13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In order to achieve this goal, the following part of this chapter covers the statistical analysis of the information<br />

present on different kind of devices. It should be underlined that the approach is based on empirical data<br />

mixed with a statistical overview, and the results can change if correlated with information-gathering about the<br />

ITTI.<br />

When collecting evidence, it is recommended to proceed from the volatile to the less volatile. This is an<br />

example of order of volatility for a typical system:<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

registers, cache;<br />

routing table, address resolution protocol (ARP) cache, process table, kernel statistics, memory;<br />

temporary file systems;<br />

disk;<br />

remote logging and monitoring data that is relevant to the system in question;<br />

physical configuration, network topology;<br />

archival media.<br />

The goal in this study is to assure, statistically, that the gathered information is the most comprehensive<br />

possible, in a way that can lead further operations.<br />

To reach this goal, an algorithm to assist in determining the major possibility of information gathering is<br />

needed.<br />

For this algorithm the following information is needed in order to carry out the statistical analysis:<br />

<br />

<br />

<br />

<br />

Effectiveness: in percentage terms, the likelihood of the device containing useful information;<br />

Level of effort / resources: estimated time to perform prioritisation based on small, medium and large<br />

estimates;<br />

Compatibility of toolsets: the amount of time in minutes to adjust or install the prerequisites for this<br />

device;<br />

Familiarity with devices and this toolset: based on descriptions of novice, experienced, and expert.<br />

The first step to take in addressing the statistical analysis is to obtain the needed parameters, defined as<br />

follows:<br />

<br />

<br />

<br />

<br />

<br />

<br />

Effectiveness: this parameter should cover how effective an acquisition of a different type of device can<br />

be;<br />

Acquisition time for dataset size: this parameter should address the amount of data that can be acquired in<br />

the mission amount of time;<br />

Additional costs are ‘converted’ to minutes to adjust methods that require an additional set-up time or<br />

resources: this parameter should cover the troubleshooting time needed in case of tools failure;<br />

Power status: this parameter should cover the power status of the device, in case of a portable device this<br />

parameter is critical, but the risk can be reduced using an external power supply;<br />

Connectivity: this parameter should cover the connectivity status of the device, this evaluation should be<br />

done before the acquisition, also because, as explained in Chapter 8 – ‘Exfiltration Solutions, the acquired<br />

device should be stored in a ‘safe place’ to avoid enemy interaction with it;<br />

Anti-forensics measures: this parameter should take into account the statistical degradation of information<br />

if an anti-forensics measure is in place, to understand and recognise anti-forensics measures (see Chapter<br />

7 – ’Anti-Forensics Measures’ ).<br />

The study starts by addressing which kind of device is most likely collectable from the operators on the ground,<br />

as the first step of the analysis. From this algorithm, the statistical gatherable intelligence is calculated.<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!