Evidence Handling
Evidence Handling
• WHAT IS EVIDENCE?
During an investigation of a computer security incident, you may be
unsure whether an item (such as a hard disk) should be marked as
evidence or merely be an attachment to an investigative report.
• We can define evidence as any information of probative value,
meaning it proves something or helps prove something relevant to
the case. It is safest to treat any information of probative value that
you obtain during an investigation as evidence.
• Therefore, any document, electronic media, electronic files, printouts,
or other objects obtained during an investigation that may assist you
in proving your case should be treated as evidence and handled
according to your organization’s evidence-handling procedures.
Original Evidence
• For our purposes, we define original evidence as the original copy of the evidence
media provided by a client/victim. We define best evidence as the original
duplication of the evidence media, or the duplication most closely linked to the
original evidence.
• The evidence custodian should store either the best evidence or the original
evidence for every investigation in the evidence safe.
• THE CHALLENGES OF EVIDENCE HANDLING
One of the most common mistakes made by computer security professionals is
failure to adequately document when responding to a computer security
incident.
• Critical data might not ever be collected, the data may be lost, or the data’s
origins and meaning may become unknown. Added to the technical complexity of
evidence collection is the fact that the properly retrieved evidence requires a
paper trail.
• Such documentation is seemingly against the natural instincts of the technically
savvy individuals who often investigate computer security incidents.
• The biggest challenges to evidence handling are that the evidence collected
must be authenticated at a judicial proceeding and the chain-of-custody for
the evidence must be maintained. You also must be able to validate your
evidence.
• Authentication of Evidence
The FRE, as well as the laws of many state jurisdictions, define computer
data as “writings and recordings.” Documents and recorded material must
be authenticated before they may be introduced into evidence.
• Initial disposition occurs when the final investigative report has been
completed and the analysis, for all practical purposes, is finished. In other
words, the forensic expert or the investigator has no outstanding tasks that
require the best evidence.
• All media that contained working copies of the evidence should be
returned to the evidence custodian to be wiped clean and placed back into
the rotation as a clean storage drive. The evidence custodian disposes of
the best evidence, but not the tape backup of the best evidence.
• We adhere to a final disposition of evidence occurring five years from the
date a case was initially opened, unless otherwise directed by law, the
court, or some deciding body.