The collection process is the crux of any investigation, and the most important step in any collection is documentation. Proper documentation and the ability to validate the findings are essential when a matter goes to trial, especially when the duration of a case lasts for months or years. Evidence that was located during the beginning of a case may become critical later on. If the chain of custody and evidence was properly documented, it will be easier to locate the necessary information.
Additionally, evidence must be authenticated before it can be deemed admissible in court. To authenticate your evidence you must be able to prove your collection process was sound and void of tampering. The most effective way to do this is to maintain a documented chain of custody.
It is a common misconception among the legal community that self-collecting data will save time and costs from the collection process. However, qualified forensics consultants are trained to understand the intricacies and challenges associated with identifying, collecting, and preserving from all sources of ESI.
“By involving a neutral third-party expert, counsel can focus on preparing for litigation, while the expert can ascertain the data was collected properly and provide adequate documentation…” By involving a neutral third-party expert, counsel can focus on preparing for litigation, while the expert can ascertain the data was collected properly and provide adequate documentation and testimony required for authenticating evidence.
It is possible to misinterpret data and results provided by forensic software, which is why it is imperative to document exactly where the data came from, in the event it needs to be revisited. Take the Casey Anthony trial in 2011. The computer forensic examiner, John Bradley, testified at trial that he identified 84 searches for the word “chloroform.”
It turns out “two software programs were used for conducting computer analysis of searches completed during the Anthony trial. The results produced by CacheBack returned results of 84 visits. The second program, Net Analysis, returned results of one visit.”
Bradley said “I gave the police everything they needed to present a new report. I did the work myself and copied out the entire database in a spreadsheet to make sure there was no issue. Then I turned it over to them. The No. 1 principle for them is to validate the data, and they had the tools and resources to do it. They chose not to.”
If Casey Anthony had been found guilty at trial this may have been ground for a mistrial.
EDRM.net states “Chain of custody refers to the chronological documentation and/or paper trail showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Because evidence can be used in court to convict persons of crimes, it must be handled in a scrupulously careful manner to avoid later allegations of tampering or misconduct…” [emphasis added]
It is important to not only document what is being obtained, but who is doing the collection, when it was collected, and other details that validate the evidence. The chain of custody documentation provides information regarding the collection, transportation, storage, and general handling of the electronic evidence.
A typical chain of custody document may include:
Documenting as many details as possible throughout the entire process leaves less room for scrutiny about the collection process. A party’s ability to present evidence in a case rests heavily on their ability to prove their collection process was sound. If a misstep occurred and was no properly documented, it can invalidate evidence, which can ultimately change the entire outcome of a case.