Digital Evidence
Digital Evidence
Evidence
Introduction to Digital Evidence
Digital
devices
are
everywhere
in
todays
world,
helping
people
communicate
locally
and
globally
with
ease.
Most
people
immediately
think
of
computers,
cell
phones
and
the
Internet
as
the
only
sources
for
digital
evidence,
but
any
piece
of
technology
that
processes
information
can
be
used
in
a
criminal
way.
For
example,
hand-held
games
can
carry
encoded
messages
between
criminals
and
even
newer
household
appliances,
such
as
a
refrigerator
with
a
built-in
TV,
could
be
used
to
store,
view
and
share
illegal
images.
The
important
thing
to
know
is
that
responders
need
to
be
able
to
recognize
and
properly
seize
potential
digital
evidence.
There
are
many
sources
of
digital
evidence,
but
for
the
purposes
of
this
publication,
the
topic
is
divided
into
three
major
forensic
categories
of
devices
where
evidence
can
be
found:
Internet-based,
stand-alone
computers
or
devices,
and
mobile
devices.
These
areas
tend
to
have
different
evidence-gathering
processes,
tools
and
concerns,
and
different
types
of
crimes
tend
to
lend
themselves
to
one
device
or
the
other.
[1]
E LECTRONIC
C SI,
A
G UIDE
F OR
F IRST
R ESPONDERS ,
2 ND
E DITION ,
National
Institute
of
Justice,
April
2008
The Principles of Digital Evidence
Information
that
is
stored
electronically
is
said
to
be
digital
because
it
has
been
broken
down
into
digits;
binary
units
of
ones
(1)
and
zeros
(0),
that
are
saved
and
retrieved
using
a
set
of
instructions
called
software
or
code.
Any
kind
of
informationphotographs,
words,
spreadsheetscan
be
created
and
saved
using
these
types
of
instructions.
Finding
and
exploiting
evidence
saved
in
this
way
is
a
growing
area
of
forensics
and
constantly
changes
as
the
technology
evolves.
Internet:
The
launch
of
the
Internet
or
World
Wide
Web
in
the
mid
1990s
truly
ushered
in
the
age
of
access.
For
the
first
time,
individuals
outside
the
academic
world
could
use
it
to
connect
with
others
(and
their
computers)
in
a
brand
new
way.
The
Internet
opened
up
access
to
a
world
of
information
and
resources,
but
also
provided
a
highway
for
the
traffic
of
illegal
images,
information
and
espionage.
Computers:
In
the
late
1970s,
employees
at
the
Flagler
Dog
Track
in
Florida
used
a
computer
to
create
and
print
fraudulent
winning
tickets.
This
prompted
Florida
to
enact
the
first
computer
crime
law,
the
Florida
Computer
Crimes
Act,
which
declared
un-authorized
use
of
computing
facilities
a
crime.
Federal
laws
followed
in
1984.
Once
used
only
for
voice
communications,
todays
cell
phones
are
also
used
to
take
digital
photos
and
movies,
send
instant
messages,
browse
the
web
and
perform
many
of
the
same
tasks
as
a
computer.
Mobile
devices
allow
criminals
to
engage
in
an
ever-growing
variety
of
activities
and
the
devices
keep
track
of
every
move
and
message.
It
is
this
tracking
capability
that
turns
mobile
devices
into
key
evidence
in
many
cases.
Why and when is digital evidence
used?
Digital
evidence
may
come
into
play
in
any
serious
criminal
investigation
such
as
murder,
rape,
stalking,
car-jacking,
burglary,
child
abuse
or
exploitation,
counterfeiting,
extortion,
gambling,
piracy,
property
crimes
and
terrorism.
Pre-
and
post-crime
information
is
most
relevant,
for
example,
if
a
criminal
was
using
an
online
program
like
Google
Maps
or
street
view
to
case
a
property
before
a
crime;
or
posting
stolen
items
for
sale
on
Craigslist
or
E-Bay;
or
communicating
via
text-message
with
accomplices
to
plan
a
crime
or
threaten
a
person.
Some
crimes
can
be
committed
entirely
through
digital
means,
such
as
computer
hacking,
economic
fraud
or
identity
theft.
investigators
can
access
an
average
of
the
last
200
cell
locations
accessed
by
a
mobile
device.
Satellite
navigation
systems
and
satellite
radios
in
cars
can
provide
similar
information.
Even
photos
posted
to
social
media
such
as
Facebook
may
contain
location
information.
Photos
taken
with
a
Global
Positioning
System
(GPS)-enabled
device
contain
file
data
that
shows
when
and
exactly
where
a
photo
was
taken.
By
gaining
a
subpoena
for
a
particular
mobile
device
account,
investigators
can
collect
a
great
deal
of
history
related
to
a
device
and
the
person
using
it.
Certified
Digital
Media
Examiners
are
investigators
who
have
the
education,
training
and
experience
to
properly
exploit
this
sensitive
evidence.
That
said,
there
is
no
single
certifying
body,
and
certification
programs
can
contain
different
courses
of
study.
Generally
speaking,
these
professionals
have
demonstrated
core
competencies
in
pre-examination
procedures
and
legal
issues,
media
assessment
and
analysis,
data
recovery,
specific
analysis
of
recovered
data,
documentation
and
reporting,
and
presentation
of
findings.
While
certification
of
examiners
is
not
required
in
most
agencies,
it
is
becoming
a
widely
valued
asset
and
the
numbers
of
certified
examiners
will
increase.
Vendor-neutral
(not
software
based,
but
theory-
and
process-
based)
certification
is
offered
through
the
Digital
Forensics
Certification
Board
(DFCB),
an
independent
certifying
organization
for
digital
evidence
examiners,
the
National
Computer
Forensics
Academy
at
the
High
Tech
Crime
Institute
and
some
colleges.
Most
states
have
at
least
one
laboratory
or
section
for
digital
forensics
and
a
variety
of
task
forces
including
Internet
Crimes
Against
Children
(ICAC),
Joint
Terrorism
Task
Force
(JTTF),
and
Narcotics
and
Property
Crimes.
These
forces
comprise
officers
with
specialized
training,
including
search,
seizure
and
exploitation
of
digital
evidence
as
it
pertains
to
their
area
of
expertise.
Agencies
and
investigators
must
work
together
to
ensure
the
highest
level
of
security
and
evidence
handling
is
used.
In
the
United
States,
the
FBI
can
provide
assistance
in
some
specialty
areas.
First
responders
need
to
take
special
care
with
digital
devices
in
addition
to
normal
evidence
collection
procedures
to
prevent
exposure
to
things
like
extreme
temperatures,
static
electricity
and
moisture.
If
the
device
cannot
be
turned
off,
then
it
must
be
isolated
from
its
cell
tower
by
placing
it
in
a
Faraday
bag
or
other
blocking
material,
set
to
airplane
mode,
or
the
Wi-Fi,
Bluetooth
or
other
communications
system
must
be
disabled.
Digital
devices
should
be
placed
in
antistatic
packaging
such
as
paper
bags
or
envelopes
and
cardboard
boxes.
Plastic
should
be
avoided
as
it
can
convey
static
electricity
or
allow
a
buildup
of
condensation
or
humidity.
In
emergency
or
life
threatening
situations,
information
from
the
phone
can
be
removed
and
saved
at
the
scene,
but
great
care
must
be
taken
in
the
documentation
of
the
action
and
the
preservation
of
the
data.
Computers
that
are
off
may
be
collected
into
evidence
as
per
usual
agency
digital
evidence
procedures.
the
suspect
device
on
a
CD
that
already
contained
information,
that
information
might
be
analyzed
as
though
it
had
been
on
the
suspect
device.
Although
digital
storage
media
such
as
thumb
drives
and
data
cards
are
reusable,
simply
erasing
the
data
and
replacing
it
with
new
evidence
is
not
sufficient.
The
destination
storage
unit
must
be
new
or,
if
reused,
it
must
be
forensically
wiped
prior
to
use.
This
removes
all
content,
known
and
unknown,
from
the
media.
2.
Isolate
Wireless
Devices:
Cell
phones
and
other
wireless
devices
should
be
initially
examined
in
an
isolation
chamber,
if
available.
This
prevents
connection
to
any
networks
and
keeps
evidence
as
pristine
as
possible.
The
Faraday
bag
can
be
opened
inside
the
chamber
and
the
device
can
be
exploited,
including
phone
information,
Federal
Communications
Commission
(FCC)
information,
SIM
cards,
etc.
The
device
can
be
connected
to
analysis
software
from
within
the
chamber.
If
an
agency
does
not
have
an
isolation
chamber,
investigators
will
typically
place
the
device
in
a
Faraday
bag
and
switch
the
phone
to
airplane
mode
to
prevent
reception.
4.
Select
extraction
methods:
Once
the
working
copy
is
created,
the
analyst
will
determine
the
make
and
model
of
the
device
and
select
extraction
software
designed
to
most
completely
parse
the
data,
or
view
its
contents.
6.
Proceed
with
investigation:
At
this
point,
the
analyst
will
use
the
selected
software
to
view
data.
The
analyst
will
be
able
to
see
all
the
files
on
the
drive,
can
see
if
areas
are
hidden
and
may
even
be
able
to
restore
organization
of
files
allowing
hidden
areas
to
be
viewed.
Deleted
files
are
also
visible,
as
long
as
they
havent
been
over-written
by
new
data.
Partially
deleted
files
can
be
of
value
as
well.
Files
on
a
computer
or
other
device
are
not
the
only
evidence
that
can
be
gathered.
The
analyst
may
have
to
work
beyond
the
hardware
to
find
evidence
that
resides
on
the
Internet
including
chat
rooms,
instant
messaging,
websites
and
other
networks
of
participants
or
information.
By
using
the
system
of
Internet
addresses,
email
header
information,
time
stamps
on
messaging
and
other
encrypted
data,
the
analyst
can
piece
together
strings
of
interactions
that
provide
a
picture
of
activity.
FAQs
What
kind
of
results
can
be
expected
from
analysis
of
digital
evidence?
If
evidence
collection
and
analysis
is
conducted
properly,
examiners
can
secure
information
that
can
support
criminal
activity
claims
through
dialog
or
message
exchange,
images
and
documents.
The
examiner
will
generally
provide
all
the
supporting
documentation,
highlighting
relevant
information,
but
also
a
report
detailing
what
was
done
to
extract
the
data.
As
with
evidence
of
other
types,
chain
of
custody
and
proper
collection
and
extraction
techniques
are
critical
to
the
credibility
of
evidence
and
must
be
thoroughly
documented.
There
are
both
legal
and
technical
limitations
in
this
area
of
investigation.
Laws
governing
processing
and
prosecution
are
different
from
state
to
state.
Digital
crime
can
easily
cross
jurisdictions,
making
standardization
an
increasingly
critical
law
enforcement
issue.
Wiretapping
laws
can
also
come
into
play
particularly
with
regard
to
mobile
phone
seizure.
Intercepting
a
call
without
a
court
order
violates
an
expectation
of
privacy.
Even
after
a
phone
has
been
seized,
any
calls
or
messages
received
by
that
phone
cannot
be
used
as
the
holders
of
the
phone
(law
enforcement)
are
not
the
intended
recipient.
Privacy
laws
and
issues
are
the
most
limiting
areas
of
search.
Without
proper
authority
to
search
or
seize
electronics,
the
information
contained
on
the
device
may
not
be
used.
Internet
and
personal
device
privacy
laws
can
be
confusing.
In
addition,
peoples
understanding
of
privacy
tends
to
be
generational
younger
people
tend
to
believe
they
should
have
access
to
information
freely
but
that
their
movements
and
communications
are
inherently
private;
older
users
tend
to
understand
that
their
movements
and
communications
can
be
tracked
and
have
a
lesser
expectation
of
privacy.
Today
there
has
been
no
major
case
law
to
clearly
define
new
limits
in
the
United
States.
4.
The
person
in
charge
of
the
investigation
(the
case
officer)
has
overall
responsibility
for
ensuring
that
the
law
and
these
principles
are
adhered
to.
These
guidelines
are
widely
accepted
in
courts
of
England
and
Scotland,
but
they
do
not
constitute
a
legal
requirement
and
their
use
is
voluntary.
field
of
digital
and
multimedia
evidence
in
the
U.S.
and
other
countries
to
foster
communication
and
cooperation
as
well
as
to
ensure
quality
and
consistency
within
the
forensic
community.
Practices
have
been
cited
by
the
European
Network
Forensic
Science
Institute
Forensic
Information
Technology
Working
Group
(ENFSI-FITWG)
and
in
publications.
Sample email header showing the path and timing of the message.
This
can
show
a
track
record
of
information
exchange,
and
the
hash
value,
also
referred
to
as
a
checksum,
hash
code
or
hashes,
is
the
mark
of
authenticity
and
must
be
present
and
explained
to
courtroom
participants.
Hash
values
calculated
for
the
text
string
forensic
science.
Each
line
contains
the
search
term
value
calculated
using
the
unique
algorithm
in
the
left
hand
column.
Hash
values
are
a
reliable,
fast,
and
a
secure
way
to
compare
the
contents
of
individual
files
and
media.
Whether
it
is
a
single
text
file
containing
a
phone
number
or
five
terabytes
of
data
on
a
server,
calculating
hash
values
is
an
invaluable
process
for
evidence
verification
in
electronic
discovery
and
computer
forensics.
Once
verified,
the
information
pulled
from
the
files
can
be
shown
in
the
courtroom,
such
as
photos
or
emails.
In
addition,
email
headers,
showing
the
path
and
timing
emails
took
to
get
from
source
to
destination
could
be
displayed.
Decrypting
a
password
is
quick
and
easy,
with
the
right
software.
With
the
increasing
complexity
of
passwords
including
capitals,
numbers,
symbols
and
password
length,
there
are
billions
of
potential
passwords.
Decryption
can
take
a
great
deal
of
time,
up
to
a
year
in
some
cases,
using
system
resources
and
holding
up
investigations.
Gathering
passwords
from
those
involved
in
a
case
is
much
more
efficient
and
should
be
done
whenever
possible.
Any
digital
image
can
be
refined
to
high
definition
quality.
Images
can
be
very
useful
for
investigations,
but
a
low
resolution
image
is
made
by
capturing
fewer
bits
of
data
(pixels)
than
higher
resolution
photos.
Pixels
that
are
not
there
in
the
first
place
cannot
be
refined.
evidence
or
even
render
it
completely
inadmissible.
Only
investigators
with
the
proper
tools
and
training
should
be
viewing
and
retrieving
evidence.
Common Terms
Common
terminology
is
critical
in
the
digital
evidence
world.
The
Scientific
Working
Group
on
Digital
Evidence
(SWGDE)
in
collaboration
with
the
Scientific
Working
Group
on
Imaging
Technology
(SWGIT)
has
developed
and
continuously
maintains
a
glossary
of
terms
used
within
the
digital
and
multimedia
disciplines.
SWGDE
has
used
ASTM
International,
a
recognized
standards
organization,
to
establish
international
acceptance
of
terminology.
SWGDE/SWGITs
full
glossary
is
available
online:
(http://www.swgde.org/documents/current-documents/SWGDE
SWGIT
Combined
Glossary
V2.5.pdf)
Data
Extraction
-
A
process
that
identifies
and
recovers
information
that
may
not
be
immediately
apparent.
Media
-
Objects
on
which
data
can
be
stored.
Includes
hard
drives,
thumb
drives,
CD/DVD,
floppy
discs,
SIM
cards
from
mobile
devices,
memory
cards
for
cameras,
etc.
Work
Copy
-
A
copy
or
duplicate
of
a
recording
or
data
that
can
be
used
for
subsequent
processing
and/or
analysis.
Also
called
an
image.
Resources & References
You
can
learn
more
about
this
topic
at
the
websites
and
publications
listed
below.
Resources
E LECTRONIC
C RIME
S CENE
INVESTIGATION :
A
G UIDE
FOR
F IRST
R ESPONDERS,
S ECOND
E DITION ,
http://www.nij.gov/pubs-sum/219941.htm
References
E LECTRONIC
C RIME
S CENE
INVESTIGATION :
A
G UIDE
FOR
F IRST
R ESPONDERS,
2 ND
ED ,
2008.
Department
of
Justice,
Office
of
Justice
Programs,
National
Institute
of
Justice.
http://www.nij.gov/pubs-sum/219941.htm
(accessed
July
5,
2012).
F ORENSIC
E XAMINATION
O F
D IGITAL
E VIDENCE:
A
G UIDE
FOR
L AW
E NFORCEMENT ,
2004.
Department
of
Justice,
Office
of
Justice
Programs,
National
Institute
of
Justice.
http://www.ojp.usdoj.gov/nij/pubs-
sum/199408.htm
(accessed
July
5,
2012).
Acknowledgements
The
authors
wish
to
thank
the
following
for
their
invaluable
contributions
to
this
forensic
guide:
Forensic Evidence Admissibility and
Expert Witnesses
How
or
why
some
scientific
evidence
or
expert
witnesses
are
allowed
to
be
presented
in
court
and
some
are
not
can
be
confusing
to
the
casual
observer
or
a
layperson
reading
about
a
case
in
the
media.
However,
there
is
significant
precedent
that
guides
the
way
these
decisions
are
made.
Our
discussion
here
will
briefly
outline
the
three
major
sources
that
currently
guide
evidence
and
testimony
admissibility.
Just
when
a
scientific
principle
or
discovery
crosses
the
line
between
the
experimental
and
demonstrable
stages
is
difficult
to
define.
Somewhere
in
this
twilight
zone
the
evidential
force
of
the
principle
must
be
recognized,
and
while
the
courts
will
go
a
long
way
in
admitting
experimental
testimony
deduced
from
a
well-recognized
scientific
principle
or
discovery,
the
thing
from
which
the
deduction
is
made
must
be
sufficiently
established
to
have
gained
general
acceptance
in
the
particular
field
in
which
it
belongs.
The
first
version
of
Federal
Rule
of
Evidence
702
provided
that
a
witness
who
is
qualified
as
an
expert
by
knowledge,
skill,
experience,
training,
or
education
may
testify
in
the
form
of
an
opinion
or
otherwise
if:
[1]
293
Fed.
1013
(1923)
a. the
experts
scientific,
technical,
or
other
specialized
knowledge
will
help
the
trier
of
fact
to
understand
the
evidence
or
to
determine
a
fact
in
issue;
b. the
testimony
is
based
on
sufficient
facts
or
data;
c. the
testimony
is
the
product
of
reliable
principles
and
methods;
and
d. the
expert
has
reliably
applied
the
principles
and
methods
to
the
facts
of
the
case.
While
the
states
are
allowed
to
adopt
their
own
rules,
most
have
adopted
or
modified
the
Federal
rules,
including
those
covering
expert
testimony.
In
deciding
if
the
science
and
the
expert
in
question
should
be
permitted,
the
judge
should
consider:
[2]
The
Daubert
Trilogy
of
cases
is:
D AUBERT
V .
M ERRELL
D OW
P HARMACEUTICALS ,
G ENERAL
E LECTRIC
C O .
V .
J OINER
and
K UMHO
T IRE
C O .
V .
C ARMICHAEL .
Who
can
serve
as
an
expert
forensic
science
witness
at
court?
Over
the
years,
evidence
presented
at
trial
has
grown
increasingly
difficult
for
the
average
juror
to
understand.
By
calling
on
an
expert
witness
who
can
discuss
complex
evidence
or
testing
in
an
easy-to-understand
manner,
trial
lawyers
can
better
present
their
cases
and
jurors
can
be
better
equipped
to
weigh
the
evidence.
But
this
brings
up
additional
difficult
questions.
How
does
the
court
define
whether
a
person
is
an
expert?
What
qualifications
must
they
meet
to
provide
their
opinion
in
a
court
of
law?
These
questions,
too,
are
addressed
in
Fed.
R.
Evid.
702.
It
only
allows
experts
qualified
by
knowledge,
skill,
experience,
training,
or
education.
To
be
considered
a
true
expert
in
any
field
generally
requires
a
significant
level
of
training
and
experience.
The
various
forensic
disciplines
follow
different
training
plans,
but
most
include
in-house
training,
assessments
and
practical
exams,
and
continuing
education.
Oral
presentation
practice,
including
moot
court
experience
(simulated
courtroom
proceeding),
is
very
helpful
in
preparing
examiners
for
questioning
in
a
trial.
Normally,
the
individual
that
issued
the
laboratory
report
would
serve
as
the
expert
at
court.
By
issuing
a
report,
that
individual
takes
responsibility
for
the
analysis.
This
person
could
be
a
supervisor
or
technical
leader,
but
doesnt
necessarily
need
to
be
the
one
who
did
the
analysis.
The
opposition
may
also
call
in
experts
to
refute
this
testimony,
and
both
witnesses
are
subject
to
the
standard
in
use
by
that
court
(Frye,
Daubert,
Fed.
R.
Evid
702)
regarding
their
expertise.
Each
court
can
accept
any
person
as
an
expert,
and
there
have
been
instances
where
individuals
who
lack
proper
training
and
background
have
been
declared
experts.
When
necessary,
the
opponent
can
question
potential
witnesses
in
an
attempt
to
show
that
they
do
not
have
applicable
expertise
and
are
not
qualified
to
testify
on
the
topic.
The
admissibility
decision
is
left
to
the
judge.
Additional
Resources
Publications:
Saferstein,
Richard.
C RIMINALISTICS:
A N
INTRODUCTION
T O
F ORENSIC
S CIENCE ,
Pearson
Education,
Inc.,
Upper
Saddle
River,
NJ
(2007).
Acknowledgements
The
authors
wish
to
thank
the
following
for
their
invaluable
contributions
to
this
guide: