HOME

TheInfoList



OR:

In evidence law, digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence is relevant, whether it is authentic, if it is
hearsay Hearsay, in a legal forum, is an out-of-court statement which is being offered in court for the truth of what was asserted. In most courts, hearsay evidence is Inadmissible evidence, inadmissible (the "hearsay evidence rule") unless an exception ...
and whether a copy is acceptable or the original is required. The use of digital evidence has increased in the past few decades as courts have allowed the use of e-mails, digital photographs, ATM transaction logs,
word processing A word processor (WP) is a device or computer program that provides for input, editing, formatting, and output of text, often with some additional features. Word processor (electronic device), Early word processors were stand-alone devices dedicate ...
documents, instant message histories, files saved from
accounting Accounting, also known as accountancy, is the process of recording and processing information about economic entity, economic entities, such as businesses and corporations. Accounting measures the results of an organization's economic activit ...
programs, spreadsheets,
web browser A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
histories,
database In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and a ...
s, the contents of
computer memory Computer memory stores information, such as data and programs, for immediate use in the computer. The term ''memory'' is often synonymous with the terms ''RAM,'' ''main memory,'' or ''primary storage.'' Archaic synonyms for main memory include ...
, computer
backup In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "wikt:back ...
s, computer printouts,
Global Positioning System The Global Positioning System (GPS) is a satellite-based hyperbolic navigation system owned by the United States Space Force and operated by Mission Delta 31. It is one of the global navigation satellite systems (GNSS) that provide ge ...
tracks, logs from a hotel’s electronic door locks, and digital video or audio files. Many
court A court is an institution, often a government entity, with the authority to adjudicate legal disputes between Party (law), parties and Administration of justice, administer justice in Civil law (common law), civil, Criminal law, criminal, an ...
s in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
have applied the Federal Rules of Evidence to digital evidence in a similar way to traditional documents, although important differences such as the lack of established standards and procedures have been noted. In addition, digital evidence tends to be more voluminous, more difficult to destroy, easily modified, easily duplicated, potentially more expressive, and more readily available. As such, some courts have sometimes treated digital evidence differently for purposes of
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
,
hearsay Hearsay, in a legal forum, is an out-of-court statement which is being offered in court for the truth of what was asserted. In most courts, hearsay evidence is Inadmissible evidence, inadmissible (the "hearsay evidence rule") unless an exception ...
, the best evidence rule, and privilege. In December 2006, strict new rules were enacted within the Federal Rules of Civil Procedure requiring the preservation and disclosure of electronically stored evidence. Digital evidence is often attacked for its authenticity due to the ease with which it can be modified, although courts are beginning to reject this argument without proof of tampering.


Admissibility

Digital evidence is often ruled inadmissible by courts because it was obtained without authorization. In most jurisdictions a warrant is required to seize and investigate digital devices. In a digital investigation this can present problems where, for example, evidence of other crimes are identified while investigating another. During a 1999 investigation into online harassment by Keith Schroeder investigators found pornographic images of children on his computer. A second warrant had to be obtained before the evidence could be used to charge Schroeder.


Authentication

As with any
evidence Evidence for a proposition is what supports the proposition. It is usually understood as an indication that the proposition is truth, true. The exact definition and role of evidence vary across different fields. In epistemology, evidence is what J ...
, the proponent of digital evidence must lay the proper foundation. Courts largely concerned themselves with the reliability of such digital evidence. As such, early court decisions required that authentication called "for a more comprehensive foundation." US v. Scholle, 553 F.2d 1109 (8th Cir. 1976). As courts became more familiar with digital documents, they backed away from the higher standard and have since held that "computer data compilations… should be treated as any other record." US v. Vela, 673 F.2d 86, 90 (5th Cir. 1982). A common attack on digital evidence is that digital media can be easily altered. However, in 2002 a US court ruled that "the fact that it is possible to alter data contained in a computer is plainly insufficient to establish untrustworthiness" (US v. Bonallo, 858 F. 2d 1427–1988 – Court of Appeals, 9th). Nevertheless, the "more comprehensive" foundation required by ''Scholle'' remains good practice. The American Law Reports lists a number of ways to establish the comprehensive foundation. It suggests that the proponent demonstrate "the reliability of the computer equipment", "the manner in which the basic data was initially entered", "the measures taken to ensure the accuracy of the data as entered", "the method of storing the data and the precautions taken to prevent its loss", "the reliability of the computer programs used to process the data", and "the measures taken to verify the accuracy of the program". The Best Evidence Rule is a legal principle that requires presenting the most reliable form of evidence in court, which is often the original document or file. In cases where digital evidence is involved, this means presenting the original digital file, rather than a printout or a copy. However, proving the authenticity and integrity of digital evidence can be challenging, as it is relatively easy to manipulate digital files and metadata. Therefore, establishing a clear chain of custody and demonstrating that the evidence presented is unchanged from its original state is crucial. To address this issue, commercial software technology solutions have been developed to preserve digital evidence in its original form and authenticate it for admissibility in court disputes.


UK ACPO guidelines

In the United Kingdom, examiners usually follow guidelines issued by the Association of Chief Police Officers (ACPO) for the authentication and integrity of evidence. They were updated to Version 5 in October 2011 when computer based evidence was replaced with digital evidence reflecting the development of investigating information security incidents in a wider context. The guidelines consist of four principles: Principle 1: No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court.
Principle 2: In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.
Principle 3: An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.
Principle 4: The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to. These guidelines are widely accepted in courts of England and Scotland, but they do not constitute a legal requirement and their use is voluntary. It is arguable that whilst voluntary, non adherence is almost certain to lead to the exclusion of evidence that does not comply subject to the provisions of s 78 Police and Criminal Evidence Act 1984 (Power to exclude evidence obtained unfairly)


ADAM Principles

Building on the ACPO Guidelines with a more generic application outside of law enforcement, a doctoral thesis proposed the following overriding principles to be followed by digital forensic practitioners: #The activities of the digital forensic practitioner should not alter the original data. If the requirements of the work mean that this is not possible then the effect of the practitioner’s actions on the original data should be clearly identified and the process that caused any changes justified. #A complete record of all activities associated with the acquisition and handling of the original data and any copies of the original data must be maintained. This includes compliance with the appropriate rules of evidence, such as maintaining a chain of custody record, and verification processes such as hashing. #The digital forensic practitioner must not undertake any activities which are beyond their ability or knowledge. #The digital forensic practitioner must take into consideration all aspects of personal and equipment safety whilst undertaking their work. #At all times the legal rights of anyone affected by your actions should be considered. #The practitioner must be aware of all organizational policies and procedures relating to their activities #Communication must be maintained as appropriate with the client, legal practitioners, supervisors and other team members


Best evidence rule

Digital evidence is almost never in a format readable by humans, requiring additional steps to include digital documents as evidence (i.e. printing out the material). It has been argued that this change of format may mean digital evidence does not qualify under the " best evidence rule". However, the "Federal Rules of Evidence" rule 1001(3) states "if data are stored in a computer…, any printout or other output readable by sight, shown to reflect the data accurately, is an ‘original.’" Commonly courts do not bar printouts under the best evidence rule. In ''Aguimatang v. California State Lottery'', the court gave near '' per se'' treatment to the admissibility of digital evidence stating "the computer printout does not violate the best evidence rule, because a computer printout is considered an ‘original.’" 234 Cal. App. 3d 769, 798.


Video evidence

Video evidence is a video clip that may be used in a court case at trial. Examples include: * George Holliday's video of Rodney King's beating by the LAPD * The shooting of Neda Agha-Soltan * BART Police shooting of Oscar Grant * Death of Ian Tomlinson * Killing of Robert Dziekański * Death of Eric Garner


See also

* Electronic discovery * Body worn video (police equipment) * Closed-circuit television * Copwatch * Direct evidence * Electronic_evidence * Police misconduct#Recording * Videre * Viral video#Police misconduct * Witness (organization) * :Video surveillance


References

{{Reflist, refs= {{cite web, last=Adams, first=Richard, title='The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice, year=2012, url=http://researchrepository.murdoch.edu.au/14422/2/02Whole.pdf {{cite book, last=Casey, first=Eoghan, title=Digital Evidence and Computer Crime, Second Edition, year=2004, publisher=Elsevier, isbn=0-12-163104-4, url=https://books.google.com/books?id=Xo8GMt_AbQsC&q=Digital%20Evidence%20and%20Computer%20Crime,%20Second%20Edition {{cite web, title= Legal Aspects of Digital Forensics, url=http://euro.ecom.cmu.edu/program/law/08-732/Evidence/RyanShpantzer.pdf, access-date=31 August 2010, author=Daniel J. Ryan, author2=Gal Shpantzer {{cite web, title=US v. Bonallo, url=https://scholar.google.co.uk/scholar_case?case=17436631095971908840&q=US+v.+Bonallo&hl=en&as_sdt=2002&as_vis=1, access-date=1 September 2010, location=Court of Appeals, 9th Circuit, year=1988 {{cite web, title=Federal Rules of Evidence #702, url=http://federalevidence.com/rules-of-evidence#Rule702, access-date=23 August 2010, archive-url=https://web.archive.org/web/20100819114909/http://federalevidence.com/rules-of-evidence#Rule702, archive-date=19 August 2010, url-status=dead {{cite book, last=Various, title=Handbook of Digital Forensics and Investigation, year=2009, publisher=Academic Press, isbn=978-0-12-374267-4, pages=567, url=https://books.google.com/books?id=xNjsDprqtUYC, editor=Eoghan Casey, access-date=2 September 2010 {{cite web, title=State v. Schroeder, 613 NW 2d 911 – Wis: Court of Appeals 2000, url=https://scholar.google.co.uk/scholar_case?case=6657201255979914796&q=Wisconsin+v+Schroeder&hl=en&as_sdt=2002&as_ylo=1998&as_yhi=2000, year=2000 {{cite CiteSeerX, last=Pollitt, first=MM, title=Report on digital evidence, citeseerx = 10.1.1.80.1663 {{cite web, title=ACPO Good Practice Guide for Digital Evidence, url=http://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf, access-date=26 April 2016


External links


Digital Evidence: Standards and Principles

The Digital Evidence in the Information Era

Video as Evidence: A WITNESS guide for citizens, activists, and lawyers
Evidence law Computer law Digital forensics