25
Electronic Electronic Evidence Evidence Admissibility Admissibility Carmen R. Cintrón Ferrer, 2006, Derechos Carmen R. Cintrón Ferrer, 2006, Derechos Reservados Reservados ISACA – San Juan Chapter, February ISACA – San Juan Chapter, February Meeting Meeting

Electronic Evidence Admissibility Carmen R. Cintrón Ferrer, 2006, Derechos Reservados ISACA – San Juan Chapter, February Meeting

Embed Size (px)

Citation preview

Electronic Evidence Electronic Evidence AdmissibilityAdmissibility

Carmen R. Cintrón Ferrer, 2006, Derechos ReservadosCarmen R. Cintrón Ferrer, 2006, Derechos Reservados

ISACA – San Juan Chapter, February MeetingISACA – San Juan Chapter, February Meeting

22

AgendaAgenda

ProblemProblem

Definitions Definitions

Legal environmentLegal environment Best Evidence RuleBest Evidence Rule Chain of Custody and Protection of OriginalsChain of Custody and Protection of Originals Compliance with Constitutional RightsCompliance with Constitutional Rights

Suggested procedureSuggested procedure

CommentsComments

33

ProblemProblem

Will the electronic evidence seized by the FBI on February 10th, 2006, be admissible in a court of law?

44

Stated Problem ImplicationsStated Problem ImplicationsIn order for electronic evidence to be admissible it must not be hearsay, must comply with the “Best Evidence Rule” and it must be placed under a chain of custody that warrants there has been no tampering or improper handling.

Computer forensics suggests procedures and mechanisms that reduce the risks of evidence be deemed inadmissible, while allowing investigators to:

•Execute a warrant to search electronic devices,

•Examine and collect electronic evidence, or

•Seize (impound) electronic equipment where such evidence might be deposited in a manner that protects the integrity of such evidence,

•Protect acquired evidence

55

Stated Problem Stated Problem Questions to be answeredQuestions to be answered

What standards should apply?

How they should have been applied by the FBI?

Why is it relevant for information systems auditors?

66

DefinitionsDefinitions

Electronic EvidenceElectronic Evidence

HearsayHearsay

Best Evidence RuleBest Evidence Rule

AuthenticationAuthentication

Chain of CustodyChain of Custody

Computer Forensics ScienceComputer Forensics Science

77 Incident Response and Computer ForensIncident Response and Computer Forensics & Cyber Forensicsics & Cyber Forensics

DefinitionsDefinitions

Evidence:Evidence:

““Any information of probative value that helps Any information of probative value that helps prove something relative to the case under prove something relative to the case under investigation.”investigation.”

88 Incident Response and Computer ForensIncident Response and Computer Forensics & Cyber Forensicsics & Cyber Forensics

DefinitionsDefinitions

Hearsay:Hearsay:

““When a computer record contains the assertions of a When a computer record contains the assertions of a person, whether or not processed by a computer, the person, whether or not processed by a computer, the record can contain hearsay. An exception to the record can contain hearsay. An exception to the hearsay rule is the business record exception.”hearsay rule is the business record exception.”

““When a computer record contains computer generated When a computer record contains computer generated data untouched by human hands, the record cannot data untouched by human hands, the record cannot contain hearsay.”contain hearsay.”

99 Incident Response and Computer ForensIncident Response and Computer Forensics & Cyber Forensicsics & Cyber Forensics

DefinitionsDefinitionsBest Evidence Rule:Best Evidence Rule:““Absent some exceptions requires that the Absent some exceptions requires that the originaloriginal of a writing or recording must be of a writing or recording must be admitted in court to prove its contents.”admitted in court to prove its contents.”

““(if) data are stored in a computer or similar device, any (if) data are stored in a computer or similar device, any printout or other output readable by sight, shown to printout or other output readable by sight, shown to reflect the data accurately, is an reflect the data accurately, is an originaloriginal.” .” (FRE 1001(3))(FRE 1001(3))

““A duplicate is admissible to the same extent as an A duplicate is admissible to the same extent as an original unless (1) a genuine question is raised as to original unless (1) a genuine question is raised as to the authenticity of the original or (2) in the the authenticity of the original or (2) in the circumstances it would be unfair to admit the circumstances it would be unfair to admit the duplicate in lieu of the original.” duplicate in lieu of the original.” (FRE 1003)(FRE 1003)

1010 Incident Response and Computer ForensIncident Response and Computer Forensics & Cyber Forensicsics & Cyber Forensics

DefinitionsDefinitions

Authentication:Authentication:““Whomever collected the evidence should Whomever collected the evidence should

testify during examination that the information testify during examination that the information is what the proponent claims.” (FRE 901(a))is what the proponent claims.” (FRE 901(a))

““A testimony by a witness who has personal A testimony by a witness who has personal knowledge as to the origins of that piece of knowledge as to the origins of that piece of evidence.”evidence.”

““Applicable standard is the same as for other Applicable standard is the same as for other records.” records.”

1111 Incident Response and Computer ForensIncident Response and Computer Forensics & Cyber Forensicsics & Cyber Forensics

DefinitionsDefinitions

Chain of Custody:Chain of Custody: Requires that evidence is stored in a manner Requires that evidence is stored in a manner

where it cannot be accessed by unauthorized where it cannot be accessed by unauthorized personnel.personnel.

The location of evidence from the moment it The location of evidence from the moment it was collected to its presentation at trial needs was collected to its presentation at trial needs to be traced.to be traced.

A log should be kept for each evidentiary A log should be kept for each evidentiary item.item.

1212 Incident Response and Computer ForensIncident Response and Computer Forensics & Cyber Forensicsics & Cyber Forensics

DefinitionsDefinitions

Computer forensics science:Computer forensics science:““Is a common ground of rules, techniques and tools for Is a common ground of rules, techniques and tools for

collecting, examining, preserving, retrieving and collecting, examining, preserving, retrieving and presenting data that has been processed presenting data that has been processed electronically and has been stored on computer electronically and has been stored on computer media.”media.”

““It pertains to electronic or digital transactions or It pertains to electronic or digital transactions or records.”records.”

““It produces direct information and data that may have It produces direct information and data that may have significance in a case, rather than producing significance in a case, rather than producing interpretative conclusions.”interpretative conclusions.”

1313

Legal EnvironmentLegal Environment

Constitutional Rights:Constitutional Rights: Fourth AmendmentFourth Amendment – – ““The right of the people to be secure in their persons, The right of the people to be secure in their persons,

houses, papers and effects, against unreasonable houses, papers and effects, against unreasonable searches and seizures, shall not be violated, and no searches and seizures, shall not be violated, and no warrants shall issue but upon probable cause, supported warrants shall issue but upon probable cause, supported by oath or affirmation, and particularly describing the place by oath or affirmation, and particularly describing the place to be searched and the persons or things to be seized.”to be searched and the persons or things to be seized.”

First AmendmentFirst Amendment – – ““Congress shall make no law respecting an establishment of Congress shall make no law respecting an establishment of

religion, or prohibiting the free exercise thereof, or religion, or prohibiting the free exercise thereof, or abridging the freedom of speech or of the press; or the abridging the freedom of speech or of the press; or the right of the people peaceably to assemble, and to petition right of the people peaceably to assemble, and to petition the government for a redress of grievances.”the government for a redress of grievances.”

1414

Legal EnvironmentLegal Environment

Search and Seizures Search and Seizures (42 USC 2000aa):(42 USC 2000aa): Warrant Warrant (exceptions on terrorism by USA Patriot Act)(exceptions on terrorism by USA Patriot Act)

Probable Cause for:Probable Cause for:Search and/or seize HW?Search and/or seize HW?

Search and/or seize SW?Search and/or seize SW?

Search and or seize Data?Search and or seize Data?

Search and/or seize a Network?Search and/or seize a Network? Key questions:Key questions:

Is it contraband, tool for the offense or incidental?Is it contraband, tool for the offense or incidental?

Where will the search be conducted?Where will the search be conducted?

How will the search be conducted?How will the search be conducted?

Can evidence out of the scope of the warrant be used?Can evidence out of the scope of the warrant be used?

1515

Legal EnvironmentLegal Environment

Other applicable legislation:Other applicable legislation: Federal Criminal Code Federal Criminal Code (18USC2703):(18USC2703):

WarrantWarrant

SubpoenaSubpoena

Court OrderCourt Order

Electronic Communications Privacy Act Electronic Communications Privacy Act (ECPA)(ECPA)

USA Patriot Act (2001)USA Patriot Act (2001) Communications Assistance for Law Communications Assistance for Law

Enforcement Act Enforcement Act (CALEA) – Under scrutiny of Congress(CALEA) – Under scrutiny of Congress

1616

Best Practices for Seizing Best Practices for Seizing Electronic Evidence Electronic Evidence (US Secret Service)(US Secret Service)

Determine type of searchDetermine type of search

Determine what to searchDetermine what to search

Determine where to searchDetermine where to search

Assure valid warrantAssure valid warrant

Use appropriate collection techniques so Use appropriate collection techniques so the evidence is not destroyed or alteredthe evidence is not destroyed or altered

Employ trained personnel for forensic Employ trained personnel for forensic examination examination

1717

Best Practices for Seizing Best Practices for Seizing Electronic Evidence Electronic Evidence (US Secret Service)(US Secret Service)

Conduct the search and seizure:Conduct the search and seizure: Secure the scene:Secure the scene:

Officer safetyOfficer safetyPreserve areaPreserve areaRestrict access to computer(s) and isolate from phone lines or Restrict access to computer(s) and isolate from phone lines or connections to ISPconnections to ISP

Secure computer evidence:Secure computer evidence:Photograph scene, and screen(s)Photograph scene, and screen(s)Unplug and labelUnplug and labelPlace evidence tape Place evidence tape If transport is required, package components as fragile cargoIf transport is required, package components as fragile cargoKeep away from magnets, radio transmitters and similar Keep away from magnets, radio transmitters and similar environmentsenvironments

If it is necessary to access storage devices all actions If it is necessary to access storage devices all actions associated with the manipulation of the device should be noted associated with the manipulation of the device should be noted in order to document the chain of custody and insure its in order to document the chain of custody and insure its admission to courtadmission to court

1818 Cyber ForensicsCyber Forensics

International PrinciplesInternational PrinciplesInternational Organization on Computer EvidenceInternational Organization on Computer Evidence

Take actions not to change seized evidence.Take actions not to change seized evidence.Only a forensically competent professional should Only a forensically competent professional should access original digital evidence, when necessary.access original digital evidence, when necessary.All activity relating to the seizure, access, storage, or All activity relating to the seizure, access, storage, or transfer of digital evidence. must be fully documented, transfer of digital evidence. must be fully documented, preserved and available for review.preserved and available for review.An individual is responsible for all actions taken with An individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in respect to digital evidence while the digital evidence is in their possession.their possession.Any agency that is responsible for seizing, accessing, Any agency that is responsible for seizing, accessing, storing or transferring digital evidence is responsible for storing or transferring digital evidence is responsible for compliance with these principles.compliance with these principles.

1919

Suggested ProcedureSuggested Procedure

Request warrant to determine terms, scope of Request warrant to determine terms, scope of search and of seizuresearch and of seizureIf valid warrant, request:If valid warrant, request: Presence while scene is secured by agentsPresence while scene is secured by agents Equipment be digitally photographed in your presenceEquipment be digitally photographed in your presence Equipment be turned on (if it is not on):Equipment be turned on (if it is not on):

Solicit that an image of each computer’s fixed storage Solicit that an image of each computer’s fixed storage device or computer files to be seized be made in your device or computer files to be seized be made in your presencepresenceSolicit that an image of each removable storage device to be Solicit that an image of each removable storage device to be seized be made in your presenceseized be made in your presenceSolicit a that a preliminary forensics investigation be Solicit a that a preliminary forensics investigation be conducted in accordance to the search warrant and request conducted in accordance to the search warrant and request a copy of the resultsa copy of the results

Else, deny access to equipment until legal Else, deny access to equipment until legal counsel is present.counsel is present.

2020

Suggested ProcedureSuggested ProcedureRecommended Forensic PracticeRecommended Forensic PracticeDocument procedureDocument procedureSearch equipment on siteSearch equipment on siteMake a mirror image of storage devicesMake a mirror image of storage devicesTake mirror image off-siteTake mirror image off-siteRestore mirror image on another hard drive that has Restore mirror image on another hard drive that has been wiped cleanbeen wiped cleanSearch for files and data specified in warrant:Search for files and data specified in warrant: Searching original devices can compromise original Searching original devices can compromise original

evidence evidence An image is unreadable unless restored to another deviceAn image is unreadable unless restored to another device If evidence pertaining other crimes is present it might not If evidence pertaining other crimes is present it might not

be admissible if it is out of the scope of the warrantbe admissible if it is out of the scope of the warrant

2121

CommentsComments

2222

ReferencesReferences

Cyber Forensics A Field Manual for Collecting, Examining, and Cyber Forensics A Field Manual for Collecting, Examining, and Preserving Evidence of Computer CrimesPreserving Evidence of Computer Crimes, Marcella & Greenfield, , Marcella & Greenfield, Auerbach Publications, 2002Auerbach Publications, 2002Incident Response & Computer ForensicsIncident Response & Computer Forensics, Mandia, Prosise & Pepe, , Mandia, Prosise & Pepe, 22ndnd Edition, McGraw-Hill/Osborne, 2003 Edition, McGraw-Hill/Osborne, 2003United States ConstitutionUnited States Constitution, Yahoo version, Yahoo versionGood Practice Guide for Computer Based Electronic EvidenceGood Practice Guide for Computer Based Electronic Evidence, , National High Tech Crime Unit, Association of Police Officers, National High Tech Crime Unit, Association of Police Officers, WalesWalesComputer Searches and Seizures: Some Unresolved Issues, Computer Searches and Seizures: Some Unresolved Issues, Brenner & Frederiksen, Michigan Telecomm Tech Law Review, Brenner & Frederiksen, Michigan Telecomm Tech Law Review, 20022002Computer-Based Investigation and Discovery in Criminal Cases: A Computer-Based Investigation and Discovery in Criminal Cases: A Guide for United States Magistrate JudgesGuide for United States Magistrate Judges, Withers, National , Withers, National Workshop for Magistrate Judges II, Boston Mass, 2003Workshop for Magistrate Judges II, Boston Mass, 2003Annotated Case Law on Electronic DiscoveryAnnotated Case Law on Electronic Discovery, Withers, 2005, Withers, 2005Digital Evidence and the New Criminal Procedure, Digital Evidence and the New Criminal Procedure, Orin S. Kerr, Orin S. Kerr, Columbia Law Review, Vol. 105:279Columbia Law Review, Vol. 105:279

2323

ReferencesReferencesSearching and Seizing Computers and Obtaining Electronic Evidence in Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Computer Crime and Intellectual Property Section Criminal Investigations, Computer Crime and Intellectual Property Section Criminal Division, US Dept of Justice, 2002Criminal Division, US Dept of Justice, 2002Ensuring the Admissibility of Electronic Forensic Evidence and Enhancing Ensuring the Admissibility of Electronic Forensic Evidence and Enhancing Its Probative Value at Trial, Its Probative Value at Trial, Galves & Galves, American Bar Association Galves & Galves, American Bar Association Criminal Justice Magazine, Vol 19 #1, 2004Criminal Justice Magazine, Vol 19 #1, 2004Suppressing Evidence Gained by Government Surveillance of Computers, Suppressing Evidence Gained by Government Surveillance of Computers, James Adams, American Bar Association, Criminal Justice Magazine Spring James Adams, American Bar Association, Criminal Justice Magazine Spring 2004, Vol 19 #12004, Vol 19 #1Computer Records and the Federal Rules of EvidenceComputer Records and the Federal Rules of Evidence, Orin S. Kerr, USA , Orin S. Kerr, USA Bulletin, US Dept of Justice, March 2001Bulletin, US Dept of Justice, March 2001Federal Guidelines for Searching and Seizing Computers,Federal Guidelines for Searching and Seizing Computers, US Dept of US Dept of Justice, 1994Justice, 1994United States Secret Service Best Practices for Seizing electronic EvidenceUnited States Secret Service Best Practices for Seizing electronic Evidence, , www.secretservice.govwww.secretservice.govCommunications Assistance for Law Enforcement Act (CALEA),, ACommunications Assistance for Law Enforcement Act (CALEA),, Agent gent Michael P. Clifford, US Dept of Justice, CCIPS page, April, 2005Michael P. Clifford, US Dept of Justice, CCIPS page, April, 2005

2424

AppendixAppendixEvidence Handling ProceduresEvidence Handling Procedures

Record information about computer system before examining contents Record information about computer system before examining contents of its hard drive.of its hard drive. Take digital photos of original system and media before it is Take digital photos of original system and media before it is duplicated.duplicated.Fill an evidence tag for all media to be duplicated, examined and Fill an evidence tag for all media to be duplicated, examined and preserved as evidence.preserved as evidence.Store the best evidence copy in evidence safe.Store the best evidence copy in evidence safe.Maintain an evidence log for each piece of best evidence under an Maintain an evidence log for each piece of best evidence under an evidence custodian.evidence custodian.Perform all examinations on a forensic copy of the best evidence Perform all examinations on a forensic copy of the best evidence ( ( working copy)working copy)..Create backup copies of the best evidence.Create backup copies of the best evidence.Comply with disposition dates for evidence disposition as defined by Comply with disposition dates for evidence disposition as defined by principal investigator.principal investigator.Audit monthly all evidence in custody to ascertain that all best Audit monthly all evidence in custody to ascertain that all best evidence is present, properly stored and labeled.evidence is present, properly stored and labeled.

2525

AppendixAppendixEvidence System DescriptionEvidence System Description

Record information on individuals who:Record information on individuals who: occupy the office or room where the original evidence is found; occupy the office or room where the original evidence is found; have access to the office or room where the original evidence is have access to the office or room where the original evidence is

found;found; actually use the system.actually use the system.

Record information on the computer:Record information on the computer: Location in the room or office;Location in the room or office; State (power on/off), Data on screen;State (power on/off), Data on screen; Time/Date from system BIOS;Time/Date from system BIOS; Network/Modem connectionsNetwork/Modem connections Serial #, Model, make of computer, drives and componentsSerial #, Model, make of computer, drives and components Peripherals attachedPeripherals attached

Digital photos:Digital photos: Protect investigator(s) from claims of damage to propertyProtect investigator(s) from claims of damage to property Return system to its exact state prior to forensic duplicationReturn system to its exact state prior to forensic duplication Capture current configurationCapture current configuration