iTnews

Finding digital fingerprints fast

By Juha Saarinen, iTnews on May 24, 2016 1:34PM
Finding digital fingerprints fast

Data forensics in real time.

It's fast becoming the norm that criminal and civil investigations centre on data stored in digital devices used by individuals and businesses.

This may seem like a straightforward case of taking data from the devices and wading through it, but digital forensics present their own set of unusual and developing challenges, according to Dr Bradley Schatz.

Schatz has put 18 years of computing expertise and research into developing new methods to rapidly acquire relevant information for investigations.

He has developed the Advanced Forensics File Format (AFF4) - together with Simson Garfinkel of the US NIST and PyFLAG forensics and log analysis graphical UI developer Michael Cohen - as open source, and is pushing for the format to become the standard in forensic imaging.

According to Schatz - who is presenting at this week's AusCERT conference on the Gold Coast - the problem is that devices that store important data are now ubiquitous, and the amounts of information on them is rising exponentially. 

It means digital investigators are having to make choices about which ones to analyse, given the impractical amount of time it would take to acquire and analyse content on all available systems.

Schatz is called on as an independent expert in trials around Australia. He says data is often acquired under difficult circumstances, meaning digital investigators need to make decisions fast.

“Search warrants now involve numerous devices in the family home, and investigators need to quickly assess what contains relevant data and what doesn’t. Given their intrusiveness, they are high pressure environments,” Schatz told iTnews.

“At one warrant execution on a family home, the children were clearly distressed by the intrusion.

"While all involved were sensitive to this, the children needed to be moved to other carers, and family life was significantly impacted. We were there late into the night."

Adding to the time pressure, warrants and court orders contain time limits.

The current approach by investigators, according to Schatz, is to triage - to identify only the most important devices and leave the rest behind.

"[But] the problem with these approaches is that the investigator has limited ability to do continued analysis beyond their pre-programmed features. Their output is used to base the decision of seizing the device, or not seizing it," he said.

He argues that a better approach would be for analysts to use tools that have immediate visibility of the data to perform this triage, allowing the investigators to choose in real-time the devices that are relevant, making the entire process faster and more efficient.

“It’s not just about speedier imaging, but about not having to wait until imaging is done," Schatz said.

"Being able to analyse while you image, and based on that analysis, and choosing to collect only the most important data."

Schatz says using a file system better suited for forensic work - specfically AFF4 - can accelerate this analysis.

The tool allows analysts to work with multiple streams of data of the same volume, with support for metadata, signatures and cryptography.

“Ultimately this will enable investigators to preserve more evidence, and of a higher quality,” Schatz argues.

“Widespread adoption of a forensic approach that preserves all evidence that the investigator uses to base their decisions on is a win for reproducibility and third party scrutiny, which is fundamental to forensics."

Dr Schatz will present on AFF4 and his case for a new standard in forensic imaging at AusCERT's 2016 conference on the Gold Coast this week.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
auscert2016 bradley schatz digital forensics security

Partner Content

Beat the DDoS blackmails in 2021
Partner Content Beat the DDoS blackmails in 2021
Why companies fail at picking cloud modernisation partners
Partner Content Why companies fail at picking cloud modernisation partners
Shut the door on ransomware
Partner Content Shut the door on ransomware
MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics

Sponsored Whitepapers

Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution
Effectively addressing advanced threats
Effectively addressing advanced threats
The risky business of open source
The risky business of open source
Ensure your e-signatures are legally binding
Ensure your e-signatures are legally binding
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • Beat the DDoS blackmailers in 2021
By Juha Saarinen, iTnews
May 24 2016
1:34PM
0 Comments

Related Articles

  • ASIC joins Reserve Bank NZ as victim of Accellion hack
  • North Koreans social engineer and hack vulnerability developers
  • SonicWall discloses "coordinated attack" on internal systems
  • Biden enlists 'world class' cyber security team
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Australia Post is building a digital twin of its delivery network

Australia Post is building a digital twin of its delivery network

Google threatens to withdraw search engine in Australia

Google threatens to withdraw search engine in Australia

Trump pardons former Google self-driving car engineer

Trump pardons former Google self-driving car engineer

NBN Co runs fixed wireless tower on diesel generator for over two years

NBN Co runs fixed wireless tower on diesel generator for over two years

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.