Page 657 - StudyBook.pdf
P. 657

Operational and Organizational Security: Incident Response • Chapter 11  641

                 it open.The bag should then be marked or a tag should be affixed to it, showing
                 the person who initially took it into custody.The tag should provide such informa-
                 tion as a number to identify the evidence, a case number (which shows what case
                 the evidence is associated with), the date and time, and the name or badge number
                 of the person taking it into custody.A tag may also be affixed to the object, pro-
                 viding the same or similar information to what is detailed on the bag. However,
                 this should only be done if attaching a tag to the item does not compromise the
                 evidence in any manner.
                    Information on the tag is also written in an evidence log, which is a document
                 that inventories all evidence collected in a case. In addition to the data available on
                 the tag, the evidence log includes a description of each piece of evidence, serial
                 numbers, identifying marks or numbers, and other information that is required by
                 policy or local law.
                    The evidence log also details the chain of custody.This document is used to
                 describe who had possession of the evidence after it was initially tagged, transported,
                 and locked in storage room.To obtain possession of the evidence, a person needs to
                 sign it in and out. Information is added to a chain of custody log to show who had
                 possession of the evidence, when, and for how long.The chain of custody log speci-
                 fies the person’s name, department, date, time, and other pertinent information.
                    In many cases, the investigator will follow the evidence from the crime scene to
                 court, documenting who else had possession along the way. Each time possession is
                 transferred to another person it is written in the log. For example, the log would
                 show the investigator had initial custody, while the next line in the log shows a
                 computer forensic examiner took possession on a particular date and time. Once
                 the examination is complete, the next line in the log would show that the investi-
                 gator again took custody. Even though custody is transferred back to the investi-
                 gator, this is indicated in the log so there is no confusion over who was responsible
                 at any time.

                 Preservation of Evidence

                 If data and equipment are to be used as evidence, it is important to ensure that
                 their integrity has not been compromised. Preservation of data involves practices
                 that protect data and equipment from harm, so that original evidence is preserved
                 in a state as close as possible to when it was initially acquired. If data is lost, altered,
                 or damaged, it may not be admissible in court.Worse yet, the credibility of how
                 evidence was collected and examined may be called into question, making other
                 pieces of evidence inadmissible as well.




                                                                              www.syngress.com
   652   653   654   655   656   657   658   659   660   661   662