Weekly training modules are based on the textbook:
DIGITAL EVIDENCE & eDISCOVERY LAW PRACTICE IN NIGERIA
by the Convener of the course Emeka Arinze Esq,
LLM, M.I.T (info-tech), CBSP (Certified Biometric & Surveillance Professional, CDEA (Certified Digital Evidence Analyst), CCI (Certified Cybercrime Investigator), CFP (Certified Forensic Professional).
Learn More About Emeka Arinze
It is not in debate that electronic data contain information of investigative value stored on and transmitted by electronic devices. In its natural state, we cannot “see” what is contained in the physical object that holds the evidence. The existence of the digital information cannot be well perceived by human senses. This is because the record has been electro-magnetically recorded and stored in the computer system and networks. It is, therefore, impossible to perceive its content or visibility without the help of a suitable toolkit, equipment and software.
These tools that provide the ability to bring back in-depth information about what’s “under the hood” of a system are the actual drivers of the digital forensics industry, without which cybercrime or computer crime investigation cannot be carried out. These tools, found essentially reliable, and having produced results used in courts for admissibility purposes, can be classified into various categories, such as: hardware imaging tool; authentication software tool; decryption tools; audit log file tool; IP address tracker; email address tracker and a host of others.
The process of collection of digital data for investigative purpose must in no way compromise the evidential veracity. The typical goal of an investigation is to collect evidence using generally acceptable tools and methods in order to make the evidence acceptable and admitted in court. This weekly task therefore, undertakes in a most stringent and detailed manner the inherent capabilities, contents and evidentiary values of these tools comprising hardware imaging tool; authentication software tool; decryption tools; audit log file tool; IP address tracker; email address tracker and a host of others
On completion of the lecture as espoused in the video, reading activity, quiz and assessment, you will be able to understand: