Concurrent Session VI: 6.03 Digital Evidence Handling: Chain of Custody - PowerPoint PPT Presentation

Concurrent Session VI: 6.03 Digital Evidence Handling: Chain of Custody
Description:
Court-ordered or government sanctioned hacking for the purpose of obtaining . Everything is fresh in your mind. All notes and documentation is organized . – PowerPoint PPT presentation
Number of Views:76
Avg rating: 3.0/5.0
Slides: 13
Provided by: ehc6
Category:
Tags: chain | concurrent | custody | digital | evidence | hack | handling | mind | session | the
Transcript and Presenter's Notes
 Title: Concurrent Session VI: 6.03 Digital Evidence Handling: Chain of Custody
  - September 26, 2006
- 245pm-345pm
- Jody S. Hawkins, ISO, Childrens Medical Center 
 Dallas
  - Electronic Discovery (also called e-discovery 
 or ediscovery) refers to any process in which
 electronic data is sought, located, secured, and
 searched with the intent of using it as evidence
 in a civil or criminal legal case. E-discovery
 can be carried out offline on a particular
 computer or it can be done in a network.
 Court-ordered or government sanctioned hacking
 for the purpose of obtaining critical evidence is
 also a type of e-discovery.
- Chain of Custody The "chain of custody" is a 
 concept in jurisprudence which applies to the
 handling of evidence and its integrity.
- "Chain of custody" also refers to the document or 
 paper trail showing the seizure, custody,
 control, transfer, analysis, and disposition of
 physical and electronic evidence.
- Because evidence can be used in court to convict 
 persons of crimes, it must be handled in a
 scrupulously careful manner to avoid later
 allegations of tampering or misconduct which can
 compromise the case of the prosecution toward
 acquittal or to overturning a guilty verdict upon
 appeal.
  - This presentation will cover investigative 
 procedures dealing with electronic files
 contained on a single hard drive
- These procedures would need to be followed for 
 each separate hard drive containing digital
 evidence
  - Securing Electronic Data
- Establishing a Chain of Custody
- Best Evidence vs. Working Copies
- Securing Electronic Evidence
- Transfer of Electronic Evidence
- Storage of Electronic Evidence
- Affidavit of Electronic Evidence
  - Copy entire hard disk
- Best to use Forensic Tools
- Must perform md5 or similar hash on all copies
- There are tools available that can copy multiple 
 disks at 3gig/minute while performing an md5
 checksum of the entire disk
- Very detailed information should be maintained
- Workstation, Server, Smart Phone?
- Make, Model, Serial Number?
- Physical and Virtual Location?
- MAC Address?
  - Field notes are invaluable
- Date and Time references
- Thorough, legible, notes describing all actions
- Secure one copy of data to be a best evidence 
 copy
- Never use the best evidence copy to perform 
 digital forensic examination
- Always annotate all actions pertaining to the 
 best evidence copy
- Transfer of custodianship
- Checksum copy made for forensic analysis
- Location change
- Formal reports should not cause conflicts with 
 the chain of custody
- Accurate timelines
- Same make, model, serial, etc. annotated in both 
 reports
  - There is only one best evidence copy of the 
 data
- Always use the best evidence copy to make working 
 copies
- Working copies should be checksum validated 
 against best evidence copy that has been checksum
 validated against original data
- Never make a working copy from a working copy
- You can have as many working copies as needed
- All should be validated from the best evidence 
 copy
  - Working from the working copy
- Forensic analysis software is extremely useful
- Computer Cops Forensic Examiner and EnCases 
 EnCase Forensic are both good tools
- Fill out all pertinent information prior to 
 performing the analysis
- Both tools give you exceptional ways to secure 
 evidence while performing md5 checksum
 verification on the files you commit to evidence
- These checksums can then be verified to the 
 original verification performed on the original
 data
- Document every action performed and keep 
 exceptional notes
- The evidence obtained can be kept separately 
 however, these evidence files are simply
 pointers to the best evidence copy and, thus,
 the original data
  - Once you have your evidence files documented, you 
 should treat these with the same care as the best
 evidence copy of your seized data
- The discovered, separated, and validated evidence 
 files can be maintained separately from the best
 evidence copy, but an inventory of the evidence
 files should be kept with the best evidence copy
- Since the evidence files are ultimately 
 maintained on the best evidence copy, you can
 establish a single chain of custody for the best
 evidence copy and all evidence files or you may
 wish establish separate chains of custody for
 each evidence item. This will depend on the
 individual case
- For all transfers of custodianship of any item 
 (best evidence copy, evidence files) you should
 have a form or receipt that shows the transfer
 and you must keep all transfers documented
- If it is discovered that someone had the data in 
 their possession that is not documented in the
 chain of custody then is can be argued that that
 data can no longer be trusted
  - Since the best evidence copy contains all the 
 digital evidence, we will talk about these items
 as one. If you have separate copies of each
 piece of digital evidence then I would store them
 the same
- Anti-Static pouches/bags
- Hard Drives are shipped in Anti-Static bags so if 
 you keep these bags then you will not need to
 purchase more
- If you need to purchase, they run around 53.00 
 per 1000
- You may wish to purchase bags due to labeling, 
 etc. however, this is merely for storage
 purposes
- Sometimes data and digital evidence may sit for 
 several months or years before needing to be used
- Exceptional documentation is a must
  - I would suggest completing an affidavit of the 
 evidence as quickly as possible
- Everything is fresh in your mind
- All notes and documentation is organized
- If the evidence is ever needed you should pull 
 the original affidavit from the case file, review
 your affidavit, and then have the affidavit
 notarized
- A lot of times well documented descriptions of 
 evidence files accompanied by copies of the
 evidence files (even hard copies) along with your
 affidavit swearing that all evidence files are
 accurate is enough in a court of law
- You may not be asked to produce the original 
 best evidence copy as long as everything is
 documented
- You can make a checksum verified copy for legal 
 to review
