Lecturer/ Justyna Sarkowicz
Welcome to the module on Cybercrime Investigations and Digital Evidence. In the digital age, a crime scene is no longer just a physical room—it is a network, a cloud server, or a mobile device. This module transforms you into a digital investigator, teaching you how to uncover, preserve, and interpret the "digital footprints" that criminals leave behind.
The heart of this module is the systematic lifecycle of a digital investigation. We move beyond raw technical skill, focusing on the rigorous methodology required to ensure your findings are admissible in a court of law. Digital evidence is notoriously fragile; a single mishandled file, an unblocked connection, or a lack of documentation can render months of investigative work useless.
We place a heavy emphasis on the Chain of Custody (CoC), the documentation backbone of any legal case. You will learn to track every interaction with digital evidence, ensuring an unbroken, transparent trail from the moment of seizure to the final verdict.
Key Learning Outcomes:
Forensic Readiness: Master the "First Response" protocols to secure evidence without contamination.
Evidence Admissibility: Understand the standards courts use to accept (or reject) electronic evidence, including metadata analysis.
Technical Integrity: Learn to utilize cryptographic hash functions to verify that data remains bit-for-bit identical to the original throughout the analysis.
By the end of this module, you will understand that technical expertise is only half the battle. Legal defensibility is the other. You will be prepared to bridge the gap between complex technical analysis and the strict requirements of judicial procedure.