23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix 12: Steps for Copy<strong>in</strong>g and Hash<strong>in</strong>g the Orig<strong>in</strong>al Evidence Images<br />

from Flash (Evidence) Drive<br />

1. Tableau Forensic USB Bridge Write Blocker (WB) was connected to the<br />

forensic work-station (FW).<br />

2. The WB was tested without attach<strong>in</strong>g the evidence drive before copy<strong>in</strong>g<br />

the orig<strong>in</strong>al evidence images from the flash drive (which was<br />

ARKAR_USB).<br />

3. After confirm<strong>in</strong>g the WB device was <strong>in</strong> work<strong>in</strong>g condition, the flash drive<br />

was attached to the WB via USB port. As seen <strong>in</strong> the Figure A12.1, the<br />

drive is detected as B: on the FW.<br />

Figure A12.1: The evidence drive is detected on the forensic workstation<br />

4. Opened the EnCase software (v. 6.16.1.4) runn<strong>in</strong>g on the FW and created<br />

a new case as shown <strong>in</strong> the figure below.<br />

Figure A12.2: Creat<strong>in</strong>g a new case<br />

107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!