23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

all the collected digital evidence data<br />

was <strong>in</strong> order to ma<strong>in</strong>ta<strong>in</strong> and security of<br />

the evidence. F<strong>in</strong>ally, the hash values<br />

before and after analysis were<br />

compared and found exactly the same<br />

(see Appendix 22). Hence, the<br />

preservation of the digital evidence data<br />

was done <strong>in</strong> a forensically sound<br />

manner dur<strong>in</strong>g the research experiment<br />

as the hash values were not changed.<br />

SUMMARY:<br />

The acquisition and analysis methods of the potential evidence were performed<br />

and documented <strong>in</strong> a forensically sound manner, as stated <strong>in</strong> Section 4.2 and<br />

Section 4.3. MD5 hash<strong>in</strong>g on the acquired data was done by us<strong>in</strong>g different<br />

forensic tools and techniques. The acquired evidence is credible, reliable and<br />

repeatable and acceptable to the court of law as the hash values of collected<br />

evidence before and after analysis are precisely the same. Although there are<br />

some limitations as stated <strong>in</strong> the above mentioned argument aga<strong>in</strong>st, the<br />

arguments made for and aga<strong>in</strong>st prove the hypothesis 9 is to be accepted <strong>in</strong> this<br />

research experiment.<br />

Table 5.4: Secondary Research Question 4 and Tested Hypothesis<br />

Secondary Question 4: What are the methods to analyze the acquired evidence?<br />

Hypothesis 8: The significant evidence can be extracted by analyz<strong>in</strong>g collected<br />

data with EnCase forensic software, W<strong>in</strong>dows Forensic Toolchest (WFT), and a<br />

hardware write blocker (Tableau Forensic USB Bridge).<br />

ARGUMENT FOR:<br />

Forensic copy of the collected data was<br />

performed by us<strong>in</strong>g a hardware write<br />

blocker connected to the USP port of<br />

the forensic work-station <strong>in</strong>stalled with<br />

EnCase forensic software (see<br />

Appendix 12). Hence, the <strong>in</strong>tegrity of<br />

ARGUMENT AGAINST:<br />

Physical evidence could also be found<br />

at the POS given the <strong>Tag</strong> repository<br />

(assum<strong>in</strong>g the poison <strong>Tag</strong> had not yet<br />

been rewritten).<br />

Further <strong>in</strong>vestigation of the bus<strong>in</strong>ess<br />

136

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!