IAAC: Digital Evidence, Digital Investigation and E-Disclosure

Organisations and individuals currently have little idea how to collect and preserve evidence from computers and the Internet. As a result criminal prosecutions become difficult, businesses fail to get redress in the civil courts or are unable to make proper insurance claims, and business value is lost.

That’s the message of Digital Evidence, Digital Investigation and E-Disclosure: A Guide to Forensic Readiness for Organisations, Security Advisors and Lawyers (PDF file) to be launched by the Information Assurance Advisory Council on Wednesday 21 March 2012…“The need for digital evidence is not confined to obvious cybercrime events such as hacking, fraud and denial of service attacks, “ says report author Professor Peter Sommer, “it’s also required when transactions are disputed, in employee disputes, and almost all forms of non-cyber crime, including murder, forgery, industrial espionage and terrorism. With the vast proliferation of computer ownership and usage plus the growth of low-cost always-on broadband connectivity, all organisations require a Forensic Readiness Program. Businesses don’t realise that when they enter litigation they are compelled to assist the other side via E-Disclosure. Too many are unprepared for this eventuality”

Sommer, who has appeared as an expert witness in many high profile cases involving computer and Internet evidence, says: “Most businesses and individuals don’t need to have on their staff a Digital Sherlock Holmes but they should have plans to identify and preserve important digital evidence from email, web transactions, PCs, tablets and smartphones – and have a broad understanding of some of the associated legal problems such as admissibility and privacy. Often what is technically easy may be illegal or inadmissible. It is very odd that organisations have in place contingency plans for low likelihood/high impact events like fire and terrorism but nothing for common-place high frequency events like disputed transactions and suspicious employee behaviour.”

The first third of the Guide gives general management advice; the remainder provides details of procedures, techniques, applicable law and sources of further information.

IAAC are making the publication free to download in view of its general importance and the lack of any other comparable advice. This is the third, considerably updated and expanded, edition of a publication now widely used in universities and in training schemes, which first appeared in 2005.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

Download site: http://www.iaac.org.uk/_media/DigitalInvestigations2012.pdf

About Peter Sommer

Peter Sommer taught and researched information system security at the LSE for 17 years, ending up as a Visiting Professor. He is now a Visiting Reader at the Open University where he is consultant for its computer forensics and investigations course. He read law at Oxford and has had earlier careers as a book and electronic publisher and as a risk analyst for major corporates and insurers. In the mid 1980s he was the pseudonymous author of The Hacker’s Handbook and his co-written OECD study Reducing Systemic Cyber Security Risk attracted wide praise for its sober analysis n 2011. He appears frequently on TV and radio as an authority on cyber war, digital crime and cyber security. His main income comes from acting as an expert witness. More details: www.psommer.com

About IAAC

The Information Assurance Advisory Council is a unique partnership that brings together corporate leaders, public policy makers, law enforcement and the research community to address the challenges of managing risks to information. Our mission is to advance Information Assurance and Cyber Security to ensure that the UK’s Information Society has a robust, resilient and secure foundation. We are engaged in the development of policy recommendations to government and corporate leaders at the highest levels. Our recommendations are influential because IAAC’s Sponsors and Members comprise leading commercial end-users, government policy makers and distinguished academics. www.iaac.org.uk.

Contact Details

Peter Sommer peter@pmsommer.com

Information Assurance Advisory Council

info@iaac.org.uk | http://www.iaac.org.uk

Leave a Comment

Latest Videos

Data Extraction From UNISOC-Based Devices In Oxygen Forensic® Detective

Forensic Focus 16th November 2023 3:08 pm

Si and Desi talk to Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation, and Emma Pickering, Head of Tech and Economic Abuse at Refuge. They discuss the impact of digital forensics and incident response (DFIR) in cases of domestic abuse. They highlight the prevalence of tech-enabled abuse, such as the use of stalkerware, and the need for comprehensive support and safety plans for survivors. 

They also talk about the challenges faced by law enforcement in investigating and prosecuting these cases, as well as the importance of training and awareness in addressing tech-enabled abuse. The conversation emphasizes the need for collaboration between organizations, tech developers, and law enforcement to effectively combat domestic abuse.

Show Notes:

Apple Support: How Safety Check on iPhone works to keep you safe - https://support.apple.com/guide/personal-safety/how-safety-check-works-ips2aad835e1/web
IBM: Five Technology Design Principles to Combat Domestic Abuse - https://www.ibm.com/policy/five-technology-design-principles-to-combat-domestic-abuse/
EFF: Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users  - https://www.eff.org/deeplinks/2023/09/today-uk-parliament-undermined-privacy-security-and-freedom-all-internet-users
Wesley Mission: More support to help escape family violence - https://www.wesleymission.org.au/about-us/what-we-do/helping-people-most-in-need/housing-and-accommodation/wesley-emergency-relief/more-support-to-help-escape-family-violence/
Refuge: How we can help you - https://refuge.org.uk/i-need-help-now/how-we-can-help-you/
Electronic Frontier Foundation - https://www.eff.org/

Si and Desi talk to Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation, and Emma Pickering, Head of Tech and Economic Abuse at Refuge. They discuss the impact of digital forensics and incident response (DFIR) in cases of domestic abuse. They highlight the prevalence of tech-enabled abuse, such as the use of stalkerware, and the need for comprehensive support and safety plans for survivors.

They also talk about the challenges faced by law enforcement in investigating and prosecuting these cases, as well as the importance of training and awareness in addressing tech-enabled abuse. The conversation emphasizes the need for collaboration between organizations, tech developers, and law enforcement to effectively combat domestic abuse.

Show Notes:

Apple Support: How Safety Check on iPhone works to keep you safe - https://support.apple.com/guide/personal-safety/how-safety-check-works-ips2aad835e1/web
IBM: Five Technology Design Principles to Combat Domestic Abuse - https://www.ibm.com/policy/five-technology-design-principles-to-combat-domestic-abuse/
EFF: Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users - https://www.eff.org/deeplinks/2023/09/today-uk-parliament-undermined-privacy-security-and-freedom-all-internet-users
Wesley Mission: More support to help escape family violence - https://www.wesleymission.org.au/about-us/what-we-do/helping-people-most-in-need/housing-and-accommodation/wesley-emergency-relief/more-support-to-help-escape-family-violence/
Refuge: How we can help you - https://refuge.org.uk/i-need-help-now/how-we-can-help-you/
Electronic Frontier Foundation - https://www.eff.org/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_nSWQZe9gpVk

Protecting Victims From Stalkerware And Tech-Enabled Abuse

Forensic Focus 15th November 2023 11:11 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles