Digital Forensic and Distributed Evidence
Digital Forensic and Distributed Evidence
Digital Forensic and Distributed Evidence
net/publication/362297807
CITATIONS READS
0 1,220
1 author:
SEE PROFILE
All content following this page was uploaded by Emmanuel Kpakpo Brown on 17 December 2022.
ABSTRACT
Citation: Emmanuel Kpakpo Brown (2022): Digital Forensic and Distributed Evidence
Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 357-362
www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P57
1. INTRODUCTION
Joseph (2018) defines digital forensics as the application of scientifically established methods
in preserving, collecting, validating, identifying, analysing, interpreting and presenting digital
evidence to the court of law after obtaining the evidence from reconstruction of events if
possible. In the late 1990s and early 2000s when computer based crime started growing with
the increasing usage of computers and the Internet.
357
Research Nexus in IT, Law, Cyber Security & Forensics
Digital forensics developed as an independent field (Sriram Raghavan, n.d.). The field is made
up of computer forensics, network forensics, mobile forensics, cloud computing forensics, and
IoT forensics.
The varied branches of the field largely explain the distributed nature of evidence to be collected
when a computer/cybercrime is reported or suspected to have been perpetrated. In evidence
law, digital evidence or electronic evidence is any probative information stored or transmitted
in digital form that a party to a court case may use at trial. According to Ryan (n.d.) for evidence
to be admissible in court, it must be relevant, material and competent, and its probative value
must outweigh any prejudicial effect. This paper gives a comprehensive review of digital forensic
and distributed evidence. It focuses on the frameworks for gathering distributed digital evidence
that can meet the techno-legal requirements for admissibility in the courts of law. The rest of
this paper is organized as follows - section 2 presents a background to the study; section 3
discusses the related literature; section 4 touches on research gaps/findings; section 5
concludes the study; section 6 makes recommendation for policy and practice, and section 7
provides directions for future works.
They have allowed the use of e-mails, digital photographs, ATM transaction logs, word
processing documents, instant message histories, internet browser histories, databases, digital
printouts, Global Positioning System tracks, logs from a hotel’s electronic door locks, and digital
video or audio files found on digital devices such as computers, external hard drives, flash
drives, routers, smartphones, tablets, cameras, smart televisions, Internet-enabled home
appliances; and communication service providers business records; and cloud storage providers
records of user activity and content. With the rise and use of several electronic means of transfer
of documents and information, the commission of especially a cybercrime transcends national
and continental boundaries; hence distributing evidence and making the gathering process a
herculean task. This study is largely focused on what the current challenges of gathering
distributed digital forensic evidence are; the available harmonization frameworks for
admissibility of the evidence by the Courts for prosecution.
2. RELATED LITERATURE
A literature review was adopted as a research methodology in order to locate existing relevant
literature based on prior formulated research questions and to evaluate their respective
contributions to the field. The literature found was used to map emerging issues related to digital
forensic and distributed evidence as follows.
358
Research Nexus in IT, Law, Cyber Security & Forensics
Cyber offenders spread their influence as fast as the Internet and cloud computing develop;
therefore it aggravates the challenges in collecting and analyzing digital evidence in a
cybercrime investigation. Establishing timeline information using date-time stamps is
recommended for law enforcement agents in investigating cloud-related crime (Kao, 2016).
Additionally, a model for digital evidence admissibility assessment Antwi-Boasiako and Venter
(2017) - the Harmonized Model for Digital Evidence Admissibility Assessment (HM-DEAA)
encapsulates the essential techno-legal requirements that determine evidence admissibility in
the court.
359
Research Nexus in IT, Law, Cyber Security & Forensics
Ay & Akoto (2020) asserts that for digital evidence to appear at court to be legally admissible,
the evidence must be authentic, accurate, complete, and convincing to the jury. Antwi-boasiako
et al., (2018) further states that for admissibility, the court examines the legal authorization to
conduct searches and seizures of information and communication technology and related data,
and the relevance, authenticity, integrity, and reliability of the digital evidence.
Modern day computers come with or can be augmented to provide huge amounts of data
storage. Seizing and freezing can no longer be accomplished simply by burning a single CDROM
(Ryan, n.d.). The problem of locating relevant evidence within massive amounts of data is a
daunting task especially when a digital forensic investigator has to look beyond a single
computer. In modern distributed computer architectures, the digital evidence we may need for
the Courts may reside on many different servers and clients within an organization’s IT
infrastructure. The distributed nature of digital evidence makes it more difficult for Africa that is
deficient in the technical expertise and resources required to properly investigate cybercrimes to
bring sanity into its cyberspace.
4. RESEARCH GAPS/FINDINGS
Interestingly, despite the valuable reviews, the various studies did a generalized distributed
digital evidence framework assessment except Khanafseh & Qatawneh (2019) that surveyed
available frameworks and focused specifically on cloud computing framework; and the Joseph
(2018) implementation of digital forensic framework that could be used with standalone
systems as well as in distributed environments, including cloud systems and solutions of cloud
forensics - both of which are at the experimental stage. The effectiveness of the Antwi-boasiako
et al., (2018) HM-DEAA have not been assessed or attested to by players in the criminal
prosecutions circles locally in Ghana and internationally.
The focus of developing frameworks for gathering distributed digital evidence have largely been
general frameworks, apart from the cloud computing forensics branch that have received some
attention. All the other branches - computer forensics, network forensics, mobile forensics and
IoT forensics have been left to be gathered with one-size-fits-all frameworks.
360
Research Nexus in IT, Law, Cyber Security & Forensics
5. CONCLUSION
There is first of all, the need to streamline existing laws and implement existing policies,
technical and legal requirements for evidence admissibility. Standard procedures that are
coherent and ensure harmony between lawyers, judges, forensic experts, law enforcement
agencies, corporations, individuals, and the court must be adhered to. Secondly, the
harmonization of cybercrime investigation and digital forensics practices across borders is
essential for investigations which often times involve more than one legal jurisdiction.
Furthermore, heavy investments must be made to boost the capacities of the relevant
institutions engaged in both digital evidence gathering and prosecution.
While this work discovered that the available literature is mainly geared towards general
framework for digital forensics; only a few studied a specific branch of digital forensics such as
cloud computing. Future works could explore unique frameworks designed and implemented for
the other branches of digital forensics - computer forensics, network forensics, mobile forensics,
and IoT forensics for gathering distributed digital evidence for jurisprudence. Issues such as
security, accuracy, performance and privacy with any of the frameworks could also be
considered.
The above apart, a study into the unique and relevant legal requirements for digital evidence
gathering and admissibility for different jurisdictions (cross-border) could be explored and
recommendations for harmonization made. Additionally, a future study could focus on
comparing and contrasting the different digital forensic investigation processes for the various
digital devices and propose a process that is compatible with all devices and environments. The
last but the least, a study could also be conducted into digital forensic technical mechanisms,
the availability of capacity building programs, organisational infrastructure as well as the
existence of cooperation mechanisms.
REFERENCES
1. Antwi-boasiako, A., Venter, H., Antwi-boasiako, A., Venter, H., Model, A., Evidence, D., &
Assessment, A. (2018). A Model for Digital Evidence Admissibility Assessment To cite
this version : HAL Id : hal-01716394.
2. Apau, R., & Koranteng, F. N. (2020). Forensic Science International : Synergy An
overview of the digital forensic investigation infrastructure of Ghana. Forensic Science
International: Synergy, 2, 299–309. https://doi.org/10.1016/j.fsisyn.2020.10.002
3. Ay, O., & Akoto, D. (2020). Digital Forensics Investigation Jurisprudence : Issues of
Admissibility of Digital Evidence. https://doi.org/10.24966/FLIS-733X/100045
4. International, K. (n.d.). Cross-border investigations: Are you prepared for the challenge?
361
View publication stats
8. Mahfouz, M., & Adjei-quaye, A. (2017). Computer & Cyber Forensics : A Case Study of
Ghana Computer & Cyber Forensics : A Case Study of Ghana. January.
9. Patil, R. Y., & Devane, S. R. (2022). Network Forensic Investigation Protocol to Identify
True Origin of Cyber Crime. Journal of King Saud University - Computer and Information
Sciences, 34(5), 2031–2044. https://doi.org/10.1016/j.jksuci.2019.11.016
10. Practices, S. B., & Acquisitions, C. F. (2018). Scientific Working Group on Digital
Evidence Scientific Working Group on Digital Evidence. 0, 1–11.
11. Ryan, D. J. (n.d.). Legal Aspects of Digital Forensics.
12. Sriram Raghavan. (n.d.). Digital forensic research: current state of the art.
13. Standard, T., & Last, W. A. S. (2018). THIS VERSION REMAINS CURRENT .
362