Authenticating Digital Evidence

Given the proliferation of digital media, the question of what types of evidence are admissible in court, and how they should be handled, is increasingly complex. Cellphone video has played a pivotal role in scores of high-profile cases in the US, as have recordings of 911 calls and footage captured from police body cameras

There’s no question this evidence is valuable, but ensuring its integrity and demonstrating an unbroken chain of custody, the documentation that records the chronological sequence of the custody, control and disposition of a piece of evidence, often proves difficult.

To avoid controversies surrounding digital evidence, some public safety authorities have started turning to a seemingly unlikely solution: blockchain technology. At its core, a blockchain is a decentralised database shared across a network. Unlike centralised databases, however, records are only accepted after attaining group consensus. It provides a way to incorporate a variety of data from multiple sources, anonymise it, track it and ensure its authenticity without the need for third-party validation. 

Indeed, blockchain holds the potential to help transform public safety by improving the way agencies handle their most sensitive evidence and data, enhancing interagency cooperation and promoting greater public trust in the integrity of investigations.

Blockchain is uniquely suited to tackling this challenge, according to gcn.com. In fact, the existing US federal guidelines for handling digital evidence are surprisingly similar to the way blockchains work. When seizing a hard drive, for example, special personnel will scan the contents and use that data to generate a hash value. In the same way blockchains use hash values to verify linked blocks, digital forensics investigators use hashes to track digital evidence. Blockchain presents multiple advantages over the current procedures. The principal advantage is the redundancy blockchain provides. 

Instead of relying on a team of specialists to first extract the data, then hash it, then track it, a “blockchain of custody” would allow for open submission of data to the blockchain, where it would be automatically verified by consensus, hashed and then entered into an immutable, shared public record.

Data collection by various agencies in the US has grown exponentially, but the ability to generate intelligence and then act upon this data continues to be hampered by bureaucratic inefficiencies, interagency divisions and siloed data.

Establishing a unified data standard poses many challenges because it requires buy-in from so many agencies.

Blockchain circumvents this problem by enabling trustless collaboration and removing the need for centralised authority. The promise of an immutable, open public record of all data submitted could overcome a major hurdle for interagency collaboration.

Blockchain’s “smart contract” feature could ensure protocols between agencies are always followed because they would be executed automatically by the system. 

Basically, a smart contract is a computer protocol that facilitates, verifies or enforces the performance of a contract or contract clause. In addition to formalising information requests and opening investigations, smart contracts might also help balance data privacy and public safety.

I-HLS

You Might Also Read:

Blockchain Will Radically Transform Anti-Fraud:

 

 

« EU Elections: Facebook Prepares
GCHQ Chief Wants A Big Effort To Improve British Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.