Introduction to Chain of Custody
Chain of custody refers to the chronological documentation and paper trail showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence. Maintaining proper chain of custody is crucial in legal proceedings to establish that evidence has not been altered, contaminated, replaced, or tampered with. A properly maintained chain of custody verifies the integrity of evidence, ensuring its admissibility in court and preventing challenges to its authenticity or reliability.
Core Chain of Custody Principles
- Continuous Accountability: Every person who handles evidence must be documented
- Temporal Documentation: All times and dates of evidence transfers must be recorded
- Minimal Handling: Limit the number of individuals who handle evidence
- Proper Storage: Evidence must be stored in appropriate conditions to prevent degradation
- Tamper-Evident Packaging: Seals and packaging should reveal if tampering has occurred
- Complete Documentation: All actions taken with evidence must be thoroughly documented
- Authentication: Evidence must be uniquely identified and authenticated
Standard Chain of Custody Process Flow
Stage | Key Activities | Documentation Required |
---|---|---|
Collection | Identify, document, photograph, collect evidence | Initial documentation forms, photographs, sketches |
Packaging | Properly package and seal evidence | Packaging logs, seal numbers |
Labeling | Apply unique identifiers to evidence | Evidence labels, barcodes |
Transportation | Securely move evidence to storage facility | Transport logs, temporary custody forms |
Submission | Transfer to evidence custodian or facility | Evidence submission forms, receipts |
Storage | Maintain in appropriate conditions | Storage location records, access logs |
Analysis | Testing or examination by specialists | Laboratory submission forms, analysis reports |
Return/Transfer | Return to storage or transfer to other entities | Transfer forms, receipts |
Disposition | Final handling (retention, return, destruction) | Disposition authorization, destruction certificates |
Evidence Collection Procedures
Physical Evidence Collection
Before Collection
- Document scene (photographs, video, sketches)
- Plan collection sequence (least to most fragile items)
- Prepare proper collection materials and PPE
- Establish evidence collection log
During Collection
- Wear appropriate PPE (gloves, masks, etc.)
- Photograph item in original position
- Note exact location, condition, appearance
- Collect evidence using appropriate method:
- Trace evidence: Tape lifting, vacuum collection
- Biological: Sterile swabs, containers
- Fingerprints: Lifting tape, powders, chemicals
- Documents: Non-marking forceps, document protectors
- Digital devices: Proper shutdown procedures, anti-static bags
Immediate Post-Collection
- Properly package to prevent contamination/degradation
- Apply unique identifier or evidence number
- Complete evidence label with:
- Case number
- Item number
- Description
- Collection location
- Date and time of collection
- Collector’s name and signature
- Seal package with evidence tape
- Initial and date across seal
Digital Evidence Collection
Electronic Device Seizure
- Document device state (on/off, connected peripherals)
- Photograph device, screen, connections
- If device is on, consider:
- Photographing visible screen information
- Capturing volatile data if trained to do so
- Proper shutdown procedures per forensic protocols
- Disconnect power (remove battery if applicable)
- Document all cables and connections
Digital Storage Media
- Handle by edges only
- Package in anti-static containers
- Keep away from magnetic fields, extreme temperatures
- Document physical condition, visible damage
Cloud-Based Evidence
- Document legal authority for access
- Use write-blocking or forensic tools
- Capture metadata including access dates/times
- Document collection methodology
- Create forensic hash values of collected data
Chain of Custody Documentation
Essential Information for Documentation
Every chain of custody form should include:
Case Information
- Case/incident number
- Type of incident
- Date/time of incident
- Location of incident
- Investigating officer/team
Evidence Information
- Item number/unique identifier
- Description of item
- Location where collected
- Date and time of collection
- Collected by (name and ID/badge number)
Transfer Information (for each transfer)
- Date and time of transfer
- Reason for transfer
- From (name, ID/badge number, signature)
- To (name, ID/badge number, signature)
- Condition of seals and packaging
Storage Information
- Storage location details
- Special storage requirements
- Access log
Sample Chain of Custody Form Format
CHAIN OF CUSTODY RECORD
Case Number: ________________ Incident Type: ________________
Incident Date/Time: __________ Location: ____________________
Item Number: _______________ Description: __________________
Collection Location: _________ Collection Date/Time: _________
Collected By: ______________ Signature: ____________________
CHAIN OF CUSTODY
| Date/Time | Released By | ID/Badge | Signature | Received By | ID/Badge | Signature | Purpose | Seal Intact (Y/N) |
|-----------|------------|----------|-----------|-------------|----------|-----------|---------|-------------------|
| | | | | | | | | |
| | | | | | | | | |
| | | | | | | | | |
Storage Location(s): ___________________________________
Special Handling Instructions: __________________________
Final Disposition: ____________________________________
Disposition Date: ____________________________________
Authorized By: ______________________________________
Evidence Packaging and Storage Requirements
Packaging Guidelines by Evidence Type
Evidence Type | Packaging Requirements | Storage Conditions | Special Considerations |
---|---|---|---|
Biological/DNA | Paper bags, envelopes; sterile containers | Refrigerated (4°C) or frozen (-20°C) | Air-dry before packaging; biohazard labeling |
Fingerprints | Fingerprint cards, lifts in protective sleeves | Room temperature, low humidity | Avoid touching print surface; secure from friction |
Firearms | Gun boxes, cable ties through barrel | Room temperature, secure locker | Unload safely; document condition; mark position of moving parts |
Ammunition/Explosives | Non-sparking containers, padding | Cool, dry area; specially designated | Separate from firearms; explosives may require specialized storage |
Controlled Substances | Sealed plastic bags, evidence pouches | Secure, temperature-controlled | Double packaging; precise weight documentation |
Currency | Paper bags, tamper-evident bags | Secure safe or locker | Count and document in presence of witness |
Digital Devices | Anti-static bags, padded containers | Room temperature, low humidity | Faraday bags for active devices; document battery status |
Documents | Document protectors, manila envelopes | Dry, flat storage, acid-free | Minimal handling; protect from light, moisture |
Trace Evidence | Paper bindles, sealed vials | Room temperature, protected from contamination | Package separately; document collection method |
Clothing | Paper bags, separate items | Room temperature, dry | Air-dry biological stains before packaging; separate victim/suspect items |
Storage Duration Guidelines
- Active Investigations: Until case resolution
- Homicide/Violent Felonies: Permanent or statutory maximum (typically 20+ years)
- Sexual Assaults: According to statute of limitations or longer (many jurisdictions now require indefinite storage)
- Non-Violent Felonies: Typically 5-7 years after case resolution
- Misdemeanors: Typically 1-3 years after case resolution
- Adjudicated Cases: Per appeal period plus statutory requirements
Common Chain of Custody Challenges and Solutions
Challenge | Potential Issue | Best Practice Solution |
---|---|---|
Multiple Handlers | Increased risk of tampering allegations | Minimize transfers; document each transfer completely |
Improper Packaging | Contamination, degradation | Use appropriate containers; follow evidence-type specific protocols |
Incomplete Documentation | Chain breaks, inadmissibility | Use standardized forms; train personnel; conduct regular audits |
Storage Integrity | Tampering, unauthorized access | Use tamper-evident seals; restricted access storage; video monitoring |
Transportation Risks | Loss, damage, tampering | Secure transport methods; minimize transit time; document condition before/after |
Long-Term Storage | Degradation, lost items | Proper environmental controls; regular inventories; clear labeling |
Mass Casualty/Large Scenes | Volume overwhelms systems | Pre-established mass incident protocols; temporary secure storage planning |
Digital Evidence Challenges | Data volatility, encryption | Use write-blockers; document hash values; detailed collection logs |
Legal Considerations
Admissibility Requirements
- Authentication: Proper identification of evidence (Federal Rule of Evidence 901)
- Relevance: Connection to facts of case (Federal Rules of Evidence 401-402)
- Reliability: Scientifically valid methods (Daubert/Frye standards)
- Continuity: Unbroken chain of custody
- Best Evidence Rule: Original documents preferred over copies
Common Legal Challenges
- Breaks in documentation
- Inadequate security measures
- Improper handling techniques
- Failure to follow departmental procedures
- Inconsistencies in testimony about handling
- Missing or incomplete documentation
Court Testimony Best Practices
- Review all documentation before testimony
- Be prepared to describe exact handling procedures
- Explain any unusual circumstances or notations
- Never guess or speculate if unsure
- Acknowledge limitations or problems honestly
- Be able to explain department procedures and why they’re effective
Chain of Custody for Special Situations
Hazardous Materials
- Consult hazmat specialists before collection
- Document decontamination procedures
- Use specialized containment and labeling
- Note any necessary alterations to standard procedures
- Include hazard classification in documentation
High-Profile Cases
- Consider dual collection teams
- Implement extra documentation (video recording of collection)
- Additional security measures for storage
- More frequent inventory verification
- Limited access protocols
Mass Casualty Incidents
- Implement disaster-specific protocols
- Use pre-staged supply caches
- Establish temporary secure storage areas
- Consider modified documentation for initial collection
- Assign evidence coordination officers
Multi-Agency Investigations
- Establish lead agency for evidence control
- Use consistent documentation forms
- Conduct joint evidence processing when possible
- Clear agreements on storage responsibilities
- Regular inter-agency evidence status meetings
Electronic Chain of Custody Systems
Benefits of Electronic Systems
- Real-time tracking capability
- Reduced documentation errors
- Automatic notification of needed actions
- Built-in compliance checks
- Audit trail generation
- Barcode/RFID integration
- Automated storage location management
Key Features to Look For
- Secure user authentication
- Comprehensive audit trails
- Automated alerts for storage condition issues
- Integration with evidence management systems
- Mobile access capabilities
- Digital signature capabilities
- Photo/document attachment functionality
- Barcode/RFID compatibility
- Customizable forms and workflows
Implementation Best Practices
- Maintain paper backup capabilities
- Regular system testing and validation
- Comprehensive staff training
- Clear policies for system failures
- Regular data backups and security reviews
Quality Assurance and Compliance
Evidence Audits
Regular Inventory Checks
- Scheduled (quarterly, annually)
- Random spot checks
- Supervisor reviews
Audit Documentation
- Evidence present and properly stored
- Packaging intact
- Documentation complete
- Storage conditions appropriate
- Discrepancies noted and resolved
Training Requirements
- Initial evidence handling certification
- Annual refresher training
- Discipline-specific protocols (DNA, digital, etc.)
- Documentation requirements
- Legal updates and court decisions
- Cross-training for emergency situations
Accreditation Standards
- International Organization for Standardization (ISO 17025, 17020)
- American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB)
- International Association for Property and Evidence (IAPE)
- ANSI National Accreditation Board (ANAB)
Common Evidence Handling Mistakes to Avoid
- Failing to wear appropriate PPE
- Incomplete or illegible documentation
- Improper packaging for evidence type
- Failure to document damaged seals
- Neglecting to obtain signatures during transfers
- Inadequate photographic documentation
- Storing incompatible items together
- Using incorrect storage conditions
- Failing to document temporary access
- Using improper evidence destruction methods
Best Practices and Professional Tips
Documentation Excellence
- Document even temporary possession
- Use precise descriptions
- Record condition at each transfer
- Photograph evidence with scale and case identifier
Efficiency Strategies
- Pre-printed labels and forms
- Evidence collection kits by type
- Digital photography with automatic metadata
- Regular purging of eligible items
Risk Mitigation
- Two-person verification for high-value items
- Video recording of critical evidence processing
- Regular procedure reviews
- Mock court challenges
Professional Development
- Stay current with legal decisions
- Participate in evidence handling certifications
- Network with evidence professionals
- Regular procedure updates based on best practices
Resources for Further Learning
Professional Organizations
- International Association for Property and Evidence (IAPE)
- American Society of Crime Laboratory Directors (ASCLD)
- International Association of Computer Investigative Specialists (IACIS)
- Association of Forensic Quality Assurance Managers (AFQAM)
Training Resources
- National Institute of Justice (NIJ) Evidence Management Resources
- Federal Law Enforcement Training Centers (FLETC) Evidence Handling Courses
- IAPE Professional Certification Programs
- Laboratory Evidence Handling Certifications
Publications and Guidelines
- “Biological Evidence Preservation Handbook” (NIST)
- “Crime Scene Investigation: A Guide for Law Enforcement” (NIJ)
- “Electronic Crime Scene Investigation: A Guide for First Responders” (NIJ)
- “ASTM Standards for Property and Evidence Management”
- “Scientific Working Group on Digital Evidence (SWGDE) Best Practices”