Knowledge Builders

how do you handle digital evidence

by Gene Mohr DVM Published 2 years ago Updated 2 years ago
image

How To Easily Handle Digital Evidence

  • Get your files from A to Z. You've hopefully read our eBook on Digital Evidence Management for Police; FotoWare was born...
  • Keeping order. Being able to sort and categorize files according to hundreds of different forms of metadata is valuable...
  • There's an API for that. As the web and associated applications have also developed, the...

10 Best Practices for Managing Digital Evidence (Evidence Handling Procedures)
  1. Document Device Condition. ...
  2. Get Forensic Experts Involved. ...
  3. Have a Clear Chain of Custody. ...
  4. Don't Change the Power Status. ...
  5. Secure the Device. ...
  6. Never Work on the Original Data. ...
  7. Keep the Device Digitally Isolated. ...
  8. Prepare for Long-Term Storage.
Apr 19, 2021

Full Answer

How is digital evidence typically handled in court?

Digital evidence is typically handled in one of two ways: 1 The investigators seize and maintain the original evidence (i.e., the disk). This is the typical practice of law... 2 The original evidence is not seized, and access to collect evidence is available only for a limited duration. This is... More ...

What are the steps involved in the initial handling of evidence?

These protocols delineate the steps to be followed when handling digital evidence. There are four phases involved in the initial handling of digital evidence: identification, collection, acquisition, and preservation ( ISO/IEC 27037 ; see Cybercrime Module 4 on Introduction to Digital Forensics). Did you know?

What is the best way to store digital evidence?

As a general rule, personnel should store digital evidence in its original, as well as nonproprietary, format to ensure accessibility. 5

What are the risks of handling digital evidence?

Digital evidence is volatile and fragile and the improper handling of this evidence can alter it. Because of its volatility and fragility, protocols need to be followed to ensure that data is not modified during its handling (i.e., during its access, collection, packaging, transfer, and storage).

image

How do you handle evidence?

Trace EvidenceDocument and photograph the evidence.Properly secure the evidence by placing it in a paper bag or envelope.Close, seal, or tape the paper bag or envelope. ... Label the bag or envelope with the patient's identifying information.Examiner must place signature, date, and time on the envelope[3]

How might an investigator properly collect and preserve digital evidence?

Drive Imaging Before investigators can begin analyzing evidence from a source, they need to image it first. Imaging a drive is a forensic process in which an analyst creates a bit-for-bit duplicate of a drive. This forensic image of all digital media helps retain evidence for the investigation.

How do you ensure integrity of digital evidence?

Digital evidence integrity is ensured by calculating MD5 and SHA1 hashes of the extracted content and storing it in a report along with other details related to the drive. It also offers an encryption feature to ensure the confidentiality of the digital evidence.

What are the best practices in collecting digital evidence?

An accepted best practice in digital evidence collection - modified to incorporate live volatile data collectionPhotograph the computer and scene.If the computer is off do not turn it on.If the computer is on photograph the screen.More items...•

Where do you store digital evidence?

Where can digital evidence be stored? Usually it can be stored on a hard disc drive or a solid state drive of a computer or external storage units including CDs and DVDs. Flash memory of peripheral devices such as mobile phones, USB pen drives and camera memory cards are also used to store digital evidence.

Why do we need to preserve digital evidence?

When sensitive information is compromised, it is important to ensure that all of the obtained pieces of electronic evidence are handled with precision and care, as well as to prevent further damage, such as being overwritten, destroyed, or otherwise corrupted.

What are the 6 stages of evidence handling?

Incident response is typically broken down into six phases; preparation, identification, containment, eradication, recovery and lessons learned.

Which of the following is the proper way of preserving digital evidence?

You need to document things like- where the device is, who has access to the device, and when it is moved. Do not plug any external storage media in the device: Memory cards, USB thumb drives, or any other storage media that you might have, should not be plugged into the device.

How do you secure a digital crime scene?

Maintain logs of where you are keeping records. If the computer is to be recirculated, take the hard drive from the machine and secure it. An original makes the best evidence. Then make a forensically sound image of the hard drive, using hardware-based drive imaging tools as opposed to a write-blocking software tool.

How do you establish that the collected digital evidence is real?

Section 2, Rule 5 of the REE provides that “[b]efore any private electronic document offered as authentic is received in evidence, its authenticity must be proved by any of the following means: (a) by evidence that it had been digitally signed by the person purported to have signed the same; (b) by evidence that other ...

What is the most important thing that an investigator must consider when collecting evidence during a digital forensic investigation and why is this important?

I believe the preparation phase of a digital search is the most important because it determines whether evidence will meet the standards necessary to be admissible in the court of law.

How can we collect evidence in cyber crime?

In order to ensure the authenticity of electronic evidence, four issues should be paid attention to in the collection of electronic evidence in cybercrime: collect strictly according to law, collect electronic evidence comprehensively, invite electronic experts to participate, and ensure the privacy rights of the ...

How do forensics seize digital evidence?

Take a picture of the piece of the evidence: Ensure to take the picture of the evidence from all the sides. If it is a mobile phone, capture pictures from all the sides, to ensure the device has not tampered till the time forensic experts arrive.

Get your files from A to Z

You've hopefully read our eBook on Digital Evidence Management for Police; FotoWare was born out of the digitalization of the photo section of a leading Norwegian newspaper back in 1997, where rapid development and use of digital media resulted in greater needs for managing the increased number of digital media files.

Keeping order

Being able to sort and categorize files according to hundreds of different forms of metadata is valuable to any organisation. You can add metadata such as special instructions and expiry dates to images, so that they not only contain the correct information, but are easily searchable and accessible later.

There's an API for that

As the web and associated applications have also developed, the need for integrations has arisen in tact with this development.

Partner up

Our partners have also developed a range of useful features, functions and integrations for our customers. These include Bandwidth Support, PDF+ (for creating PDFs from a collection of images), end-to-end encryption when uploading images, and audit trails & notifications.

What is digital evidence?

Collecting and handling digital evidence is a crucial part in performing digital forensics. As stated earlier, not collecting the right evidence or mishandling evidence can lead to a perpetrator not getting convicted for their crime. Everything from the way digital evidence is collected to the way it is worked with and even stored plays a vital role in court proceedings. For example, once an incident is made apparent, it is advised that evidence gathering procedures be initiated. In this way, you will be more likely to gather all pertinent evidence before they become lost or deleted.

How is digital evidence stored?

The manner in which digital evidence is stored is also crucial. Any collected evidence should be stored in a way that will preserve the integrity of the evidence. For instance, sensitive files such as network logs should be stored on password-protected hard drives or flash drives to ensure only investigators and other relevant persons have access to them. Additionally, all storage media that contain evidence should be stored in a safe place; again, where only investigators can access them. Any evidence or storage media containing evidence that is stored in common areas is at risk of becoming lost or mishandled.

How is digital evidence acquired?

At the forensics laboratory, digital evidence should be acquired in a manner that preserves the integrity of the evidence (i.e., ensuring that the data is unaltered); that is, in a forensically sound manner (see Cybercrime Module 4 on Introduction to Digital Forensics). To achieve this, the tools and techniques used to acquire digital evidence must prevent alterations to the data or when this is not possible, at the very least minimize them ( SWGDE Best Practices for Computer Forensic Acquisitions , 2018). The tools and techniques used should be valid and reliable (NIST, n.d.; SWGDE Recommended Guidelines for Validation Testing , 2014; US National Institute of Justice, 2007b). The limitations of these tools and techniques should be identified and considered before their use (SWGDE Best Practices for Computer Forensic Acquisitions, 2018). The US National Institute of Standards and Technology has a searchable digital forensics tools database with tools with various functionalities (e.g., cloud forensics tools, among others) (for more information on digital forensics tools, see Cybercrime Module 4 on Introduction to Digital Forensics).

What is the collection of evidence?

The actual collection of the evidence involves the preservation of volatile evidence and the powering down of digital devices. The state of operation of the digital devices encountered will dictate the collection procedures. For instance, if a computer is encountered, if the device is on, volatile evidence (e.g., temporary files, register, cache, and network status and connections, to name a few) is preserved before powering down the device and collecting it (Casey, 2011; Sammons, 2012; Maras, 2014; Nelson, Phillips, and Steuart, 2015). If the device is off, then it remains off and is collected (US National Institute of Justice; 2004b; US National Institute of Justice, 2008). There are circumstances where digital devices will not and cannot be collected (e.g., due to size and/or complexity of the systems and/or their hardware and software configurations, because these systems provide critical services) (see Cybercrime Module 4 on Introduction to Digital Forensics). In these situations, volatile and non-volatile data are collected through special procedures that require live acquisition ( SWGDE Capture of Live Systems , 2014). The type of digital device encountered during an investigation will also dictate the manner in which digital evidence is collected (see, for example, SWGDE Best Practices for Mobile Device Evidence Preservation and Acquisition, 2018; SWGDE Best Practices for the Acquisition of Data from Novel Digital Devices; US National Institute of Justice, 2007a).

What is the evidence sought for cybercrime?

The evidence sought will depend on the cybercrime under investigation. If the cybercrime under investigation is identity-related fraud, then digital devices that are seized will be searched for evidence of this crime (e.g., evidence of a fraudulent transactions or fraudulent transactions).

What are the techniques used in cybercrime investigation?

In the identification phase, cybercrime investigators use many traditional investigative techniques (see: UNODC, Policing: Crime Investigation for a detailed analysis of these techniques), especially with respect to information and evidence gathering. For example, victims, witnesses, and suspects of a cybercrime are interviewed to gather information and evidence of the cybercrime under investigation (for guidance on interviewing suspects and adult and children witnesses and victims, see: UNODC, Anti-Human Trafficking Manual for Criminal Justice Practitioners, Module 9; UNODC, Toolkit to Combat Trafficking in Persons; UN Economic and Social Council (ECOSOC) Resolution 2005/20 Guidelines on Justice in Matters involving Child Victims and Witnesses of Crime; UNODC, Justice in Matters involving Child Victims and Witnesses of Crime ; and Boyle and Vullierme, Council of Europe, A brief introduction to investigative interviewing: A practitioner's guide ).

What is evidence preservation?

Evidence preservation seeks to protect digital evidence from modification. The integrity of digital evidence should be maintained in each phase of the handling of digital evidence (ISO/IEC 27037). First responders, investigators, crime scene technicians, and/or digital forensics experts must demonstrate, wherever possible, that digital evidence was not modified during the identification, collection, and acquisition phase; the ability to do so, of course, depends on the digital device (e.g., computer and mobile phones) and circumstances encountered by them (e.g., need to quickly preserve data). To demonstrate this, a chain of custody must be maintained. The chain of custody is "the process by which investigators preserve the crime (or incident) scene and evidence throughout the life cycle of a case. It includes information about who collected the evidence, where and how the evidence was collected, which individuals took possession of the evidence, and when they took possession of it" (Maras, 2014, 377; Cybercrime Module 4 on Introduction to Digital Forensics). In the chain of custody, the names, titles, and contact information of the individuals who identified, collected, and acquired the evidence should be documented, as well as any other individuals the evidence was transferred to, details about the evidence that was transferred, the time and date of transfer, and the purpose of the transfer.

What is data hiding analysis?

Data hiding analysis can also be performed. As the name implies, data hiding analysis searches for hidden data on a system. Criminals use several data-hiding techniques to conceal their illicit activities and identifying information, such as using encryption (discussed in Cybercrime Module 9 on Cybersecurity and Cybercrime Prevention: Practical Applications and Measures as well as Cybercrime Module 10 on Privacy and Data Protection), password-protecting devices and specific content (e.g., files), changing file extensions, and hiding partitions (US National Institute of Justice, 2004b; Casey, 2011; Maras, 2014; Nelson, Phillips, and Steuart, 2015). During the analysis phase, the investigator needs to address the data-hiding techniques that perpetrators could have used to conceal their identities and activities. Hidden data can reveal "knowledge [of a crime], ownership [of content], or intent [to commit a crime]" (US National Institute of Justice, 2004b, p. 17).

What is the answer to the question "where did this crime occur"?

The answers to these questions will provide investigators with guidance on how to proceed with the case. For example, the answer to the question "where did this crime occur?" - that is, within or outside of a country's borders (see Cybercrime Module 3 on Legal Frameworks and Human Rights for information about jurisdictions) - will inform the investigator on how to proceed with the case (e.g., which agencies should be involved and/or contacted).

Why is electronic data important to police?

This variety of data represents a key component of police investigations and a potential source of evidence that could prove critical in supporting the prosecution of different types of crimes. This highlights the importance of not only collecting such digital evidence but also having up-to-date procedures for its proper handling, archival, and maintenance, particularly to ensure its suitability for presentation in court.

What do law enforcement officers use to document crime?

Most law enforcement officers know that they should use a clean sheet of paper, new notebook, or fresh roll of film to document each crime scene to prevent details from other cases commingling with the one at hand. This rule also applies to digital evidence, such as that produced by a sensor. Despite the reusability of some units of storage media, merely erasing them is insufficient; they must be forensically prepared, or wiped. Investigators must not only remove any vestige of the previous contents but also ensure that only known data is written to each sector of the media. Personnel usually accomplish this with software that will overwrite a known character, such as 0 or 1, to the entire device and eliminate all of the previous data. 6 Agencies should be prepared with a mitigation strategy for detectors and sensors that store data internally if they intend to use the readings as digital evidence. If available, a similar device employing removable storage media may be easier to sterilize and would allow the original removable storage media to be archived, if necessary, without the loss of the entire instrument. Alternatively, a digital photograph could be taken of the relevant readings from the device’s screen to document the events, and those digital photographs could be preserved.

What are the instruments used by law enforcement?

Additionally, newer instruments used by law enforcement, such as radiation detectors, radioisotope identification devices (RIID), gas meters, hazardous materials identification systems, and digital bomb X-rays, generate electronic readings and provide the opportunity to export them via a data cable or electronic memory card.

What is digital X-ray?

Often, the digital X-ray is the only record of what a device looked like prior to the rendering of safe operations. If the digital X-rays reside solely on the computer associated with the digital X-ray system, investigators would find it very difficult, if not impossible, to introduce them as evidence at a later date.

How many copies of a CD-ROM should an investigator make?

Investigators should make two copies and ensure that they put on each disk the operator’s name and signature, as well as the date and case number, and then treat each CD-ROM as they would any other item of evidence, establishing a chain of custody and securely storing the media. 3.

Why do police need to store data files?

Due to the inherent time lag between arrest and prosecution, officers should recognize that data files stored for a particular item of equipment may need proprietary software to retrieve and read the display. Prior to a courtroom prosecution, the detector or sensor used to gather the evidence could be replaced with a more current model or one from a different manufacturer. Personnel must retain copies of the proper software unless they have saved the data files in a universal format or exported the results in hard copy format and maintained those results as evidence. If they do not maintain the proprietary software, investigators may not be able to open the archived data files. As a general rule, personnel should store digital evidence in its original, as well as nonproprietary, format to ensure accessibility. 5

Why do agencies use electronic templates?

Some agencies use an electronic template form to provide the incident background information during the reach back process , thereby creating more potential evidence. Due to the critical nature of an incident, many departments use special operations commands to operate the identification devices.

How is digital evidence handled?

Digital evidence is typically handled in one of two ways: The investigators seize and maintain the original evidence (i.e., the disk). This is the typical practice of law enforcement organizations. The original evidence is not seized, and access to collect evidence is available only for a limited duration.

What is digital evidence?

Digital evidence is commonly associated with electronic crime, or e-crime, such as child pornography or credit card fraud. However, digital evidence is now used to prosecute all types of crimes, not just e-crime. For example, suspects’ email or mobile phone files might contain critical evidence regarding their intent, ...

Why do investigators use sifting collectors?

When investigators retain the original evidence, the mitigation is even simpler: Sifting Collectors allows users to collect and analyze disk regions expected to contain evidence. It allows them to acquire evidence quickly and start the case more rapidly, and it potentially reduces case backlogs. If, at any time, users need to analyze other regions, they can go back to the original and collect those regions.

Why is it important to collect information from a computer?

For some cases, such as software piracy, it is important to collect these programs so investigators can understand the computer’s original environment. However, for the vast majority of cases, these regions are not important. For most computer forensic investigations, the evidence lies in the user’s documents, emails, internet history, and any downloaded illicit images.

Why is it important to analyze the original media?

Analyzing the forensic image of the original media. This ensures that the original media are not modified during analysis and helps preserve the probative value of the evidence.

How does more worker nodes affect evidence?

More worker nodes will significantly reduce evidence ingest and processing times. However, there is a limit to the number of worker nodes that can be implemented on a server, even one that is equipped with a state-of-the-art multicore microprocessor.

Can law enforcement use computers to fight crime?

Computers are used to commit crime, but with the burgeoning science of digital evidence forensics, law enforcement can now use computers to fight crime. Digital evidence is information stored or transmitted in binary form that may be relied on in court.

Why is computer forensics important?

Computer forensics is an important mechanism that can ultimately lead to finding out the truth, but only with partnership between investigators and clients. Preserve data, collect forensically-sound digital copies of media, create hash values, and manage chain of custody paperwork to keep your investigation on the right path.

What is imaging a drive?

Imaging a drive is a forensic process in which an analyst creates a bit-for-bit duplicate of a drive. This forensic image of all digital media helps retain evidence for the investigation. When analyzing the image, investigators should keep in mind that even wiped drives can retain important recoverable data to identify and catalogue. In the best cases, they can recover all deleted files using forensic techniques.

Do investigators reveal evidence?

Yet, as our story unravels, investigators inevitably reveal evidence of a crime and submit it to authorities. They can do this when they and the victim avoid evidence destruction, correctly address data integrity, and assure legal defensibility through proper chain of custody documentation.

Can a change of possession record be analyzed?

Any gaps in the possession record, including any time the evidence may have been in an unsecured location are problematic. Investigators may still analyze the information but the results are not likely to hold up in court against a reasonably tech-savvy attorney. Forms that investigators use to clearly and easily document all records of change of possession are easy to find on the Internet; we use the NIST Sample CoCto maintain the chain of custody audit trail.

Is it cheaper to do forensics?

Companies must choose between building out their own forensics team and contracting out any forensics work. It is generally cheaper for medium and large organizations to field their own team as they will likely to run into problems that require forensics/IR frequently enough to make the investment pay off.

Can digital evidence be preserved?

Preserving digital evidence is tricky. Without a skilled analyst and the right software, the evidence could be ruined, and prevent it from being legally admissible. If you have digital evidence you need to preserve, the team at CI Security is ready to assist. Contact ustoday to speak directly with one of our senior forensic consultants.

Is it better to outsource forensics?

Smaller organizations are generally fine without a dedicated team, contracting out any critical forensics/IR work. For those small companies, outsourcing is often better than paying for the tools you need and reallocating already busy employees or paying someone new a full-time salary to do the job . For businesses of any size, it is important for the business to secure the data for forensic analysis, and that’s where many run into trouble.

image

First Things First…

Image
The investigating officer must ensure before handling any electronic evidence that he or she has a right to examine or collect said evidence within the scope of the Fourth Amendment. For example, if the officer is serving a search warrant on a residence, does the search warrant specifically mention electronic storage device…
See more on caseguard.com

Legal Authority

  • Once it has been determined that the investigating officer can legally collect electronic evidence for further examination, it is paramount that the officer follow a few basic rules when doing so. First, the officer will need to take still pictures or a video of the evidence where it was found as questions may arise as to the location of the electronic evidence later in the investigation. It is al…
See more on caseguard.com

Collection and Transport of Electronic Evidence

  • Here are a few simple practices when collecting and transporting electronic evidence can save investigating officers future headaches if implemented correctly. All cables and cords must be disconnected and kept with their respective device. It is best practice to store each individual piece of electronic evidence (i.e. desktop computer, laptop comp...
See more on caseguard.com

Conclusions

  • Electronic devices as evidence have become so ubiquitous in our lives that most jobs, (including being an effective law enforcement officer) can’t be done without them. From mail fraud to murder and everything in between, nearly every single crime committed will have an electronic device involved that can be utilized by law enforcement to develop or further a case against a su…
See more on caseguard.com

Identification

  • In the identification phase, preliminary information is obtained about the cybercrime case prior to collecting digital evidence. This preliminary information is similar to that which is sought during a traditional criminal investigation. The investigator seeks to answer the following questions: 1. Who was involved? 2. What happened? 3. When did the cybercrime occur? 4. Where did the cybe…
See more on unodc.org

Collection

  • With respect to cybercrime, the crime scene is not limited to the physical location of digital devices used in the commissions of the cybercrime and/or that were the target of the cybercrime. The cybercrime crime scene also includes the digital devices that potentially hold digital evidence, and spans multiple digital devices, systems, and servers. The crime scene is secured when a cy…
See more on unodc.org

Acquisition

  • Different approaches to performing acquisition exist. The approach taken depends on the type of digital device. For example, the procedure for acquiring evidence from a computer hard drive is different from the procedure required to obtain digital evidence from mobile devices, such as smartphones. Unless live acquisition is performed, evidence is extracted from the seized digital …
See more on unodc.org

Preservation

  • Evidence preservation seeks to protect digital evidence from modification. The integrity of digital evidence should be maintained in each phase of the handling of digital evidence (ISO/IEC 27037). First responders, investigators, crime scene technicians, and/or digital forensics experts must demonstrate, wherever possible, that digital evidence was not modified during the identification…
See more on unodc.org

Analysis and Reporting

  • In addition to the handling of digital evidence, the digital forensics process also involves the examination and interpretation of digital evidence ( analysis phase), and the communication of the findings of the analysis ( reporting phase). During the analysis phase, digital evidence is extracted from the device, data is analysed, and events are re...
See more on unodc.org

1.How To Easily Handle Digital Evidence - FotoWare

Url:https://www.fotoware.com/blog/how-to-easily-handle-digital-evidence

29 hours ago  · How Do You Handle Digital Evidence? The device must be documented in its condition. Make sure forensic experts are involved… Make sure your custody chain is clear. …

2.Handling Digital Evidence: Data Protection & Legal …

Url:https://study.com/academy/lesson/handling-digital-evidence-data-protection-legal-requirements.html

6 hours ago How To Easily Handle Digital Evidence Get your files from A to Z. You've hopefully read our eBook on Digital Evidence Management for Police; FotoWare was born... Keeping order. Being able to …

3.Cybercrime Module 6 Key Issues: Handling of Digital …

Url:https://www.unodc.org/e4j/en/cybercrime/module-6/key-issues/handling-of-digital-evidence.html

1 hours ago  · As a general rule, personnel should store digital evidence in its original, as well as nonproprietary, format to ensure accessibility. 5. Most law enforcement officers know that they …

4.Digital Evidence — LEB - FBI: Law Enforcement Bulletin

Url:https://leb.fbi.gov/articles/featured-articles/digital-evidence

18 hours ago  · Digital evidence is typically handled in one of two ways: The investigators seize and maintain the original evidence (i.e., the disk). This is the typical practice of law …

5.New Approaches to Digital Evidence Acquisition and …

Url:https://nij.ojp.gov/topics/articles/new-approaches-digital-evidence-acquisition-and-analysis

24 hours ago  · Principle 2: In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the …

6.3 Methods to Preserve Digital Evidence for Computer …

Url:https://www.criticalinsight.com/resources/news/article/3-methods-to-preserve-digital-evidence-for-computer-forensics/

33 hours ago 1. Drive Imaging. Before investigators can begin analyzing evidence from a source, they need to image it first. Imaging a drive is a forensic process in which an analyst creates a bit-for-bit …

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9