Digital or Electronic Evidence is any information and data to investigate value that is stored on or transmitted by an electronic device. Equipment and software are required to make the evidence visible, testimony may be required to explain the examination process and any process limitations. Electronic Evidence is accepted as physical evidence, and by its nature is fragile. It can be altered, damaged, or destroyed by improper handling or improper examination. Thus, special precautions must be taken to document, collect, preserve, and examine this type of evidence. Methods taken to collect evidence must preserve the integrity of evidence.
The Scientific Working Group on Digital Evidence SWGDE (www.swdge.org) and The International Organisation on Computer Evidence IOCE (www.ioce.org) has set standards for recovering, preserving and examining digital evidence.
General tasks that the investigator must perform while working with digital evidence can be as follows –
- Identify digital information or artefacts that can be used as evidence.
- Collect, preserve, and document evidence.
- Analyze, identify, and organize evidence.
- Rebuild evidence or repeat a situation to verify that the results can be reported reliably.
- Properly follow procedures for packing, transportation, and storage of electronic evidence.
Computer records must also be shown to be authentic and trustworthy to be admitted into evidence. Computer-generated records are considered authentic if the program that created the output is functioning correctly. To show that computer-stored records are authentic, the person offering the records must demonstrate that a person created the data and the data is reliable and that it wasn’t altered when it was acquired or afterward.
Collecting evidence according to the proper steps of evidence control helps ensure that the computer evidence is authentic, as does using established computer forensics software tools. Courts have consistently ruled that computer forensics investigators don’t have to be subject matter experts on the tools they use. Knowledge of only facts relevant to the case is required. To testify the investigator’s role in acquiring, preserving, and analyzing evidence, the investigator doesn’t need to know the inner workings of the software used but should understand the purpose and operations.
For example –
Message Digest 5 (MD5) and Secure Hash Algorithm (SHA-1) tools use complex algorithms. During cross-examination, an opposing attorney might ask you to describe how these forensics tools work. You can safely testify that you don’t know how the MD5 hashing algorithm works, but you should know how to describe the steps for using the MD5 function in AccessData Forensic Toolkit, for instance.
- Examining Git
- Different Types of Digital Marketing
- Digital Data storage in DNA
- Understanding Digital Rights Management
- Cybersecurity Challenges In Digital Marketing - Take These Steps To Overcome
- Digital Smell Technology- An Underrated Technology
- Top 5 Artificial Intelligence(AI) Predictions in 2020
- Biometric System Architecture
- Difference between Search Engine and Web Browser
- Building App For Google Assistant Without Any Coding
- Data Science Project Scope and Its Elements
- How to Learn Programming?
- The Technical Scripter Event 2019 By GeeksforGeeks
- What is the Role of Fuzzy Logic in Algorithmic Trading?
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.