Atnaujinkite slapukų nuostatas

Electronic Evidence and Electronic Signatures Combined edition of two previously published volumes [Kietas viršelis]

Edited by , Edited by
  • Formatas: Hardback, 604 pages, aukštis x plotis: 234x156 mm
  • Serija: OBserving Law
  • Išleidimo metai: 01-Aug-2021
  • Leidėjas: University of London Press
  • ISBN-10: 1911507265
  • ISBN-13: 9781911507260
  • Formatas: Hardback, 604 pages, aukštis x plotis: 234x156 mm
  • Serija: OBserving Law
  • Išleidimo metai: 01-Aug-2021
  • Leidėjas: University of London Press
  • ISBN-10: 1911507265
  • ISBN-13: 9781911507260
Two leading authorities address the technical and ethical issues of practicing law in the digital age. 
 
In this updated edition of a well-established practitioner text, Stephen Mason and Daniel Seng have brought together a team of experts in the field to provide an exhaustive treatment of electronic evidence and electronic signatures. This fifth edition continues to follow the tradition in English evidence textbooks by basing the text on the law of England and Wales, with appropriate citations of relevant case law and legislation from other jurisdictions.
Software is reliable and robust xiii
Preface xv
Acknowledgments xvii
Table of statutes
xxi
Table of cases
xxxi
1 The sources and characteristics of electronic evidence and artificial intelligence
1(50)
Steven J. Murdoch
Daniel Seng
Burkhard Schafer
Stephen Mason
Digital devices
2(1)
Processors
2(1)
Mobile devices
3(1)
Embedded devices
3(2)
Software
5(3)
Data storage facilities
8(1)
Data formats
9(1)
Starting a computer
10(1)
Networks
11(1)
Types of network
11(5)
Cloud computing
16(1)
The Internet of Things
17(1)
The deep web and the dark web
17(2)
Common network applications
19(4)
Types of evidence available on a digital device
23(1)
Files
23(1)
Metadata
24(5)
Imaging
29(1)
System and program logs
29(1)
Temporary files and cache files
30(1)
Deleted or `lost' files
31(1)
Simulations, data visualizations, augmented and virtual reality
32(1)
Encryption and obfuscated data
32(1)
Artificial intelligence and machine learning
33(3)
Simulations, data visualizations, augmented and virtual reality
36(2)
Transparency and explainability
38(1)
AI adversarial attacks
39(1)
Defining electronic evidence
39(4)
The dependency on machinery and software
43(1)
The mediation of technology
43(1)
Speed of change
44(2)
Volume and replication
46(2)
Storage and disclosure
48(2)
Concluding remarks
50(1)
2 The foundations of evidence in electronic form
51(34)
Stephen Mason
Daniel Seng
Direct and indirect evidence
51(1)
Evidence in both digital and analogue form
51(1)
Metadata and electronic evidence
52(1)
Means of proof
53(1)
Testimony and hearsay
53(1)
Real evidence
53(5)
Documents and disclosure or discovery
58(4)
Visual reading of a document
62(1)
Authentication
63(1)
Best evidence
64(3)
Analogue evidence
67(1)
Digital evidence
68(3)
Civil proceedings
71(1)
Criminal proceedings
72(1)
Admissibility
73(2)
Weight
75(1)
Video and audio evidence
75(1)
Testimonial use in legal proceedings
75(1)
Identification and recognition evidence
76(3)
Computer-generated animations and simulations
79(1)
Computer-generated evidence in England and Wales: civil proceedings
80(1)
Computer-generated evidence in England and Wales: criminal proceedings
81(4)
3 Hearsay
85(27)
Daniel Seng
Stephen Mason
The rule of hearsay exclusion and its rationale
85(2)
The right of confrontation
87(1)
Hearsay and electronic evidence
88(2)
Electronic evidence and real evidence
90(2)
Testimonial and non-testimonial use of information
92(3)
Implied assertions
95(1)
Civil proceedings and the requirement to give notice
96(1)
Criminal proceedings
97(1)
Telephone calls and messages
98(4)
Representations other than by a person
102(1)
Body-worn camera footage
103(3)
Business and other documents
106(3)
Judicial discretion to include hearsay
109(1)
Judicial discretion to exclude hearsay
110(1)
Concluding observations
110(2)
4 Software code as the witness
112(14)
Stephen Mason
The classification of digital data
115(3)
Category 1 Content written by one or more people
118(2)
Category 2 Records generated by the software that have not had any input from a human
120(2)
Category 3 Records comprising a mix of human input and calculations generated by software
122(3)
Challenging the code to test the truth of the statement
125(1)
5 The presumption that computers are `reliable'
126(110)
Stephen Mason
The purpose of a presumption
127(1)
Presumptions and mechanical instruments
128(2)
Judicial formulations of the presumption that mechanical instruments are in order when used
130(1)
Judicial notice
130(3)
A `notorious' class
133(3)
Common knowledge
136(3)
Evidential foundations of the presumption
139(2)
How judges assess the evidence of devices controlled by software
141(8)
Mechanical instruments and computer-like devices
149(1)
The nature of software errors
149(3)
Why software appears to fail
152(2)
Classification of software errors
154(7)
The development, maintenance and operation of software
161(1)
Developmental issues and software errors
162(2)
Increasing the risk of errors through modification of software
164(3)
Security vulnerabilities
167(3)
Software testing
170(1)
Writing software that is free of faults
171(1)
Software standards
172(2)
Summary
174(2)
Challenging `reliability'
176(3)
Aviation
179(3)
Financial products
182(3)
Motor vehicles
185(4)
Emergency services
189(1)
Medical
190(2)
The Post Office Horizon scandal
192(4)
Banking
196(3)
Interception of communications
199(1)
Most computer errors are either immediately detectable or result from input errors
200(4)
Challenging the authenticity of digital data - trial within a trial
204(3)
A protocol for challenging software in devices and systems
207(4)
Reintroduction of the common law presumption
211(5)
The statutory presumption
216(2)
Challenging the presumption
218(4)
`Working properly'
222(1)
Concluding remarks
223(13)
6 Authenticating electronic evidence
236(43)
Luciana Duranti
Allison Stanfield
Authenticity and authentication
236(2)
An example: email
238(1)
Digital evidence compared to past paradigms
238(2)
Admissibility and authentication
240(6)
The best evidence rule
246(1)
Identity and integrity
247(2)
Reliability
249(6)
Methods of authentication
255(1)
Self-authentication
255(1)
System authentication
255(2)
Digital certification
257(1)
Digital forensics
258(1)
Extrinsic and circumstantial evidence
258(1)
Judicial notice
259(1)
Digital evidence in archival systems
260(3)
Technological authentication
263(1)
Digital signatures
263(1)
Blockchain
263(2)
Challenges to the authenticity of evidence in digital form
265(1)
The cloud
265(2)
The Internet of Things
267(1)
Digital preservation
268(2)
Migration and format changes
270(1)
The business records exception to the rule against hearsay
271(1)
The business records exception
271(3)
Authentication of digital business records
274(2)
Conclusion
276(3)
7 Electronic signatures
279(118)
Stephen Mason
The purpose of a signature
279(1)
Dictionary definitions
280(1)
The manuscript signature
281(1)
Statutory definition of signature
282(1)
The functions of a signature
283(1)
The primary evidential function
283(1)
Secondary evidential functions
284(1)
Cautionary function
284(1)
Protective function
285(1)
Channelling function
285(1)
Record-keeping function
285(1)
Disputing a manuscript signature
285(1)
Defences
285(1)
Evidence of the manuscript signature
286(1)
Intention to authenticate and adopt the document
287(1)
The electronic signature
288(1)
Forms of electronic signature
289(1)
Authority, delegation and ratification
290(1)
Forged signatures
291(1)
Evidence of intent to sign
291(1)
The automatic inclusion of the signature
292(3)
Partial document with separate signature page
295(1)
The Electronic Communications Act 2000
296(1)
The definition of an electronic signature
297(1)
The elements of an electronic signature
298(2)
Liability of a certification service provider
300(1)
The power to modify legislation
301(2)
Regulation of Investigatory Powers Act 2000
303(2)
Electronic sound
305(3)
The `I accept' and `wrap' methods of indicating intent
308(1)
Click wrap
308(3)
Browse wrap
311(1)
`I accept'
312(1)
Personal Identification Number (PIN) and password
313(4)
Typing a name into an electronic document
317(2)
Acts by a lawyer as agent
319(1)
Interest in real property
319(1)
Loan of money
319(1)
Employment
320(1)
Contract
321(1)
Guarantees and debt
322(1)
Public administration, the judiciary and the police
322(2)
Statute of Frauds
324(1)
Wills
325(4)
Constitution of a legal entity
329(1)
Amending boilerplate contractual terms
329(2)
The name in an email address
331(1)
Limitation Act 1969 (NSW)
331(1)
Statute of Frauds
332(11)
Legal fees arrangement
343(1)
Civil Law Act
343(2)
A manuscript signature that has been scanned
345(1)
Mortgage redemption
346(1)
Writing
347(1)
Employment
347(1)
Biodynamic version of a manuscript signature
348(1)
Electoral register
348(2)
Contract formation
350(1)
Digital signatures
350(1)
Technical overview of digital signatures
350(1)
Algorithms and keys
351(1)
Control of the key
352(1)
Disguising the message
352(3)
Public key infrastructure
355(1)
Difficulties with public key infrastructure
356(2)
Authenticating the sender
358(1)
The ideal attributes of a signature in electronic form
358(2)
Methods of authentication
360(2)
Types of infrastructure for asymmetric cryptographic systems
362(1)
Management of the key and certificate
363(4)
The duties of a user
367(1)
Internal management of a certification authority
367(1)
Barriers to the use of the public key infrastructure
368(1)
Risks associated with the use of digital signatures
369(2)
What a digital signature is capable of doing
371(1)
What no form of electronic signature is capable of doing
371(3)
The weakest link
374(2)
The burden of managing the private key
376(1)
Evidence and digital signatures
377(3)
`Non-repudiation'
380(4)
Certifying certificates
384(1)
The burden of proof
385(3)
The recipient's procedural and due diligence burden
388(1)
The sending party: the burden of proof of security and integrity
388(3)
Burden of proof-the jitsuin
391(3)
Burden of proof - summary
394(3)
8 Encrypted data
397(32)
Alisdair Gillespie
Jessica Shurson
Stephen Mason
Encryption
397(1)
Methods to obtain encrypted data
398(1)
Breaking the encryption without obtaining the key
398(1)
Obtaining the key
399(1)
Compelling disclosure in England and Wales
400(1)
Protected information
400(1)
Notice requiring disclosure
401(7)
Obligations of secrecy and tipping off
408(1)
Circumventing the procedure
409(1)
The privilege against self-incrimination
410(1)
England and Wales
411(3)
The USA
414(11)
Canada
425(1)
Belgium
426(1)
Concluding observations
427(2)
9 Proof: the technical collection and examination of electronic evidence
429(59)
Nigel Wilson
Andrew Sheldon
Hein Dries
Burkhard Schafer
Stephen Mason
Accreditation of the digital forensics discipline
430(1)
Guidelines for handling digital evidence
431(1)
Handling electronic evidence
432(3)
Identifying electronic evidence
435(1)
Gathering electronic evidence
436(2)
Gathering of data following legal retention or reporting obligations
438(2)
Copying electronic evidence
440(3)
Forensic triage
443(1)
Preserving electronic evidence
444(7)
Analysis of electronic evidence
451(6)
Tools
457(5)
Traces of evidence
462(5)
Reporting
467(3)
Analysis of a failure
470(1)
Anti-forensics and interpretation of evidence
471(2)
Data destruction
473(5)
Falsifying data
478(3)
Hiding data
481(1)
Attacks against computer forensics
482(1)
Trail obfuscation
483(2)
An intellectual framework for analysing electronic evidence
485(1)
Conclusions and future considerations
486(2)
10 Competence of witnesses
488(12)
Stephen Mason
Lynne Townley
The need for witnesses
488(1)
Separating data reliability from computer reliability
489(1)
Lay experts as witnesses
490(4)
Qualification of witnesses
494(6)
Appendix 1 Draft Convention on Electronic Evidence 500(8)
Appendix 2 Cumulative vignettes 508(5)
Index 513