administration of justice.
VII.
RECOMMENDATION AND FUTURE DIRECTIONS
The study will
encourage policymakers and legal institutions to invest in digital forensic
education and training to bridge the knowledge gap. Recommendations from this
research could lead to more streamlined procedures for presenting digital
evidence in court, making legal processes more efficient. With better
integration of technology, the Indian judiciary can more effectively combat
cybercrime, ensuring justice is served in a timely and accurate manner.
[1] Rogers, M.K. and Seigfried, K.
(2004) 'The future of computer forensics: a needs analysis survey,' Computers
& Security, 23(1), pp. 12–16. https://doi.org/10.1016/j.cose.2004.01.003.
[2] Newman, R.C. (2007). Computer
Forensics: Evidence Collection and Management (1st ed.). Auerbach Publications.
https://doi.org/10.1201/9780849305627.
[3] Lillis, D. et al. (2016) Current
challenges and future research areas for digital forensic investigation.
https://arxiv.org/abs/1604.03850.
[4] M. Harbawi and A. Varol, "The role of digital
forensics in combating cybercrimes," 2016 4th International Symposium on
Digital Forensic and Security (ISDFS), Little Rock, AR, USA, 2016, pp. 138-142,
doi: 10.1109/ISDFS.2016.7473532.
[5] Fenu, G. and Solinas, F. (2013)
'COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE,'
Research Gate, pp. 77–88. https://iris.unica.it/handle/11584/109723.
[6] DeVry University (2023) What is
Computer Forensics? https://www.devry.edu/blog/what-is-computer-forensics.html.
[7] Ali, A. (2024) Advantages and
Disadvantages of Computers Forensics » Hubvela.
https://hubvela.com/hub/technology/advantages-disadvantages-computers/forensics/#4-strong-legal-support.
[8] Welch, T. (1997) 'Computer Crime
Investigation and Computer Forensics,' Information Systems Security, 6(2), pp.
56–80. https://doi.org/10.1080/10658989709342536.
[9] Espinosa, C. and Espinosa, C.
(2024) 'Digital forensics and the BTK killer - Blue Goat Cyber,' Blue Goat
Cyber, 26 April.
https://bluegoatcyber.com/blog/digital-forensics-and-the-btk-killer-a-case-study-in-solving-crimes/.
[10] Larry J. Thomas Vs State of Indiana,
18A-CR-1714.
[11] State of Tamil Nadu v. Suhas
Katti, (2008) 150 DLT 769.
[12] Nasscom vs. Ajay Sood &
Others, 119(2005)DLT596.
[13] (United States v. Wurie, 724 F.3d 255 (1st Cir. 2013).
[14] U.S. v. Hilton, Crim. No. 97-78-P-C, Civil No. 02-235-P-C (D. Me. Mar. 20,
2003).
[15] Maria Karyda & Lilian Mitrou, Internet
forensics: Legal and Technical Issues, 2 Second
International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007)
3–12 (2007).
[16] Cisomag, Challenges
and applications of Digital Forensics CISO
MAG | Cyber Security Magazine (2021),
https://cisomag.com/challenges-and-applications-of-digital-forensics/ (last
visited Sep 23, 2024).
[17] Suwajanakorn, S. et al. (2017) Synthesizing
obama: Learning Lip Sync from audio: ACM Transactions on Graphics: Vol 36, no 4,
ACM Transactions on Graphics. Available at:
https://dl.acm.org/doi/10.1145/3072959.3073640 (Accessed: 23 September 2024).
[18] Search warrants
for digital devices - UNC school of ...,
https://www.sog.unc.edu/sites/www.sog.unc.edu/files/additional_files/2.0
Handout re Search Warrants for Digital Devices -- version for Court of Appeals
Judges.pdf (last visited Sep 23, 2024).
[19] Police mishandling digital evidence, forensic experts
warn, The Guardian (2018),
https://www.theguardian.com/law/2018/may/15/police-mishandling-digital-evidence-forensic-experts-warn
(last visited Sep 23, 2024).
[20] U.S. v. Suarez, Criminal Action No. 09-932 (JLL) (D.N.J. Aug. 26, 2010)
[21] Krumwiede v. Brighton Associates, L.L.C., Case No. 05 C 3003 (N.D. Ill. Aug. 9, 2006)
[22] Let’s start a new journey today, Digital Forensics and Evidence Handling for
Legal Proceedings | Chartered Institute of Professional Certifications,
https://charteredcertifications.com/learning/courses/digital-forensics-evidence-handling
(last visited Sep 23, 2024).
[23] Neil C. Rowe, Privacy concerns with
Digital Forensics, Cyber Law,
Privacy, and Security 1464–1481 (2019).
[24] Frank Y.W. Law et al., Protecting
Digital Data Privacy in computer forensic examination, 3089 2011 Sixth IEEE International Workshop on
Systematic Approaches to Digital Forensic Engineering 1–6 (2011).
[25] Amit Jaju, Ethical
Digital Forensics – balancing investigation procedures with privacy concerns
Privacy Protection - Privacy - United
States (2023), https://www.mondaq.com/unitedstates/privacy-protection/1306880/ethical-digital-forensics-balancing-investigation-procedures-with-privacy-concerns
(last visited Sep 23, 2024).
[26] Apple v. FBI, EPIC,
https://epic.org/documents/apple-v-fbi-2/#:~:text=The%20case%20is%20captioned%20%E2%80%9CIn,%2C%20on%20February%2016%2C%202016.
(last visited Sep 23, 2024).
[27] James Tetteh Ami-Narh & Patricia A.H.
Williams, Digital Forensics and the legal
system: A dilemma of our times Research
Online, https://ro.ecu.edu.au/adf/41/ (last visited Sep 23, 2024).
[28] Ofori AY, Digital Forensics
Investigation Jurisprudence: Issues of admissibility of digital evidence, 6
Journal of Forensic, Legal &
Investigative Sciences 1–8 (2020).
[29] Radina Stoykova, Digital evidence:
Unaddressed threats to fairness and the presumption of Innocence, 42 Computer Law & Security Review
105575 (2021).
[32] Legal
issues for computer forensics, https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1361&context=acis2003
(last visited Sep 23, 2024).
[33] Cyber forensics, Legal Service India - Law, Lawyers and Legal Resources, https://www.legalserviceindia.com/legal/article-10974-cyber-forensics.html
(last visited Sep 23, 2024).
[34] State v. Arias, 248 Ariz. 546, (Ariz. Ct. App. 2020)
[35] Navigating challenges:
Technology in criminal trials under BNSS (Bharatiya Nagarik Suraksha Sanhita)
(2024) NICKELED AND DIMED. Available at:
https://nickledanddimed.com/2024/06/09/navigating-challenges-technology-in-criminal-trials-under-bnss-bharatiya-nagarik-suraksha-sanhita/
(Accessed: 24 September 2024).
[36] Sharma, R. (no date) Revolutionising
Digital Forensics: India’s New Legal Frontiers, Bar and Bench - Indian
Legal news. Available at:
https://www.barandbench.com/columns/revolutionizing-digital-forensics-indias-new-legal-frontiers
(Accessed: 24 September 2024).
[37] Amit Jaju, Ethical Digital Forensics – balancing investigation procedures with
privacy concerns Privacy
Protection - Privacy - United States (2023),
https://www.mondaq.com/unitedstates/privacy-protection/1306880/ethical-digital-forensics-balancing-investigation-procedures-with-privacy-concerns
(last visited Sep 23, 2024).
[38] Rowe, N.C. (no date) ‘Privacy concerns
with Digital Forensics’, Advances in Public Policy and Administration,
pp. 145–162. doi:10.4018/978-1-4666-9905-2.ch008.
[39] Legal
and ethical consideration in digital forensics,
https://merryinsider.hashnode.dev/legal-and-ethical-consideration-in-digital-forensics
(last visited Sep 23, 2024).
[40] Benefits and challenges of digital
forensics, Global Cyber Security Network
(2024),
https://globalcybersecuritynetwork.com/blog/benefits-and-challenges-of-digital-forensics/#What_are_the_Challenges_of_Digital_Forensics
(last visited Sep 23, 2024).