DocumentCode :
2126727
Title :
Law Enforcement Authorities´ Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement
Author :
Rajamaki, Jyri ; Knuuttila, J.
Author_Institution :
Laurea SID, Laurea Univ. of Appl. Sci., Espoo, Finland
fYear :
2013
fDate :
12-14 Aug. 2013
Firstpage :
198
Lastpage :
203
Abstract :
When carrying out criminal investigations, Law Enforcement Agencies (LEAs) apply new technology in very effective ways. However at worst, LEAs must perform many stages twice with the help of different technical tools. When investigating the identity of criminals LEAs may apply totally different technical tools than when gathering evidences for charge, because the data provided by investigating may not be valid in court. For that reason, a new monitoring system that goes beyond state of the art is needed. Three organizational layers need attentions: 1) LEA, the people that actually retrieve and store the information. 2) Prosecutors and their offices, how they get access to the information. 3) Courts, the final destination of the retrieved information. Until now, the information gathering tools for LEAs have been engineered focusing only on the best way to retrieve the information from the target. The attention paid to the legal, integrity and chain-of-custody requirements as well as social acceptance and legal oversight in connection with retrieving information has been inadequate and guidance on the matters has existed only in manuals written by legal departments.
Keywords :
information retrieval; law; LEA; chain-of-custody requirement; courts; criminal investigations; information retrieval; integrity requirement; law enforcement agencies; law enforcement authorities legal digital evidence gathering; legal requirement; organizational layers; prosecutor; social acceptance; Computers; Economics; Forensics; Law enforcement; Monitoring; Chain-on-custody; Digital evidence; Forensic; Law Enforvcement Authority; Law enforcement;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics Conference (EISIC), 2013 European
Conference_Location :
Uppsala
Type :
conf
DOI :
10.1109/EISIC.2013.44
Filename :
6657154
Link To Document :
بازگشت