Use of digital forensics technologies as part of the legal public security mechanism to detect cyberthreats
Palavras-chave:
Digital Forensics, Cyber Threats, Cyber Threat Detection, Digital Evidence Admissibility, Chain of Custody, Criminal Procedure law, Public Security Governance, Forensic Integrity Verification, Cybercrime Investigation, AI-Assisted Forensic SystemsResumo
The study addresses the issue of the growing cyber threats as a factor undermining public security. The existing legal frameworks lag behind the rapid evolution of cybercrime. This leaves state institutions vulnerable to sophisticated attacks. The aim of the article is to determine the role of digital forensics as a technical and evidentiary tool in strengthening the legal capacity of states to ensure security in cyberspace. Particular attention is paid to empirical materials obtained from the analysis of case studies of cyber investigations. The practice of law enforcement agencies is also taken into account. The research employed the following methods: doctrinal legal analysis, comparative analysis of national and international legal practice, as well as a critical review of forensic technologies used in cyber investigations. The results showed that the effectiveness of public security systems depends on both technical excellence and legal adaptability. The study examined 300 digital case models from case law and reports of law enforcement agencies in the United States (USA), Germany, France, and Poland. The key factor is the regulation of digital evidence, its admissibility and the preservation of the chain of custody. Unlike many studies that focus on technical aspects or criminology only, this study emphasizes the legal dimension of forensic technologies. It emphasizes their dual function—as a means of detection and as a guarantee of procedural fairness.The findings confirmed that integrating digital forensics into criminal process standards increases the resilience of state institutions to cyber threats. It also strengthens the legitimacy of legal responses. Further research prospects include the development of harmonized international standards for processing digital evidence. Strengthening cross-border cooperation and the implementation of forensic technologies in preventive legal policies are also important areas.
Downloads
Referências
Ali, M. I.; Kaur, S. “Next-Generation Digital Forensic Readiness BYOD Framework”, Security and Communication Networks, v. 2021, 2021, pp. 1–19. https://doi.org/10.1155/2021/6664426
Asamoah, J. T. “Exploring lack of due diligence as a threat to forensic analysis preparation and readiness”, Advances in Multidisciplinary Scientific Research Journal Publication, v. 1, 2022, pp. 307–314. https://doi.org/10.22624/aims/crp-bk3-p49
Avanija, J.; NARESH KUMAR, K. E.; USHA KUMARI, CH., NAGA JYOTHI, G.; SRUJAN RAJU, K. REDDY Madhavi, K. “Enhancing network forensic and deep learning mechanism for Internet of things networks”, Journal of Scientific Industrial Research, v. 82, n. 05 , 2023. https://doi.org/10.56042/jsir.v82i05.1084
Bulachek, V. “Administrative and legal protection of public morality”, Social Legal Studios, v. 5, n. 1, 2022. https://doi.org/10.32518/2617-4162-2022-5-41-45
Cellebrite, “Hashing—data verification: Mobile device forensics”, 2025. Available at: https://cellebrite.com/en/glossary/hashing-data-verification-mobile-device-forensics/ (accessed on 02 December 2025).
Dunsin, D.; Ghanem, M. C.; Ouazzane, K.; Vassilev, V. “A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response”, Forensic Science International Digital Investigation, v. 48, 2024, 301675. https://doi.org/10.1016/j.fsidi.2023.301675
Eclipse Forensics, “Admissibility of digital evidence in court: What you need to know”, 2025. Available at: https://eclipseforensics.com/admissibility-of-digital-evidence-in-court-what-you-need-to-know/?utm (accessed on 02 December 2025).
Elite Digital Forensics, “Investigating email hacking: A deep dive into emails”, 2023. Available at: https://elitedigitalforensics.com/2023/10/29/investigating-email-hacking-a-deep-dive-into-emails/ (accessed on 02 December 2025).
Faddom, “What is network behavior anomaly detection (NBAD)?”, 2025. Available at: Available at: https://faddom.com/what-is-network-behavior-anomaly-detection-nbad/?utm (accessed on 02 December 2025).
Fadilpašić, S. “US becomes ransomware capital of the world as attacks rise by almost 150 percent”, TechRadar, 2025. Available at: https://www.techradar.com/pro/security/us-becomes-ransomware-capital-of-the-world-as-attacks-rise-by-almost-150-percent (accessed on 02 December 2025).
Fakiha, B. “Enhancing Cyber Forensics with AI and Machine Learning: A Study on Automated Threat Analysis and Classification”, International Journal of Safety and Security Engineering, v. 13, n. 4, 2023, pp. 701–707. https://doi.org/10.18280/ijsse.130412
Guttman, B.; Lyle, J. Standard guide for establishing confidence in digital and multimedia evidence forensic results by error mitigation analysis: E3016-18. National Institute of Standards and Technology, 2021. Available at: https://www.nist.gov/system/files/documents/2022/01/31/ASTM-E3016-18%20Error%20Mitagation.pdf (accessed on 02 December 2025).
Hassan, N. S. K., Ibrahim, N. A. “The role of Artificial Intelligence in Cyber Security and Incident Response”, International Journal for Electronic Crime Investigation, v. 7, n. 2, 2023. https://doi.org/10.54692/ijeci.2023.0702154
Ihekweazu, C.; Adelowo, E. A.; Aghado, N. “Digital forensics in action: A case study of tracing cybercriminals behind job offer spear phishing scams in academic institutions”, In Proceedings of the ISCAP Conference (vol. 10, no. 6151). ISCAP, 2024. Available at: https://iscap.us/proceedings/2024/pdf/6151.pdf?utm (accessed on 02 December 2025).
Immenkamp, B. Access to data for law enforcement: Digital forensics (EPRS Briefing PE 775.879). European Parliamentary Research Service, 2025. Available at: https://www.europarl.europa.eu/RegData/etudes/BRIE/2025/775879/EPRS_BRI(2025)775879_EN.pdf (accessed on 02 December 2025).
Jaiswal, P. Importance of hash value in the context of digital evidence collection. Bhatt Joshi Associates, 2023. Available at: https://bhattandjoshiassociates.com/importance-of-hash-value-in-the-context-of-digital-evidence-collection/?utm (accessed on 02 December 2025).
Khan, A. A.; Zhang, X.; Hajjej, F.; Yang, J.; Ku, C. S.; Por, L. Y. “ASMF: Ambient social media forensics chain of custody with an intelligent digital investigation process using federated learning”, Heliyon, v. 10, n. 1, 2023, e23254. https://doi.org/10.1016/j.heliyon.2023.e23254
Loux, M.; Loux, B. How is digital evidence preserved in modern investigations? American Military University, 2025. Available at: https://www.amu.apus.edu/area-of-study/criminal-justice/resources/how-is-digital-evidence-preserved/?utm (accessed on 02 December 2025).
McNicholas, E. R. (Ed.). Cybersecurity laws and regulations: USA. ICLG, 2024. Available at: https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/usa (accessed on 02 December 2025).
MiniTAB, “Data analysis, statistical process improvement tools”, 2025. Available at: https://www.minitab.com/en-us/ (accessed on 02 December 2025).
Oxygen Forensics, “Digital forensics in eDiscovery: A comprehensive guide to modern investigations”, 2025. Available at: https://enterprise.oxygenforensics.com/resources/digital-forensics-in-ediscovery-guide/ (accessed on 02 December 2025).
Sabin, S. “Courts aren't ready for AI-generated evidence”, Axios, 2025. Available at: https://www.axios.com/2025/07/25/courts-deepfakes-ai-trial-evidence (accessed on 02 December 2025).
SalvationDATA, “Key trends in digital forensics for 2025: Technological innovation and core challenges”, 2025. Available at: https://www.salvationdata.com/knowledge/key-trends-in-digital-forensics-for-2025/ (accessed on 02 December 2025).
SEMENETS-Orlova, I.; Shevchuk, R.; Plish, B.; Moshnin, A.; Chmyr, Y.; Poliuliakh, R. “Human-Centered Approach in New Development Tendencies of Value-Oriented Public Administration: Potential of Education”, Economic Affairs, v. 67, n. 5, 2022. https://doi.org/10.46852/0424-2513.5.2022.25
SentinelOne, “Cybersecurity forensics: Types and best practices”, 2025. Available at: https://www.sentinelone.com/cybersecurity-101/cybersecurity/cybersecurity-forensics/?utm (accessed on 02 December 2025).
Sharma, P.; Gillanders, J. “Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art”, IEEE Access, v. 10, 2022, pp. 108979–108996. https://doi.org/10.1109/ACCESS.2022.3213843
Singhal, V.; Dubey, Sh.; Gupta, P.; Mishra, D. “A study of original and tempered images for Real-Fake Image”, International Journal of Innovative Research in Advanced Engineering, v. 11, n. 01, 2024, pp. 16–21. https://doi.org/10.26562/ijirae.2024.v1101.03
Soni, N. “Digital forensics: Confronting modern cyber crimes, technological advancements, and future challenges”, Journal of Forensic Legal Investigative Sciences, v. 11, n. 1, 2025, p. 105. https://doi.org/10.24966/FLIS-733X/100105
VikingCloud Team, “207 cybersecurity stats and facts for 2025”, 2025. Available at: https://www.vikingcloud.com/blog/cybersecurity-statistics (accessed on 02 December 2025).
Villafani, F. “Cyber-attacks in the EU: 10,000 in the last year, 19% against the Administration”, Global Affairs. University of Navarra, 2025. Available at: https://en.unav.edu/web/global-affairs/ciberataques-en-la-ue-10.000-en-el-ultimo-ano-el-19-contra-la-administracion (accessed on 02 December 2025).
Voronina, Y.; Lopushynskyi, I.; Grechanyk, B.; Vahonova, O.; Kondur, A.; Akimov, O. “Economic and environmental component in the field of sustainable development management”, Quality-Access to Success, v. 25, n. 201, 2024. https://doi.org/10.47750/qas/25.201.02
WebAsha Technologies, “What are the legal aspects of digital forensics and how do they affect evidence admissibility in court?”, 2025. Available at: https://www.webasha.com/blog/what-are-the-legal-aspects-of-digital-forensics-and-how-do-they-affect-evidence-admissibility-in-court (accessed on 02 December 2025).
Yermachenko, V.; Bondarenko, D.; Akimova, L.; Karpa, M.; Akimov, O.; Kalashnyk, N. “Theory and Practice of Public Management of Smart Infrastructure in the Conditions of the Digital Society’s Development: Socio-economic Aspects”, Economic Affairs, v. 68, n. 1, 2023. https://doi.org/10.46852/0424-2513.1.2023.29
Downloads
Publicado
Edição
Seção
Licença
Copyright (c) 2026 Volodymyr Kopanchuk , Vladyslav Veklych, Yurii Turovets , Volodymyr Atamanchuk, Oleg Kravchuk

Este trabalho está licenciado sob uma licença Creative Commons Attribution-NonCommercial 4.0 International License.
Those authors who have published with this journal, accept the following terms:
The authors cede all their copyrights to the magazine Cadernos de Dereito Actual, which will be in charge of disseminating and always quoting the author.
The authors agree not to send the article or publish it in another magazine.
The authors are allowed and recommended to disseminate their work through the Internet (e.g., in institutional telematic archives or on their website) before and during the submission process, which can produce interesting exchanges and increase the number of citations of the published work, provided that reference is made to Cadernos de Dereito Actual.
All contents published in the magazine are protected under a "Creative Commons - Attribution - Non-Commercial" license. Everyone has the right to freely access the contents of the magazine.
