20Dec 2019

FEATURES OF THE APPOINTMENT OF A FORENSIC COMPUTER - TECHNICAL EXAMINATION

  • Lecturer Department of the Criminal procedure and Criminalistics Tashkent State University of Law. 100047, 35, Sayilgox str., Tashkent, Uzbekistan
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

Acquisition, decoding, and presentation of information from mobile devices are complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation. A variety of tools and methods have been developed (both commercially and in the open-source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent. The article analyzes the features of the appointment of a forensic computer-technical examination, also addresses the issues of the appointment of a comprehensive and additional computer-technical examination. The errors arising at the appointment of the examination are considered.


  1. Breeuwsma M., at el. (2007): Forensic data recovery from flashmemory. Small Scale Digital Device Forensics Journal, 1(1). ssddfj.org/papers/ssddfj_v1_1_breeuwsma_et_al.pdf.
  2. www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics.html.
  3. Decree of the President of the Republic of Uzbekistan. (February 7, 2017): No. UP-4947. ?On an action strategy for the further development of the Republic of Uzbekistan?. www.lex.uz.
  4. Decree of the President of the Republic of Uzbekistan. (January 22, 2018): No. UP-5308. ?On the state program for implementing an action strategy in five priority areas for the development of the Republic of Uzbekistan in 2017-2021 in the Year of Support for Active Entrepreneurship, Innovative Ideas and Technologies?. www.lex.uz.
  5. Decree of the President of the Republic of Uzbekistan. (May 14, 2018): No. PP-3723. ?On measures to radically improve the system of criminal and criminal procedure legislation?. www.lex.uz.
  6. Emam K.E. and Koru A.G. (2008): A replicated survey of it software project failures. IEEE Software, 25(5):84-90.
  7. Jahankhani H. (2009): Criminal investigation and forensic tools for smartphones. International Journal of Electronic Security and Digital Forensics, 2(4): 387-406.
  8. Kornblum J. (2006): Identifying almost identical files using context triggered piecewise hashing. Digital Investigation.
  9. Pavlova A.A. (2005): Procedural and methodological foundations for the appointment of forensic computer-technical examination. MSTU named after N.E. Bauman. Polytechnic youth magazine, 5.
  10. Polyakov V.V. (2014): Forensic computer-technical examination of mobile radio communications. J. News of the Altai district, S. 140-145.
  11. Robinson B. (1996): Limited horizons, limited influence: information technology the London ambulance service: Proceedings of the international symposium on technology and society technical expertise and public decisions. IEEE Computer Society Press, p. 506-14.
  12. https://studfiles.net/preview/6131517/page:2/
  13. https://stud.org/117912046811/legal/functions_of_forensic_computer_technical_examination
  14. ru/statistics-terrorism/# statistics-terrorism-in-the-world.
  15. World Drug Report. (2017) unodc.org/wdr2017/field/WDR_Booklet1_Exsum_Russian.pdf.

[Rakhimova Ulzana (2019); FEATURES OF THE APPOINTMENT OF A FORENSIC COMPUTER - TECHNICAL EXAMINATION Int. J. of Adv. Res. 7 (Dec). 1033-1036] (ISSN 2320-5407). www.journalijar.com


Rakhimova Ulzana


DOI:


Article DOI: 10.21474/IJAR01/10250      
DOI URL: https://dx.doi.org/10.21474/IJAR01/10250