Volume of Digital Evidence

Doctorow states that the most important commodity in today's economy is attention [1]. Each person only has 24 hours in a day to send messages, surf the net, watch video and shop online. Hence, even though the size of hard drives has increased 100 fold from 10GB in 1999 to 1TB in 2013 [2], we ...

Centralization of Digital Evidence

Internet traffic today is highly asymmetric. The top 5 social media sites account for 99% market share of global social media traffic [1]. Crimes ranging from blackmail to phishing scams to bomb threats are largely occurring on the same few social messaging apps and social network sites. Most ...

AI model licensing

There are two main categories of open-source licenses. Firstly, permissive licenses such as Apache 2.0 and MIT allow the license holder significant freedom to use the code even as part of proprietary software that the license holder is developing [1]. Restrictive licenses such as GPL family of ...

Authenticity of Digital Evidence

There are three parts which must all be proven true to meet the "Authenticity" criteria. The evidence must be obtained from the computer in question, the evidence must be "complete and accurate" and it must "remain unchanged" since collection [1]. Proving that the evidence has not been tampered ...

Why Use Commercial Forensic Tools

Like Bart, I also disagree that some of the most influential forensic tools are "open source". There are indeed many open sources tools such as SIFT workstation [1] and The Sleuth Kit [2]. Some forensics analysts also write their own tools and scripts to parse lesser known file formats or ...

Law Enforcement use only

A bank robber making a getaway is not going to stop at a traffic light. Similarly, cybercriminals who are intending to commit serious crimes will definitely use the most secure systems available to them regardless of the legality. Thus, the pertinent question is whether such a law can be ...

AI Systems as Software

There is no clear definition of software. However, one of the more helpful definitions is the definition in the Model Provisions on the Protection of Computer Software, where software is defined as "a set of instructions" to "perform or achieve a particular function, task or result" [1]. The ...

Regulating DoS

Denial of Service (DoS) is tricky to regulate because it involves high volume of "legitimate" traffic which stresses the target's resources [1]. Since the traffic is legitimate, what makes an act DoS is the underlying intent to exhaust the target's resources. To illustrate, web scraping also ...