Information stored or transmitted in binary form that may be relied on in court
Digital evidence
E-mails
Digital photographs
ATM transaction logs
Word processing documents
Spreadsheets
Instant message histories
Internet browser histories
Files saved from accounting programs
Databases
Contents of computer memory
Computer backups
Computer printouts
Global Positioning System tracks
Logs from a hotel's electronic door locks
Digital video or audio files
Where digital evidence is found
Hard drives
Floppy drives
Zip disks
Jaz disks
Flash memory cards
Magnetic tapes
Cellular telephones
Personal Data Assistants (PDA)
Any memory developedforthe storage of electronic data or information
Types of potential digital evidence
Pictures
Videos
Files stored locally or on media card (Digital/Video Camera)
Text messages
Call logs
Applications used
Social media accounts (Cell Phone)
Everything from all categories
Social media accounts
Internet search history
Documents
Email (non-web based) (Computer/Laptop)
Applications used
Social media accounts (Mobile Device)
Pictures
Videos
Documents (Game Consoles)
Hard drive, thumb drive, optical media (File Storage)
Interactive Guide (Internet of Things (IoT))
Location
Apps used (Wearables)
Rules of evidence
Admissible
Authentic
Complete
Reliable
Believable
Admissible
The evidence must be preserved and gathered in such a way that it can be used in court or elsewhere
Authentic
The evidence must be tied to the incident in a relevant way to prove something. The forensic examiner must be accountable for the origin of the evidence.
Complete
When evidence is presented, it must be clear and complete and should reflect the whole story. It is not enough to collect evidence that just shows one perspective of the incident.
Reliable
Evidence collected from the device must be reliable. This depends on the tools and methodology used. The techniques used and evidence collected must not cast doubt on the authenticity of the evidence.
Believable
A forensic examiner must be able to explain, with clarity and conciseness, what processes they used and the way the integrity of the evidence was preserved. The evidence presented by the examiner must be clear, easy to understand, and believable by the jury.
Search
A process conducted by authorized agents of the law going through part or all of an individual's property, looking for specific items that are related to a crime that they have reason to believe has been committed.
Seizure
Officers take possession of items during the search.
Search and seizure is a procedure used in many civil law and common law legal systems by which police or other authorities and their agents, who, suspecting that a crime has been committed, commence a search of a person's property and confiscate any relevant evidence found in connection to the crime.
Section 2, Article III of the 1987 Constitution mandates that search and seizure must be carried out through or on the strength of a judicial warrant predicated upon the existence of a probable cause, absent which, such search and seizure becomes "unreasonable" within the meaning of the said constitutional provision.
Best practices for search and seizure of digital evidence
Identify and document all relevant digital devices, protect from tampering or data integrity breach, create image or clone of original hard drive
Photographing the digital scene
Capture photos of the computer/device, cords/cables, remote controls, keyboards, mice, other components, physical evidence around the computer/device, evidence labels
Documenting the digital scene
Create digital photos and logs of the entire process
Collecting and packaging digital evidence
Document the evidence-collection process, collect only what's necessary, package and label digital evidence properly and securely
Maintaining chain of custody for digital evidence
Document the chronological transfer of possession of evidence from one person or entity to another
Handling digital evidence
1. Document handling processes related to seizure and storage
2. Maintain physical control over all evidence at all times
3. Clearly document each stage in which possession changes
4. Ensure headroom exists for additional data without compromising evidence integrity
5. Maintain strict security protocols for access and storage locations
6. Never alter original documents
Information
Processed, organized and structured data that provides context for data and enables decision making
Data
Collection of raw, unorganized facts and details like text, observations, figures, symbols, and descriptions of things
Data does not carry any specific purpose and has no significance by itself</b>
Data is measured in terms of bits and bytes– which are the basic units of information in the context of computer storage and processing
Information states
Processing, storage, transmission
Transmission
Sending information or data from one place to another
Storage
Process through which digital data is saved within a data storage device by means of computing technology
Processing
Manipulation or transformation of letters, numbers or graphic symbols that constitute data
Data at rest
Data that is stored or archived in physical or electronic storage devices
Vulnerabilities of data at rest
Devices containing unexpected data being lost or stolen
Storing data in the cloud or on shared workstations without proper protection
Best practices to protect data at rest
Encrypt all drives and store selected files and folders in encrypted containers
Use access controls and authentication mechanisms to restrict unauthorized access
Store backups in secure locations to prevent data loss
Data in use
Data that is actively being accessed or manipulated by users or applications
Vulnerabilities of data in use
Data is generally unencrypted and easily accessible
Best practices to protect data in use
Utilize robust user authentication measures
Implement protection techniques to protect sensitive data during processing
Regularly monitor and audit data access to identify potential security breaches
Data in transit
Data that is in motion between different locations or networks
Vulnerabilities of data in transit
Increased risks of exposure to third parties that may compromise sensitive information
Best practices to protect data in transit
Use secure communication protocols like HTTPS or VPNs to encrypt data during transmission
Implement email encryption to protect sensitive information in transit
Consider using secure file transfer methods to maintain data confidentiality
Security services
Services provided by a protocol layer to ensure adequate security of systems or data transfers