Digital Flashcards
Give the 4 principles from the ACPO guide for computer based evidence?
- Data Preservation
- Competence
- Audit Trail
- Responsibility
Explain Principle 1 of the ACPO guide?
Data preservation: no action by law enforcement agents (or agencies) should change data on a computer (or storage media) that is later relied on in court
Explain Principle 2 of the ACPO guide?
Competence: If a person finds it essential to access original data on a computer (or storage media), this person must be competent to do so and be able to give evidence explaining relevance and implications
Explain Principle 3 of the ACPO guide?
Audit Trail: an audit trial or other record of all processes applied to computer based systems should be created and preserved. An independent 3rd party should be able to examine these processes and achieve the same result
Explain Principle 4 of the ACPO guide?
Responsibility: The person in charge of the case (case officer) has overall responsibility for ensuring that the law and these principles are adhered to.
What should be done to remove a computer from a scene?
power cables should be removed from the equipment, not unplugged or switched at the wall. The equipment should not be turned on.
what are the 4 steps of the ‘forensic process’
Acquisition: Consent, legal documentation, pic/vid/notes of item location
Identification: digital equipment type, origin (e.g. directory), evidence type (e.g. file)
Evaluation: who, how, when was the evidence produced (relevance, foul play? (virus/trojan)
Presentation: Interpretation, readability, technically correct
Name the 4 most important parts of legislation
Computer Misuse Act (1990)
Protection of Children Act (1978)
Criminal Justice and Public Order Act (1994)
Sexual Offences Act (2003)
Give the parts of the Computer Misuse Act (1990) that are relevant to Digital Forensics?
Section 1: Unauthorised access to computer material
Section 2: Unauthorised access with intent to commit or facilitate the commission of a further offence
Section 3: Unauthorised modification of computer material
Give the parts of the Protection of Children Act (1978) (POCA) that are relevant to Digital Forensics?
Section 1; a) Taking, Making or Possessing... b) Distributing.... c) Possessing with intent to distribute... ....an indecent photo of a child
What did the Criminal Justice and Public Order Act (1994) do to POCA (1990)?
Amended S1 to include ‘psuedo-photographs’
What did the Sexual Offences Act (2003) do to POCA (1990)?
Amended S1 to include;
a) Increased the age of a child 16 -> 18
b) Added the defence where an indecent photo of a child over the age of 16 was created by the child’s long time partner (marriage/’enduring relationship’
c) Added the defence where it is required to create an indecent image for a criminal investigation
How could you prove the ‘Actus Reus’ for the POCA?
Finding Images
How could you prove the ‘Mens Rea’ for the POCA?
evidence of browsing, saved pictures, renaming of pictures, searching for pictures
What is the main difference between E-FIT and E-FIT V/6?
E-FITV/6 is a holistic based system, meaning whole face as one and not truely focused on individual features (E-FIT)
E-FITv/6 has a evolutionary progressive algorithm, meaning it can identify features by number and apply similar ones based on choices