Skip to main content

Chain of Custody – Digital Forensics

 

Chain of Custody – Digital Forensics

Chain of Custody refers to the logical sequence that records the sequence of custody, control, transfer, analysis and disposition of physical or electronic evidence in legal cases. Each step in the chain is essential as if broke, the evidence may be rendered inadmissible. Thus we can say that preserving the chain of custody is about following the correct and consistent procedure and hence ensuring the quality of evidence.

The chain of custody in digital cyber forensics is also known as the paper trail or forensic link, or chronological documentation of the evidence.

·        Chain of custody indicates the collection, sequence of control, transfer and analysis.

·        It also documents details of each person who handled the evidence, date and time it was collected or transferred, and the purpose of the transfer.

·        It demonstrates trust to the courts and to the client that the evidence has not tampered.

Digital evidence is acquired from the myriad of devices like a vast number of IoT devices, audio evidence, video recordings, images, and other data stored on hard drives, flash drives, and other physical media.

 

Importance of maintaining Chain of Custody?

Importance to Examiner:

·        To preserve the integrity of the evidence.

·        To prevent the evidence from contamination, which can alter the state of the evidence.

·        In case you obtained metadata for a piece of evidence but unable to extract any meaningful information from the metadata. In such a case, the chain of custody helps to show where possible evidence might lie, where it came from, who created it, and the type of equipment used. This will help you to generate an exemplar and compare it to the evidence to confirm the evidence properties.

Importance to the Court: If not preserved, the evidence submitted in the court might be challenged and ruled inadmissible.

 

Chain of Custody Process

In order to preserve digital evidence, the chain of custody should span from the first step of data collection to examination, analysis, reporting, and the time of presentation to the Courts. This is very important to avoid the possibility of any suggestion that the evidence has been compromised in any way.

 

 

 



Let’s discuss each stage of the chain of custody in detail:

1.    Data Collection: This is where chain of custody process is initiated. It involves identification, labeling, recording, and the acquisition of data from all the possible relevant sources that preserve the integrity of the data and evidence collected.

2.    Examination: During this process, the chain of custody information is documented outlining the forensic process undertaken. It is important to capture screenshots throughout the process to show the tasks that are completed and the evidence uncovered.

3.    Analysis: This stage is the result of the examination stage. In the Analysis stage, legally justifiable methods and techniques are used to derive useful information to address questions posed in the particular case.

4.    Reporting: This is the documentation phase of the Examination and Analysis stage. Reporting includes the following:

·        Statement regarding Chain of Custody.

·        Explanation of the various tools used.

·        A description of the analysis of various data sources.

·        Issues identified.

·        Vulnerabilities identified.

·        Recommendation for additional forensics measures that can be taken.

 

 

The Chain of Custody Form

In order to prove a chain of custody, you’ll need a form that lists out the details of how the evidence was handled every step of the way. The form should answer the following questions:

·        What is the evidence?: For example- digital information includes the filename, md5 hash, and Hardware information includes serial number, asset ID, hostname, photos, description.

·        How did you get it?: For example- Bagged, tagged or pulled from the desktop.

·        When it was collected?: Date, Time

·        Who has handle it?

·        Why did that person handled it?

·        Where was it stored?: This includes the information about the physical location in which proof is stored or information of the storage used to store the forensic image.

·        How you transported it?: For example- in a sealed static-free bag, or in a secure storage container.

·        How it was tracked?

·        How it was stored?: For example- in a secure storage container.

·        Who has access to the evidence?: This involves developing a check-in/ check-out process.

The CoC form must be kept up-to-date. This means every time the best evidence is handled off, the chain of custody form needs to be updated.

 

Procedure to establish the Chain of Custody

In order to assure the authenticity of the chain of custody, a series of steps must be followed. It is important to note that the more information Forensic expert obtains concerning the evidence, the more authentic is the created chain of custody. You should ensure that the following procedure is followed according to the chain of custody for electronic devices:

·        Save the original material

·        Take photos of the physical evidence

·        Take screenshots of the digital evidence.

·        Document date, time, and any other information on the receipt of the evidence.

·        Inject a bit-for-bit clone of digital evidence content into forensic computers.

·        Perform a hash test analysis to authenticate the working clone.

 

 

How can the Chain of Custody be assured?

A couple of considerations are involved when dealing with digital evidence and Chain of Custody. We shall discuss the most common and globally accepted and practiced best practices.

1.    Never ever work with the Original Evidence: The biggest consideration that needs to be taken care of while dealing with digital evidence is that the forensic expert has to make a full copy of the evidence for forensic analysis. This cannot be overlooked as when errors are made to working copies or comparisons need to be done, then, in that case, we need an original copy.

2.    Ensuring storage media is sterilized: It is important to ensure that the examiner’s storage device is forensically clean when acquiring the evidence. Suppose if the examiner’s storage media is infected with malware, in that case, malware can escape into the machine being examined and all of the evidence will eventually get compromised.

3.    Document any extra scope: During the process of examination, it is important to

  1. document all such information that is beyond the scope of current legal authority and later brought to the attention of the case agent. A comprehensive report must contain following sections:
    1. Identity of the reporting agency.
    2. Case identifier.
    3. Case investigator.
    4. Identity of the submitter.
    5. Date of receipt.
    6. Date of report.
    7. Descriptive list of items submitted for examination: This includes the serial number, make, and model.
    8. Identity and signature of the examiner
    9. Brief description of steps taken during the examination: For example- string searches, graphics image searches, and recovering erased files.
    10. Results.
  2. Consider the safety of the personnel at the scene: It is very important to ensure that the crime scene is fully secure before and during the search. In some cases, the examiner may only be able to do the following while onsite:
    1. Identify the number and type of computers.
    2. Interview the system administrator and users.
    3. Identify and document the types and volume of media: This includes removable media also.
    4. Determine if a network is present.
    5. Document the information about the location from which the media was removed.
    6. Identify offsite storage areas and/or remote computing locations.
    7. Identify proprietary software.
    8. Determine the operating system in question.

 

The Digital evidence and Digital Chain of Custody are the backbones of any action taken by digital forensic specialists. In this article, we have examined the seriousness of the digital evidence and what it entails and how slight tampering with the digital evidence can change the course of the forensic expert’s investigation.


SAMPLE 

 

 

  
EVIDENCE CHAIN OF CUSTODY TRACKING FORM

 

 

Case Number: ________________________ Offense: ______________________________

Submitting Officer: (Name/ID#) _______________________________________________

Victim: ______________________________________________________________________

Suspect: _____________________________________________________________________

Date/Time Seized: __________________Location of Seizure: ______________________

 

 

Description of Evidence

Item #

Quantity

Description of Item (Model, Serial #, Condition, Marks, Scratches)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Chain of Custody

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

APD_Form_#PE003_v.1 (12/2012)                                                                                               Page 1 of 2 pages (See back)


 

EVIDENCE CHAIN-OF-CUSTODY TRACKING FORM
(Continued)

 

Chain of Custody

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Final Disposal Authority

Authorization for Disposal

Item(s) #: __________ on this document pertaining to (suspect): ____________________________________________
is(are) no longer needed as evidence and is/are authorized for disposal by (check appropriate disposal method)
 Return to Owner           Auction/Destroy/Divert
Name & ID# of Authorizing Officer: ____________________________ Signature: ______________________Date: _______________

 

Witness to Destruction of Evidence

Item(s) #: __________ on this document were destroyed by Evidence Custodian ___________________________ID#:______
in my presence on (date) __________________________.

Name & ID# of Witness to destruction: ________________________ Signature: ______________________Date: _______________

 

Release to Lawful Owner


Item(s) #: __________ on this document was/were released by Evidence Custodian ________________________ID#:_________ to
Name _____________________________________________________________________________
Address: ________________________________________________ City: ____________________State: _______ Zip Code: __________
Telephone Number: (_____) ___________________________________
Under penalty of law, I certify that I am the lawful owner of the above item(s).


Signature: _______________________________________________________ Date: __________________________

Copy of Government-issued photo identification is attached. 
 Yes   No

This Evidence Chain-of-Custody form is to be retained as a permanent record by the Anywhere Police Department.

 

 

APD_Form_#PE003_v.1 (12/2012)                                                                                               Page 2 of 2 pages (See front)

 

Comments

Popular posts from this blog

Part 1.3 :Disk Analysis, Autopsy & Redline

  Disk Analysis, Autopsy & Redline Autopsy: Autopsy  gives you the option to acquire data from both live systems or from a disk image. After adding your data source, navigate to the location of the files you want to extract, then right-click and select the Extract File(s) option. It will look similar to what you see in the screenshot below How to start Digital forensics Investigations with Autopsy 1.       Download Autopsy 2.       Download Hxd 3.       Download md5sum 4.       Download dd.exe 5.       Create disk image using dd.exe PS C:\Users\ME\Desktop\Tool\tools source> .\dd.exe if=\\.\e: of=c:\users\me\desktop\cases\image.dd bs=1M –-progress 6.       Create hash for image using md5sum or hasher PS C:\Users\ME\Desktop\Tool\tools source> .\md5sums.exe c:\users\me\desktop\cases\image2.dd  ...

Part 1.2: Memory Analysis

  Part 1.2: Memory Analysis  Investigating Malware Using Memory Forensics   Memory forensics is a technique used in digital forensics that involves the analysis of a computer's volatile memory (RAM) to obtain information about running processes, open network connections, system configurations, and other valuable data. This technique is particularly useful in investigating malware, as malware often tries to hide its presence on a system, making it difficult to detect using traditional methods. When investigating malware using memory forensics, there are several steps to follow: 1.       Acquisition: The first step is to acquire the volatile memory from the infected system. This can be done using tools such as FTK Imager or Volatility. 2.       Analysis: Once the memory has been acquired, it is time to analyze it. This involves examining the memory for suspicious processes, network connections, and other indicato...

Step1: Identification & Preparation

Step 1:Identification and preparation Identification involves recognizing and documenting potential digital evidence, which includes identifying devices, storage media, and files that may contain relevant information. This step often involves creating a forensic image of the storage media to preserve the data for analysis. Preparation involves ensuring that the digital evidence is collected and handled properly to maintain its integrity and admissibility in court. This includes using proper tools and techniques to collect and preserve the data, documenting the chain of custody, and ensuring that the evidence is not altered or destroyed during the collection process . Both identification and preparation are critical to the success of a digital forensic investigation, as they lay the foundation for the analysis and interpretation of the data. 1.  Identification &   Preparation : The first step is to identify the scope of the investigation and create a plan for the investi...