25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.2 Justification<br />

The thumbnail cache can provide an analyst with information about potential<br />

system and user activity. This is highlighted in cases such as United States V.<br />

Vosburgh [2010] and R v Ross Warwick Porter [2006] where the information<br />

contained within the thumbnail cache and the user behaviour that led to its<br />

presence on the system are important evidential concerns (See Chapter 4). An<br />

analyst interprets each artefact in the context of the system: by reconstructing<br />

the behaviour of the system it is possible to identify how events occurred and<br />

prove or disprove the hypothesis relating to the case. This process of contextual<br />

analysis suggests that the Forensic Computing community needs to be aware<br />

of both the structure and behaviour of an artefact in order to interpret its<br />

significance in a case. The thumbnail cache does not have a generic<br />

implementation and therefore understanding the unique structure and behaviour<br />

of each thumbnail cache can assist with interpreting the behaviour it represents.<br />

The growing interest in privacy and increased understanding of technology has<br />

led to an increase in user awareness of system files. For example, information<br />

about thumbnail cache can be found on sites such as YouTube [2013],<br />

Facebook [2013] and Twitter [2013], which highlights the growing interest<br />

amongst users in understanding system files. This has led to users attempting<br />

to disguise their behaviour by deleting system and user files which contain<br />

potential evidence of their activities. Therefore it is becoming increasingly<br />

important to look for crucial evidential artefacts that may be present in<br />

unallocated space.<br />

Files in unallocated space may become partially or completely overwritten,<br />

which may leave only fragments of the file on the system. Most file carving<br />

techniques focus on recovery of complete contiguous files; little research has<br />

been conducted into retrieving and reassembling individual file fragments. One<br />

Page 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!