The “Silver Platter Doctrine” has had various reincarnations and permutations in the last hundred years, but generally, as pertinent here, provides that evidence obtained through a private search is outside of the Fourth Amendment’s application.1 Today, with a world gone digital, a hand-off by a private individual or entity of a computer hard drive to law enforcement may involve the transfer of gigabytes or more of pertinent electronic data requiring expert and efficient computer forensic examination. The proponent of the evidence must demonstrate that the circumstances under which the evidence was obtained was proper and that the forensic examination was appropriate for admission of the evidence at trial. Frequently raised questions concerning the legality and scope of the subsequent government search without a warrant, and the lawfulness of the forensic examination, are subjects addressed here.
Hashing: Integrity of Evidence
In the routine seizure of digital evidence by the government, in order to protect the integrity of the evidence seized, a copy or “clone” of the digital files is made so that the evidence may be examined without the possibility of tainting the actual evidence seized. The clone is then subjected to expert forensic examination. The cloning process usually includes a process identifying each file’s hash value. “Hashing” is a mathematical formula that allows the identification of a digital file through a hash value, which is a string of letters and numbers representing the file’s absolute uniqueness. Every digital image or file has a hash value.2 The hash value of a file is an important tool used to identify and authenticate it. It has been analogized to the 20th century Bates stamp in civil discovery, and in the criminal arena as the file’s “digital fingerprint.”3 Two files with identical content will have the same hash value. More specifically, hashing creates a digital fingerprint that represents the binary content of a file unique to every electronically-generated document, and thereby facilitates ensuring that the file has not been modified.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]