Chain of Custody refers to the logical sequence that records the sequence of custody, control, transfer, analysis and disposition of physical or electronic evidence in legal cases. Each step in the chain is essential as if broke, the evidence may be rendered inadmissible. Thus we can say that preserving the chain of custody is about following the correct and consistent procedure and hence ensuring the quality of evidence. Show
Let’s get started with each section in detail. What the Chain of Custody entails in Digital Cyber Forensics?If you are in the field of Cyber Security, you will
be at one point in your career will be involved in Digital Forensics. One of the concepts that is most essential in Digital Forensics is the Chain of Custody.
Digital evidence is acquired from the myriad of devices like a vast number of IoT devices, audio evidence, video recordings, images, and other data stored on hard drives, flash drives, and other physical media. Importance of maintaining Chain of Custody?Importance to Examiner:
Importance to the Court: If not preserved, the evidence submitted in the court might be challenged and ruled inadmissible. Chain of Custody ProcessIn order to preserve digital evidence, the chain of custody should span from the first step of data collection to examination, analysis, reporting, and the time of presentation to the Courts. This is very important to avoid the possibility of any suggestion that the evidence has been compromised in any way. Let’s discuss each stage of the chain of custody in detail:
The Chain of Custody FormIn order to prove a chain of custody, you’ll need a form that lists out the details of how the evidence was handled every step of the way. The form should answer the following questions:
The CoC form must be kept up-to-date. This means every time the best evidence is handled off, the chain of custody form needs to be updated. Procedure to establish the Chain of CustodyIn order to assure the authenticity of the chain of custody, a series of steps must be followed. It is important to note that the more information Forensic expert obtains concerning the evidence, the more authentic is the created chain of custody. You should ensure that the following procedure is followed according to the chain of custody for electronic devices:
How can the Chain of Custody be assured?A couple of considerations are involved when dealing with digital evidence and Chain of Custody. We shall discuss the most common and globally accepted and practiced best practices.
The Digital evidence and Digital Chain of Custody are the backbones of any action taken by digital forensic specialists. In this article, we have examined the seriousness of the digital evidence and what it entails and how slight tampering with the digital evidence can change the course of the forensic expert’s investigation. References: – https://en.wikipedia.org/wiki/Chain_of_custody What is the term for tracking evidence in an investigation?Trace Evidence Analysis is the discipline of forensic science that deals with the minute transfers of materials that cannot be seen with the unaided eye.
What methods are used in gathering trace evidence?Trace examiners use tools such as tweezers, tape, specialized vacuums, swabs, alternate light sources, and lasers to find and collect trace evidence. Following the principles of proper crime scene investigation, the collected materials are packaged, documented and sent to a crime laboratory for analysis.
What are the methods that would be needed to preserve the evidence?The five steps recommended by the Federal Bureau of Investigation for collecting and preserving evidence are (1) obtaining it legally; (2) describing the evidence in detailed notes; (3) identifying it accurately and positively; (4) packaging it properly for identification, storage, or shipment to the laboratory; and (5 ...
What is the purpose of an evidence log?The Evidence Log is used to document and provide a written record of each item of evidence collected during an investigation.
|