Skip to main content
Menu
Contents
Electronic Evidence and Electronic Signatures: Cover
Electronic Evidence and Electronic Signatures
Cover
Visibility
Reader Appearance
Search
Sign In
avatar
Edit Profile
Notifications
Privacy
Log Out
Project Home
Electronic Evidence and Electronic Signatures
Projects
Sign In
Learn more about
Manifold
Notes
Close
Show the following:
Annotations
Yours
Others
Your highlights
Resources
Show all
Show all
Hide all
Enter search criteria
Execute search
Search within:
chapter
text
project
Adjust appearance:
font
Font style
Serif
Sans-serif
Decrease font size
Increase font size
Decrease font size
Increase font size
color scheme
Light
Dark
Margins
Increase text margins
Decrease text margins
Reset to Defaults
Options
table of contents
Cover
Title Page
Copyright Page
List of Contributors
A note on our Creative Commons licence
Dedication
Contents
Software is reliable and robust
Preface
Acknowledgments
Table of statutes
Table of cases
1. The sources and characteristics of electronic evidence and artificial intelligence
Digital devices
Processors
Mobile devices
Embedded devices
Software
Data storage facilities
Data formats
Starting a computer
Networks
Types of network
Cloud computing
The Internet of Things
The deep web and the dark web
Common network applications
Types of evidence available on a digital device
Files
Metadata
Imaging
System and program logs
Temporary files and cache files
Deleted or ‘lost’ files
Simulations, data visualizations, augmented and virtual reality
Encryption and obfuscated data
Artificial intelligence and machine learning
Simulations, data visualizations, augmented and virtual reality
Transparency and explainability
AI adversarial attacks
Defining electronic evidence
The dependency on machinery and software
The mediation of technology
Speed of change
Volume and replication
Storage and disclosure
Concluding remarks
2. The foundations of evidence in electronic form
Direct and indirect evidence
Evidence in both digital and analogue form
Metadata and electronic evidence
Means of proof
Testimony and hearsay
Real evidence
Documents and disclosure or discovery
Visual reading of a document
Authentication
Best evidence
Analogue evidence
Digital evidence
Civil proceedings
Criminal proceedings
Admissibility
Weight
Video and audio evidence
Testimonial use in legal proceedings
Identification and recognition evidence
Computer-generated animations and simulations
Computer-generated evidence in England and Wales: civil proceedings
Computer-generated evidence in England and Wales: criminal proceedings
3. Hearsay
The rule of hearsay exclusion and its rationale
The right of confrontation
Hearsay and electronic evidence
Electronic evidence and real evidence
Testimonial and non-testimonial use of information
Implied assertions
Civil proceedings and the requirement to give notice
Criminal proceedings
Telephone calls and messages
Representations other than by a person
Body-worn camera footage
Business and other documents
Judicial discretion to include hearsay
Judicial discretion to exclude hearsay
Concluding observations
4. Software code as the witness
The classification of digital data
Category 1: Content written by one or more people
Category 2: Records generated by the software that have not had any input from a human
Category 3: Records comprising a mix of human input and calculations generated by software
Challenging the code to test the truth of the statement
5. The presumption that computers are ‘reliable’
The purpose of a presumption
Presumptions and mechanical instruments
Judicial formulations of the presumption that mechanical instruments are in order when used
Judicial notice
A ‘notorious’ class
Common knowledge
Evidential foundations of the presumption
How judges assess the evidence of devices controlled by software
Mechanical instruments and computer-like devices
The nature of software errors
Why software appears to fail
Classification of software errors
The development, maintenance and operation of software
Developmental issues and software errors
Increasing the risk of errors through modification of software
Security vulnerabilities
Software testing
Writing software that is free of faults
Software standards
Summary
Challenging ‘reliability’
Aviation
Financial products
Motor vehicles
Emergency services
Medical
The Post Office Horizon scandal
Banking
Interception of communications
Most computer errors are either immediately detectable or result from input errors
Challenging the authenticity of digital data – trial within a trial
A protocol for challenging software in devices and systems
Reintroduction of the common law presumption
The statutory presumption
Challenging the presumption
‘Working properly’
Concluding remarks
6. Authenticating electronic evidence
Authenticity and authentication
An example: email
Digital evidence compared to past paradigms
Admissibility and authentication
The best evidence rule
Identity and integrity
Reliability
Methods of authentication
Self-authentication
System authentication
Digital certification
Digital forensics
Extrinsic and circumstantial evidence
Judicial notice
Digital evidence in archival systems
Technological authentication
Digital signatures
Blockchain
Challenges to the authenticity of evidence in digital form
The cloud
The Internet of Things
Digital preservation
Migration and format changes
The business records exception to the rule against hearsay
The business records exception
Authentication of digital business records
Conclusion
7. Electronic signatures
The purpose of a signature
Dictionary definitions
The manuscript signature
Statutory definition of signature
The functions of a signature
The primary evidential function
Secondary evidential functions
Cautionary function
Protective function
Channelling function
Record-keeping function
Disputing a manuscript signature
Defences
Evidence of the manuscript signature
Intention to authenticate and adopt the document
The electronic signature
Forms of electronic signature
Authority, delegation and ratification
Forged signatures
Evidence of intent to sign
The automatic inclusion of the signature
Partial document with separate signature page
The Electronic Communications Act 2000
The definition of an electronic signature
The elements of an electronic signature
Liability of a certification service provider
The power to modify legislation
Regulation of Investigatory Powers Act 2000
Electronic sound
The ‘I accept’ and ‘wrap’ methods of indicating intent
Click wrap
Browse wrap
‘I accept’
Personal Identification Number (PIN) and password
Typing a name into an electronic document
Acts by a lawyer as agent
Interest in real property
Loan of money
Employment
Contract
Guarantees and debt
Public administration, the judiciary and the police
Statute of Frauds
Wills
Constitution of a legal entity
Amending boilerplate contractual terms
The name in an email address
Limitation Act 1969 (NSW)
Statute of Frauds
Legal fees arrangement
Civil Law Act
A manuscript signature that has been scanned
Mortgage redemption
Writing
Employment
Biodynamic version of a manuscript signature
Electoral register
Contract formation
Digital signatures
Technical overview of digital signatures
Algorithms and keys
Control of the key
Disguising the message
Public key infrastructure
Difficulties with public key infrastructure
Authenticating the sender
The ideal attributes of a signature in electronic form
Methods of authentication
Types of infrastructure for asymmetric cryptographic systems
Management of the key and certificate
The duties of a user
Internal management of a certification authority
Barriers to the use of the public key infrastructure
Risks associated with the use of digital signatures
What a digital signature is capable of doing
What no form of electronic signature is capable of doing
The weakest link
The burden of managing the private key
Evidence and digital signatures
‘Non-repudiation’
Certifying certificates
The burden of proof
The recipient’s procedural and due diligence burden
The sending party: the burden of proof of security and integrity
Burden of proof – the jitsuin
Burden of proof – summary
8. Encrypted data
Encryption
Methods to obtain encrypted data
Breaking the encryption without obtaining the key
Obtaining the key
Compelling disclosure in England and Wales
Protected information
Notice requiring disclosure
Obligations of secrecy and tipping off
Circumventing the procedure
The privilege against self-incrimination
England and Wales
The USA
Canada
Belgium
Concluding observations
9. Proof: the technical collection and examination of electronic evidence
Accreditation of the digital forensics discipline
Guidelines for handling digital evidence
Handling electronic evidence
Identifying electronic evidence
Gathering electronic evidence
Gathering of data following legal retention or reporting obligations
Copying electronic evidence
Forensic triage
Preserving electronic evidence
Analysis of electronic evidence
Tools
Traces of evidence
Reporting
Analysis of a failure
Anti-forensics and interpretation of evidence
Data destruction
Falsifying data
Hiding data
Attacks against computer forensics
Trail obfuscation
An intellectual framework for analysing electronic evidence
Conclusions and future considerations
10. Competence of witnesses
The need for witnesses
Separating data reliability from computer reliability
Lay experts as witnesses
Qualification of witnesses
Appendix 1: Draft Convention on Electronic Evidence
Appendix 2: Cumulative vignettes
Index
About This Text
Annotate
Close
Next Chapter
Half-title
Next