- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 373字
- 2021-06-24 16:39:01
Rules of evidence
Courtrooms rely more and more on the information inside a mobile phone as vital evidence. Prevailing evidence in court requires a good understanding of the rules of evidence. Mobile forensics is a relatively new discipline, and laws dictating the validity of evidence are not widely known, and they also differ from country to country. However, there are five general rules of evidence that apply to digital forensics and need to be followed in order for evidence to be useful. Ignoring these rules makes evidence inadmissible, and your case could be thrown out. These five rules are admissible, authentic, complete, reliable, and believable:
- Admissible: This is the most basic rule and a measure of evidence validity and importance. The evidence must be preserved and gathered in such a way that it can be used in court or elsewhere. Many errors can be made that could cause a judge to rule a piece of evidence as inadmissible. For example, evidence that is gathered using illegal methods is commonly ruled inadmissible.
- Authentic: The evidence must be tied to the incident in a relevant way to prove something. The forensic examiner must be accountable for the origin of the evidence.
- Complete: When evidence is presented, it must be clear and complete and should reflect the whole story. It is not enough to collect evidence that just shows one perspective of an incident. Presenting incomplete evidence is more dangerous than not providing any evidence at all, as it could lead to a different judgment.
- Reliable: Evidence collected from the device must be reliable. This depends on the tools and methodology used. The techniques used and evidence collected must not cast doubt on the authenticity of the evidence. If you used some techniques that cannot be reproduced, the evidence is not considered unless those considering the evidence, such as the judge and jury, are directed to do so. This would include possible destructive methods such as chip-off extraction.
- Believable: A forensic examiner must be able to explain, with clarity and conciseness, what processes they used and how the integrity of the evidence was preserved. The evidence presented by you must be clear, easy to understand, and believable by the jury.
Now let's look at best practices.
推薦閱讀
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 黑客攻防技巧
- 軟件開(kāi)發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- 物聯(lián)網(wǎng)安全滲透測(cè)試技術(shù)
- SQL Injection Strategies
- 電腦安全與攻防入門(mén)很輕松(實(shí)戰(zhàn)超值版)
- 實(shí)用黑客攻防技術(shù)
- CTF快速上手:PicoCTF真題解析(Web篇)
- 信息內(nèi)容安全管理及應(yīng)用
- 信息組織
- Real-World SRE
- 企業(yè)安全建設(shè)入門(mén):基于開(kāi)源軟件打造企業(yè)網(wǎng)絡(luò)安全
- 2023—2024年中國(guó)網(wǎng)絡(luò)安全發(fā)展藍(lán)皮書(shū)
- 大數(shù)據(jù)安全治理與防范:反欺詐體系建設(shè)