Digital Courts, the Law and Evidence

Robert Slade, Vancouver Institute for Research into User Security, Canada

Introduction

Legal Systems

Differences within Common Law

Jurisdiction

Digital Court

Evidence

Types of Evidence

Rules of Evidence

Providing Expert Testimony

Ethics

Disclosure

Black Hat Motivations as a Defense

Conclusion

Glossary

Cross References

Further Reading

INTRODUCTION

Computer and system security professionals traditionally deal with issues of technology, but may be called upon to investigate when security is breached and to support forensic investigations and legal proceedings. Conversely, members of the legal profession are increasingly called upon to bring cases based upon, and present in court, information obtained from computer, network, and other technical systems.

To both groups, let me point out that this chapter is an overview and not an encyclopedia itself. Subfields of forensic science can produce very fat books, and the law produces entire libraries. Technical experts are not going to find details of file system internals here, nor are lawyers going to find case law.

LEGAL SYSTEMS

In dealing with legal issues, we have an immediate problem in that different countries not only have distinct laws but possibly even diverse legal systems. There are different approaches to what constitutes law and legal proceedings, and these will have an impact in regard to what constitutes evidence permissible in court.

Those from Britain, the Commonwealth countries, and ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.