NLSUI OPAC header image

Techno-Legal Tussle over Electronic Evidence & the Need for a Change: A Road Towards Generation, Preservation & Admissibility

By: Contributor(s): Publication details: Bangalore NLSIU 2014Description: 93pOnline resources:
Contents:
TABLE OF CONTENTS INTRODUCTION ; 1 LEGAL INTERPRETATIONAL ISSUES ; 1.1 TYPES OF EVIDENCE ; 1.2 DOCUMENT ; 1.3 WRITING ; 1.4 PRIMARY OR SECONDARY EVIDENCE ; 1.5 ADMISSIBILITY ; 2 APPLICABILITY OF OLD EVIDENTIARY RULES ; 2.1 RULE AGAINST HEARSAY EVIDENCE ; 2.1.1 The United States ; 2.1.2 The United Kingdom ; 2.1.3 India ; 2.2 BEST EVIDENCE RULE/SECONDARY EVIDENCE RULE ; 3 PROOF, AUTHENTICITY AND AUTHORSHIP ; 3.1 PROOF ; 3.1.1 Proof of Electronic Signature ; 3.1.2 Proof of Electronic Mail ; 3.1.3 Proof of Computer Processes ; 3.2 AUTHENTICITY ; 3.3 AUTHORSHIP ; 4 SOME STANDARDS OF COLLECTION PROCESS UNDER E-EVIDENCES ; 4.1 PRESENCE OF COMPUTER/IT EXPERT(S) IN THE INVESTIGATIVE TEAM: 4.2 TASK ASSIGNMENT: 4.3 PLANNING THE SEARCH AND SEIZURE OPERATION: 4.4 SECURING THE PLACE OF SEARCH AND ELEMENT OF SURPRISE: 4.5 DOCUMENTING THE PLACE OF SEARCH: 4.6 ENQUIRIES FROM THE OCCUPANTS: 4.7 SEIZING THE COMPUTER SYSTEM ITSELF MAY NOT BE PRACTICAL IN MANY CASES: 4.8 REMOVAL OF THE HARD-DISK: 4.9 APPLY THE 'WRITE BLOCKING' SOFTWARE: 4.10 NEED FOR FORENSIC SOFTWARE ON SUSPECT MEDIA: 4.11 PREVENTIVE MEASURES: 4.12 PACKAGING AND TRANSPORTATION OF ELECTRONIC EVIDENCE: 4.13 STORING ELECTRONIC EVIDENCE: 4.14 CHAIN OF CUSTODY: 4.15 PRESERVING THE ORIGINAL: 4.16 "DELETION" MYTHS AND DIGITAL FORENSIC: 5 CYBER FORENSICS RECOVERY AND PRESERVATION PROCESS; 5.1 UNDERSTAND THE SUSPECTS; 5.2 ELECTRONIC EVIDENCE CONSIDERATIONS ; 5.3 SECURE THE MACHINE AND THE DATA; 5.3.1 Examine the machine's surroundings ; 5.3.2 Examine the Live System and record open applications ; 5.3.3 Power down carefully ; 5.3.4 Fully document hardware configuration ; 5.3.5 Duplicate the electronic media (evidence) ; 5.4 E-MAIL REVIEW ; 5.5 E-MAIL HEADERS; 5.6 SORTING THROUGH THE MASSES; 5.7 COMPUTER FORENSIC EXAMPLES; 6 CYBER FORENSIC INITIATIVES AND SOME FORENSIC TOOLS ; 6.1 STRATEGIC APPROACH BY DEITY ; 6.2 HI-TECH CYBER CRIME INVESTIGATION CENTER AT CHI ACADEMY IN COLLABORATION WITH ERNET : 6.3 C-DAC ; 6.3.1 True Back -Disk Imaging Tool ; 6.3.2 Cyber Check-Data Recovery and Analysis Tool.; 6.3.3 Email Tracer-S/W tool for tracing sender of an email ; 6.3.4 Cyber Investigator ; 6.3.5 NeSA (Network Session Analyzer) ; 6.3.6 PDA Imager & Analyzer; 6.3.7 SIM Card Imager & Analyzer ; 6.3.8 Truelmager; 6.3.9 TrueLock; 7 CONCLUSION AND THE NEED FOR A CHANGE ; 8 BIBLIOGRAPHY.
Summary: Collection of Proff Under E-Evidences Cyber Forensics Electronic Evidence
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Dissertation . Not for loan LLM516

TABLE OF CONTENTS
INTRODUCTION ;
1 LEGAL INTERPRETATIONAL ISSUES ;
1.1 TYPES OF EVIDENCE ;
1.2 DOCUMENT ;
1.3 WRITING ;
1.4 PRIMARY OR SECONDARY EVIDENCE ;
1.5 ADMISSIBILITY ;
2 APPLICABILITY OF OLD EVIDENTIARY RULES ;
2.1 RULE AGAINST HEARSAY EVIDENCE ;
2.1.1 The United States ;
2.1.2 The United Kingdom ;
2.1.3 India ;
2.2 BEST EVIDENCE RULE/SECONDARY EVIDENCE RULE ;
3 PROOF, AUTHENTICITY AND AUTHORSHIP ;
3.1 PROOF ;
3.1.1 Proof of Electronic Signature ;
3.1.2 Proof of Electronic Mail ;
3.1.3 Proof of Computer Processes ;
3.2 AUTHENTICITY ;
3.3 AUTHORSHIP ;
4 SOME STANDARDS OF COLLECTION PROCESS UNDER E-EVIDENCES ;
4.1 PRESENCE OF COMPUTER/IT EXPERT(S) IN THE INVESTIGATIVE TEAM:
4.2 TASK ASSIGNMENT:
4.3 PLANNING THE SEARCH AND SEIZURE OPERATION:
4.4 SECURING THE PLACE OF SEARCH AND ELEMENT OF SURPRISE:
4.5 DOCUMENTING THE PLACE OF SEARCH:
4.6 ENQUIRIES FROM THE OCCUPANTS:
4.7 SEIZING THE COMPUTER SYSTEM ITSELF MAY NOT BE PRACTICAL IN MANY CASES:
4.8 REMOVAL OF THE HARD-DISK:
4.9 APPLY THE 'WRITE BLOCKING' SOFTWARE:
4.10 NEED FOR FORENSIC SOFTWARE ON SUSPECT MEDIA:
4.11 PREVENTIVE MEASURES:
4.12 PACKAGING AND TRANSPORTATION OF ELECTRONIC EVIDENCE:
4.13 STORING ELECTRONIC EVIDENCE:
4.14 CHAIN OF CUSTODY:
4.15 PRESERVING THE ORIGINAL:
4.16 "DELETION" MYTHS AND DIGITAL FORENSIC:
5 CYBER FORENSICS RECOVERY AND PRESERVATION PROCESS;
5.1 UNDERSTAND THE SUSPECTS;
5.2 ELECTRONIC EVIDENCE CONSIDERATIONS ;
5.3 SECURE THE MACHINE AND THE DATA;
5.3.1 Examine the machine's surroundings ;
5.3.2 Examine the Live System and record open applications ;
5.3.3 Power down carefully ;
5.3.4 Fully document hardware configuration ;
5.3.5 Duplicate the electronic media (evidence) ;
5.4 E-MAIL REVIEW ;
5.5 E-MAIL HEADERS;
5.6 SORTING THROUGH THE MASSES;
5.7 COMPUTER FORENSIC EXAMPLES;
6 CYBER FORENSIC INITIATIVES AND SOME FORENSIC TOOLS ;
6.1 STRATEGIC APPROACH BY DEITY ;
6.2 HI-TECH CYBER CRIME INVESTIGATION CENTER AT CHI ACADEMY IN COLLABORATION WITH ERNET :
6.3 C-DAC ;
6.3.1 True Back -Disk Imaging Tool ;
6.3.2 Cyber Check-Data Recovery and Analysis Tool.;
6.3.3 Email Tracer-S/W tool for tracing sender of an email ;
6.3.4 Cyber Investigator ;
6.3.5 NeSA (Network Session Analyzer) ;
6.3.6 PDA Imager & Analyzer;
6.3.7 SIM Card Imager & Analyzer ;
6.3.8 Truelmager;
6.3.9 TrueLock;
7 CONCLUSION AND THE NEED FOR A CHANGE ;
8 BIBLIOGRAPHY.

Collection of Proff Under E-Evidences Cyber Forensics Electronic Evidence