13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

common, as it could also wipe the data during accidents such as power loss in cell towers. Storage media 18 and<br />

other devices also exist which can be destructed physically via an SMS and have a self-destruct functionality<br />

(that is launched if the device is put into a Faraday cage).<br />

<br />

<br />

Recommendation: Check the number of wireless connections and devices with specific equipment to<br />

discover if storage media have integrated GSM receivers (scan and identify).<br />

Recommendation: Mark devices that have wireless connections (document). Seal the captured devices into<br />

Faraday bags or similar (secure).<br />

o Be aware that some of the devices might wipe themselves when they lose Internet/GSM<br />

connectivity (secure). However, because it is rare, use the Faraday bag from these two options.<br />

Figure 8. Autothysis128t 19<br />

In addition to remote commands via SMSs, Autothysis128t SSD (shown in Figure 8) provides some other means<br />

of self-destruction. When the computer or the SSD is put into a Faraday cage, the SSD will self-destruct after a<br />

set number of hours of GSM starvation. It is also possible to set it up so that the self-destruct is triggered when<br />

it is removed from the SATA III interface.<br />

Before turning any device off, it is good to be aware that the enemy might have manipulated a ‘graceful<br />

shutdown’ process to prevent evidence recovery. As Lance Cleghorn writes [21], many technology professionals<br />

feel compelled to shut down the computer in question through a graceful shutdown rather than remove power<br />

from the system and risk data corruption or loss of volatile data not committed to permanent storage.<br />

However, it is possible to modify the graceful shutdown process with anti-forensics techniques so that<br />

evidences can be disrupted or destroyed. This is one reason why the shutdown of the device should always be<br />

done by pulling the power plug and/or removing the battery from the device.<br />

7.2.2 Wiping Data When Use of Forensics Tools Is Detected<br />

This chapter presents techniques that can be used to wipe the data when the system detects the use of digital<br />

forensic investigation tools.<br />

18 One such approach is presented by SecureDrives. Autothysis128t SSD, presented in Figure 8, has a GSM based remote control allowing<br />

for data destruction and physical fragmentation of the NAND-Flash storage on demand.<br />

19 Figure from http://securedrives.co.uk.<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!