Digital Evidence in Criminal Procedures

  • Gordana Buzarovska Lazetik Univesity "St. Cyrilus and Methodius"-Skopje, Faculty of Law "Iustinianus Primus", Macedonia
  • Olga Koshevaliska University "Goce Delcev"- Shtip, Faculty of Law, Macedonia

Abstract

Digital evidence can be a litigant's best friend or worst nightmare, depending on the type of evidence, how it is used, and in what court it is presented. Therefore this article aims to provide an overview of computer forensics from general definitions on digital evidence, their potential sources and basic principles regarding the evaluation of phases of "crime scene investigation" and seizure of data in order to determinate the "fingerprints" of the crime. We illustrated the procedure regarding digital evidence in the USA because of its contemporariness. At last the purpose of this paper is to illustrate the “handling” of digital evidence in Macedonia and to give recommendations for a better compliance with the international instruments regarding this issue.

Downloads

Download data is not yet available.

Author Biographies

Gordana Buzarovska Lazetik, Univesity "St. Cyrilus and Methodius"-Skopje, Faculty of Law "Iustinianus Primus", Macedonia

Univesity "St. Cyrilus and Methodius"-Skopje, Faculty of Law "Iustinianus Primus", Macedonia

Olga Koshevaliska, University "Goce Delcev"- Shtip, Faculty of Law, Macedonia
University "Goce Delcev"- Shtip, Faculty of Law, Macedonia

References

A Road Map for Digital Forensic Research, Report from the First Digital Forensic Research Workshop (DFRWS), August 7-8, 2001, Utica, New York;

Ali Obaid Sultan Alkaabi (2010): Combating Computer Crime: an international prespective, Doctoral Thesis on Information Security Institute, Faculty of Science and Technology, Queensland University of Technology;

Angus M. Marshall, (2008): Digital Forensics, Digital Evidence in Criminal Investigation, University of Teesside, UK, JohnWiley & Sons, Ltd, London, p.22 - 25;

Bradley Schatz (2007): Digital Evidence: Representation & assurance, Information Security Institute, faculty of Information Technologies, Queensland University of Technologies, Austria, p.13;

Chang-Tsun Li (ed.) (2013): Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, Idea Group Inc (IGI), p.240;

Colin Evans, Criminal justice: Evidence, 2010 by Infobase Publishing, New York, p. 17 -28

Commonwealth Secretariat (2001): Law in Cyber Space, Commonwealth Secretariat, p.1;

David Watson, Andrew Jones (2013): Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, Newnes;

ForensicScience.org,, official expert Anthony Falsetti, http://www.forensicscience.org/resources/digital-evidence/ last access 18.09.2013

Genci Fejzula and Jonuz Mazreku vs. Macedonia, Appeal No.23065/07 Council of Europa, Court of Human Rights:

IOCE Princips & Definitions, IOCE 2. Conference, Marriott Hotel, London;

ISO/IEC 27037 prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques, Reference number ISO/IEC 27037:2012(E);

John Jackson, Máximo Langer, Peter Tillers (ed.) (2008): Crime, Procedure and Evidence in a Comparative and International Context - Essays in Honour of Professor Mirjan Damaška, Hart Publishing, Oxford and Portland Oregon;

John R. Vacca (2005): Computer Forensics: Computer Crime Scene Investigation, Volume 1, Cengage Learning, p.7 and 673;

Josiah Dykstra, Damien Riehl (2013): Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing, Richmond Journal of Law & Technology, Volume XIX, Issue 1;

Code for Financial Police, Official Gazette No.55/2007; United States v. Bennett, 363 F.3d 947 (9th Cir. 2004) (reviewing the admissibility of a customs officer's testimony about global positioning satellite data);

Criminal Procedure Code, Official Gazette no. 15/1997; 44/2002; 74/2004; 83/2008; 67/2009 и 51/2011, hereinafter former and current LPC;

Criminal Procedure Code, Official Gazette no. 150 from 18.11.2010;

Leah Voigt Romano (2005): VI. Electronic Evidence and the Federal Rules, 38 Loy. L.A. L. Rev. 1745, Loyola Marymount University and Loyola Law School Digital Commons at Loyola Marymount University and Loyola Law School;

Mark L. Krotoski (2011): Effectively Using Electronic Evidence Before and at Trial, Obtaining and Admitting Electronic Evidence, United States Department of Justice Executive Office for United States Attorneys Washington, DC 20530, Volume 59, Number 6, p.52;

Nikola Matovski, Gordana Buzarovska Lazetik, Gordan Kalajdziev: Criminal Procedure Law, second and amendment issue, Academik Skopje, p.438;

Official web site: http://www.ioce.org/fileadmin/user_upload/2002/ioce_bp_exam_digit_tech.html last acces 17.10.2013;

Peter Mell & Tim Grance, The NIST Definition of Cloud Computing, NAT’L INST. OF STANDARDS & TECH., 2 (Sept. 2011), http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf last access 18.10.2013;

Peter Sommer , (2012): Digital Evidence, Digital Investigations and E-Disclosure: A Guide to Forensic Readiness for Organizations, Security Advisers and Lawyers, The Information Assurance Advisory Council (IAAC), Third Edition;

Računalna forenzika NCERT-PUBDOC-2010-05-301, Nacionalno središte za sigurnost računalnih mreža i sustava, Laboratorij za sustave i signale pri Zavodu za elektroničke sustave i obradbu informacija Fakulteta elektrotehnike i računarstva Sveučilišta u Zagrebu.

Risto Hristov, Atanas Kozarev (2011): Digital evidence - Annual Review, Year II, No. 3, European University, Republic of Macedonia, Skopje, p.873 – 891;

Terrence F. Kiely (2001): Forensic evidence: science and the criminal law, CRC Press LLC, New York, p.140;

U.S. Department of Justice Office of Justice Programs: (2001) Electronic Crime Scene Investigation: A Guide for First Responders, written and Approved by the Technical Working Group for Electronic Crime Scene Investigation, Washington, USA;

Xuejia Lai, Dawu Gu, Bo Jin, Yongquan Wang, Hui Li (2010): Forensics in Telecommunications, Information and Multimedia: Third International ICST Conference, E-Forensics 2010, Shanghai, China, Revised Selected Papers, Springer, p.227;

Zakona o kaznenom postupku Hrvatska, »Narodne novine« br. 121/11, precisteni tekst;

Николоска, С.: Методика на истражување на компјутерскиот криминал, http://www.fb.uklo.edu.mk/aktivnosti.Nikoloska.aspx последен пристап 0.03.2013 година;

Published
2014-01-20