Sie sind auf Seite 1von 5

Financial impact of forensic proceedings in ICT

Saa Aksentijevi1, Edvard Tijan2, Alen Jugovi3


1
Aksentijevi Forensics and Consulting, Ltd.
Gornji Sroki 125a, Vikovo, Croatia
Tel: +385 51 65 17 00 Fax: +385 51 65 17 81 E-mail: sasa.aksentijevic@gmail.com
2,3
University of Rijeka, Faculty of Maritime Studies
Studentska 2, 51000 Rijeka, Croatia
Tel: +385 51 33 84 11 Fax: +385 51 33 67 55 E-mail: etijan@pfri.hr, ajugovic@pfri.hr

Abstract Application of scientific forensic methods in clearly demonstrated validity of the used method. While one
ICT has become a mainstream methodology not only in can argue that evidence digital forensics is dealing with is
criminal and civil proceedings, but also in preventive material, in a sense that it is usually inextricably tied to
maintenance of various aspects of ICT systems used by material media that contains them, their nature is clearly not
corporations, governmental and other institutions. material. This demonstrates how technical developments of
However, despite efforts of solution providers to create the present and near future will test and challenge some
forensic hardware, software and procedures that are definitions that seemed to be solid in the past.
purported to be easy to use even by those that are not
forensic experts, in most cases forensic proceedings are Over the past two decades, dematerialization of the IT world
connected with high utilization of financial and temporal has caused detachment of the data, media that contains them
resources. Accelerated changes in information technology and physical locations where such media is stored. Internet
and architecture also require additional regulation that became a new transport layer for such evidence, crossing
will pre-emptively ensure adequate amount and form of geographical barriers and further pushing the envelope of
forensic trail left for possible future investigations. This well-established legal framework whose jurisdiction is
paper is an attempt to describe current state of affairs of usually defined by physical national borders. While crime
forensic proceedings, the latest trends and to provide and other events are always one step ahead of codified
comment on their financial impact and consequential legislation, described course of events made it very difficult
real-world feasibility. even for those very best in the legal profession of digital
forensics, and those who use their services (district attorneys,
Key words: forensic proceedings, forensic investigations, lawyers and courts) even to apply existing legislature, let
financial impact, ICT alone understand the presented facts that are usually dealing
with very complex technical architecture, facts and
conclusions.
I INTRODUCTION
Most authors agree that until events of 9/11 [3], separation of
Generally, forensic science or forensics is the application of non-material world of digital networks and systems according
scientific principles and techniques to matters of criminal to national and geographical borders was one of the main
justice especially as relating to the collection, examination obstacles in front of experts in the field of digital forensics
and analysis of physical evidence [1]. The main characteristic and users of their services. After 9/11, new legislative acts
of forensics is that it produces results and reports suitable to have been passed all over the world to support the agenda of
be used in courts or judicature, and for public discussion or fight against terrorism [4], further facilitating cooperation
debate. Therefore, forensics is indubitably tied to the legal between national bodies in charge of ICT infrastructure and
context and explaining complex facts and their mutual legislative bodies of various countries, in provision of digital
connection in simple, straightforward language and layman evidence during investigations. However, facilitation of this
terms to those who are not subject experts, but have to reach process has caused some major concerns among privacy
certain conclusions or make decisions based on the presented advocates. Civil liberties implications of counterterrorism
facts. policies are a hot topic of debate in the European Union
whose directives still protect the privacy of its countries
Digital forensics is one of the latest branches of general citizen. Findings of Julian Assanges WikiLeaks organization
forensic science dealing with digital traces and artefacts. One and those of Edward Snowden have clearly demonstrated
of possible definitions of digital forensics is given by the how pre-emptive acting on behalf of the governments creates
following: The application of computer science and a myriad of more or less coordinated global surveillance
investigative procedures for a legal purpose involving the programs with cooperation of telecommunication companies
analysis of digital evidence after proper search authority, and European governments [5] that are clearly creating
chain of custody, validation with mathematics, use of breaches on behalf of privacy of their own citizens.
validated tools, repeatability, reporting, and possible expert
presentation [2]. As it is clearly visible from comparison of It is clear that there are several concerns to be addressed by
definitions of general forensics and the digital one, digital experts in digital forensics and legislative branches outlining
forensics deviates from general definition because it does not the operational framework. Privacy of citizens and security of
analyse material (physical) evidence. Material nature of corporate business information has to be leveraged against
evidence was initially included in the definition of forensics national and international security; digital evidence is
because reliance on physical properties of the evidence extremely volatile in nature, therefore it has to be carefully

1698 MIPRO 2017/DE-GLGPS


collected and examined, and it has to be done quickly, in data evidence is among the most volatile evidence
order to avoid data expiration. Requirements related to digital forms [9].
data handling have to be respected. Furthermore,
international cooperation is often the main prerequisite for 4. Law of comparison states that only the likes can be
most forensic investigations. compared, meaning that only like samples and
specimens can be compared.
The described situation requires regular engagement of
significant resources: time needed to perform analysis and 5. Law of probability claims that all definite or
create reports, sophisticated software and technology to indefinite identifications made consciously or
analyse media and networks, and skilled experts who are able unconsciously are based on probability.
to explain digital findings. Therefore, both the required
technology and time of experts are major constraints in 6. Law of circumstantial facts, otherwise known as
forensic examination of digital evidence and if improperly facts do not lie, men can and do requires reliance
utilized, they could results in sunk cost or even on digital data and evidence and not oral evidence,
misinterpretation of findings. power of observation or suggestion.

II DIGITAL FORENSICS PRINCIPLES AND Except basic forensic laws that are more or less common for
LAWS all forensics disciplines, there are a few more principles of
digital forensics that are specific for the field of digital
Modern forensics has its roots in ancient China, with Song Ci investigations [10].
being the most famous forensic medial expert during
Southern Song Dynasty whose book Collected Cases of 1. No action taken during the forensic investigation
Injustice Rectified is still regarded as a seminal book of should change data which may have to be relied
forensic science in China. Developments in the field of upon in court
forensics in Europe became rapid only in the 19th century and
especially in the beginning of the 20th century with wide 2. In case that an investigator has to access original
adoption of fingerprint analysis invented by Juan Vucetic in digital evidence, he has to be competent to do so
1891. Widespread adoption of forensic and scientific and give evidence explaining the relevance and
methods and introduction of expert witnesses in most implications of their actions. Considering that
legislative systems had as a consequence the dissemination of operating systems and programs alter the content of
forensics in almost all fields of human life (and related legal digital evidence without the user being aware of
proceedings). such change, forensic analysis is usually performed
using relevant media images.
Digital forensics is only a logical development of the above
mentioned and became a discipline with the introduction of 3. An audit trail has to be created and preserved
computers first used as mainframes for mass data processing. demonstrating that the chain of custody over digital
In the past two decades and with further development of evidence is maintained. An independent expert
information society, computers, smartphones, networks, should be able to examine the utilized methodology
servers and Internet usage are very often the usual and even and achieve the same result.
expected part of many other legal proceedings, in the areas of
both the criminal and civil law. 4. There has to be a single instance in charge of
investigation and ensuring that the forensic laws
Digital forensics adheres to several classical laws of forensics and principles are being adhered to.
sciences that are also used in other areas of science. While
different sources quote different versions of these laws, they The golden standard in digital forensics nowadays is the
can be summarily explained in the following way when Abstract Digital Forensics Model, created as a generic,
applied to the digital world: technology-independent model, composed of nine different
phases (Figure 1).
1. Law of individuality, stating that every digital
artefact has the characteristics that are not
duplicated in any other object.

2. Principle of exchange (otherwise known as


Locards Exchange Principle, as a hommage to its
founder, professor Edmond Locard) according to
which when the perpetrator or the instrument (s)he
uses comes in contact with the victim or
surrounding objects, they leave traces, but they also
pick up graces from them. This principle is
extremely important in digital forensics.

3. Law of progressive change applied to digital


forensics means that every digital trace changes
with the passage of time. The impact of this
principle in digital forensics is immense because Figure 1. Abstract Digital Forensic Model [11]
the passage of time logarithmically alters it. Digital

MIPRO 2017/DE-GLGPS 1699


This model assumes that the incident type is well recognized operations and administration of various ICT systems, and to
and determined. In comparison to previous models, this provide audit trail for compliance purposes, but they can also
model consists of detailed pre- and post- investigation be used in forensic analysis and provide a valuable source of
procedures. information, especially if their usage and data storage follows
forensic principles and laws.
III FINANCIAL IMPACT OF DIGITAL
FORENSICS Legislative branch is also placing forensics-motivated
requests in form of various laws and requirements, especially
Digital forensics trends are largely dictated by rapid advances aimed towards telecommunications and IT service providers.
in information technology over the past decades. In the latest In most telecommunication acts, there are articles and
period, we saw rapid growth and development of concept of provisions requiring service providers to install and maintain
Internet of Things (IoT), where ubiquitous computing systems and software (often at their own cost) that tracks its
principles are applied to a variety of devices and sensors in usage and provide full access to the police and investigators.
media, manufacturing, energy management, medical and This trend is widespread in the United States and more and
healthcare, transportation, building and home automation, more present in the European Union. Privacy is still one of
environmental monitoring and personal use. Each of these the main concerns and only communication meta-data and
devices may serve as a source of digital data stream to be not its content is preserved, unless measures of wiretapping
analysed as a part of forensic process. With the introduction or surveillance are ordered by the court. It is reasonable to
of IoT, literally almost anything can become an object of expect that in the future there will be more and more
digital forensic investigation, from wearable technologies and implementations of legislation-driven systems that will
cars, to sensor grids. An interesting analysis of diverse topics monitor patterns of usage of various information systems in
in journals covering different areas is shown in Figure 2. order to collect data for later forensic analysis.

Anticipative inclusion of data logging in laws does not only


provide audit trail and basis for further forensic
investigations, it can also lower the cost of forensic analysis
because it contains data that would otherwise have to be
extracted using other, more costly methods, or it would not
be available at all. The cost of forensic investigations in the
USA is typically in the range of 10,000 US$ - 100,000 US$
with hourly rates in the range between 125 US$ and 650 US$
[14]. These costs can be significantly lowered with greater
inclusion of logging tools, some of which can also be
obtained as a open source data loggers and maintained as
such. It is worth noticing that there is significant overlapping
between solutions that are behind implemented controls in
systems of information security and forensic logging tools.
Organizations that have higher achieved levels of information
Figure 2. Coverage of digital forensics topics in journal security will also have less security breaches, and probably
papers [12] even less those that will result in serious consequences that
might be a matter of forensic investigation. Even if that
While the number of overall papers shown in Figure 2. is low occurs, forensic investigation might be faster or easier, thus
and its sum is not statistically significant, it shows a variety incurring less related cost.
of topics covered by digital forensics. Some other papers
show that 77,8 % of all cases deal with single user computers, Inclusion of legislative requirements seems to be especially
44,4 % with network forensics, and 55,60 % with mobile important in the case of cloud computing forensics. The
forensics [13]. It is worth noticing that the sum is above 100 National Institute of Standards and Technology of the U.S.
% because in some investigations, there are multiple objects. Department of Commerce has recognized this importance and
So, despite variety of various objects of digital forensic has included forensic science challenges in the draft of its
investigation, some less complex or traditional objects still NISTIR 8006 standard. This draft anticipates almost all steps
make up the majority of all investigations. This can partially of forensic process described in this paper and recognizes that
be explained by the latency that is still prevalent in this field: cloud forensics possesses certain specific traits and
there is a significant passage of time since the moment when challenges arising from the distinctive nature of the computer
certain digital evidence is created until the time it is fixed for cloud [15]. It further defines cloud computing stakeholders
analysis. So, forensic investigators are still working with and their roles, and collection and aggregation of challenges,
delayed data. along with additional observations. The most distinctive are:
On the other hand, there is an entire industry made around 1. Time, either in terms of consistency or data
log data analysis and even predictive algorithms, aimed volatility in time,
especially towards large enterprise server and network
systems that are creating automated environment for large- 2. Location, where even locating an evidence may be
scale data acquisition, analysis and alerting of administrative a major hurdle in forensic investigation, and
and other personnel in relation to potentially occurring
anomalous events. These systems are in fact forensic in 3. Data sensitivity, where pervasive use of cloud
nature: they create forensically viable environment for computing environments by users and employees
analysis of various events. In most cases it is even possible to could elevate the risk of incidents that might end up
program various actions that will be triggered by events. as forensic investigations.
These systems are primarily used to facilitate day-to-day

1700 MIPRO 2017/DE-GLGPS


Additional requirements for laboratories performing forensic analysis. The introduction of these standards will further
investigations in ICT and especially data acquisition are increase the cost of forensic services, and might render small
arising from some applicable ISO standards, and especially forensic investigation teams unable to compete with large
the new edition of ISO /IEC DIS 17025: General accredited laboratories, who possess capabilities to
requirements for the competence and testing and calibration forensically analyse large volumes of ICT equipment and
laboratories, slated for the next revision issue in May 2017 data.
[16]. In United Kingdom, there will be a mandatory required
certification of ICT forensic laboratories according to this
standard [17] something that was until now reserved for REFERENCES
wet evidence laboratories dealing with DNA testing and
organic evidence. This procedure will have far reaching
consequences for all involved parties because, at this [1] Meriam-Webster, https://www.merriam-
moment, four year long backlogs for analysis of seized webster.com/medical/forensic%20science (accessed 17th
computer equipment are not unheard of in the industry [18]. December 2016)
Currently, the market of digital forensics field consists of a
small number of large players, and a large number of one- [2] Lynch, V.A., Duval J.B. Forensic Nursing Science,
man forensic investigators who are very important in the Elsevier Health Sciences, 2010, p. 97
process of provisioning forensic assistance to district
attorneys, police and judicial system, and decrease of current [3] Kean, T.H. et al. The 9/11 Commission Report, The
forensic backlog. The anticipated certification of the process National Commission on Terrorist Attacks Upon the United
will both increase the cost of service due to less competition States, August 21, 2014
and lengthen (at least initially) the process of forensic
investigation until the market is fully consolidated. [4] http://www.un.org/en/counterterrorism/ (accessed 17th
December 2016)
VI CONCLUSION
[5] https://www.theguardian.com/world/2013/jun/09/edward-
Digital forensics deviates from the general definition of snowden-nsa-whistleblower-surveillance (accessed 17th
forensics because its procedures are done over a set of non- December 2016)
material evidence, which is one of the prerequisites of the
traditional forensics. However, media where such evidence [6] Sung, T. et al. The Washing Away of Wrongs: Forensic
resides is still material in nature (hard drives, memory cards, Medicine in Thirteenth-Century China (Science, Medicine,
network storages, volatile memory). and Technology in East Asia), Center for Chinese Studies,
University of Michigan, 1981
There are several other characteristics that separate digital
forensics from other, more traditional forensic disciplines, [7] Vucetich, J. Dactiloscopia comparada el nuevo sistem
some of them being evidence volatility, remote geographical Argentino, Establecimento Tipografico Jacobo Pkuser, La
placement of evidence, transition over several legal Plata, 1904
jurisdictions, reliance on legal framework and implemented
measures of information security to obtain digital evidence, [8] Locard's Exchange Principle, http://vjestak-
and constantly changing technology. informatika.com/2016/12/13/locardov-princip-razmjene-u-
forenzici/ (accessed 17th December 2016)
Digital forensics follows the same well-established laws and
principles known in the other forensic fields. However, the [9] DOJ National Institute of Justice, Volatility of digital
amount of analysed material, the inability to make data evidence,https://www.policeone.com/Officer-
acquisition automatic, high level of required skills, Safety/tips/1655664-Volatility-of-digital-evidence/, June 10
knowledge, specialized hardware and software and time 2008 (accessed 17th December 2016)
required to perform the analysis are the main obstacles placed
in front of forensic investigators. Modern digital forensics [10] http://www.computerforensicsspecialists.co.uk/blog/the-
also has to perform the analysis of the new systems, like data principles-of-digital-evidence (accessed 17th December 2016)
acquired from sensor arrays and grids connected to the
Internet of Things, personal devices like mobile phones or [11] Reith, M. et al. An Examination of Digital Forensic
cloud computing systems. Such forensic analysis is often Model, International Journal of Digital Evidence, Volume 1,
very complex and costly. Issue 3, fall 2002

One possibility of control of possible forensic cost and [12] Dezfoli, F.N. et al. Digital Forensics Trends and
facilitating forensic analysis is the implementation of various Future, International Journal of Cyber-Security and Digital
controls aimed to elevate the achieved level of information Forensics (IJCSDF) 2(2), 2013, p. 50
security. These measures often provide a good level of audit
trail that has to be kept under forensically sound conditions [13] M. Tu, K. Cronin, D.Xu, S.Wira,"On the Development
and it could be later used as such. Therefore, there is a of Digital Forensics Curriculum",
significant level of overlapping between the information http://www.dsu.edu/research/ia/documents/ [6]-On-the-
security management systems and tentative subsequent development-of-Digital Forensics-Curriculum (accessed 17th
forensic usage. December 2016)

There is a noticeable global effort to standardize practices in [14]http://blog.securitymetrics.com/2016/08/what-do-


digital forensics by using standards already applicable to forensic-investigations-do.html1 (accessed 17th December
other forensic fields and especially DNA and crime trace 2016)

MIPRO 2017/DE-GLGPS 1701


[15]http://csrc.nist.gov/publications/drafts/nistir-
8006/draft_nistir_8006.pdf (accessed 17th December 2016)

[16]http://www.iso.org/iso/home/store/catalogue_ics/catalogu
e_detail_ics.htm?csnumber=66912 (accessed 6th January
2017)

[17]http://www.forensicmag.com/article/2012/02/isoiec-
170252005-accreditation-digital-forensics-discipline
(accessed 6th January 2017)

[18] D. Lillis, B. Becker, T. OSullivan, and M. Scanlon,


Current Challenges and Future Research Areas for Digital
Forensic Investigation, 05 2016

1702 MIPRO 2017/DE-GLGPS

Das könnte Ihnen auch gefallen