Evidence in an Electronic Age – What is admissible?

Slides:



Advertisements
Similar presentations
FRAUD EXAMINATION ALBRECHT, ALBRECHT & ALBRECHT
Advertisements

COEN 252 Computer Forensics
Evidence Collection & Admissibility Computer Forensics BACS 371.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Fundamentals of Computer Forensics Fundamentals of Computer Forensics by Jim Bates,published Feb 1997, International Journal of Forensic Computing “…This.
BACS 371 Computer Forensics
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
CJ227 Criminal Procedure Welcome to our Seminar!!! (We will begin shortly) Tonight – Unit 4 (Chapter 9 – Pretrial Motions, Hearings and Pleas) (Chapter.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
Electronic evidence in Spanish civil procedure: where wishes clash against reality Julio Pérez Gil Universidad de Burgos.
Fraud Examination, 3E Chapter 8: Investigating Concealment COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
3Digital Evidence in the Courtroom Dr. John P. Abraham Professor of Computer Science UTPA.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Discovery III Expert Witness Disclosure And Discovery Motions & Sanctions.
Two competing options: (1) Military tribunals / commissions Most recently, created by Executive Order in Nov 2001 Secretary of Defense ordered to establish.
Computer Forensics Principles and Practices
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Advanced Civil Litigation Class 3Slide 1 Types of Evidence Testimonial evidence Testimonial evidence from eyewitnesses having personal knowledge from eyewitnesses.
A Federal Defender’s Guide to Confrontation Jessica Smith School of Government, UNC-Chapel Hill.
Types of Evidence From Arraignment to Verdict. Self-Incrimination The Canada Evidence Act - regulates rules of evidence (1893). Applies to federal jurisdictions.
THE TRIAL IN CANADIAN COURTS – Part 3 RULES AND TYPES OF EVIDENCE LAW 12 MUNDY
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
1 PRESENTATION OF EVIDENCE Learning Domain PURPOSE FOR THE RULES OF EVIDENCE Protect the jury from seeing or hearing evidence that is: (w/b p. 1-3)
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Legal aspects of forensics. Civil Law private law ◦ Regulates noncriminal relationships between individuals, businesses, agency of government, and other.
MEDICAL RECORDS Admissabilty: Hearsay exceptions Authentication Who can sponsor the evidence? What can it be used for? How to get it in? What to do with.
The Development of Computer Forensic Legal System in Mainland China Yonghao Mai Digital Forensics key Laboratory, Hubei University of Police, China.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
The Adversary System Part I Chapter 7. Learning Intention Explain the processes and procedures for the resolution of criminal cases and civil disputes.
The Investigation.  Right to remain silent  Right to an attorney  No interrogation should take place before they read  Are a result of the US Supreme.
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
CJ305 Criminal Evidence Welcome to our Seminar!!! (We will begin shortly) Tonight – Unit 9 (Chapter 12 – Documents and the Right of Discovery) (Chapter.
EVIDENCE ACT Law of evidence lay rules for the production of evidence in the court of law.
Fraud Investigation FRAUD EXAMINATION ALBRECHT & ALBRECHT Theft and Concealment Investigation Methods CHAPTER 7.
Chapter 8: Investigating Concealment © 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
The Search & Surveillance Act 2012 Who does it effect in Local Government & how? Compliance, Enforcement and Regulatory Training (CERT) Systems “Maximising.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Module 9 – Storing Information Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Criminal Justice Process: The Investigation
Diploma in Arbitration Evidence
Outline of the U.S. and Arizona Criminal Justice Systems
Dr. Anastasios Xeniadis Dr. Luca Schicho
Law of Evidence Oral Evidence.
Forensic and Investigative Accounting
Legal, Regulations, Compliance and Investigations
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Understand rules in relation to the use of evidence in criminal cases
Law of Evidence OPINION EVIDENCE 2/12/2014 Chapter 8.
AGENDA Brief Lecture on Chapters courtroom evidence and jury selections and juries Film, 12 angry men Written exercise
Fraud Examination Chapter 8
Principles of Evidence
Crime Scene Investigation and Evidence Collection
Pre-Trial Procedures Search and Seizure.
Objections Criminal law – unit #3.
Ad Hoc Phase Structured Phase Enterprise Phase
Chapter 17 Videotapes Photographs Documents Writings.
THE CRIMINAL JUSTICE PROCESS: THE INVESTIGATIVE PHASE
Vocabulary Activity Indictment Grand Jury
THE TRIAL IN CANADIAN COURTS – Part 3
CGSB and Electronic Records
CHAP. 13: AUTHENTICATION P. JANICKE 2010.
CHAP. 13: AUTHENTICATION Prof. JANICKE 2019.
On-Site Investigations
Presentation transcript:

Evidence in an Electronic Age – What is admissible? Clare Carroll Friday 20 October 2017

Introduction Consider implications for admissibility of evidence from the beginning of an investigation Develop some familiarity with the ways in which information tends to be created and stored in businesses and by the public generally, so that the rules of evidence can be applied in an appropriate way Engage technical/forensic experts where necessary

Regulatory agencies

Unlawfully obtained evidence Unconstitutionally obtained evidence Illegally obtained evidence Consider closely the parameters of your powers as set out in legislation

Investigative powers Enter premises, by force if necessary, with or without warrant Search Seize records, take copies Conduct interviews Demand information / explanations from persons Require access to computers Seize equipment Demand that certain operations cease pending remediation

Exclusionary Rules – Unreliable Evidence Rule against Hearsay Rule concerning Opinion Evidence Best Evidence Rule Original Document Rule

Preference for Oral Evidence Direct Oral Evidence is best Accused person’s right to cross-examine his accuser is a key feature of a trial in due process Rationale behind the Rule against Hearsay – out of court statements are inadmissible to prove the truth of their contents Documents are, generally speaking, out of court statements and are hearsay

Admissibility of Documents and Electronic Evidence Admissibility as evidence to prove the truth of its contents Admissible in that the evidence is authentic (i.e. as opposed to false and has not been tampered with)

Admissibility of Documents – Truth of its Contents Legislative exceptions to the Rule against Hearsay Bankers’ Books Evidence Acts 1879 –section 4 Criminal Evidence Act 1992 – section 5 Other specific legislative provisions in certain sectors Certificate Evidence

Admissibility of Documents – Authentication Duty of investigator to seek out and preserve all relevant evidence Engage internal or external forensic experts as necessary Chain of Custody Robust Documented Forensically Sound

Electronic Media – Admissibility Considerations “Real Evidence” vs “Documentary Evidence”? “Analogue” vs “Digital”? Automated Computer Generated Records CCTV Video Audio Photographs