CONTROLLED CONTAMINATION OF DIGITAL EVIDENCE: CONCEPTUAL PROPOSAL AND EXPERIMENTAL VALIDATION IN AN ACQUISITION SCENARIO
DOI:
https://doi.org/10.56238/bocav25n74-014Keywords:
Computer Forensics, Chain of Custody, Evidence Preservation, Controlled Contamination, Validity of Digital EvidenceAbstract
This study investigates the feasibility and applicability of the concept of Controlled Contamination in computer forensics, analyzing whether documenting and isolating contamination in specific scenarios enables the use of digital traces without compromising their validity. Based on international guidelines and current national legislation, the study addresses concepts related to the preservation of evidence, the chain of custody, and evidentiary integrity. The methodology combines a literature review with practical experimentation to analyze studies on the contamination of digital traces and their effects on the reliability of the evidence. The experimental study was conducted in a controlled environment that simulated a scenario in which data were transferred from a cloud to a hard drive, which was subsequently imaged, enabling detailed forensic analysis of the traceability of the contamination. The results provide evidence on the possibility of maintaining the validity of the evidence in specific scenarios, provided that contamination is appropriately documented and traced, thereby enabling a comparative analysis with existing studies on the chain of custody and evidentiary admissibility. This research proposes an innovative approach that could redefine how digital evidence contamination is handled, directly impacting forensic practices, expert training, and how courts evaluate digital evidence. Furthermore, the research may inform the development of new guidelines, within legal limits, that permit the analysis and use of certain types of partially contaminated evidence in criminal investigations and legal proceedings. The originality of this study lies in the introduction of the concept of Controlled Contamination and the practical demonstration of its viability in specific scenarios, highlighting the importance of rigorous documentation to maintain the reliability of digital evidence. The study seeks to expand chain-of-custody guidelines and to advance methodological approaches in computer forensics, thereby improving understanding of the effects of contamination and enabling the development of new criteria for evaluating the admissibility of digital evidence in legal contexts.
References
Arellano, L. E., & Castañeda, C. M. (2012). La cadena de custodia informático-forense. Revista ACTIVA, (3), 67–81. ISSN 2027-8101
Brasil, E. C. A. (2023). Identificação e análise das ferramentas de computação forense aplicadas em investigações no Brasil [Trabalho de Conclusão de Curso, Bacharelado em Sistemas de Informação, Universidade Federal do Ceará, Campus Quixadá]. Quixadá, Brasil.
Brasil. (2019). Lei n. 13.964, de 24 de dezembro de 2019. Altera o Decreto-Lei n. 2.848, de 7 de dezembro de 1940 (Código Penal), e a Lei n. 8.069, de 13 de julho de 1990 (Estatuto da Criança e do Adolescente), e outras normas. Diário Oficial da União. http://www.planalto.gov.br/ccivil_03/_ato2019-2022/2019/lei/l13964.htm
Cantore, J. A. G. (2014). Cadena de custodia de evidencias. Anales de la Facultad de Ciencias Médicas, 47(1). DOI: https://doi.org/10.15381/anales.v1i0.10681
Carvalho, R. W. R. (2020). A importância da cadeia de custódia na computação forense. Revista Brasileira de Criminologia, 9(2), 134–138. https://doi.org/10.15260/rbc.v9i2.463 DOI: https://doi.org/10.15260/rbc.v9i2.463
Castellanos, B. J. P. (2017). El uso de los métodos deductivo e inductivo para aumentar la eficiencia del procesamiento de adquisición de evidencias digitales. Cuadernos de Contabilidad, 18. DOI: https://doi.org/10.11144/Javeriana.cc18-46.umdi
Grigollo, F. V., & Fernandes, R. F. (2024). Study on the adoption of historical record and chain of custody by Brazilian judicial experts from the collection to the disposal of evidence: A survey questionnaire. Revista de Gestão Social e Ambiental, 18(8), Article e08431. https://doi.org/10.24857/rgsa.v18n8-168 DOI: https://doi.org/10.24857/rgsa.v18n8-168
Grigollo, F. V., & Fernandes, R. F. (2025). Proposal of a conceptual framework to represent the historical record of events in the chain of custody: A doctoral thesis review. Derecho y Cambio Social, 22(80), Article e2660. https://doi.org/10.54899/dcs.v22i80.2660 DOI: https://doi.org/10.54899/dcs.v22i80.2660
Machado, N. T., & cols. (2021). Protocolo de informática forense ante ciberincidentes en telemedicina para preservar información como primera respuesta. Revista Científica General José María Córdova, 19(33), 181–203. https://doi.org/10.21830/19006586.726 DOI: https://doi.org/10.21830/19006586.726
Ministério da Justiça e Segurança Pública (Brasil). (2023). Diagnóstico e proposição de um modelo sobre a cadeia de custódia no Brasil: Estudo preliminar em cinco capitais representantes das cinco regiões brasileiras. MJSP.
Nandhakumar, N. K., Agarwal, U., & Faizal, H. (2012). Use of AFF4 chain of custody - Methodology for foolproof computer forensics operation. International Journal of Communication and Networking System, 1(1), 49–54. ISSN 2278-2427
Poersch, C. G., & Kuntze, G. M. (2010). Modelo de coleta e análise de vestígios em sistemas computacionais. Universidade do Sul de Santa Catarina.
Martínez-Ramírez, D. A., & cols. (2019). Evidência digital focada em unidades de estado sólido (SSD): Uma revisão. Visão Eletrônica, 1, 183–198.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright (c). Conjuncture Bulletin (BOCA)
This work is licensed under a Creative Commons Attribution 4.0 International License.