29.10.2014 Views

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />

© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />

passwords and business corresp<strong>on</strong>dence? Chances are Hubby is going to fight you tooth and<br />

nail and, when finally ordered to make the machine available, he will clumsily seek to delete<br />

anything deemed compromising. But even if Hubby isn’t trying to cover his tracks, know that<br />

every time he saves a file, or starts a program—in fact every time he simply boots the<br />

machine—some latent data is altered or overwritten to the point it can never be retrieved. By<br />

way of example, Windows accesses (and thus modifies metadata for) about a thousand files<br />

every time it boots up (and you w<strong>on</strong>dered why booting took so l<strong>on</strong>g)!<br />

You must persuade the court that c<strong>on</strong>venti<strong>on</strong>al paper discovery is inadequate and that your<br />

client’s interests will be irreparably harmed if she isn’t granted access to Hubby’s computer and<br />

afforded the right to c<strong>on</strong>duct a complete forensic examinati<strong>on</strong> of same, starting with the creati<strong>on</strong><br />

of a sector-by-sector bit stream copy of the hard drive. Because Hubby has hired a savvy<br />

advocate, the judge is being assured that all reas<strong>on</strong>able steps have been taken to identify and<br />

protect computer data and that print outs of discoverable material will be furnished, subject to<br />

claims of privilege and other objecti<strong>on</strong>s. If you can’t articulate why your opp<strong>on</strong>ent’s proposal is<br />

hogwash and thoroughly educate the judge about the existence and <strong>on</strong>going destructi<strong>on</strong> of<br />

latent data, Missus is out-of-luck.<br />

To be prepared to educate the Court, evaluate and select a computer forensics effort or simply<br />

better understand and advise your clients about “safe” data practices, you need a working<br />

knowledge of how a computer stores data and, more to the point, where and how data lives <strong>on</strong><br />

after it’s supposed to be g<strong>on</strong>e.<br />

To get that working knowledge, this secti<strong>on</strong> explains (as simply and painlessly as possible) the<br />

nuts and bolts of computer storage, beginning with the bits and bytes that are the argot of all<br />

digital computing, then <strong>on</strong> to the mechanics of hard drive operati<strong>on</strong> and finally to the nooks and<br />

crannies where data hides when it doesn’t want to be dispatched to that big CPU in the sky.<br />

Bits and Bytes<br />

You can become very facile with computers never knowing the nitty-gritty about bits and bytes,<br />

but when it comes to building a fundamental understanding of computer forensics, you’ve got to<br />

begin with the building blocks of computer data: bits and bytes. You know something of bits and<br />

bytes because every computer ad you’ve seen uses them in some impressive-sounding way.<br />

The capacity of computer memory (RAM), size of computer storage (disks), and the data<br />

throughput speed of modems and networks are all customarily expressed in bits and bytes.<br />

This Little Piggy went to Market<br />

When we express a number like 9,465 in the decimal system, we understand that each digit<br />

represents some decimal multiple. The nine is in the thousands place, the four in the hundreds,<br />

the six in the tens place and so <strong>on</strong>. You could express 9,465 as: (9 x 1000) + (4 x 100) + (6 x<br />

10) + (5 x 1), but check writing would quickly become an even more tedious chore. We just<br />

know that it is a decimal system and process the string 9,465 as nine thousand four hundred<br />

sixty-five.<br />

Another equivalent method would be to use powers of ten. We can express 9,645 as: (9 x 10 3 )<br />

+ (4 x 10 2 ) + (6 x 10 1 ) + (5 x 10 0 ). This is a “base-ten” system.<br />

<strong>Page</strong> 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!