Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal
Abstract
:1. Introduction
2. Background
2.1. The Nature and Challenges of Digital Evidence
- ○
- Admissibility: Digital Evidence must be collected through a legally acceptable and allowed procedure, so they can be admitted in front of court.
- ○
- Authenticity: Digital Evidence must be tied positively and relate to the incident under investigation in a relevant way.
- ○
- Completion: Digital Evidence must be able to uncover every aspect of the incident under investigation, thus functioning both inculpatory and exculpatory.
- ○
- Reliability: Digital Evidence must be collected and analyzed in a way that confirms the evidence’s authenticity and veracity. The applicable procedure must create a uniqueness and singularity that makes that specific piece of evidence morphologically and technologically recognizable and distinct from any other similar digital object.
- ○
- Believability: Digital Evidence must be presented in front of a court in a clear, understandable and believable manner.
- No action taken should change data which may subsequently be relied upon in court. This way the integrity of the collected digital evidence is guaranteed. This applies especially to at the time of collection non-working electronic devices, since powering-on a digital gadget gives the operational system the opportunity to read and write and therefore alter a significant amount of data and metadata, even before the user begins to use the electronic device in question.
- If it is necessary to access original data, this must be done by a person, who is competent to do so and is also able to give evidence explaining the relevance and the implications of his actions. This applies especially to at the time of collection working electronic devices, since powering-off a digital gadget gives the operational system the opportunity to modify a significant amount of data and metadata and is also possible that some information is lost or even destroyed if the files are encrypted and set as auto-destructive.
- An audit trail or other record of all processes applied to digital evidence should be created and preserved forming a continuous and unbroken “chain of custody” [13]. An independent third party should be able to examine those processes and achieve the same result. All digital evidence must meet the universally acknowledged criteria of auditability, repeatability, reproducibility and justifiability.
- A specific person who is leading the investigation has overall responsibility for ensuring the application of these principles and generally the law as well.
2.2. The Emergence of Cloud Storage
2.3. Digital Evidence in the Cloud: Cloud Forensics
3. Legal Challenges for Cloud Forensics
3.1. Data Territoriality—The Loss of Location Challenge (CH1)
3.1.1. The Criminal Event Theory (Territorial)
3.1.2. The Criminal Instrument Theory (Territorial)
3.1.3. The Direct Consequence Theory (Extra-Territorial)
3.1.4. The Nationality Principle (Extra-Territorial)
3.2. The Challenge of Cloud Content Ownership (CH2)
3.3. The Challenge of User Authentication and Data Preservation (CH3)
4. Judicial Opinions on Cloud Forensics from Greek Court Cases
5. Existing Legal Frameworks for Capturing Digital Evidence in the Cloud
5.1. The USA Legal Framework
5.2. The International/European Legal Framework
- ▪
- Preservation of Data Stored In A Computer System: Each State ensures its ability to secure rapid preservation of data that is stored in a computer system, in particular data held by third parties such as service providers, and that is subject to short retention practices or is otherwise particularly vulnerable to loss or modification, for the purpose of seeking its access, search, copying, seizure or disclosure, and ensure that preservation is possible even if necessary only to assist another State.
- ▪
- Expedited Mutual Legal Assistance: Upon receiving a formal request for access, search, copying, seizure or disclosure of data, including data that has been preserved, the requested State shall execute the request as expeditiously as possible.
- ▪
- Transborder Access to Stored Data Not Requiring Legal Assistance: a State need not obtain authorization from another State when it is acting in accordance with its national law for the purpose of (i) accessing publicly available (open source) data, regardless of where the data is geographically located or (ii) accessing, searching, copying or seizing data stored in a computer system located in another State, if acting in accordance with the lawful and voluntary consent of a person who has the lawful authority to disclose to it that data.
- ❖
- Access with consent: A person that is physically located on the territory that the Law Enforcement Authorities operate in, gives its lawful and voluntary consent, enabling the Law Enforcement Authorities and ultimately granting access to his computer data that is stored in another jurisdiction.
- ❖
- Access without consent but with lawfully obtained credentials: Law Enforcement Authorities lawfully obtain a password for accessing and storing (downloading) computer data, regardless of their whereabouts.
- ❖
- Access without consent: Law Enforcement Authorities must obtain technical information from a Cloud Storage Service Provider concerning a suspect, who does not facilitate access to his data.
6. Discussion—The Power of Disposal
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Techopedia. What Is Cyberspace?—Definition from Techopedia. Available online: http://www.techopedia.com/definition/2493/cyberspace (accessed on 28 March 2021).
- Richter, J.; Kuntze, N.; Rudolph, C. Securing Digital Evidence. In Proceedings of the 5th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, CA, USA, 20 May 2010; Endicott-Popovsky, B., Lee, W., Eds.; Institute of Electrical and Electronics Engineers: Piscataway, NJ, USA, 2010; pp. 119–130. [Google Scholar] [CrossRef] [Green Version]
- U.S. Government Publishing Office. Federal Rules of Evidence. Available online: https://www.uscourts.gov/sites/default/files/evidence-rules-procedure-dec2017_0.pdf (accessed on 30 March 2021).
- Montrose, J.L. Basic concepts of the law of evidence. Law Q. Rev. 1954, 70, 527–555. [Google Scholar]
- Council of Europe. Convention on Cybercrime. Available online: https://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561 (accessed on 30 March 2021).
- International Organization for Standardization. Information Technology—Security Techniques—Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence. Available online: https://www.iso.org/standard/44381.html (accessed on 28 March 2021).
- Lone, A.H.; Mir, R.N. Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer. Digit. Investig. 2019, 28, 44–55. [Google Scholar] [CrossRef]
- Talend. What Is Data Redundancy? Available online: https://www.talend.com/resources/what-is-data-redundancy/ (accessed on 30 March 2021).
- Varanasi, P. Understanding Fault Tolerance in Cloud Computing and Its Significance. Available online: https://www.cloudcodes.com/blog/fault-tolerance-in-cloud-computing.html (accessed on 30 March 2021).
- Braid, M. Collecting Electronic Evidence After a System Compromise, Global Information Assurance Certification Paper for SANS Institute. Available online: https://www.giac.org/paper/gsec/659/collecting-electronic-evidence-system-compromise/101519 (accessed on 28 March 2021).
- Li, M.; Lal, C.; Conti, M.; Hua, D. LEChain: A blockchain-based lawful evidence management scheme for digital forensics. J. Future Gener. Comput. Syst. 2020, 115, 406–420. [Google Scholar] [CrossRef]
- ACPO Good Practice Guide for Digital Evidence. 2012. Available online: https://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf (accessed on 28 March 2021).
- Ryder, K.; SANS Institute, Information Security Reading Room. Computer Forensics—We’ve Had an Incident, Who Do We Get to Investigate? 2002. Available online: https://www.sans.org/reading-room/whitepapers/incident/computer-forensics-weve-incident-investigate-652 (accessed on 28 March 2021).
- Licklider, J.C.R. Memorandum for Members and Affiliates of the Intergalactic Computer Network. 1963. Available online: https://www.kurzweilai.net/memorandum-for-members-and-affiliates-of-the-intergalactic-computer-network (accessed on 28 March 2021).
- National Institute of Standards and Technology of United States Department of Commerce. The NIST Definition of Cloud Computing. Special Publication 800-145. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf (accessed on 28 March 2021).
- Kaur, R.; Kaur, A. A review paper on evolution of cloud computing, its approaches and comparison with grid computing. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 6060–6063. [Google Scholar]
- Subashini, S.; Kavitha, V. Difference between Cloud Storage and Cloud Computing. J. Netw. Comput. Appl. 2010, 34, pp. 1–11.
- European Commission. Recommendation for a Council Decision. Authorising the Opening of Negotiations in View of an Agreement between the European Union and the United States of America on Cross-Border Access to Electronic Evidence for Judicial Cooperation in Criminal Matters. 2019. Available online: https://ec.europa.eu/info/sites/info/files/recommendation_council_decision_eu_us_e-evidence.pdf (accessed on 28 March 2021).
- Microsoft. Azure Storage Redundancy. Available online: https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy (accessed on 30 March 2021).
- Boas, G. Public International Law: Contemporary Principle and Perspectives; Edward Elgar Publishing: Cheltenham, UK, 2012. [Google Scholar]
- Kshetri, N. Pattern of global cyber war and crime: A conceptual framework. J. Int. Manag. 2005, 11, 541–562. [Google Scholar] [CrossRef] [Green Version]
- Adams, J. Virtual defense. Foreign Aff. 2001, 80, 98. [Google Scholar] [CrossRef]
- Rogers, A. From peer-to-peer networks to cloud computing: How technology is redefining child pornography laws. John’s Law Rev. 2013, 87, 1–39. Available online: https://scholarship.law.stjohns.edu/cgi/viewcontent.cgi?article=6662&context=lawreview (accessed on 28 March 2021). [CrossRef] [Green Version]
- Chima, R. Cloud Security—Who Owns the Data? Available online: https://www.bbconsult.co.uk/blog/cloud-security-who-owns-the-data (accessed on 30 March 2021).
- Caiapha-Gbady, M. Online Insults of Minors, Criminal Chronicles, P. N. Sakkoulas 2012, 3, 161. [Google Scholar]
- Andreadis-Papadimitriou, P. The pornography of minors in the era of the cloud computing, Thoughts on the occasion of Greek Law 4267/2014, Criminal Justice. Nomiki Vivliothiki 2015, 5, 454. [Google Scholar]
- Mixed Jury Court of Katerini (GR). Ruling 19-22/2009, Criminal Justice. Nomiki Vivliothiki 2010, 10, 1125. [Google Scholar]
- Marin, G. Possession of child pornography: Should you be convicted when the computer cache does the saving for you? Fla. Law Rev. 2008, 60, 1–31. Available online: http://www.floridalawreview.com/wp-content/uploads/2010/01/Marin_BOOK.pdf (accessed on 28 March 2021).
- Burmas, G. Efforts to conceptually define the possession of electronic data in child pornography cases, Criminal Justice. Nomiki Vivliothiki 2009, 3, 322. [Google Scholar]
- Directive 2011/93/EU of the European Parliament and of the Council of 13 December 2011 on Combating the Sexual Abuse and Sexual Exploitation of Children and Child Pornography. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32011L0093 (accessed on 28 March 2021).
- Orton, I.; Alva, A.; Endicott-Popovsky, B. Legal process and requirements for cloud forensic investigations, information resources managing association (USA). In Cloud Technology: Concepts, Methodologies, Tools and Applications; IGI Global: Hershey, PA, USA, 2014; p. 332. [Google Scholar]
- Clough, J. A world of difference: The Budapest convention on cybercrime and the challenges of harmonization. Monash Univ. Law Rev. 2014, 40, 1–39. Available online: https://www.monash.edu/__data/assets/pdf_file/0019/232525/clough.pdf (accessed on 28 March 2021).
- Kousouni-Pantazopoulou, A. Legal Dimensions of Cloud Computing, Media and Communications Law. Nomiki Vivliothiki 2012, 2, 177. [Google Scholar]
- Athens Council for Criminal Procedure in Misdemeanor Cases. Ruling 613/2016 Criminal Justice. Nomiki Vivliothiki 2016, 5, 424. [Google Scholar]
- Opinion of the Prosecutor of the Supreme Court (GR) 6/4.7.2008 Criminal Justice 2009, p. 185. Available online: https://eisap.gr/%ce%b3%ce%bd%cf%89%ce%bc%ce%bf%ce%b4%cf%8c%cf%84%ce%b7%cf%83%ce%b7-06-2008/ (accessed on 19 April 2021).
- Baum, S. In re Grand Jury Proceedings (Bank of Nova Scotia). NYLS J. Intern. Comp. Law 1984, 5, 2. [Google Scholar]
- Brennan Center for Justice. The “Microsoft Ireland” Case (Amicus Brief) [Update]. Available online: https://www.brennancenter.org/our-work/court-cases/microsoft-ireland-case-amicus-brief-update (accessed on 30 March 2021).
- GovTrack, S. 512 (114th): Law Enforcement Access to Data Stored Abroad Act. Available online: https://www.govtrack.us/congress/bills/114/s512/text (accessed on 30 March 2021).
- Watney, M. Law enforcement access to evidence stored abroad in the cloud. In Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS, Munich, Germany, 7–8 July 2016. [Google Scholar]
- Thomas, F.; Brier, J. Defining the limits of governmental access to personal data stored in the cloud: An analysis and critique of Microsoft Ireland. J. Inf. Policy 2017, 7, 327–371. [Google Scholar]
- The Harvard Law Review Association. Microsoft corp. v. United States. Harvard Law Rev. 2016, 130, 769–776. [Google Scholar]
- U.S. Government Publishing Office. One Hundred Fifteenth Congress of the United States of America. Available online: https://www.govinfo.gov/content/pkg/BILLS-115hr1625enr/html/BILLS-115hr1625enr.htm (accessed on 28 March 2021).
- Sachowski, J. Digital Forensics and Investigations, People, Process, and Technologies to Defend the Enterprise; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
- Council of Europe. Principals on Transborder Access to Stored Computer Data. Available online: https://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/Documents/Points%20of%20Contact/24%208%20Principles%20on%20Transborder%20Access%20to%20Stored%20Computer%20Data_en.pdf (accessed on 28 March 2021).
- Transborder Access and Jurisdiction: What Are the Options? Report of the Transborder Group (ad-hoc sub-Group on Jurisdiction and Transborder Access to Data). Adopted on 6 December 2012 by the Cybercrime Convention Committee (T-CY) of the Council of Europe. Available online: https://rm.coe.int/16802e79e8 (accessed on 28 March 2021).
- Directive 2014/41/EU/3-4-2014 of the European Parliament and the Council of Europe on the European Investigation Order in Criminal Matters. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32014L0041 (accessed on 28 March 2021).
- Farmakidis, E.V. European production order and european data preservation order. The adaptation of judicial cooperation procedures in criminal cases in the digital age, Criminal Justice. Nomiki Vivliothiki 2021, 1, 28. [Google Scholar]
- Proposal for a Regulation of the European Parliament and of the European Council on European Production and Preservation Orders for Electronic Evidence in Criminal Matters. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM%3A2018%3A225%3AFIN (accessed on 28 March 2021).
- Daskal, J. The un-territoriality of data. Yale Law J. 2015, 326, 390. [Google Scholar]
- Orin, S.; Foreword, K. Accounting for technological change. Harvard J. Law Public Policy 2013, 403, 403. [Google Scholar]
- Spoenle, J. Project on Cybercrime from The Economic Crime Division of the Council of Europe. Discussion Paper. Cloud Computing and Cybercrime Investigations: Territoriality vs. the Power of Disposal? 2010. Available online: https://rm.coe.int/16802fa3df (accessed on 28 March 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Karagiannis, C.; Vergidis, K. Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal. Information 2021, 12, 181. https://doi.org/10.3390/info12050181
Karagiannis C, Vergidis K. Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal. Information. 2021; 12(5):181. https://doi.org/10.3390/info12050181
Chicago/Turabian StyleKaragiannis, Christos, and Kostas Vergidis. 2021. "Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal" Information 12, no. 5: 181. https://doi.org/10.3390/info12050181
APA StyleKaragiannis, C., & Vergidis, K. (2021). Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal. Information, 12(5), 181. https://doi.org/10.3390/info12050181