The inundation of digital evidence in modern day law enforcement poses a new challenge: ensuring an unbroken chain of custody of digital evidence. In a time where evidence includes everything from CCTV, body cam and dash cam footage to pictures of physical evidence to audio recordings, managing that evidence becomes a cumbersome process, considering that you can’t tag and keep digital files on a shelf in an evidence locker. Naturally, this would result in certain vulnerabilities in the handling of the evidence.
When physical evidence in an envelope is making rounds from first responders to forensics to investigators, it’s easy to trace the evidence and track each person that gets hold of it with their signatures going on the envelope or a registry, or both. But things get tricky when digital evidence is involved, simply because it can be easily accessed and duplicated, effectively losing all legal worth.
Of course, digital forensics is governed by law to dissuade mishandling. To make any evidence inadmissible in the court of law, a defense attorney would just have to do some digging, find gaps in the handling of a piece of evidence and effectively create reasonable doubt, possibly letting the criminal walk free.
Therefore, it’s in the prosecution’s, law enforcement agencies’ and, in turn, society’s best interest to make sure that law enforcement can ensure a rock-solid chain of custody of any digital evidence (or any evidence, for that matter) and guarantee that there has been no mishandling or tampering with evidence.
VIDIZMO’s Digital Evidence Management (DEM)
The entire point of ensuring an unbroken chain of custody of evidence is to trace the evidence when it’s in possession of different entities and keep track of any access or tampering to it, to make sure it doesn’t impede investigations and can be taken to court.
VIDIZMO’s full-featured DEM solution not only gives you a transparent outlook of the chain of custody, but it also helps you ensure the integrity and credibility of your digital evidence in the court of law by detecting any tampering with evidence, all while complying with CJIS, FedRamp and more.
Chain Of Custody
In VIDIZMO, you get a clear look into the chain of custody. A list shows you exactly who accessed the evidence file on the platform and what they did with it, along with their IP addresses. You can download this information as a spreadsheet file, print it and present it in the court of law, if need be, to prove the integrity of your evidence.
VIDIZMO takes a rather intuitive approach to detect tampering with any evidence. For each evidence file ingested into your DEM system, a hash code is generated. This hash code is updated every time someone edits the evidence file, clearly showing that it has been tampered with. When you run a tamper detection on an evidence file (or a bulk of evidence files), you get a blue tick badge or a ‘Tampered’ badge to show you exactly which file has been tampered with.
A defense attorney would not spare any chance to not only challenge the integrity of your digital evidence but of the entire platform that you store your evidence on. You don’t have to worry about that with VIDIZMO. You can see an Audit Log of all the activities performed in the portal, along with IP addresses. Again, you can print this log out to show in court.
An unbroken chain of custody makes sure that the evidence is reliable and admissible in the court of law.
With VIDIZMO’s Digital Evidence Management (DEM) solution, you can ensure an unbroken chain of custody, detect tampering with evidence and keep track of all the activities in your DEM portal.
VIDIZMO can be deployed on a private or shared cloud, on-premises or a hybrid model. To learn more about VIDIZMO’ Digital Evidence Management capabilities, contact us.
REMINDER: Stay at home, maintain safe physical distance and wash your hands with soap for at least 20 seconds. Stay safe against COVID-19.