Digital Forensics: Legality of the Process in Cameroon

Authors

  • Joan B. Ali

Keywords:

digital Forensics, digital evidence, cyber criminality.

Abstract

In many  legal  systems today,  it  is  important  for  evidence  that  is obtained  for  use  in  any  judicial  proceedings,  especially criminal and civil prosecutions, to be obtained lawfully. In other words, evidence should be obtained and examined in such a way as to make it relied upon in court. Part III of the 2010 LAW N° 2010/012 OF 21 DECEMBER 2010, law relating to cyber security and cyber criminality in Cameroon creates a procedural law provision to punish criminal offence of cyber criminality, which has a significance on the acquisition, examination, and analysis of digital evidence; knowing that traditional digital forensic processes, most be legally authorized, so that they do not potentially contravene this law.  Cameroon is faced with constraints and limitations in the way digital evidence is interpreted and handled in the courts. These constraints are related to skills, time, laws, technology and cost. The huge limitation is the lack of experts with appropriate skills to carry out digital forensic processes. The legal implications and ramifications for both digital forensics experts, law enforcement, and the cases that they are engaged in are identified, and provide appropriate legal solutions to ensure that these digital forensic practitioners do not contravene the existing laws.

References

Casey, E, (2004), Digital Evidence and Computer Crime, 2nd ed. London: Academic Press.

Swanson, C R, Chamelin, N C, Territo, L, & Taylor, R W, (2006), Criminal Investigation, 9th ed. New York: McGraw-Hill.

Peisert, S, Sishop, M, & Marzullo, K, (2008), "Computer Forensics in Forensics," in Systematic Approaches to Digital Forensic Engineering, pp. 102122.

Van Der Merwe, D, Roos, A, Pistorius, T, & Eiselen, S, (2008), Information and Communications Technology Law. Durban: Lexis Nexis.

Carrier, Brian, and Eugene H. Spafford. "Getting physical with the digital investigation process." International Journal of digital evidence 2.2 (2003): 1-20.

Website: http://www.budde.com.au/Research/Cameroon-Telecoms-Mobile-and-Broadband-Statistics-and-Analyses.html, last date accessed 442015.

Website: http://crtv.cm/fr/latest-news/science-et-technologie-9/third-generation-3g-network-cameroon-to-renew-mtn-mobile-licence-14216.htm, last date accessed 442015.

Vacca, J R, (2005), Computer Forensics: Computer Crime Scene Investigation, 2nd ed. Boston: Thomson.

Solomon, M G, Barrett, D, & Broom, N, (2005,) Computer Forensics Jump Start. Alameda: Sybex.

Jones, A & Valli, C, (2009,) Building a Digital Forensic Laboratory. Burlington: Syngress.

McKemmish, R, (2008), "When is Digital Evidence Forensically Sound?," in Advances in Digital Forensics IV, Indrajit Ray and Sujeet Shenoi, Eds. Boston:Springer, pp. 3-15.

Sansurooah, K, (2006), "Taxonomy of Computer Forensics Methodologies and Procedures for Digital Evidence Seizure," in Proceedings of the 4th Australian Digital Forensics Conference, Perth, pp. 67-77.

http://fakoamerica.typepad.com/files/law_relating_to_cybersecurity_and_cybercriminality-1.pdf, date downloaded 442015..

http://www.justiceandpeacebamenda.org/attachments/article/24/The+Judicial+System+in+Cameroon.pdf, date downloaded 442015.

http://www.crc.bg/files/_en/ZES_ENG.pdf, date downloaded 442015.

Giannelli & E. Imwinkelried, Scientific Evidence §§ 1.06, 1.16 (4th ed. 2007)

Downloads

Published

2015-08-05

How to Cite

B. Ali, J. (2015). Digital Forensics: Legality of the Process in Cameroon. International Journal of Computer (IJC), 17(1), 35–44. Retrieved from https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/428

Issue

Section

Articles