Blockchain Tutorial
Blockchain Tutorial
What is Blockchain?
A blockchain is a constantly growing ledger which keeps a permanent
record of all the transactions that have taken place in a secure,
chronological, and immutable way.
Note: A blockchain can be used for the secure transfer of money, property, contracts,
etc. without requiring a third-party intermediary like bank or government. Blockchain is a
software protocol, but it could not be run without the Internet (like SMTP used in email).
Need of Blockchain
History of Blockchain
The blockchain technology was described in 1991 by the research
scientist Stuart Haber and W. Scott Stornetta. They wanted to
introduce a computationally practical solution for time-stamping digital
documents so that they could not be backdated or tampered. They
develop a system using the concept of cryptographically secured
chain of blocks to store the time-stamped documents.
o
o Further, in 2008, Satoshi Nakamoto conceptualized the theory
of distributed blockchains. He improves the design in a unique
way to add blocks to the initial chain without requiring them to be
signed by trusted parties. The modified trees would contain a secure
history of data exchanges. It utilizes a peer-to-peer network for
timestamping and verifying each exchange. It could be managed
autonomously without requiring a central authority. These
improvements were so beneficial that makes blockchains as the
backbone of cryptocurrencies. Today, the design serves as the
public ledger for all transactions in the cryptocurrency space.
o The evolution of blockchains has been steady and promising. The
words block and chain were used separately in Satoshi Nakamoto's
original paper but were eventually popularized as a single word, the
Blockchain, by 2016. In recent time, the file size of cryptocurrency
blockchain containing records of all transactions occurred on the
network has grown from 20 GB to 100 GB.
What is Bitcoin?
Satoshi Nakamoto introduced the bitcoin in the year 2008. Bitcoin is a
cryptocurrency(virtual currency), or a digital currency that uses rules of
cryptography for regulation and generation of units of currency. A Bitcoin
fell under the scope of cryptocurrency and became the first and most
valuable among them. It is commonly called decentralized digital
currency.
A bitcoin is a type of digital assets which can be bought, sold, and transfer
between the two parties securely over the internet. Bitcoin can be used to
store values much like fine gold, silver, and some other type of
investments. We can also use bitcoin to buy products and services as well
as make payments and exchange values electronically.
Whenever you want to transfer money to someone over the internet, you
need to use a service of third-party such as banks, a credit card, a PayPal,
or some other type of money transfer services. The reason for using third-
party is to ensure that you are transferring that money. In other words,
you need to be able to verify that both parties have done what they need
to do in real exchange.
For example, Suppose you click on a photo that you want to send it to
another person, so you can simply attach that photo to an email, type the
receiver email address and send it. The other person will receive the
photo, and you think it would end, but it is not. Now, we have two copies
of photo, one is a simple email, and another is an original file which is still
on my computer. Here, we send the copy of the file of the photo, not the
original file. This issue is commonly known as the double-spend problem.
The double-spend problem provides a challenge to determine whether a
transaction is real or not. How you can send a bitcoin to someone over the
internet without needing a bank or some other institution to certify the
transfer took place. The answer arises in a global network of thousands of
computers called a Bitcoin Network and a special type of decentralized
laser technology called blockchain.
Blockchain Version
The brief description of the evolution of blockchain technology and
its versioning from 1.0 to 3.0 are explained below.
What is Blockchain?
A blockchain is a collection of records or an electronic
database, like a spreadsheet. A blockchain holds larger
amounts of information, such as cryptocurrency transaction
records, stored in “blocks” or groups, unlike a regular
spreadsheet.
What is Cryptocurrency?
Cryptocurrency is digital money with market value like
other currencies. Cryptocurrencies can also be used as a
store of value like gold. The first cryptocurrency
was Bitcoin which pioneered blockchain technology.
Advanced
Interdependent
Monetary Value
Usage
Mobility
Transparency
KEY TAKEAWAYS
Distributed ledgers have been around for decades but have become
more well-known, researched, used, and developed since Bitcoin
was introduced.
Distributed ledgers can be used in nearly every industry where data
is collected and used.
All blockchains are distributed ledgers, but not all distributed ledgers
are blockchains.
Computer and data scientists developed programs that reduced the need
for auditing data. These programs used automation and data encryption
techniques to verify database transactions or changes in a database's
state. This is called consensus—the act of automated majority agreement
on transaction validity, where a transaction is simply a change made to a
database's state.
If the network reaches a consensus about the validity of the latest ledger,
the transactions are finalized, encrypted, and used as a basis for the
following transactions. This is how blockchains develop—each block
contains encrypted information about the proceeding block, which makes
them impossible to change.
Supply chains can benefit greatly from DLT. Many factors make them
inefficient, inaccurate, and susceptible to corruption or losses. Fujitsu, a
global data and information technology company, has designed distributed
ledger technology to enhance supply chain transparency and fraud
prevention by securing and tracking data.
Fujitsu's Rice Exchange was created to trade rice, ensuring data regarding
sources, prices, insurance, shipping, and settlement are recorded on the
ledger. Anyone involved can look at any data and find accurate information
regarding the entire process because it cannot be changed. All data is
entered and secured automatically by the platform—it will eventually
provide tracking information for rice shipping containers as it is shipped to
its final destination.3
Uses of Distributed Ledger Technology
Aside from specific industries, there are also specific situations where DLT
solutions have proven to add value. Some examples of specific uses of
DLT include:
DLT holds many benefits over more traditional centralized ledger systems.
Because DLT is a decentralized system, there is no central point of control
or failure. This makes DLT more resilient to attacks and less vulnerable to
system-wide failures. Also, because DLT uses cryptographic algorithms to
secure data, DLT is nearly impossible to tamper with or forge records. This
enhances the trustworthiness of the data and reduces the risk of fraud.
DLT allows for transparent access to data and transactions, allowing all
users of the DLT greater visibility into the operations of the system. This
may lead to greater buy-in from users due to transparency and
accountability of records.
Last, DLT can enable greater financial inclusion. Some people may have
not have access to traditional banking services . As DLT often relies only
on an internet connection, individuals who would be otherwise limited may
have access to a greater range of services. This extends to the use of
different platforms and networks via interoperability.
Cons of DLT
Largely due to the infancy of DLT, there are still large downsides to the
technology. DLT is still complex and difficult to implement and maintain. In
order for companies or individuals to leverage the solution, it often
requiring specialized knowledge and expertise especially to implement.
Pros
Cons
Security
Traditional ledger technology often has a central point of control with one
single entity often in charge of the ledger. DLT makes the ledger more
resilient to attacks and less vulnerable to system-wide failures. As DLT
uses cryptographic algorithms to secure data, it also makes it more difficult
to tamper with or forge records.
Consider a traditional banking system where a banker is the central point
in ensuring your transaction is recorded correctly. In contrast, consider a
DLT solution built on a consensus mechanism where all distributed ledgers
must be in agreement about how a transaction is recorded. This validation
of transactions allows greater trust among users and relinquishes power
from any single individual.
Transparency
Accessibility
Distributed Ledgers
Can be encrypted
Can be immutable
Blockchain
Always encrypted
Always immutable
Courses
Jobs
Go to:
Definition/Introduction
The chain of custody is the most critical process of evidence documentation. It is a must to
assure the court of law that the evidence is authentic, i.e., it is the same evidence seized at the
crime scene. It was, at all times, in the custody of a person designated to handle it and for
which it was never unaccounted. Although it is a lengthy process, it is required for evidence
to be relevant in the court. The continuity of possession of evidence or custody of evidence
and its movement and location from the point of discovery and recovery (at the scene of a
crime or from a person), to its transport to the laboratory for examination and until the time it
is allowed and admitted in the court, is known as the chain of custody or chain of evidence.
Go to:
Issues of Concern
Importance of the Chain of Custody
The chain of custody proves the integrity of a piece of evidence.[1] A paper trail is
maintained so that the persons who had charge of the evidence at any given time can be
known quickly and summoned to testify during the trial if required.
A record of the chain of evidence must be maintained and established in the court whenever
presenting evidence as an exhibit.[2] Otherwise, the evidence may be inadmissible in the
court leading to serious questions regarding its legitimacy, integrity, and the examination
rendered upon it.[3] The chain of custody needs to document every transmission from the
moment the evidence is collected, from one person to another, to establish that nobody else
could have accessed or possessed that evidence without authorization. Although there is no
limit on the number of transfers, it is crucial to keep this number as low as possible.
Evidence requires conscientious handling to avert tampering. The chain of custody is said to
be the sequential documentation or trail that accounts for the sequence of custody, control,
transfer, analysis, and disposition of physical or electronic evidence. The goal is to establish
that the evidence is related to the alleged crime, was collected from the scene, and was in its
original/unaltered condition rather than having been tampered with or "planted" deceitfully to
make someone seem guilty. The chain of custody maintains the integrity of the sample. The
traceability of the record of the control, transfer, and analysis of samples indicates the
transparency to the procedure.[4]
Maintaining the chain of custody is critical in forensic practice.[5] This step of
documentation is vital because everything done for the examination and analysis of the
evidentiary sample must be authorized and recorded. The liability for the condition rests with
everyone coming in contact with it. The documentation should be comprehensive with
information regarding the circumstances of evidence collection, the people who handled the
evidence, period of the guardianship of evidence, safekeeping conditions while handling
and/or storing of the evidence, and how evidence is handed over to subsequent custodians
every time a transfer occurs (along with the signs of individuals involved at the respective
stage). It prevents police officers and other labs/law officials involved from tainting the
evidence or misplacing the piece of evidence as it would eventually be traceable back to
them, and they would be held responsible for the same.[6]
Go to:
Clinical Significance
The Relevance of the Chain of Custody Documentation
The documentation of the chain of custody serves three primary purposes; to ask relevant
questions regarding the evidence to the analytical laboratory, to maintain a record of the
chain of custody, and to document that the sample/evidence was handled only by approved
personnel and was not accessible for tampering before analysis.
The investigator or the person responsible for collecting evidence must complete the labels of
the sample container/bags and the chain of custody forms to enable tracking of the sample.
Each sample container label must receive a unique identification code and other relevant
information such as location, date and time of collection, the name, and signature of the
person who collected the sample, and signature of the witness(es). It is vital that the evidence
is appropriately packed to avoid damage during transport and must be preferably sealed in
tamper-evident/resistant bags or with tamper-evident tapes.
A separate chain of custody form must accompany different evidence bags. The chain of
custody form shall at least include the following information:
Unique identifier
Name and signature of the sample collector
Official address and contact number
Name of the recipient
Laboratory's address
Details of each sample, including:
o Unique identifier and matrix
o Date and time of collection
o Type of analysis required
Signatures of everyone involved in the chain of possession with date and time
Date and method of delivery
Authorization for the analysis of the sample
Any other information about the sample
Custody of the Evidence
Each time the charge of evidence is changed, an entry of signature, date, and time is
necessary for the chain of custody form. A sample shall be deemed to be in custody if it is in
actual physical possession of the authorized custodian in a secured place without access to
unauthorized personnel or any opportunity for tampering.
An illustration of the chain of custody in case of the recovery of a blood-stained flat iron rod
at the scene of a murder depicted in the routine text is as follows:
"Investigating officer Steve collects the iron rod, packs it, and hands it over to forensic
analyst Jack. Forensic analyst Jack analyses the iron rod at the laboratory and collects
fingerprints and blood from the iron rod. Jack then hands over the iron rod and all the
collected evidence from the iron rod to the evidence receiving clerk Tom. The evidence
receiving clerk, Tom, then stores the evidence in the evidence storage locker. Tom keeps a
record of all those who have accessed the original evidence."
During the trial, if the defense counsel raises queries on the chain of evidence, the records
will demonstrate that the iron rod in the evidence storage is the same as that collected from
the scene of a crime. Still, if inconsistencies persist and the prosecution cannot prove who
had the iron rod at a given point of time, then the chain is deemed broken, and the defense
counsel may seek in the court to have the resultant evidence annulled.
Other Scenarios of the Chain of Custody Usage
Apart from crime scene investigation, the other areas which also find the use of the
chain of custody maintenance include (but are not limited to):
Civil litigation
In dope testing of athletes
Managing the chain of source, e.g., to improve the traceability of food products (to
ensure authenticity to ethically sourced meat), or to ensure that wood products
originate from sustainably managed woodlands
In research (involving the use of animals) to know whether the animals were ethically
raised/sourced or not
In clinical trials
In the fields of history, art collection to see the provenance (timeline of the ownership,
custody, and/or location of the painting, document, or a piece of art/antique)
Postal services; supply chain integrity
The procurement of drugs for execution
Seizure of controlled/prohibited substance
Seizure of money/gold ornaments/other valuable items by customs, income tax, or
revenue departments
In violence and abuse cases
In firearms injuries, etc.[2][4][7][8][9][4]
The chain of custody is particularly significant in environmental sampling that can help
identify contamination and can be used to fix accountability. The laboratories should also be
aware of other legal implications such as chain of custody, expert testimony, and
appropriateness of scientific evidence.[10]
Chain of Custody in Legal Drug Testing
For drugs of abuse testing using urine samples, it is essential that the
donor/athlete/sportsperson identifies the sample and that the urine cup is sealed (preferably
by themselves). The chain of custody forms should then be signed by the donor/athlete,
followed by the person who collected the specimen. In the case of an insentient patient in the
emergency room, the nurse who collects the urine/blood sample can identify it in the patient's
place.
A related illustration depicted at the "American Association for Clinical Chemistry"- Clinical
Laboratory News by Professor Amitava Dasgupta is as follows:
"Police officer Ramsey seizes the urine sample collected from the suspect, and police
officer Fred transports the sample to the forensic/drug testing laboratory. At the laboratory,
case receiving staff, Paul, receives the sample, and scientist Derek analyzes it and detects a
metabolite of a banned substance/drug. Scientist Derek gives the result to principal
scientist Evan, who confirms the result."
Ramsey, Fred, Paul, Derek, and Evan would have to sign the chain of custody form
sequentially. Each one of them would be required to testify to recognize and establish the
condition of the sample while in their custody while maintaining the chain, which will
eventually prove that the suspect abused the banned substance.
Chain of Custody in Clinical/Medical Drug Testing
A drug test in a clinical setting using urine or blood samples is usually necessary in cases of
the suspected overdosing patient getting admitted in the emergency department except for the
cases where the results are positive, and the patient was in an accident or instances which
may result in a trial. The screening for drugs in urine samples is usually via immunoassays.
[11] Analytical methods confirm the initial results on the clinician's request.
The result of medical drug testing is confidential information. Even if the drug screen is
positive, it cannot be evidence against the individual for disciplinary or penal action. Hence,
the chain of custody is not required. It is necessary to confirm the results of the initial positive
immunoassay, as it may be necessary in court as evidence. In these cases, the chain of
custody is essential.
Conclusion
Maintaining the chain of custody should be considered a professional and ethical
responsibility by those in charge of the evidence. It is imperative to create appropriate
awareness regarding the importance and correct procedures of maintaining the chain of
custody of evidence among the people dealing with such cases. It is often ignored and given
very little significance as a presumably un-important and straightforward procedure. Still, it
must remain in mind that it is the most critical procedure which ultimately decides the
admissibility of evidence in the court of law.