Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Practical Digital Forensics

You're reading from   Practical Digital Forensics Get started with the art and science of digital forensics with this practical, hands-on guide!

Arrow left icon
Product type Paperback
Published in May 2016
Publisher
ISBN-13 9781785887109
Length 372 pages
Edition 1st Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Richard Boddington Richard Boddington
Author Profile Icon Richard Boddington
Richard Boddington
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. The Role of Digital Forensics and Its Environment 2. Hardware and Software Environments FREE CHAPTER 3. The Nature and Special Properties of Digital Evidence 4. Recovering and Preserving Digital Evidence 5. The Need for Enhanced Forensic Tools 6. Selecting and Analyzing Digital Evidence 7. Windows and Other Operating Systems as Sources of Evidence 8. Examining Browsers, E-mails, Messaging Systems, and Mobile Phones 9. Validating the Evidence 10. Empowering Practitioners and Other Stakeholders Index

Case studies

The following examples highlight a small sample of previous cases that rely on digital evidence. Chapter 3, The Nature and Special Properties of Digital Evidence, will describe digital evidence in more detail.

The Aaron Caffrey case – United Kingdom, 2003

In 2003, Caffrey was acquitted of an offence: the unauthorized modification of computer material by sending data from his computer that shut down the Port of Houston computer servers. This was one of a few cases where a malware defense was accepted by the court without any proof of it controlling the computer. You can find details here:

http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1370&context=chtlj.

The Julie Amero case – Connecticut, 2007

School teacher Julie Amero had serious charges of the possession of indecent images, which were seen by her students; she was dismissed, thereby avoiding a lengthy jail sentence. The police examination was shown to be faulty, and malware on Amero's computer was thought responsible for the downloading of the indecent files. Refer to these links for details:

The Michael Fiola case – Massachusetts, 2008

A similar case was dismissed when the defendant was able to obtain confirmation from a practitioner that malware was probably responsible for the presence of the indecent files you will find details here:

http://truthinjustice.org/fiola.htm.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image