Use of digital forensics technologies as part of the legal public security mechanism to detect cyberthreats

Autores/as

  • Volodymyr Kopanchuk Leonid Yuzkov Khmelnytskyi University of Management and Law
  • Vladyslav Veklych Prince Volodymyr the Great Educational and Scientific Institute of Law; Interregional Academy of Personnel Management
  • Yurii Turovets Leonid Yuzkov Khmelnytskyi University of Management and Law
  • Volodymyr Atamanchuk National Academy of Internal Affairs
  • Oleg Kravchuk Leonid Yuzkov Khmelnytskyi University of Management and Law

Palabras clave:

Digital Forensics, Cyber Threats, Cyber Threat Detection, Digital Evidence Admissibility, Chain of Custody, Criminal Procedure law, Public Security Governance, Forensic Integrity Verification, Cybercrime Investigation, AI-Assisted Forensic Systems

Resumen

The study addresses the issue of the growing cyber threats as a factor undermining public security. The existing legal frameworks lag behind the rapid evolution of cybercrime. This leaves state institutions vulnerable to sophisticated attacks. The aim of the article is to determine the role of digital forensics as a technical and evidentiary tool in strengthening the legal capacity of states to ensure security in cyberspace. Particular attention is paid to empirical materials obtained from the analysis of case studies of cyber investigations. The practice of law enforcement agencies is also taken into account. The research employed the following methods: doctrinal legal analysis, comparative analysis of national and international legal practice, as well as a critical review of forensic technologies used in cyber investigations. The results showed that the effectiveness of public security systems depends on both technical excellence and legal adaptability. The study examined 300 digital case models from case law and reports of law enforcement agencies in the United States (USA), Germany, France, and Poland. The key factor is the regulation of digital evidence, its admissibility and the preservation of the chain of custody. Unlike many studies that focus on technical aspects or criminology only, this study emphasizes the legal dimension of forensic technologies. It emphasizes their dual function—as a means of detection and as a guarantee of procedural fairness.The findings confirmed that integrating digital forensics into criminal process standards increases the resilience of state institutions to cyber threats. It also strengthens the legitimacy of legal responses. Further research prospects include the development of harmonized international standards for processing digital evidence. Strengthening cross-border cooperation and the implementation of forensic technologies in preventive legal policies are also important areas.

Descargas

Los datos de descarga aún no están disponibles.

Referencias

Ali, M. I.; Kaur, S. “Next-Generation Digital Forensic Readiness BYOD Framework”, Security and Communication Networks, v. 2021, 2021, pp. 1–19. https://doi.org/10.1155/2021/6664426

Asamoah, J. T. “Exploring lack of due diligence as a threat to forensic analysis preparation and readiness”, Advances in Multidisciplinary Scientific Research Journal Publication, v. 1, 2022, pp. 307–314. https://doi.org/10.22624/aims/crp-bk3-p49

Avanija, J.; NARESH KUMAR, K. E.; USHA KUMARI, CH., NAGA JYOTHI, G.; SRUJAN RAJU, K. REDDY Madhavi, K. “Enhancing network forensic and deep learning mechanism for Internet of things networks”, Journal of Scientific Industrial Research, v. 82, n. 05 , 2023. https://doi.org/10.56042/jsir.v82i05.1084

Bulachek, V. “Administrative and legal protection of public morality”, Social Legal Studios, v. 5, n. 1, 2022. https://doi.org/10.32518/2617-4162-2022-5-41-45

Cellebrite, “Hashing—data verification: Mobile device forensics”, 2025. Available at: https://cellebrite.com/en/glossary/hashing-data-verification-mobile-device-forensics/ (accessed on 02 December 2025).

Dunsin, D.; Ghanem, M. C.; Ouazzane, K.; Vassilev, V. “A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response”, Forensic Science International Digital Investigation, v. 48, 2024, 301675. https://doi.org/10.1016/j.fsidi.2023.301675

Eclipse Forensics, “Admissibility of digital evidence in court: What you need to know”, 2025. Available at: https://eclipseforensics.com/admissibility-of-digital-evidence-in-court-what-you-need-to-know/?utm (accessed on 02 December 2025).

Elite Digital Forensics, “Investigating email hacking: A deep dive into emails”, 2023. Available at: https://elitedigitalforensics.com/2023/10/29/investigating-email-hacking-a-deep-dive-into-emails/ (accessed on 02 December 2025).

Faddom, “What is network behavior anomaly detection (NBAD)?”, 2025. Available at: Available at: https://faddom.com/what-is-network-behavior-anomaly-detection-nbad/?utm (accessed on 02 December 2025).

Fadilpašić, S. “US becomes ransomware capital of the world as attacks rise by almost 150 percent”, TechRadar, 2025. Available at: https://www.techradar.com/pro/security/us-becomes-ransomware-capital-of-the-world-as-attacks-rise-by-almost-150-percent (accessed on 02 December 2025).

Fakiha, B. “Enhancing Cyber Forensics with AI and Machine Learning: A Study on Automated Threat Analysis and Classification”, International Journal of Safety and Security Engineering, v. 13, n. 4, 2023, pp. 701–707. https://doi.org/10.18280/ijsse.130412

Guttman, B.; Lyle, J. Standard guide for establishing confidence in digital and multimedia evidence forensic results by error mitigation analysis: E3016-18. National Institute of Standards and Technology, 2021. Available at: https://www.nist.gov/system/files/documents/2022/01/31/ASTM-E3016-18%20Error%20Mitagation.pdf (accessed on 02 December 2025).

Hassan, N. S. K., Ibrahim, N. A. “The role of Artificial Intelligence in Cyber Security and Incident Response”, International Journal for Electronic Crime Investigation, v. 7, n. 2, 2023. https://doi.org/10.54692/ijeci.2023.0702154

Ihekweazu, C.; Adelowo, E. A.; Aghado, N. “Digital forensics in action: A case study of tracing cybercriminals behind job offer spear phishing scams in academic institutions”, In Proceedings of the ISCAP Conference (vol. 10, no. 6151). ISCAP, 2024. Available at: https://iscap.us/proceedings/2024/pdf/6151.pdf?utm (accessed on 02 December 2025).

Immenkamp, B. Access to data for law enforcement: Digital forensics (EPRS Briefing PE 775.879). European Parliamentary Research Service, 2025. Available at: https://www.europarl.europa.eu/RegData/etudes/BRIE/2025/775879/EPRS_BRI(2025)775879_EN.pdf (accessed on 02 December 2025).

Jaiswal, P. Importance of hash value in the context of digital evidence collection. Bhatt Joshi Associates, 2023. Available at: https://bhattandjoshiassociates.com/importance-of-hash-value-in-the-context-of-digital-evidence-collection/?utm (accessed on 02 December 2025).

Khan, A. A.; Zhang, X.; Hajjej, F.; Yang, J.; Ku, C. S.; Por, L. Y. “ASMF: Ambient social media forensics chain of custody with an intelligent digital investigation process using federated learning”, Heliyon, v. 10, n. 1, 2023, e23254. https://doi.org/10.1016/j.heliyon.2023.e23254

Loux, M.; Loux, B. How is digital evidence preserved in modern investigations? American Military University, 2025. Available at: https://www.amu.apus.edu/area-of-study/criminal-justice/resources/how-is-digital-evidence-preserved/?utm (accessed on 02 December 2025).

McNicholas, E. R. (Ed.). Cybersecurity laws and regulations: USA. ICLG, 2024. Available at: https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/usa (accessed on 02 December 2025).

MiniTAB, “Data analysis, statistical process improvement tools”, 2025. Available at: https://www.minitab.com/en-us/ (accessed on 02 December 2025).

Oxygen Forensics, “Digital forensics in eDiscovery: A comprehensive guide to modern investigations”, 2025. Available at: https://enterprise.oxygenforensics.com/resources/digital-forensics-in-ediscovery-guide/ (accessed on 02 December 2025).

Sabin, S. “Courts aren't ready for AI-generated evidence”, Axios, 2025. Available at: https://www.axios.com/2025/07/25/courts-deepfakes-ai-trial-evidence (accessed on 02 December 2025).

SalvationDATA, “Key trends in digital forensics for 2025: Technological innovation and core challenges”, 2025. Available at: https://www.salvationdata.com/knowledge/key-trends-in-digital-forensics-for-2025/ (accessed on 02 December 2025).

SEMENETS-Orlova, I.; Shevchuk, R.; Plish, B.; Moshnin, A.; Chmyr, Y.; Poliuliakh, R. “Human-Centered Approach in New Development Tendencies of Value-Oriented Public Administration: Potential of Education”, Economic Affairs, v. 67, n. 5, 2022. https://doi.org/10.46852/0424-2513.5.2022.25

SentinelOne, “Cybersecurity forensics: Types and best practices”, 2025. Available at: https://www.sentinelone.com/cybersecurity-101/cybersecurity/cybersecurity-forensics/?utm (accessed on 02 December 2025).

Sharma, P.; Gillanders, J. “Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art”, IEEE Access, v. 10, 2022, pp. 108979–108996. https://doi.org/10.1109/ACCESS.2022.3213843

Singhal, V.; Dubey, Sh.; Gupta, P.; Mishra, D. “A study of original and tempered images for Real-Fake Image”, International Journal of Innovative Research in Advanced Engineering, v. 11, n. 01, 2024, pp. 16–21. https://doi.org/10.26562/ijirae.2024.v1101.03

Soni, N. “Digital forensics: Confronting modern cyber crimes, technological advancements, and future challenges”, Journal of Forensic Legal Investigative Sciences, v. 11, n. 1, 2025, p. 105. https://doi.org/10.24966/FLIS-733X/100105

VikingCloud Team, “207 cybersecurity stats and facts for 2025”, 2025. Available at: https://www.vikingcloud.com/blog/cybersecurity-statistics (accessed on 02 December 2025).

Villafani, F. “Cyber-attacks in the EU: 10,000 in the last year, 19% against the Administration”, Global Affairs. University of Navarra, 2025. Available at: https://en.unav.edu/web/global-affairs/ciberataques-en-la-ue-10.000-en-el-ultimo-ano-el-19-contra-la-administracion (accessed on 02 December 2025).

Voronina, Y.; Lopushynskyi, I.; Grechanyk, B.; Vahonova, O.; Kondur, A.; Akimov, O. “Economic and environmental component in the field of sustainable development management”, Quality-Access to Success, v. 25, n. 201, 2024. https://doi.org/10.47750/qas/25.201.02

WebAsha Technologies, “What are the legal aspects of digital forensics and how do they affect evidence admissibility in court?”, 2025. Available at: https://www.webasha.com/blog/what-are-the-legal-aspects-of-digital-forensics-and-how-do-they-affect-evidence-admissibility-in-court (accessed on 02 December 2025).

Yermachenko, V.; Bondarenko, D.; Akimova, L.; Karpa, M.; Akimov, O.; Kalashnyk, N. “Theory and Practice of Public Management of Smart Infrastructure in the Conditions of the Digital Society’s Development: Socio-economic Aspects”, Economic Affairs, v. 68, n. 1, 2023. https://doi.org/10.46852/0424-2513.1.2023.29

Descargas

Publicado

30-03-2026

Cómo citar

“Use of digital forensics technologies as part of the legal public security mechanism to detect cyberthreats” (2026) Cadernos de Dereito Actual, (31), pp. 238–256. Available at: https://cadernosdedereitoactual.es/index.php/cadernos/article/view/1445 (Accessed: 30 March 2026).