Biometric system reliability as a important factor of influence on Chain of Custody of Digital Evidence

Some biometric systems are designed to recognize and track individuals without their knowledge and allowance. Covert identification has not been widely deployed, but its potential use raises deep privacy concerns. Although the biometrics industry has at times dismissed such concerns, biometric systems could win broader acceptance if more attention were paid to the target community’s social and cultural values. Biometric recognition raises important legal issues of remediation, authority, and reliability, and, of course, privacy. The standard assumptions of the technologists who design new techniques, capabilities, and systems are very different from those embedded in the legal system. Legal precedent on the use of biometric technology is growing, with some key cases going back decades and other more recent cases having raised serious questions about the admissibility of biometric (digital) evidence in court. In this paper authors is about to propose analysis of existing methodology for preserving chain of custody by an introduction of biometric vulnerability evaluation methodology as important factor of influence for integrity and acceptability in Court of Justice of presented Digital Evidence through preservation of Chain of Custody (CoC). Using UML modeling methodology authors are about to represent a framework which will describe essential phases for evaluation of admissibility process of digital evidence including a vulnerability assessment process of biometric system exposing issues on reliability of biometric system that can have influence on reliability of CoC.

[1]  Miroslav Bača,et al.  An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence , 2011 .

[2]  H. Lan,et al.  SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .

[3]  Miroslav Bača,et al.  “Chain of Digital Evidence” Based Model of Digital Forensic Investigation Process , 2011 .

[5]  Mary F. Theofanos,et al.  Usability and Biometrics: Ensuring Successful Biometric Systems | NIST , 2008 .

[6]  Jasmin Cosic,et al.  (Im)proving chain of custody and digital evidence integrity with time stamp , 2010, The 33rd International Convention MIPRO.

[7]  N. F. Noy,et al.  Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .

[8]  Jean-Claude Laprie,et al.  X-Ware Reliability and Availability Modeling , 1992, IEEE Trans. Software Eng..

[9]  Miroslav Bača,et al.  Recovery function of Components of Additive Model of Biometric System Reliability in UML , 2011 .

[10]  Miroslav Bača,et al.  Additive Model of Reliability of Biometric Systems with Exponential Distribution of Failure Probability , 2011 .

[11]  Miroslav Bača,et al.  Biometric System Vulnerability as a Compromising Factor for Integrity of Chain of Custody and Admissibility of Digital Evidence in Court of Justice: Analysis and Improvement Proposal , 2014 .

[12]  K. L. Jacobsen BIOMETRICS AS SECURITY TECHNOLOGY , 2012 .

[13]  Miroslav Bača,et al.  Modeling Biometrics Systems in UML , 2007 .

[14]  Bojan Cukic,et al.  A Bayesian approach to reliability prediction and assessment of component based systems , 2001, Proceedings 12th International Symposium on Software Reliability Engineering.

[15]  Kai Shi,et al.  A Scenario-Based Reliability Analysis Approach for Component-Based Software , 2015, IEICE Trans. Inf. Syst..

[16]  Joel L. Horowitz,et al.  Nonparametric estimation of an additive model with a link function , 2002, math/0508595.

[17]  Mark A. Musen,et al.  A Framework for Ontology Evolution in Collaborative Environments , 2006, SEMWEB.