03.03.2013 Views

Issues in Computer Forensics

Issues in Computer Forensics

Issues in Computer Forensics

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

But it is possible to recover deleted files even after its record is overwritten <strong>in</strong> the<br />

MFT and <strong>in</strong>dex entry of its parent folder. If the file data was large enough, the data<br />

would have resided <strong>in</strong> some clusters on the disk <strong>in</strong>stead of the MFT itself. Clusters<br />

hold<strong>in</strong>g data of deleted files compose part of the unallocated space on the disk, so a<br />

simple list<strong>in</strong>g of the file directory’s contents will not show the deleted files. Because the<br />

forensic analyst has all the contents of the suspect’s hard drive, the analyst could search<br />

for a deleted file’s contents on the disk us<strong>in</strong>g a hex editor or other forensic tools.<br />

Unallocated space is a huge source of <strong>in</strong>formation for analysts because deleted file data<br />

resid<strong>in</strong>g there may not have been overwritten yet. Unallocated space also conta<strong>in</strong>s<br />

contents of the <strong>in</strong>dex buffers of deleted folder entries.<br />

Mov<strong>in</strong>g and renam<strong>in</strong>g a file creates entries <strong>in</strong> the MFT that have the same MAC<br />

times, start<strong>in</strong>g clusters and file sizes. Forensic analysts can exam<strong>in</strong>e the record allocated<br />

renamed file <strong>in</strong> the MFT with the deleted file <strong>in</strong> the unallocated space to compare if they<br />

are <strong>in</strong>deed the same. If they are the same, this can establish proof that a suspect had<br />

knowledge of the file’s existence s<strong>in</strong>ce the suspect moved it (if only the suspect had<br />

access to the computer). MAC times also can help prove the suspect’s knowledge of a<br />

file and its contents as they show the time it was created, last modified, and last accessed.<br />

For example, if the file was last accessed at a time much later than the creation time, the<br />

<strong>in</strong>vestigator could show that the suspect know<strong>in</strong>gly used the file, as shown <strong>in</strong> a court case<br />

<strong>in</strong>volv<strong>in</strong>g child pornography <strong>in</strong> which the defendant had claimed he simply downloaded<br />

files of unknown content and forwarded them to others without view<strong>in</strong>g them. The<br />

forensic <strong>in</strong>vestigator had evidence of the MAC times of the files <strong>in</strong> question and that<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!