As a result, in its guide for victims of copyright and trademark infringement (Royal Canadian Mounted Police, 2008b), RCMP instructs evidence handle to keep it under lock and key, and to maintain chain of custody – document all handling and movement of the exhibit, including date and signature of the individual handling the evidence. Furthermore, chain of custody has to be maintained (recorded and traced) from the initial evidence acquisition to the presentation in the court of law.
The importance to maintain the chain of custody is relevant not only to criminal cases. For example, a decision to dismiss an employee for violating corporate policy could end up in the court as a non criminal case. The employee could file a “wrongful dismissal” suit against the employer and the collected digital data could become a critical evidence. If a defence alleges that the digital evidence has been altered or could have been altered, it is up to the prosecution to prove otherwise (Douglas Schweitzer, 2003).
In many cases, the traditional methods of handling digital data are not sufficient to ensure admissibility of the digital evidence in the court of law. For example, standard file copying technique, such as using copy or cp commands, could alter access time of the original file therefore impacting the authenticity of a potential evidence. Furthermore, simply “pulling the plug” (as a way to preserve the data on the non-volatile storage) approach could result in a loss of a vast amount of volatile data such as encryption keys and “hacking tools and malicious software that may exist solely within memory” (Association of Chief Police Officers, 2008).
Bibliography
- Association of Chief Police Officers (2008), Good Practice
Guide for Computer-Based Electronic Evidence [online]. 7Safe.
Available from:
http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence_v4_web.pdf
(accessed: June 9, 2011).
- Dictionary.com (n.d.), "chain of custody" in
Dictionary.com's 21st Century Lexicon [online]. Available from:
http://dictionary.reference.com/browse/chain
of custody (accessed: June 09, 2011).
- Douglas Schweitzer (2003), “Incident Response: Computer
Forensics Toolkit”, Wiley Publishing, Inc., p61.
- Royal Canadian Mounted Police (2008a), Computer Forensics:
A Guide for IT Security Incident Responders [online]. Technical
Security Branch Technical Operations, Royal Canadian Mounted Police.
Available from:
http://www.rcmp-grc.gc.ca/ts-st/pubs/it-ti-sec/g2-008-eng.pdf
(accessed: June 9, 2011)
- Royal Canadian Mounted Police (2008b). A Guide for Victims
of Copyright and Trademark Infringement [online]. Available
from: http://www.rcmp-grc.gc.ca/fep-pelf/ipr-dpi/guide-eng.htm
(accessed: June 9, 2011).
No comments:
Post a Comment