Authenticating Digital Evidence

Given the proliferation of digital media, the question of what types of evidence are admissible in court, and how they should be handled, is increasingly complex. Cellphone video has played a pivotal role in scores of high-profile cases in the US, as have recordings of 911 calls and footage captured from police body cameras

There’s no question this evidence is valuable, but ensuring its integrity and demonstrating an unbroken chain of custody, the documentation that records the chronological sequence of the custody, control and disposition of a piece of evidence, often proves difficult.

To avoid controversies surrounding digital evidence, some public safety authorities have started turning to a seemingly unlikely solution: blockchain technology. At its core, a blockchain is a decentralised database shared across a network. Unlike centralised databases, however, records are only accepted after attaining group consensus. It provides a way to incorporate a variety of data from multiple sources, anonymise it, track it and ensure its authenticity without the need for third-party validation. 

Indeed, blockchain holds the potential to help transform public safety by improving the way agencies handle their most sensitive evidence and data, enhancing interagency cooperation and promoting greater public trust in the integrity of investigations.

Blockchain is uniquely suited to tackling this challenge, according to gcn.com. In fact, the existing US federal guidelines for handling digital evidence are surprisingly similar to the way blockchains work. When seizing a hard drive, for example, special personnel will scan the contents and use that data to generate a hash value. In the same way blockchains use hash values to verify linked blocks, digital forensics investigators use hashes to track digital evidence. Blockchain presents multiple advantages over the current procedures. The principal advantage is the redundancy blockchain provides. 

Instead of relying on a team of specialists to first extract the data, then hash it, then track it, a “blockchain of custody” would allow for open submission of data to the blockchain, where it would be automatically verified by consensus, hashed and then entered into an immutable, shared public record.

Data collection by various agencies in the US has grown exponentially, but the ability to generate intelligence and then act upon this data continues to be hampered by bureaucratic inefficiencies, interagency divisions and siloed data.

Establishing a unified data standard poses many challenges because it requires buy-in from so many agencies.

Blockchain circumvents this problem by enabling trustless collaboration and removing the need for centralised authority. The promise of an immutable, open public record of all data submitted could overcome a major hurdle for interagency collaboration.

Blockchain’s “smart contract” feature could ensure protocols between agencies are always followed because they would be executed automatically by the system. 

Basically, a smart contract is a computer protocol that facilitates, verifies or enforces the performance of a contract or contract clause. In addition to formalising information requests and opening investigations, smart contracts might also help balance data privacy and public safety.

I-HLS

You Might Also Read:

Blockchain Will Radically Transform Anti-Fraud:

 

 

« EU Elections: Facebook Prepares
GCHQ Chief Wants A Big Effort To Improve British Cybersecurity »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Unitrends

Unitrends

Unitrends helps IT pros do more with less by providing an all-in-one enterprise backup and continuity solution.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.