Module 4 - Legal Considerations of Evidence Flashcards
Upon the completion of this module students will be able to: Explain how the incident response life cycle may change when a legal department gets involved Compare and contrast the different types of computer records as defined by the Federal Rules of Evidence. Evaluate common locations that are associated with persistent malware
Office of General Counsel Goal
Use information in legal proceedings, have their own requests
e-discovery rules
Federal Rules of Evidence (FRE)
- Adopted by 41 states
Working with Legal
- distinction between experienced incident responder and an expert
- have to identify indisputable facts and separate from opinions
- gather and use data that can withstand legal scrutiny, i.e. FRE.
Computer Records (3 Types)
- most information captured by administrators and incident responders. (turned over to attorneys)
- Non-hearsay
- Hearsay
- Both hearsay and non-hearsay
Hearsay Records
- Covered under FRE 801
- Assertion by human beings (declarants)
- Many exceptions (e.g. FRE 803(6), business records).
- Attorneys have to argue why should be allowed in
Examples:
body of Word document
body of an e-mail
Bookkeeping records made in QuickBooks or Excel
Business Records
- Haag v US, US v Fujii, US v Briscoe
- Computer records are not hearsay at all.
Non-Hearsay Records
- Created by process that does not involve a human assertion
Examples: Firewall records TCP/IP headers E-Mail headers Login records List of processes and activities
Mixed Records
- data recorded by a computer and a statement of assertion made by a human
Examples:
Word doc header and metadata with body
e-mail header along with body of e-mail
SMS records with system created time stamps
How to introduce mixed records in legal
Requires:
- forming foundation for admissibility of hearsay statement
- authenticating the computer generated record
Authentication
- Chain of Custody
- Hashing files
Computer Business Record Admissibility
Must be:
- kept in the course of regularly conducted business activity
- regular practice of the business activity to make the record (as shown by collectors)
Public Records
- content that is publicly available, is not considered privileged and can be an exception to the hearsay rules
- multiple parties can view the content.
Tool standards
- tools must meet standards within the Federal Rules of Evidence
- > Reliable results
- > Reproducible results
- > Tested
- > Recognized by the community
Authentication of Data
- CoC (FRE 901(a)
- Show source of product and that is reliable
- prove data has not been altered
- identify source (IR can be responder, FRE901(b) has list of authentication methods)
Best Practices for IR in prep for legal
- do not add comments to the output files (keep it non-hearsay)
- hash files (incl. results)
- burn all files to non-rewritable medium
- Initial the CD with permanent markers
- use SOPs
- use of DOSKey to show commands and switches