29.10.2014 Views

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />

© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />

course, whatever points you score forcing the examiner to admit he didn't pursue certain<br />

searches can be lost when the witness returns the next day having completed those<br />

searches without finding anything.<br />

Dealing with Digests<br />

Disk drives are so vast and operating systems so complex, how can a forensic examiner be<br />

certain that some<strong>on</strong>e hasn't slipped in incriminating data? A forensic examiner might<br />

resp<strong>on</strong>d that, when acquired, the data <strong>on</strong> the hard drive is "hashed" using sophisticated<br />

encrypti<strong>on</strong> algorithms and a message digest is calculated, functi<strong>on</strong>ing as a fingerprint of the<br />

drive. Once hashed, the chance that tampering would not be detected is <strong>on</strong>e in 340<br />

undecilli<strong>on</strong>--and that's <strong>on</strong>e in 340 followed by 36 zeroes! That’s FAR more reliable than DNA<br />

evidence! It’s an impressive asserti<strong>on</strong>, and even true…to a point. Hash collisi<strong>on</strong>s have been<br />

engineered in recent years for the comm<strong>on</strong> MD5 hash algorithm. Though these proven<br />

defects in the algorithm d<strong>on</strong>’t seriously imperil its value in forensics, an examiner who testifies<br />

hash collisi<strong>on</strong>s are “impossible” is <strong>on</strong>e not keeping abreast of the discipline.<br />

C<strong>on</strong>trived collisi<strong>on</strong>s aside, drive hashing and the creati<strong>on</strong> of those message digest<br />

“fingerprints” is indeed <strong>on</strong>e of the slickest tools in a forensic examiner's arsenal. The<br />

reliability asserti<strong>on</strong> is genuine (though the probabilities vary am<strong>on</strong>g commentators). But, the<br />

probative value of hashing depends up<strong>on</strong> the points in time during the acquisiti<strong>on</strong> and<br />

analysis process when hashing is d<strong>on</strong>e and, ultimately, up<strong>on</strong> the veracity of the examiner<br />

who claims to have hashed the drive. Two identical message digests of a drive tell you <strong>on</strong>ly<br />

that no tampering occurred between the time those two digests were computed, but tell you<br />

nothing about tampering at other times. If a drive is altered, then hashed, subsequent<br />

hashes can be a perfect match without revealing the earlier alterati<strong>on</strong>. Likewise, an earlier<br />

hash can't tell you anything about subsequent handling; at least, not until the drive is hashed<br />

again and the digests compared. The point is, be sure you know when the hashing was d<strong>on</strong>e<br />

and where that activity falls with respect to the entire chain of custody. Also, c<strong>on</strong>sider<br />

whether the hashing was d<strong>on</strong>e by some<strong>on</strong>e telling the truth. A cross-examiner might score<br />

some cheap points by getting the witness to attest to the importance of hashing, and then<br />

asking the witness to explain the mathematical process by which such a critical step is<br />

accomplished. Some experts understand cryptography and can explain it, but I suspect their<br />

ranks are small.<br />

Pornographic Images<br />

Aside from the scourge of child pornography, the law makes a pers<strong>on</strong>'s proclivity for<br />

pornography their own affair; unless, of course, that pers<strong>on</strong> is my employee and dumps their<br />

trash <strong>on</strong> my computer system. Pornography, the bread-and-butter of law enforcement<br />

computer forensic examinati<strong>on</strong>s, is a civil litigati<strong>on</strong> issue in cases of wr<strong>on</strong>gful terminati<strong>on</strong> or<br />

harassment. When used as grounds for discipline or terminati<strong>on</strong>, or when the presence of<br />

smut will otherwise be used to impeach, it's essential to be able to reliably link the<br />

objecti<strong>on</strong>able imagery to its true owner.<br />

It's a simple matter to load a computer with dirty pictures unbeknownst to the owner. One<br />

reprehensible way to do this is to embed the pictures in an innocuous e-mail but specify the<br />

dimensi<strong>on</strong>s of the image to be a single pixel. That way, all of the image data gets<br />

<strong>Page</strong> 84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!