DIGITAL FORENSICS AND CYBERCRIME INVESTIGATION

DIGITAL FORENSICS AND CYBERCRIME INVESTIGATION

DIGITAL FORENSICS AND CYBERCRIME INVESTIGATION

AUTHORS – PRASANNA S* & LAVANYA P**

* PRASANNA S, CHAIRMAN OF INSTITUTE OF LEGAL EDUCATION AND I.L.E. EDUCATIONAL TRUST. EMAIL – PRASANNA@ILEDU.IN.

** LAVANYA P, CHIEF ADMINISTRATOR OF INSTITUTE OF LEGAL EDUCATION. EMAIL – LAVANYA@ILEDU.IN.

Best Citation – PRASANNA S & LAVANYA P, DIGITAL FORENSICS AND CYBERCRIME INVESTIGATION, ILE JOURNAL OF LAW AND FORENSIC SCIENCE (ILE JLFS), 1 (1) of 2023, Pg. 05-13, APIS – 3920 – 0047 | ISBN – 978-81-964391-3-2.

Abstract:

Digital forensics plays a crucial role in investigating cybercrimes, ensuring the admissibility of digital evidence in legal proceedings. This paper explores the challenges associated with cybercrime investigations from a legal standpoint, examining the evolving nature of digital forensics and its impact on privacy in the digital age. Key themes include the admissibility of digital evidence, ethical considerations, and the need for updated legal frameworks to address emerging challenges.

Keywords: Digital Forensics, Cybercrime Investigation, Admissibility of Digital Evidence, Legal Challenges, Privacy Concerns, Ethical Considerations

Bibliography

i. Books:

  1. Casey, Eoghan. (2011). “Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet.” Academic Press.
  2. Nelson, Bill, Phillips, Amelia, & Enfinger, Frank. (2019). “Guide to Computer Forensics and Investigations.” Cengage Learning.
  3. Maras, Marie-Helen. (2014). “Cybercriminology and Digital Investigation.” Routledge.
  4. Carrier, Brian. (2005). “File System Forensic Analysis.” Addison-Wesley.
  5. Pollitt, Mark. (2014). “Introduction to Digital Evidence.” CRC Press.

Ii. Journal Articles:

  1. Daryabar, Farid, & Dehghantanha, Ali. (2017). “Digital Forensics Challenges in Cyber Physical Systems: A Comprehensive Review.” Journal of Network and Computer Applications, 88, 1-20.
  2. Quick, Darren. (2016). “The Legal and Ethical Implications of Digital Forensics.” The Computer & Security Journal, 61, 111-121.
  3. Reith, Matthew, Carr, Chris, & Gunsch, Gerry. (2002). “An Examination of Digital Forensic Models.” International Journal of Digital Evidence, 1(3), 1-12.
  4. Casey, Eoghan, & Chevalier, Sharon. (2013). “The Impact of Full Disk Encryption on Digital Forensic Acquisition.” Digital Investigation, 10(3), 226-235.
  5. Cohen, Fred. (2018). “Chain of Custody in Digital Forensics: A Comprehensive Review.” Digital Investigation, 27, 48-57.

iii. Case Laws:

  1. R v. Grant, [2009] 2 S.C.R. 353 – Supreme Court of Canada, landmark case on the admissibility of electronic evidence.
  2. United States v. Stavros Ganias, 824 F.3d 199 (2d Cir. 2016) – U.S. Court of Appeals case addressing the Fourth Amendment issues in digital searches.

iv. Websites:

  1. National Institute of Standards and Technology (NIST) Computer Forensics Tool Testing Program. (https://www.cftt.nist.gov/) – Resource for testing computer forensic software tools.
  2. Digital Forensics Magazine. (https://www.digitalforensicsmagazine.com/) – Online magazine covering various aspects of digital forensics.

v. Reports and White Papers:

  1. Council of Europe. (2017). “Guidelines for the Forensic Examination of Digital Technology.” (https://www.coe.int/en/web/cybercrime/guidelines-digital-evidence)
  2. Department of Justice (U.S.). (2020). “Best Practices for Seizing Electronic Evidence.” (https://www.justice.gov/criminal-ccips/page/file/1087896/download)

vi. Conference Proceedings:

  1. Peterson, Gilbert, & Shenoi, Sujeet. (Eds.). (2018). “Advances in Digital Forensics XIV.” Springer.
  2. Carrier, Brian, & Spafford, Eugene H. (Eds.). (2003). “Proceedings of the 6th Annual Digital Forensic Research Workshop.” Purdue University.

Vii. Other references

  1. Prasanna, S., et al. EMPOWERMENT AND EQUALITY NAVIGATING HUMAN RIGHTS LAW IN A COMPLEX WORLD. Institute of Legal Education, 2023. Access Here – https://scholar.google.com/scholar?cluster=8073531615629308019
  2. PRASANNA, S., and P. LAVANYA. “NAVIGATING THE MAZE: UNDERSTANDING KEY DATA PRIVACY AND SECURITY LAWS WORLDWIDE.” Access Here – https://scholar.google.com/scholar?cluster=14275456488561985070
  3. Gopala, Bhagyamma. “A constitutional imperative for gender equality and dignity: a discourse on menstrual leave in India.” ILE Constitutional Review 2 (2023). Access Here – https://scholar.google.com/scholar?cluster=14542656713228494739
  4. Tulsyan, Aryan. “Cannabis and the constitution:’High time for amending the NDPS act?.” ILE Human Rights Law Review 1.1 (2022). Access Here – https://scholar.google.com/scholar?cluster=1620071720487117886
  5. SINGH, UJJWAL. “CUSTODIAL VIOLENCE IN MODERN INDIA.” Journal of the Indian Law Institute 36.3 (1994). Access Here – https://scholar.google.com/scholar?cluster=4641833531038214506
  6. Azizfan, Sayed Malik Shah. “A BLUEPRINT FOR SUSTAINABLE POVERTY ALLEVIATION AND UNEMPLOYMENT MITIGATION: SYNTHESIZING SOCIOECONOMIC TRANSFORMATION IN AFGHANISTAN.” Access Here – https://scholar.google.com/scholar?cluster=17585185253194219063
  7. PRASANNA, S., and P. LAVANYA. “PROTECTING PERSONAL DATA: A COMPREHENSIVE GUIDE TO DATA PRIVACY REGULATION.” Access Here – https://scholar.google.com/scholar?cluster=2736636049548842283
  8. PRASANNA, S., and P. LAVANYA. “NAVIGATING THE MAZE: UNDERSTANDING KEY DATA PRIVACY AND SECURITY LAWS WORLDWIDE.”. Access here – https://scholar.google.com/scholar?cluster=14275456488561985070
  9. PRASANNA, S., and P. LAVANYA. “DATA PRIVACY IN THE DIGITAL AGE: COMPLIANCE WITH INDIAN LAWS.”. Access Here – https://scholar.google.com/scholar?cluster=2482682029322735326
  10. SRIVASTAVA, AVANTIKA. “A CRITICAL ANALYSIS OF LAWS PERTAINING TO RAPE AND FALSE MARRIAGE PROMISES.” Access Here – https://scholar.google.com/scholar?cluster=15122870610367691037
  11. Abdurahim Zai, Mohammad Edris, and Naseebullah Amani. “The Impact of Green Supply Chain Management on Climate Change: Cursory Glance on the Food Industry.” International Environmental Legal Research Journal 1.1 (2023): 150-161. Access Here – https://scholar.google.com/scholar?cluster=9866710733130422173
  12. JAYAL, HARDIK, and SHREYA SINGH THAKUR. “A COMPREHENSIVE ANALYSIS REGARDING THE PRACTICE OF BONDED LABOUR IN INDIA.” Access Here – https://scholar.google.com/scholar?cluster=16247068770278814586