23 May 1998


Date: Sat, 23 May 1998 10:54 +0100 (BST)
From: hcorn@cix.co.uk (Peter Sommer)
Subject: Computer Evidence Master Seminar
To: ukcrypto@maillist.ox.ac.uk

(updated information ...)

Proving Computer Crime: Admissibility, Experts and Presentation
A Master Seminar
LSE Computer Security Research Centre and QMW's Computer-Related Crime
Research Centre

Friday May 29, 1998

Venue: Room A85, Old Building,  London School of Economics, Houghton
Street, WC2A 2AE

Computer evidence used to be limited to simple print-out. For many years
now law enforcement officers have been seizing computers and data media,
carrying out complex investigations and producing exhibits. Specialist
forensic engineers are claiming to be able to recover lost and concealed
material. The growth of bulletin boards and Internet websites has created
problems of collecting offending files from remote sites. It is possible
to monitor a wide range of activities as they take place on the Internet
and other networks.

Laws such as the Copyright Design and Patents Act 1988 and in particular
the Computer Misuse Act 1990 with its emphasis on unauthorised access and
unauthorised data modification have forced the criminal courts to consider
the inner processes of computers as well as simple print-out. These
issues have spread forward into the prosecution of other groups of
offences, including fraud, forgery and pornography.

G8 - the Group of Eight Industrialised Democracies - have also identified
the need for an action plan to cover High-Tech crime which, among other
things,  potentially addresses the issues of the collection,
authentication and analysis of computer-derived evidence.  However the
action plan, identified both at the Washington G8 meeting in December 1997
and at the Birmingham Summit in May 1998, does not appear to have moved
from ambition to specifics.

A range of forensic procedures and practices, including the development of
specialist imaging hardware, has grown up informally and has met with
sporadic and inconsistent objections when presented before the courts.
For lawyers the challenge is often to pick a difficult route through the
complex rules distinguishing admissibility and probative value and to find
ways in which juries can be helped to understand unfamiliar raw material
and technical terminology. For prosecution and defence alike the
recruitment of appropriate experts present difficulties of initial
choice and continuing  management; defence lawyers additionally have to be
concerned with justifying the costs to the Legal Aid Board.

The LSE's Computer Security Research Centre and QMW's Computer-Related
Crime Research Centre are running a one-day Master Seminar to allow
lawyers, law enforcement officers and experts to discuss the issues. It is
hoped to give prosecutors and defenders an environment in which these key
matters can be discussed in principle and away from the adversarial
context of a trial.

Each themed 45-minute session will be introduced by one or more
individuals with specific experience but thereafter it is hoped that
discussion will be extensive and open. The numbers of attendees will be
restricted so that an appropriate seminar atmosphere can develop. It
should be noted that this seminar is designed for experienced
practitioners, lawyers and law enforcement officers;  the organisers are
considering the possibility of future training-orientated seminars for
those new to the field.

A summary of an illustrative case-study will be supplied to delegates to
provide a focus for the day.


Registration 9 am to 9:30 am.  The first session begins at 9:30 am.

1. Introduction to the day's proceedings

2. Role of and instruction of experts

What is the role of the expert? What are the differences in the roles of
prosecution and defence experts in the English adversarial trial? At what
stage should the police and defence solicitors engage experts, what
attributes should they look for and how should they define the scope of
the instructions? How should they continue to manage the scope of the
instructions as matters progress to trial? Legal Aid issues.

3-4. Types of evidence, practical issues of collection, provenance and 
formal procedures

How far is it possible to devise formal procedures for the handling of
computer evidence, from seizure of computers and data media through to the
production of print-outs as exhibits? What types of witness statements
should be required in support? What steps are required to demonstrate
proper working of a computer? How far can print-outs be edited in order to
make them clearer to juries? What is the role of specialist disk imaging
hardware? What techniques are appropriate to capturing data in
transmission, or data held on remote computers?

5. Admissibility of Evidence

What is the present state of the law of admissibility of evidence from
computer systems? How is the law applied in practical situations? What is
the role of the voir dire? What are the limits of the definitions of
"document"?  How far is forensically recovered material admissible? What
will  be the likely practical impact of the proposed reforms and in
particular the  proposed abolition of s 69 of the Police and Criminal
Evidence Act 1984? Do special provisions for disclosure of evidence need
to be made for computer-derived materials?

6. Court Presentation

What particular issues arise in presenting highly complex technical
material  to a lay jury? What appropriate tricks of presentation  exist
for advocates? How do experts balance the need for simplicity and clarity
in explanation against accuracy and completeness? How do experts avoid
being asked to comment on ultimate issue? What are benefits and hazards
of court-room demonstrations of computer processes and activities?

7. Matters for Officers of the Court

Even when all of the technical matters are clearly understood and
explained,  there still remain questions of law and procedure which will
be of major concern to Counsel and their instructing Solicitors. This
session will  address some of those questions, and will also widen the
scope of the discussion to include issues which arise when evidence is
obtained from and  by the practices of foreign jurisdictions.

Invited Participants

Participants are expected to include:

   John Austen,  former Head of the Metropolitan Police Computer Crime
                 Unit
   Richard Cox,  telecommunications consultant
   Dennis Jackson,  UK Computer Emergency Response Team
   Robert Jones,  QMW
   Alistair Kelman,  Barrister
   Peter Sommer,  LSE,  Virtual City Associates
   Peter Stage, Barrister
   Ian Walden,  QMW,  Bird & Bird
   Ed Wilding,  Network Security Management

However,  if court engagements prevent the attendance of some speakers
substitutes may be introduced.

The seminar qualifies for 5 hours of Law Society Continuing Professional
Development

Contacts:

   Tel: +44 171 975 5326 Fax +44 181 980 2001
   Web pages: http://csrc.lse.ac.uk/csrc/evidsem.htm 
              http://www.qmw.ac.uk/crcrc/evidsem.htm

Fee structure:

Rates for booking prior to May 1 1998

   regular attendance: £120 + vat  = £141.00
   law enforcement officers, sole practitioners £50  + vat = £58.75

Rates for booking after  May 1 1998
   regular attendance: £150 + vat  = £176.25
   law enforcement officers, sole practitioners £75  + vat = £88.13

Please send your completed booking form, together with a cheque
made payable to Queen Mary & Westfield College, to:

Lorraine Mulpeter
Centre for Commercial Law Studies 
Queen Mary & Westfield College
Mile End Road
London E1 4NS

   Name:
   Position:
   Organisation:
   Address:
   Phone:
   Fax:
   Email:

A VAT invoice will be issued upon receipt. All bookings carry a 50%
cancellation charge under the terms outlined below.  Cancellations and
Substitutions: All bookings carry a 50% liability immediately after the
booking has been made and up to 21 days before the  conference date. There
will be no refund for cancellations received 21 days  or less prior to the
conference. If any delegate is unable to attend a substitution may be made
at any time. All substitutions and name changes must be made in writing by
mail or fax.

Indemnity: It may be necessary for reason beyond the control of the
seminar organisers to change the content, timing, speakers or venue of the
programme. Should the venue or speakers change for any reason outside the
control of the seminar organisers, or the event be cancelled owing to act
of terrorism or extreme weather conditions or industrial action, the
seminar organisers shall endeavour to reschedule the event by the client
hereby indemnifies and hold harmless from and against any and all costs,
damages and expenses including attorney fees which are incurred by the
client.


|---->   Peter Sommer   ------------------------------------------->|
|---->   hcorn@cix.co.uk   P.M.Sommer@lse.ac.uk  ------------------>|
|---->   Academic URL:  http://csrc.lse.ac.uk/csrc/pmscv.htm  ----->|
|---->   Commercial URL:  http://www.virtualcity.co.uk  ----------->|