Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />
© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />
and lower case, as well as punctuati<strong>on</strong> marks and special characters. This set of numbers is<br />
known as the ASCII code (for American Standard Code for Informati<strong>on</strong> Interchange,<br />
pr<strong>on</strong>ounced “ask-key”), and is comm<strong>on</strong>ly used by many different types of computers. By limiting<br />
the ASCII character set to less than 256 variati<strong>on</strong>s, each letter (or punctuati<strong>on</strong> mark) can be<br />
stored as <strong>on</strong>e byte of informati<strong>on</strong> in the computer's memory. A byte can also hold a string of<br />
bits to express other informati<strong>on</strong>, such as the descripti<strong>on</strong> of a visual image, like the pixels or<br />
colors in a photograph. The byte, then, is the basic unit of computer data.<br />
Why is an eight-bit string the fundamental building block of computing? It just sort of happened<br />
that way. In this time of cheap memory, expansive storage and lightning-fast processors, it’s<br />
easy to forget how very scarce and costly all these resources were at the dawn of the computing<br />
era. Eight bits was basically the smallest block of data that would suffice to represent the<br />
minimum complement of alphabetic characters, decimal digits, punctuati<strong>on</strong> and special<br />
instructi<strong>on</strong>s desired by the pi<strong>on</strong>eers in computer engineering. It was in another sense about all<br />
the data early processors could chew <strong>on</strong> at a time, perhaps explaining the name “byte” coined<br />
by IBM.<br />
Storing alphanumeric data <strong>on</strong>e character to a byte works in places that employ a twenty-six<br />
letter alphabet, but what about countries like China, Japan or Korea where the “alphabet”<br />
c<strong>on</strong>sists of thousands of characters? To address this, many applicati<strong>on</strong>s dedicate two bytes to<br />
recording each character, with the most widely accepted double-byte character system called<br />
Unicode.<br />
Now it may seem that you’ve asked for the time and been told the history of clock making, but<br />
computer forensics is all about recorded data, and all computer data exists as bits and bytes.<br />
What’s more, you can’t tear open a computer’s hard drive and find tiny strings of <strong>on</strong>es and zeros<br />
written <strong>on</strong> the disk, let al<strong>on</strong>e words and pictures. The billi<strong>on</strong>s of bits and bytes <strong>on</strong> the hard drive<br />
exist <strong>on</strong>ly as faint vestiges of magnetism, microscopic in size and entirely invisible. It’s down<br />
here--way, way down where a dust mote is the size of Everest and a human hair looks like a<br />
giant sequoia--where all the fun begins.<br />
Informati<strong>on</strong> Storage<br />
We store informati<strong>on</strong> by translating it into a physical manifestati<strong>on</strong>: cave drawings, Gutenberg<br />
bibles, musical notes, Braille dots or undulating grooves in a ph<strong>on</strong>ograph record. Because<br />
binary data is no more than a l<strong>on</strong>g, l<strong>on</strong>g sequence of <strong>on</strong>es and zeros, it can be recorded by any<br />
number of alternate physical phenomena. You could build a computer that stored data as a row<br />
of beads (the abacus), holes punched in paper (a piano roll), black and white vertical lines (bar<br />
codes) or bottles of beer <strong>on</strong> the wall (still waiting for this <strong>on</strong>e!).<br />
But if we build our computer to store data using bottles of beer <strong>on</strong> the wall, we’d better be plenty<br />
thirsty because we will need something like 99,999,999 bottles of beer to get up and running.<br />
And we will need a whole lot of time to set those bottles up, count them and replace them as<br />
data changes. Oh, and we will need something like the Great Wall of China to set them <strong>on</strong>.<br />
Needless to say, despite the impressive efforts <strong>on</strong>going at major universities and bowling alleys<br />
to assemble the raw materials, our beer bottle data storage system isn’t very practical. Instead,<br />
<strong>Page</strong> 13