You are on page 1of 6

AUSTRALIAN INSTITUTE

OF CRIMINOLOGY

trends
No. 118
&
What is Forensic issues
Computing?
in crime and criminal justice
Rodney McKemmish

Developments in information technology have begun to pose new challenges


for policing. Most professions have had to adapt to the digital age, and the
police profession must be particularly adaptive, because criminal exploitation
of digital technologies necessitates new types of criminal investigation. More
and more, information technology is becoming the instrument of criminal
activity. Investigating these sophisticated crimes, and assembling the neces-
sary evidence for presentation in a court of law, will become a significant
police responsibility.
This paper provides an overview of the new law enforcement field of
forensic computing. It is an abridged version of a report prepared by the author
during his Donald Mackay Churchill Fellowship. Its publication here reflects
the Australian Institute of Criminologys continuing role in informing policy
makers and the public about complex criminal activity.
Adam Graycar
Director

June 1999
T he application of computer technology to the investigation of
computer based crime has given rise to a new field of
specialisationforensic computingwhich is the process of identi-
fying, preserving, analysing and presenting digital evidence in a ISSN 0817-8542
manner that is legally acceptable. It encompasses four key elements. ISBN 0 642 24102 3
1. The identification of digital evidence is the first step in the
forensic process. Knowing what evidence is present, where it is
stored and how it is stored is vital to determining which processes
are to be employed to facilitate its recovery. Whilst many people
think of personal computers as the sole focus of forensic computing,
in reality it can extend to any electronic device that is capable of
storing information, such as mobile/cellular telephones, electronic Australian Institute
organisers (digital diaries) and smart cards. In addition, the com-
puter forensic examiner must be able to identify the type of infor- of Criminology
mation stored in a device and the format in which it is stored so that GPO Box 2944
the appropriate technology can be used to extract it. Canberra ACT 2601
Australia
2. The preservation of digital evidence is a critical element in the
forensic process. Given the likelihood of judicial scrutiny in a court
of law, it is imperative that any examination of the electronically Tel: 02 6260 9200
stored data be carried out in the least intrusive manner. There are Fax: 02 6260 9201
circumstances where changes to data are unavoidable, but it is
For subscription information together
important that the least amount of change occurs. In situations
with a complete list of the papers in
where change is inevitable it is essential that the nature of, and
the Trends and Issues in Crime and
reason for, the change can be explained. Alteration to data that is of
evidentiary value must be accounted for and justified. This applies Criminal Justice series, visit the AIC
not only to changes made to the data itself, but also includes physi- web site at:
cal changes that are made to the particular electronic device to http://www.aic.gov.au
facilitate access to the data.
or call AusInfo toll free on 13 24 47
Australian Institute of Criminology

3. The analysis of digital evi- tendered in evidence. Not only knowledge to perform data
dencethe extraction, processing does it cast doubt over the proc- recovery on specific electronic
and interpretation of digital esses employed during the foren- devices.
datais generally regarded as sic examination, but also over the Given the wide scope of this
the main element of forensic skill and expertise of the exam- forensic computing activity, it
computing. Once extracted, iner producing the document in comes as no surprise that a
digital evidence usually requires evidence. number of disciplines are in-
processing before it can be read volved. Software engineering,
by people. For example, when the cryptography, electronic engi-
contents of a hard disk drive are Primary Activities of Forensic neering and data communications
imaged, the data contained Computing are areas of expertise which, in
within the image still requires combination, make the analysis of
processing so that it is extracted media and electronic devices
Forensic computing is not a
in a humanly meaningful manner. possible.
single activity, but draws upon
The processing of the extracted
many disciplines. It involves the Data communication analysis
product may occur as a separate
application of information tech-
step, or it may be integrated with Data communication analysis
nology to the search for digital
extraction. encompasses two separate activi-
evidence and comprises the three
primary activities listed below. ties:
4. The presentation of digital network intrusion or misuse
evidence involves the actual Media and electronic device analysis
presentation in a court of law. data interception
This includes the manner of The analysis of media relates to Network intrusion or misuse
presentation, the expertise and the examination of various types is the main forensic computing
qualifications of the presenter of storage media such as hard activity when it comes to Internet
and the credibility of the pro- disks, removable storage media based analysis. It consists of the
cesses employed to produce the (e.g. floppy disks, ZIP disks) and following functions:
evidence being tendered. specialist storage media (e.g. CD- intrusion detection;
ROMs, DVD). This requires a evidence capture and
The feature of forensic thorough understanding of both preservation; and
computing that sets it apart from the physical structure and the
event or activity
any other area of information operation of the media, as well as
reconstruction.
technology is the requirement the logical structure and composi-
tion of the data as it is stored. Intrusion detection generally
that the final result must be
Much of the complexity of this involves the application of spe-
derived from a process that is
activity has now been removed cialised software, and in some
legally acceptable. Consequently,
thanks to the application of very cases hardware, to monitor data
the application of technology in
efficient and intelligent data communications and connections
the investigation of technological
recovery tools. Consequently, with a view to identifying and
crime must be carried out with
much of the knowledge required isolating potentially unlawful
due regard to the requirements of
to perform the task is encapsu- behaviour. Such behaviour in-
law. Failure to do so can result in
lated within the particular data cludes unauthorised access and
the digital evidence being ruled
recovery software. attempts at unauthorised access,
inadmissible or, at the very least,
Electronic devices refers to remote system modification, and
being regarded as tainted.
any electronic device capable of unauthorised monitoring of data
This can best be demonstr-
storing information of eviden- packets.
ated by the situation where the
tiary value, including cellular Evidence capture and pres-
forensic examiner utilises a third
phones, electronic organisers and ervation generally occurs after an
party software package to display
various network communications intrusion or abnormal behaviour
and reproduce the data contained
devices such as routers and hubs. is detected, so that the abnormal
within a computerised document.
The analysis of such devices is or suspicious activity can be
As an example, consider a
somewhat more complex than the preserved for later analysis.
spreadsheet containing extensive
activity of recovering data from The final stage, reconstruc-
financial data. If a third party
storage media and the hardware tion of the intrusion or abnormal
product is used to reproduce the
required is generally more spe- behaviour, allows a thorough
spreadsheet in its entirety, and
cialised and complex. examination of all data gathered
that third party product does not
The development of custom- during evidence capture.
accurately and concisely repre-
ised hardware devices has made To carry out these functions
sent the location of each item of
the extraction of data from some successfully, the forensic compu-
data, the entire meaning of the
types of electronic devices much ter examiner(s) must be skilled in
document may be changed. This
easier, which in turn has allowed data communications and have
in turn can have a significant
people without the relevant the support of software engineers
impact should the document be

2
Australian Institute of Criminology

and, where necessary, cryptogra- should be conducted in such a further complexity and time to
phers. way as to minimise the likelihood the forensic process.
of alteration. Where possible, this
Research and development is achieved by duplicating the Rule 2Account for Any
Research into, and the develop- original and examining the Change
ment of, new techniques and duplicate data. Where changes occur during
tools is vital to keep abreast of The duplication of evidence a forensic examination, the
changes in technology. Time and has a number of advantages. nature, extent and reason for such
resources must be dedicated to Firstly, it ensures that the original changes should be properly
the research and development of is not subject to alteration in the documented.
new forensic techniques, not only event of an incorrect or inappro- During any examination it
to develop solutions to existing priate process being applied. may be necessary for either the
problems, but also to recognise Secondly, it allows the examiner original or duplicate to be altered.
emerging problems and find to apply various techniques in This applies both at a physical
realistic solutions. cases where the best approach is and logical level. In such cases it
Unfortunately, the resources not clear. If, during such trials, is essential that the examiner
and skills required to maintain an the data is altered or destroyed it fully understands the nature of
effective research and develop- simply becomes a matter of the change, and is the initiator of
ment program are beyond the working on a fresh copy. Thirdly, that change. Additionally, the
financial capacity of many com- it permits multiple forensic examiner must be able to cor-
puter forensic groups. And an computer specialists to work on rectly identify the extent of any
additional restriction placed on the data, or parts of the data, at change and give a detailed expla-
any solutions derived from the one time. This is especially nation of why it was necessary.
research is the requirement that important if specialist skills (for Essentially this applies to any
they must be capable of satisfying example, cryptanalysis) are evidentiary material that is
the legal framework in which the required for various parts of the derived from a forensic process in
forensic computer specialist analysis. Finally, it ensures that which change has occurred.
works. the original is in the best state This is not to say that
possible for presentation in a change shall not occur but rather,
court of law. in situations where it is inevita-
Rules of Forensic Computing Whilst there are advantages ble, the examiner has a responsi-
to duplicating evidence, there are bility to correctly identify and
also disadvantages. Firstly, the document the changea process
Given that the final product of duplication of evidence must be directly dependent on the exam-
the forensic process is subject to performed in such a manner, and iners skills and knowledge.
judicial scrutiny, it is important with such tools, as to ensure that During the forensic examination
that the rules governing it be the duplicate is a perfect repro- this point may seem insignificant,
followed. Whilst these rules are duction of the original. Failure to but it becomes a critical issue
general enough to apply to any properly authenticate the dupli- when the examiner is presenting
process in forensic computing, cate will result in questions being their findings during judicial
adherence to them is fundamental raised over its integrity. This in proceedings. Whilst the evidence
to ensuring admissibility of any turn may provoke questions over may be sound, questions regard-
product in a court of law. As the the accuracy and reliability of ing the examiners skills and
methodology employed in rela- both the examination process and knowledge can affect their cred-
tion to the various processes is the results achieved. Secondly, by ibility as well as the reliability of
determined by the individual duplicating the original, we are the process employed. Given
forensic specialist, the actual adding an additional step into the sufficient doubt, the results of the
process chosen should be applied forensic process. Additional forensic process can, in the worst
so as not to compromise the resources are required to accom- case, be ruled inadmissible.
relevant rule(s). Essentially, the modate the duplicated data, and Whilst the need to alter data
rules of forensic computing are: extra time is required to facilitate occurs infrequently, there are
the duplication process. Further- instances where the examiner is
Rule 1Minimal Handling of more, the methodology employed required to initiate change in
the Original must be expanded to include the order to facilitate the forensic
The application of forensic duplication process. Finally, the examination process. For exam-
computer processes during the restoration of duplicated data in a ple, where access to data is
examination of original data shall way that re-creates the original restricted by means of some form
be kept to an absolute minimum. environment can be difficult. In of access control, the examiner
This can be regarded as the some instances, in order to re- may be forced to change either a
single most important rule in create the original environment, logical flag (i.e. access bit) or an
forensic computing. Any exami- specific items of hardware etc. entire string of binary data to
nation of original evidence may be required. This again adds facilitate access. In such instances

3
Australian Institute of Criminology

the examiner may be required to The final option is without Operating systems
offer expert testimony that the doubt the most dangerous. It is
meaning of the data accessed by imperative that the forensic Over the past decade we have
such change has not been unduly examiner be able to describe witnessed rapid advances in
compromised. correctly the processes employed operating system (OS) design and
during an examination and to functionalityfrom the text
Rule 3Comply with the Rules explain the underlying method- based interface of DOS to the
of Evidence ologies for such processes. Failure Graphical User Interface (GUI) of
The application or develop- to explain, competently and operating systems such as Win-
ment of forensic tools and tech- accurately, the application of a dows and Unix (Xwindows). With
niques should be undertaken process or processes can result in the advent of the Graphical User
with regard to the relevant rules the expertise and credibility of Interface, operating systems have
of evidence. the examiner being called into become larger, more powerful
One of the fundamental question in any subsequent and more user friendly. It is the
precepts of forensic computing is judicial proceedings. size and usability of the GUI
the need to ensure that the appli- Another danger in continu- operating system that presents
cation of tools and techniques ing an examination beyond ones forensic computing with a new
does not lessen the admissibility skills is the increased risk of challenge.
of the final product. It therefore damagechanges that the exam- When DOS was the pre-
follows that the type of tools and iner is not aware of or does not dominant operating system for
techniques used, as well as the understand and consequently the personal computer, things
way they are applied, is impor- may ignore. This is likely to be were much easier for the forensic
tant in ensuring compliance with revealed when the examiner is computer specialist. The DOS
the relevant rules of evidence. giving evidence. based operating system could be
Another important factor Essentially, complex forensic installed on a floppy disk and a
when complying with the rules of computer examinations should be suspects system booted via the
evidence is the manner in which undertaken by properly skilled floppy drive. Device drivers
the evidence is presented. Essen- and qualified staff who have the specific to the computer under
tially, information should be appropriate level of training. examination would not be loaded
presented in a manner that is as Additionally, given that technol- but, given the simplicity of the
indicative of the original as is ogy is continually advancing, it is operating environment, it did not
possible. That is, the method of important that the examiner generally matter. Today, the size
presentation should not alter the receives ongoing training. of the GUI based operating
meaning of the evidence. system means that it cannot be
installed in its entirety on a
floppy disk. Whilst we can still
Rule 4Do Not Exceed Your Current and Future Issues for
boot to a text based interface,
Knowledge Forensic Computing many of the important operating
The forensic computer
specialist should not undertake system features cannot be
Advances in technology give rise accessed.
an examination that is beyond
to new and exciting challenges In the laboratory environ-
their current level of knowledge
but also present the forensic ment the issue of size may not be
and skill.
computer specialist with new relevant, primarily due to the
It is essential that the foren-
problems. Advances in technol- development of alternate tech-
sic computer examiner is aware
ogy can also lead to more ad- nologies, but in the field this
of the limit of their knowledge
vanced solutions but unfortu- proves to be the greatest hin-
and skill. On reaching this point,
nately, whilst technology may drance.
the examiner has a number of
change and adapt, the law is Just as operating systems
options:
somewhat slower to change. have grown in size, so too has
cease any further
Remembering that forensic their functionality. Of all the
examination and seek the computer specialists serve two features incorporated into todays
involvement of more masters, technology and the law, GUI based operating system,
experienced and skilled they must find an acceptable plug and play support provides
personnel; balance between the two. the greatest danger to the forensic
conduct the necessary Not all of the challenges computer process. A plug and
research to improve their faced by forensic computing are play supported operating system
own knowledge to a point technical in nature. They must installed on a computer is
that permits a continuation also deal with issues of resour- configured to that computer. The
of the examination; or cing, procedure and policy, train- operating system records the
continue with the ing and organisational changes. nature and configuration of all
examination in the hope that This paper, however, focuses on hardware installed on a compu-
the technical challenges. ter. The subsequent addition or
all goes well.

4
Australian Institute of Criminology

removal of hardware is readily binary imaging (without com- need to extract specific items of
detected by the operating system, pression) of a 10 GB hard drive information, means that special-
resulting in changes to the rel- will result in a file, or files, total- ised tools are needed and there
evant configuration files. The ling 10 GB in size. Copying such are extra steps within the exami-
impact of such intelligence has large amounts of data requires nation process.
serious implications for the the use of very specialised tools
forensic examination process. in a specialised environment. The Digital devices
Removing a hard drive and problem is compounded if the Recent advances in microelec-
inserting it into another computer data is derived from a number of tronics have allowed micropro-
will inevitably result in changes computers, or from a large file cessors to become more powerful
as the operating system config- server or servers. and physically smaller. Not only
ures itself for its new environ- The storage of such large has the microprocessor become
ment. It does not even have to be volumes of data also presents the faster and more capable, but
the hard drive, but rather a forensic examiner with a new set storage chips have increased their
restored binary image undergo- of problems. Many forensic capacity significantly. Such
ing examination in the specialists specialists have turned to a improvements are having a
own system. Regardless of the network solution. Essentially, significant impact on the forensic
approach, the possibility of network servers become very analysis process. Small
change is significantly increased. large storage repositories. In personalised electronic devices,
order to hold such large volumes such as electronic organisers, are
Data volume of data in one location, forensic able to store and process signifi-
Probably the greatest single computer analysis networks cant quantities of data, which in
challenge facing forensic comput- require exceptionally large stor- turn may have intelligence or
ing today is the rapid increase in age capabilities. In terms of hard evidentiary value in an investiga-
the capacity of todays storage drive space, these inevitably tion.
media. The advent of new storage exceed many corporate based The advantages of the
technologies, combined with network servers. However, server forensic examination of such
increased demand for storage storage only provides a short- devices can best be illustrated in
space by consumers and software term solutiondata cannot reside drug related investigations.
developers, has resulted in a on the server forever. Conse- Increasingly, suspected drug
surge in the size of hard drives. quently, longer-term storage dealers are using personal elec-
Just as the capacity of hard drives solutions have to be found. tronic organisers to store contact
has increased, so too has the Currently, tape backup and CD- names and numbers of both
volume of data being stored on ROMs provide the most popular clients and drug contacts. The
such media. Increased use of solution, but both have their electronic organiser allows for the
multimedia, combined with the shortcomings. CD-ROMs can storage of large quantities of data,
rapid expansion of the Internet, only hold 650 MB of data so, which can be secured by means of
has resulted in greater demand given a 10 GB drive, some 16 CDs a password. Additionally, these
for storage capacity. This in turn would be required to accommo- devices are easily concealed. It is
has led to an increase in the date an uncompressed image. no surprise that lawful access to
amount of information people Tape provides greater storage, the information contained in such
store (whether permanently or but its reliability with regard to devices can present law enforce-
temporarily) on their computers. long-term storage is questionable. ment agencies with an Aladdins
Being able to copy, store and Additionally, tape is more suscep- cave of incriminating informa-
process large volumes of data in a tible to damage than CD-ROM. tion.
timely and accurate manner One emerging solution is the These technologies have
presents a unique challenge to Digital Versatile Disk (DVD), but given rise to an application of
forensic computing. The copying at present its acceptance within microelectronics that is set to
of data does not just refer to forensic computing is very lim- have the single greatest techno-
copying files, but includes the ited. logical impact on our society to
making of a binary image. Whilst The accurate and timely date: the smart card. The ability
the quantity of data resulting processing of these large volumes of smart cards not only to store
from a file copy is dependent on of data provides the final chal- significant quantities of data, but
the number of files on the hard lenge to the forensic computer also to process and secure that
drive, the quantity of data result- specialist. Identifying the re- data in a single chip, adds
ing from a binary image is very quired information, and retriev- significant complications to the
much dependent upon the physi- ing it in a form that is legally forensic computer examination
cal capacity of the hard drive acceptable, requires the expendi- process. Just as smart card tech-
itself. Even allowing for compres- ture of time and effort beyond nology is sophisticated, so too are
sion, the amount of data involved that normally associated with the forensic processes and tools
is substantial. For example, the similar processes. The use of required to analyse and extract
binary imaging, combined with a

5
Australian Institute of Criminology

the data, requiring a level of sors, combined with such tech-


research and development be- nologies as distributed comput-
yond the resources of many of ing, have allowed many forensic
todays forensic computer units. computer specialists to use the
brute force approach in different
Encryption situations.
Improvements in processing Unfortunately, just as the
technology combined with ad- forensic specialists have become
vances in cryptographic tech- aware of the advantages of
niques mean that todays encryp- improved processing power, so
tion schemes are relatively secure too have those who design and
for the everyday user. However, implement encryption algo-
there has been a recent increase in rithms. Today there is a move
the use of encryption by offend- towards multi-implementation of
ers in Australia and overseas. an encryption algorithm within
Recent experience has seen security products. This in turn
the use of encryption spreading has the effect not only of securing
from what has traditionally been the data more strongly, but also of
the domain of the hacker commu- significantly slowing down the
nity to other criminal activities. In encryption and decryption proc-
particular, paedophiles frequent- ess.
ing the Internet have turned to
encryption to hide illegal images
of child pornography. A Victorian Conclusion
based paedophile was discovered
in possession of a quantity of Given the increasing opportuni-
computer images depicting child ties for computer based crime in
pornography. Some were contemporary Australia, a num-
encrypted with a commercially ber of related emerging issues
available product to disguise need serious consideration by
their nature during transmission, Australian law enforcement.
via the Internet, to an associate Many agencies throughout
and, to further assist the subter- Australia must recognise the
fuge, file names were changed to contribution that forensic com-
represent data other than a puting can make in the investiga-
graphic image. tion of crime, and in turn must
Advances in communica- ensure that such a contribution is Senior Sergeant Rodney
tions technologies, such as the supported and positively pro- McKemmish is the Officer in
Internet, have made complex moted. Failure to do so will see Charge of the Forensic Computer
encryption products widely those agencies falling behind Examination Unit, Queensland
accessible, presenting the forensic technologically competent crimi- Police Service. He has performed
computer examiner with a signifi- nals who readily recognise the duties as a police officer and
cant barrier. Regardless of the advantages of using new tech- forensic computer examiner with
encryption process used, if the nologies in the commission of the Victoria Police Force and
user is required to open cipher crime. Queensland Police Service and
text by way of a password or key A number of Australian law currently chairs the Australasian
(whether secured by an asymmet- enforcement agencies command Computer Crime Managers
ric or symmetric encryption impressive forensic computing Group.
algorithm), the encryption proc- resources, and the Computer
ess can almost always be attacked Crime Program of the Australa-
by using brute force techniques. sian Centre for Police Research
Whilst this may seem like the (formerly the National Police
answer to breaking all encrypted Research Unit) is assisting law
data, it is sometimes impractical. enforcement agencies in the
The use of strong keys (long key exchange of knowledge and
General Editor, Trends and Issues in
lengths) can result in a brute force technology. Through efforts such
Crime and Criminal Justice series:
attack lasting many years or as this, Australia can become a Dr Adam Graycar, Director
decadesnot a viable proposition world leader in the adoption of Australian Institute of Criminology
for most criminal investigations. technology to analyse electronic GPO Box 2944
Improvements in the evidence. Canberra ACT 2601 Australia
processing power of microproces- Note: Trends and Issues in Crime and
Criminal Justice are refereed papers.

You might also like