11.07.2015 Views

Litigator's Guide to Metadata - Codemantra.net

Litigator's Guide to Metadata - Codemantra.net

Litigator's Guide to Metadata - Codemantra.net

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For example, digital pho<strong>to</strong>graphs can carry dozens of embeddedfields of metadata detailing information about the date and time thepho<strong>to</strong> was taken, the camera, settings, exposure, lighting, evenprecise geolocation data. Many are surprised <strong>to</strong> learn that pho<strong>to</strong>staken with cell phones having GPS capabilities (like the AppleiPhone) contain detailed information about where the pho<strong>to</strong> wastaken <strong>to</strong> a precision of about ten meters.Pho<strong>to</strong>s taken with cellphones having GPScapabilities…containdetailed informationabout where the pho<strong>to</strong>was taken.The popular Microsoft Outlook e-mail client application provides for more than 180 standardapplication metadata fields which users may select <strong>to</strong> cus<strong>to</strong>mize their view. These are set outfully in Appendix C.But even this broad swath of metadata is still only part of the probative information aboutinformation recorded by computers. Within the Master File Table and index records used byWindows <strong>to</strong> track all files, still more attributes are encoded in hexadecimal notation. In fact, anironic aspect of Windows is that the record used <strong>to</strong> track information about a file may be largerthan the file itself! S<strong>to</strong>red within the hives of the System Registry—the ―Big Brother‖ database thattracks attributes covering almost any aspect of the system—are thousands upon thousands ofattribute values called ―registry keys.‖ Other records and logs track <strong>net</strong>work activity and journalvirtually every action.Matryoshka <strong>Metadata</strong>Matryoshka are carved, cylindrical Russian dolls that nest inside one another. It’s helpful <strong>to</strong> thinkof computer data the same way. If the evidence of interest is a Word document attached <strong>to</strong> an e-mail, the document has its usual complement of application metadata that moves with the file; but,as it nests within an e-mail message, its ―system‖ metadata is only that which is contained withinthe transporting message. The transporting message, in turn, carries its own metadataconcerning transit, addressing, structure, encoding and the like. The message is managed byOutlook, which maintains a rich complement of metadata about the message and about its ownconfiguration. As configured, Outlook may s<strong>to</strong>re all messages and application metadata in acontainer file called Outlook.PST. This container fileexists within a file system of a computer that s<strong>to</strong>ressystem metadata about the container file, such aswhere the file is s<strong>to</strong>red, under whose user account,when it was last modified, its size, name, associatedapplication and so on.Within this Matryoshka maelstrom of metadata,some information is readily accessible andcomprehensible while other data is so Byzantine andcryptic as <strong>to</strong> cause even highly skilled computerforensic examiners <strong>to</strong> scratch their heads.Forms of <strong>Metadata</strong>Now that your head is spinning from all the types, purposes and sources of metadata, let’s addanother complexity concern: the form of the metadata. <strong>Metadata</strong> aren’t presented the same way8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!