Expert Witnesses in Computer Crimes
What the Law Says
Till date, a stunningly small number of areas in UK's legal texts explicitly define the role of computers in criminal acts. The Computer Misuse Act - Discusses the probable misuses of computers for illegal purposes, with emphasis on unauthorized access to and modification of information. Data Protection Act - This Act addresses the processing, storage, display and transmission of personal data and its illegal manipulations using networks. Terrorism Act - This Act covers interference to electronic systems by terrorists and other individuals posing a threat to security of life and property. Police and Criminal Evidence (PACE) and Regulation of Investigatory Power Acts (RIPA) - these cover situations evidence is to be largely obtained from uses of computers, also noting the specifications of presenting evidence to a court of law. Apart from these, the Good Practice Guide prepared by the Association of Chief Police Officers (ACPO) details the correct handling, storage, and analysis of computer-derived evidence so that it may be acceptable in a court. Needless to say, this is just not enough in the face of the immense possibilities that computer-related crime has.
Need for Expert Witnesses
In a situation where the outcome of the case is dependant on its effective presentation, the role of the witness is obviously vital. Choosing the wrong witness can have disastrous results in computer-related crimes, as the court is more prone to be misdirected than other crimes. A quack will endanger more than he can grasp, especially in corporate cases, where the entire effect of the crime may not always be manifest at the beginning.
Fields Associates - the Difference An Expert Witness Can Make
In the relatively young field of computer forensics, Fields Associate has the advantages of a veteran firm, having been around since 1997. Specializing in the area of recovery of digital 'fingerprints' (evidence) left by the routine use of computers, this company deals with all kinds of cases ranging from data theft to child pornography. Interestingly, a solid 86% of their cases come through recommendations, making it a strongly symbiotic existence. In other words, since they depend so heavily on the quality of their work, their performance level and reliability would be of key concern, and is strictly maintained by the firm. Their areas of work, if summarized, would be: Forensic Computer Examination - a team of specialists procure forensic evidence through the most secure methods of examination. This is done keeping in mind that the data procured might have to be produced before a court of law, and therefore should be in their original, non tampered version so that they are acceptable.
Providing Expert Testimony - When it comes to the testimonial itself, there is tremendous performance pressure on the witness, since the fate of those involved depends on him. Naturally, a total understanding of information and network security measures, prevention and detection of intrusions, and digital forensic analysis is a necessity in these cases. The experts at Fields Associates have the extra edge of experience apart from the given qualifications required of a specialist. Proper Reportage and Court Presentation - This is perhaps the most crucial issue in computer related crimes. A jury would be lost if the witness spewed out a torrent of incomprehensible jargon, and despite his learning, the case would be lost. Since Fields Associates is also into conducting courses in related areas, they already know the danger that unclarity can pose. Therefore, accurate but comprehensible presentation of the matter - whether as an oral case before the jury or as a written document - is given utmost importance. Presentation of graphics - A similar emphasis on clarity and correct presentation of facts is laid on any graphics prepared for court presentation.
The need of the day is enlightenment, followed by right choice. The law can no more afford to remain ignorant about the importance of computers in crime, and those affected must realize that they depend entirely on who they choose to help them out.
Related Tags: investigation, digital forensic
James Walsh is a freelance writer and copy editor. For more information on digital forensic investigations see http://www.fieldsassociates.co.uk/computer-forensics.html
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Free Internet Security Software from Google
Selecting the internet security software for your computer can be a daunting task for most home user - Home Key Logger - Track Computer Activity
What goes through your mind when you think about a home key logger? Do you think about a rogue progr - Computers and Electronics Have Changed The Way We Live
You push the on button and your monitor screen springs to life. Next, you use your mouse to bring up - What PacketShaper Can Do For You?
What is PacketShaper?It is an application-intelligent traffic management system which delivers predi - Key Logger Software for Your Computer
One thing that many of us are concerned about is the safety of our children and what happens when th - Keep Your PC Healthy With Computer Tips & Tricks
Everybody just has to have a computer these days. Life without a computer is unimaginable. I am sure - Antivirus - What is a Computer Virus?
Before understanding what a computer virus is, it is necessary to understand what a virus in when it - Gibberish Spam Email - Why Do Spammers Send It?
We have all seen many spam emails that just make no sense. They contain pure gibberish in the subjec - Your Children And The Internet - 5 Tips To Keep Your Children Safe While They Are Online
If your children are on the Internet you may be concerned about their safety. We hear stories regula - How To Compare Residential VOIP Offerings
Many people are turning to VOIP phone for several different reasons, the biggest reason being cost.
Most viewed articles in this category:
- Experience the new Microsoft Zune and Future Technology with Bill Gates at CES Keynote
After the demonstration of Windows Vista by Bill Gates at the CES keynote, Robbie Bach, President of - Internet Connection Sharing in Windows XP
This articles explains in detail how to set up a small network at home so you can share your Interne - Nortel VPN Client Overview
The Nortel VPN Client creates the secure connection for VPN users into a private network. Once you l - Computer Phobias
Years ago around the end of January I would develop Chinophobia (fear of snow). Maybe it was becaus - iPod Stuff: How To Set Your iPod's Alarm Clock
The good thing about the iPod alarm clock feature is that you can wake up with the tune of your favo - CCTV: the story continues
CCTV – Closed Circuit Television – for some time at least has been used by various gover - Why Someone Stole My Mobile Phone
Not so long ago my mobile phone was stolen. I kept asking why I was the one who got targeted, especi - Office printers: introduction to technology and types
With every bit of information transfer and manipulation going digital these days, almost the entire - Computer hardware simplified
Computer Hardware is a comprehensive term which refers to all the physical parts of a computer inclu - Cordless phone technology: a brief history
Cordless Phones – as the term suggests – is a phone sans any cord. Instead the handset c