Page 33 - Forensic News Journal Jan Feb 2018
P. 33

Digital Evidence and Legal Proceedings

        versed on many occasions  the defendant’s version                         consists of an exact byte-

        and it also confirmed the            of events could not have             by-byte copy of all data
        origins of the check. After  been supported.                              and space, both live files
        months of investigation,                                                  and deleted information,

        after the identification of          During the examination               which is present on the de-
        this evidence, the case was  process of digital                           vice. This forensic image

        dropped on the morning of  evidence, it is standard                       then forms the basis of the
        the trial.                           procedure for the evidence  investigation and analy-





































                                                                                           Photo Courtesy of securedatarecovery
                                             to be connected to a suit-           sis and the original ex-
        Had the computer evi-                able system using write              hibit can then be securely

        dence not been sufficiently  protecting hardware so                       stored.
        protected and secured                that no alteration or access
        following seizure and the            to the original device is            At the start of the foren-

        data present altered in              possible.                            sic copying process, the
        any way, whether it be by                                                 device is assigned an ac-

        use of the hard drive or             Due to the volatility of             quisition hash value (most
        improper handling of the             digital evidence it is best          commonly an MD5 hash
        drive, the relatively small          practice to take a forensic  value). Once the evidence

        piece of crucial evidence            ‘image’ of the hard drive            has been forensically ac-
        may have been lost and               or storage device that               quired (imaged, similar to


                                                                                                                     33
   28   29   30   31   32   33   34   35   36   37   38