Opportunities for the Digitalisation of the Chain of Custody
Copyright (c) 2025 Kreitz Zsuzsanna

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
The chain of custody (CoC) process is essential in the management of forensic evidence, ensuring that the origin, integrity, and handling of evidence can be continuously traced and authenticated. Rapid advances in digitalisation offer opportunities to make traditionally paper-based and manually managed CoC processes more efficient and reliable. The use of digital solutions – such as blockchain technology, RFID chips, and smart contracts – can significantly increase the transparency and reliability of evidence handling, while reducing the risks arising from human error, fraud, or negligence. The aim of this paper is to explore the possibilities for CoC digitisation, with a focus on legal, technological, and data security aspects. The paper also addresses the challenges of implementing a digital CoC, such as compliance with personal data protection regulations and the integration of new systems with existing processes. Overall, digital chain-of-custody solutions can bring significant improvements in the accuracy and speed of evidence management, but their implementation requires thorough legal and technological analysis and preparation.
Keywords:
How to Cite
References
Interpol (2014): Pollution Crime Forensic Investigation Manual. Interpol Environmental Crime Programme.
AHMAD, Liza – KHANJI, Salam – IQBAL, Farkhund – KAMOUN, Faouzi (2020): Blockchain-Based Chain of Custody: Towards Real-Time Tamper-Proof Evidence Management. Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020), 1–8. Online: https://doi.org/10.1145/3407023.3409199
ALRUWAILI, Fahad F. (2021): CustodyBlock: A Distributed CoC Evidence Framework. Information, 12(2). Online: https://doi.org/10.3390/info12020088
AZARENOK, N. (2022): Conditionality of Anglo-Saxon and Romance-Germanic Types of Criminal Procedure. Vestnik Tomskogo Gosudarstvennogo Universiteta – Pravo, 478, 219–228. Online: https://doi.org/10.17223/15617793/478/25
ENFSI (2015): Best Practice Manual for the Forensic Examination of Digital Technology. European Network of Forensic Science Institutes, 2015.
GARCIA, L. – TAYLOR, R. (2020): Advanced Storage Solutions for Evidence Management. International Journal of Criminal Justice, 29(3), 150–165.
ISO/IEC 17025:2017. General requirements for the competence of testing and calibration laboratories.
ISO/IEC 27037:2012. Guidelines for identification, collection, acquisition and preservation of digital evidence.
KUMAR, S. – SINGH, P. (2021): RFID in Forensic Science: Applications and Challenges. Indian Journal of Forensic Sciences, 12(2), 55–70.
MILLER, Adir – SINGH, Avinash (2024): CoC and Evidence Integrity Verification Using Blockchain Technology. Proceedings of the 19th International Conference on Cyber Warfare and Security (ICCWS 2024), Johannesburg, South Africa, 2024. Online: https://doi.org/10.34190/iccws.19.1.2025
SANTAMARÍA, Pablo – TOBARRA, Llanos – PASTOR-VARGAS, Rafael – ROBLES-GÓMEZ, Antonio (2023): Smart Contracts for Managing the Chain-of-Custody of Digital Evidence: A Practical Case Study. Smart Cities, 6(2), 709–727. Online: https://doi.org/10.3390/smartcities6020034
SMITH, J. et al. (2019): RFID and Digital Evidence Management: A Modern Approach. Forensic Science Today, 10(4), 200–220.
SWGDE (2017a): SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Cloud Storage. Scientific Working Group on Digital Evidence.
SWGDE (2017b): SWGDE Best Practices for Data Acquisition from Digital Video Recorders. Scientific Working Group on Digital Evidence.
SWGDE (2021): SWGDE Best Practices for Computer Forensic Acquisitions. Scientific Working Group on Digital Evidence.
SCHMITT, Veronica – JORDAAN, Jason (2013): Establishing the Validity of MD5 and SHA-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in These Algorithms. International Journal of Computer Applications, 68(23), 38–46. Online: https://doi.org/10.5120/11723-7433
Jogi források
- 2017. évi XC. törvény a büntetőeljárásról
- 11/2003. (V. 8.) IM–BM–PM együttes rendelet a lefoglalás és a büntetőeljárás során lefoglalt dolgok kezelésének, nyilvántartásának, előzetes értékesítésének és megsemmisítésének szabályairól, valamint az elkobzás végrehajtásáról.
- Az Európai Parlament és a Tanács (EU) 2016/679 rendelete (2016. április 27.) a természetes személyeknek a személyes adatok kezelése tekintetében történő védelméről és az ilyen adatok szabad áramlásáról (GDPR)