Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />
© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />
passwords and business corresp<strong>on</strong>dence? Chances are Hubby is going to fight you tooth and<br />
nail and, when finally ordered to make the machine available, he will clumsily seek to delete<br />
anything deemed compromising. But even if Hubby isn’t trying to cover his tracks, know that<br />
every time he saves a file, or starts a program—in fact every time he simply boots the<br />
machine—some latent data is altered or overwritten to the point it can never be retrieved. By<br />
way of example, Windows accesses (and thus modifies metadata for) about a thousand files<br />
every time it boots up (and you w<strong>on</strong>dered why booting took so l<strong>on</strong>g)!<br />
You must persuade the court that c<strong>on</strong>venti<strong>on</strong>al paper discovery is inadequate and that your<br />
client’s interests will be irreparably harmed if she isn’t granted access to Hubby’s computer and<br />
afforded the right to c<strong>on</strong>duct a complete forensic examinati<strong>on</strong> of same, starting with the creati<strong>on</strong><br />
of a sector-by-sector bit stream copy of the hard drive. Because Hubby has hired a savvy<br />
advocate, the judge is being assured that all reas<strong>on</strong>able steps have been taken to identify and<br />
protect computer data and that print outs of discoverable material will be furnished, subject to<br />
claims of privilege and other objecti<strong>on</strong>s. If you can’t articulate why your opp<strong>on</strong>ent’s proposal is<br />
hogwash and thoroughly educate the judge about the existence and <strong>on</strong>going destructi<strong>on</strong> of<br />
latent data, Missus is out-of-luck.<br />
To be prepared to educate the Court, evaluate and select a computer forensics effort or simply<br />
better understand and advise your clients about “safe” data practices, you need a working<br />
knowledge of how a computer stores data and, more to the point, where and how data lives <strong>on</strong><br />
after it’s supposed to be g<strong>on</strong>e.<br />
To get that working knowledge, this secti<strong>on</strong> explains (as simply and painlessly as possible) the<br />
nuts and bolts of computer storage, beginning with the bits and bytes that are the argot of all<br />
digital computing, then <strong>on</strong> to the mechanics of hard drive operati<strong>on</strong> and finally to the nooks and<br />
crannies where data hides when it doesn’t want to be dispatched to that big CPU in the sky.<br />
Bits and Bytes<br />
You can become very facile with computers never knowing the nitty-gritty about bits and bytes,<br />
but when it comes to building a fundamental understanding of computer forensics, you’ve got to<br />
begin with the building blocks of computer data: bits and bytes. You know something of bits and<br />
bytes because every computer ad you’ve seen uses them in some impressive-sounding way.<br />
The capacity of computer memory (RAM), size of computer storage (disks), and the data<br />
throughput speed of modems and networks are all customarily expressed in bits and bytes.<br />
This Little Piggy went to Market<br />
When we express a number like 9,465 in the decimal system, we understand that each digit<br />
represents some decimal multiple. The nine is in the thousands place, the four in the hundreds,<br />
the six in the tens place and so <strong>on</strong>. You could express 9,465 as: (9 x 1000) + (4 x 100) + (6 x<br />
10) + (5 x 1), but check writing would quickly become an even more tedious chore. We just<br />
know that it is a decimal system and process the string 9,465 as nine thousand four hundred<br />
sixty-five.<br />
Another equivalent method would be to use powers of ten. We can express 9,645 as: (9 x 10 3 )<br />
+ (4 x 10 2 ) + (6 x 10 1 ) + (5 x 10 0 ). This is a “base-ten” system.<br />
<strong>Page</strong> 11