response_to_eric_cook

advertisement
1. The preparation phase of most tasks is arguably the most important phase of the process. In
sports, a team that walks onto the field without preparation, in this case practice will likely not
win the game. A doctor who performs surgery without washing their hands and ensuring that
the tools are properly cleaned risks jeopardizing the outcome of the procedure due to an
increased likelihood of an infection. In each case, the proper preparation is a must in order for
the best possible outcome to be achieved.
The same holds true for the digital investigation process. Prior to any digital investigation, certain steps
must be properly completed before the investigation can actually begin. Failure to exercise due diligence
in completing the steps could allow the opposing lawyer in court to question if the methods used to
conduct the investigation were completed in accordance with acceptable practices of a digital
investigation. If not, then key evidence used to prosecute an individual gained through the digital
investigation could not be admissible in court. If this was the only evidence drawing a conclusive link
between the suspect and the crime that was committed, then the individual could walk free or face a
lesser charge. For example, training falls into the preparation stages of a digital investigation.
Department of Justice (DOJ) regulations are applicable in the United States, with other developed
countries having regulations of their own (Nelson, Phillips & Steuart, 2010, p. 150). Entering a digital
investigation without knowing the requisite laws and regulations beforehand is, going back to the sports
analogy, is like a football player not knowing the rules before stepping on the playing field. Additionally,
ensuring that the proper hardware and other tools needed for the investigation are in proper working
order before beginning an investigation is necessary. For example, ensuring that the forensic technician
has a write blocking device before entering a digital crime scene is almost a most. Not having this device
could allow the contents of a hard drive to be compromised when being imaged as part of the evidence
collection process (Department of Justice, 2004). This act of preparation is equivalent to a doctor
ensuring that they have a scalpel and not a butter knife before going into surgery. To ensure that a
computer forensic technician properly executes actions before, during, and after an investigation, a
checklist detailing each step in the process should be created (Boyd & Forster, 2004). The checklist
should flow logically in chronological order and be easy to follow to ensure maximum utility. Following
this checklist reduces the chances that a mistake is made that compromises the investigation.
2. Encryption and steganography are two methods used to conceal data within storage media.
More novels methods are also available, which a suspect with limited experience may try first.
For example, a pedophile with child pornography on their computer may not be that computer
savvy and thinks that simply making the file hidden is enough protection. A number of tools are
available in order to discover hidden files, such as AccessData’s Forensic Toolkit (FTK).
Additionally, some who are slightly more savvy could change the file extension of an explicit
image to something like .exe, which would change the icon to hide the fact the file is an image
(Casey, 2011). This too is easily detected by an experienced investigator with the proper tools at
their disposal.
Encryption, unlike these other methods, does not necessarily hide the data within the storage
media. However, the fact that the file is there and may contain information is obvious, but is difficult
or in some cases impossible to access. Advanced algorithms with varying degrees of difficulty render
the contents of a file or folder unreadable unless the proper decryption keys or a method to decrypt
the file(s) are available. Generally, a password is needed to decrypt the file. If simple, a simple
dictionary attack against the encrypted file could unencrypt the file. However, if more advanced
encryption is applied, a brute force attack may be necessary, with the downside being that this can
take much longer and in the end may not even work. Additionally, the use of tools such as the
Password Recovery Toolkit and the Distributed Network Attack (DNA) from AccessData can also
assist with this effort (Casey, 2009).
Steganography, another more advanced method of concealing data within a storage medium,
generally involves hiding a file within an image (Nelson, Phillips & Steuart, 2010). Freely available
software such as S-Tools allows even a novice user to hide a file within an image. A malicious actor
could use S-Tools to hide a file containing a list of compromised usernames and passwords used in
an attack within an image of something like a smiley face, icon, or anything else. The file could then
be posted to an online forum, e-mailed to an accomplice, and then continue to be used if the
recipients’ have the password. In order to detect if steganography has been used, the existence one
of these tools is a starting point. Additionally, comparing timestamps of the last modified date of
files against the steganography tools could hint towards files that may contain hidden information.
Any suspicious files can be further examined to abstract this information (Nelson, Phillips & Steuart,
2010).
Download