Ques 4
Ques 4
What would
you be looking for? What precautions would you be taking? What evidence
collection considerations would you be considering?
The person who downloads pirated software can be traced using the IP address.
With the help of an IP address his corresponding postal address can be identified.
Then forensic examination of his computers and data storage devices can reveal a
lot of evidence that leads to criminal offence. Conventional investigation methods
can also be used to identify the suspects and gather all relevant information.
Given the source codes from two different software systems, the technical expert
concentrates on digging out the pieces of potential evidence of
copyright infringement by evaluating the similarities and commonalities that form the
basis for validating or invalidating the alleged crime. The duty of the cyber forensic
expert is to establish possible piracy through a rigorous formulation of statistical
occurrences of the data structures, variables, database tables, fields, modules,
procedures, logic, remark, error and blunders in the allegedly pirated software and
arrive at several values, preferably in percentages, to indicate the strength
of piracy (Author, 2009, p.54), all of which require comparing the original and the
pirated source codes, database schemas and procedures.
• Confiscating Hardware
• Confiscating Peripherals
• Confiscating Documents
PRECAUTIONS:
1. An investigator must ensure that he knows at each step the person to whom
the confiscated evidence was handed over.
2. He must also make sure that such person has the proper authority to have the
evidence in his custody