02.12.2012 Views

gengenbach-forensic-workflows-2012

gengenbach-forensic-workflows-2012

gengenbach-forensic-workflows-2012

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

However, their work also demonstrates the stubborn resilience of data that is written to a<br />

hard drive, outlining the various strategies implemented in recovering “lost” data. 40 The<br />

paradoxical fragility and durability of digital information is highlighted by Simson<br />

Garfinkel and Abhi Shelat in “Remembrance of Data Passed: A Study of Disk Sanitation<br />

Practices,” in which the authors reveal that an astonishing amount of information may<br />

still be available on hard drives improperly sanitized by their previous owners. 41<br />

Jeff Rothenberg also explores the nature of digital information in “Ensuring the<br />

Longevity of Digital Information,” another 1999 study. Rothenberg lays out obstacles to<br />

digital preservation through a hypothetical scenario involving a compact disc encountered<br />

by his grandchildren: “They must not only be able to extract the content on the disc—<br />

they must also interpret it correctly.” 42 Rothenberg argues that digital preservation efforts<br />

must be based around the bitstream—literally, the linear bit-by-bit stream of information<br />

on a storage medium 43 —but also notes that any preservation activity must support the<br />

processes and programs necessary to interpret those ones and zeros properly as a digital<br />

object. 44 This is because “a document file is not a document in its own right: it merely<br />

describes a document that comes into existence only when the file is 'run' by the program<br />

that created it.” 45 The interactions between digital objects described by Rothenberg are<br />

(accessed June <strong>2012</strong>). The components and operation of a “spinning disk” hard drive are also<br />

explained in great detail in Kirschenbaum, Mechanisms, 86-96; and Ron White, How Computers Work.<br />

Timothy Edward Downs, illus. 9 th edition (Indianapolis, IN: Que Publishing, 2008), 158-171.<br />

40<br />

Ross and Gow, Digital Archaeology, 17-26.<br />

41<br />

Simson Garfinkel and Abhi Shelat, “Remembrance of Data Passed: A Study of Disk Sanitation Practices,”<br />

IEEE Security and Privacy (January/February 2003), 17-27,<br />

http://cdn.computerscience1.net/2005/fall/lectures/8/articles8.pdf (accessed August <strong>2012</strong>).<br />

42<br />

Rothenberg, “Ensuring the Longevity of Digital Information,” 2.<br />

43<br />

The writing of bits onto a storage media to create the bitstream is described in depth in White, How<br />

Computers Work, 158-171.<br />

44<br />

Rothenberg, 2.<br />

45<br />

Ibid., 10. For more information on the representational levels of digital objects, see David Levy, Scrolling<br />

Forward: Making Sense of Documents in the Digital World (New York, NY: Arcade Publishing, 2001),<br />

especially Chapter 2, “What Are Documents?” pp. 21-38; and Kenneth Thibodeau, “Overview of<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!