Module 4 - Legal Considerations of Evidence Flashcards

Upon the completion of this module students will be able to: Explain how the incident response life cycle may change when a legal department gets involved Compare and contrast the different types of computer records as defined by the Federal Rules of Evidence. Evaluate common locations that are associated with persistent malware

1
Q

Office of General Counsel Goal

A

Use information in legal proceedings, have their own requests

e-discovery rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Federal Rules of Evidence (FRE)

A
  • Adopted by 41 states
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Working with Legal

A
  • distinction between experienced incident responder and an expert
  • have to identify indisputable facts and separate from opinions
  • gather and use data that can withstand legal scrutiny, i.e. FRE.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Records (3 Types)

A
  • most information captured by administrators and incident responders. (turned over to attorneys)
  • Non-hearsay
  • Hearsay
  • Both hearsay and non-hearsay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hearsay Records

A
  • Covered under FRE 801
  • Assertion by human beings (declarants)
  • Many exceptions (e.g. FRE 803(6), business records).
  • Attorneys have to argue why should be allowed in

Examples:
body of Word document
body of an e-mail
Bookkeeping records made in QuickBooks or Excel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business Records

A
  • Haag v US, US v Fujii, US v Briscoe

- Computer records are not hearsay at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-Hearsay Records

A
  • Created by process that does not involve a human assertion
Examples:
Firewall records
TCP/IP headers
E-Mail headers
Login records
List of processes and activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mixed Records

A
  • data recorded by a computer and a statement of assertion made by a human

Examples:
Word doc header and metadata with body
e-mail header along with body of e-mail
SMS records with system created time stamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to introduce mixed records in legal

A

Requires:

  • forming foundation for admissibility of hearsay statement
  • authenticating the computer generated record
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A
  • Chain of Custody

- Hashing files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer Business Record Admissibility

A

Must be:

  • kept in the course of regularly conducted business activity
  • regular practice of the business activity to make the record (as shown by collectors)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public Records

A
  • content that is publicly available, is not considered privileged and can be an exception to the hearsay rules
  • multiple parties can view the content.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tool standards

A
  • tools must meet standards within the Federal Rules of Evidence
  • > Reliable results
  • > Reproducible results
  • > Tested
  • > Recognized by the community
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication of Data

A
  • CoC (FRE 901(a)
  • Show source of product and that is reliable
  • prove data has not been altered
  • identify source (IR can be responder, FRE901(b) has list of authentication methods)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Best Practices for IR in prep for legal

A
  • do not add comments to the output files (keep it non-hearsay)
  • hash files (incl. results)
  • burn all files to non-rewritable medium
  • Initial the CD with permanent markers
  • use SOPs
  • use of DOSKey to show commands and switches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Saving Records (method for)

A
  • Recover the entire container if possible
  • if e-mails are saved, recover the entire e-mail container
  • Saving an entire website and preserving it in a PDF or other locked format.
  • Date the material.
17
Q

FRE 803(6)

A

Exclusion to Hearsay Rule for Business Records

(6) Records of a Regularly Conducted Activity. A record of an act, event, condition, opinion, or diagnosis if:

(A) the record was made at or near the time by — or from information transmitted by — someone with knowledge;

(B) the record was kept in the course of a regularly conducted activity of a business, organization, occupation, or calling, whether or not for profit;

(C) making the record was a regular practice of that activity;

(D) all these conditions are shown by the testimony of the custodian or another qualified witness, or by a certification that complies with Rule 902(11) or (12) or with a statute permitting certification; and

(E) neither the source of information nor the method or circumstances of preparation indicate a lack of trustworthiness.

18
Q

FRE 902(11)

A

Firewall records - part of normal business

RULE 902. EVIDENCE THAT IS SELF-AUTHENTICATING

The following items of evidence are self-authenticating; they require no extrinsic evidence of authenticity in order to be admitted:

(11) Certified Domestic Records of a Regularly Conducted Activity. The original or a copy of a domestic record that meets the requirements of Rule 803(6)(A)-(C), as shown by a certification of the custodian or another qualified person that complies with a federal statute or a rule prescribed by the Supreme Court. Before the trial or hearing, the proponent must give an adverse party reasonable written notice of the intent to offer the record — and must make the record and certification available for inspection — so that the party has a fair opportunity to challenge them.

19
Q

FRE 901(a)

A

Chain of Custody

RULE 901. AUTHENTICATING OR IDENTIFYING EVIDENCE

(a) In General. To satisfy the requirement of authenticating or identifying an item of evidence, the proponent must produce evidence sufficient to support a finding that the item is what the proponent claims it is.