The Association of Digital Forensics, Security and Law (ADFSL)
In March 2012, Mainland China has amended its Criminal Procedure Law, which includes the introduction of a new type of evidence, i.e., digital evidence, to the court of law. To better understand the development of computer forensics and digital evidence in Mainland China, this paper discusses the Chinese legal system in relation to digital investigation and how the current legal requirements affect the existing legal and technical usage of digital evidence at legal proceedings. Through studying the famous “Panda Burning Incense (Worm.WhBoy.cw)” virus case that happened in 2007, this paper aims to provide a better understanding of how to properly conduct computer forensics examination and present digital evidence at court of law in Mainland China.
APA Citation Style. (2014). Retrieved from http://www.apastyle.org/
Brown, C.L.T. (2010). Computer Evidence: Collection and Preservation, 2nd edition. Boston, MA: Course Technology.
Casey, E. (2011). Digital Evidence and Computer Crime: Forensics Science, Computers and the Internet, 3rd edition. Elsevier Academic Press.
Civil Procedure Law of the People's Republic of China. (2014). Retrieved from http://www.china.org.cn/english/governm ent/207343.htm
8th Annual China Computer Forensics Conference & Exhibition (CCFC). (2012). Retrieved from http://www.fulldata.cn/news1info-0- 345.html
Farmer, Dan, & Venema, Wietse. (1999). Forensic Discovery, Computer Forensics Analysis Class Handouts. Retrieved from http://www.porcupine.org/forensics/hand outs.html
Ieong, Ricci S. C. (2006).FORZA – Digital forensics investigation framework that incorporate legal issues, Digital Forensics Research Workshop (DFRWS). Internet Usage Rate in China, Statistics and Trends. (March 2013). Retrieved from http://www.go-globe.com/blog/internetusage-china/
Institute of Forensic Science, Ministry of Justice. (2009). Retrieved from http://www.ssfjd.com/WebEN/WebInfo/ WebInfoList02_1.aspx?ID=19
Ieong, Ricci S. C. (2006). FORZA – Digital forensics investigation framework that incorporate legal issues, Digital Forensics Research Workshop (DFRWS).
National Institute of Justice. (2007). Digital evidence in the courtroom: A guide for law enforcement and prosecutors, U.S. Department of Justice. Retrieved from http://www.ncjrs.gov/pdffiles1/nij/211314 .pdf
National People's Congress, Criminal Procedure Law. (2014). National People's Congress Standing Committee. (February 28, 2005). "National People's Congress Standing Committee on the forensic management issues".
Notice of the Supreme People's Court, the Supreme People's Procuratorates, the Ministry of Public Security, the Ministry of State Security and the Ministry of Justice on Issuing the Provisions on Several Issues Concerning the Examination and Judgment of Evidence in Death Sentence Cases and the Provisions on Several Issues Concerning the Exclusion of Illegal Evidence in Criminal Cases. (2014). Retrieved from http://www.lawinfochina.com/display.asp x?lib=law&id=8205&CGid=
Report: Chinese Police Arrest Eight for Computer Virus. (February 13th, 2007). Retrieved from http://www.infoworld.com/d/securitycentral/report-chinese-police-arrest-eightcomputer-virus-496
Rosenzweig, Joshua, et al (2102). The 2012 Revision of the Chinese Criminal Procedure Law: (Mostly) Old Wine in New Bottles.
Sun, Bo. (2004). Research on Key Aspects of Computer Forensic Methods. Beijing: Chinese Academy of Sciences, p.1.
Xu, Rongsheng. (2011). Digital Forensic in Mainland China, Dec 5th 2011. Retrieved from http://www.lawtech.hk/wpcontent/uploads/2011/12/ChinaDF2011- HK-5.pdf
Zhai, Jianxiong (2002). Features – Judicial Information of the People's Republic of China: A Survey.
Cohen, F. (2008). Challenges to Digital Forensics Evidence. CA: Fred Cohen & Associates.
Law, F., Chow, KP, Lai, P., and Tse, H. (2009). A Host-Based Approach to BotNet Investigation, First International ICST Conference (ICDF2C). (2009). Retrieved from http://www.cs.hku.hk/cisc/forensics/pape rs/09_05.pdf
Law, Frank; Chow, K. P.; and Mai, Y. H.
"Understanding Computer Forensics Requirements in China via the “Panda Burning Incense” Virus Case,"
Journal of Digital Forensics, Security and Law: Vol. 9
, Article 5.
Available at: http://commons.erau.edu/jdfsl/vol9/iss2/5