23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

14. Similar to the step (11), once “F<strong>in</strong>ish” button was clicked; the forensic<br />

software EnCase started acquir<strong>in</strong>g the orig<strong>in</strong>al collected data from the<br />

flash drive B to the output folder (C:\Program<br />

Files\EnCase6\ArKar\Evidences_<strong>RFID</strong>).<br />

Figure 12.12: Screenshot of the acquisition process by EnCase<br />

Astonish<strong>in</strong>gly, the time taken to acquire the collected evidences from the<br />

flash drive by us<strong>in</strong>g the data compression method (“Good”) was almost<br />

the same as that of the method used without compression.<br />

The forensic image acquisition was completed. The MD5 hash<br />

value of the acquired data, the time taken to acquire the orig<strong>in</strong>al evidence<br />

from the flash drive, and the location of the image copy can be found <strong>in</strong><br />

the completion result (Figure A12.13).<br />

Figure A12.13: Screenshot of the Completed Acquisition<br />

112

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!