From the Editor-in-Chief - Journal of Digital Forensics, Security and
Transcription
From the Editor-in-Chief - Journal of Digital Forensics, Security and
Volume 7, Number 3 2012 Journal of Digital Forensics, Security and Law, Vol. 7(3) Volume 7, Number 3 (2012) Editorial Board Editor-in-Chief Gary C. Kessler Embry-Riddle Aeronautical University Florida, USA Section Editors Digital Forensics Gregg Gunsch Defiance College Ohio, USA Scott Inch Bloomsburg University Pennsylvania, USA Cyber Law Erin Kenneally Univ. of California San Diego California, USA Nigel Wilson The University of Adelaide South Australia, Australia Information Security David Dampier Mississippi State University Mississippi, USA Daniel P. Manson Cal Poly Pomona California, USA Science of Digital Forensics Fred Cohen California Sciences Institute California, USA Simson Garfinkel Naval Postgraduate School California, USA Book Review Jigang Liu Metropolitan State University Minnesota, USA Associate Editor-in-Chief Marcus K. Rogers Purdue University Indiana, USA Technology Corner Nick V. Flor University of New Mexico New Mexico, USA Regional Editors Australia Craig Valli Edith Cowan University Western Australia, Australia Europe/UK Denis Edgar-Neville Canterbury Christ Church Univ. Canterbury, UK Latin America Pedro Luís Próspero Sanchez University of Sao Paulo Sao Paulo, Brazil Mid-East and Africa Andrew Jones Khalifa Univ of Science, Technology & Research Sharjah, United Arab Emirates Mid-East/Israel Eli Weintraub Afeka Tel Aviv Academic College of Engineering Tel Aviv, Israel Ibrahim Baggili Zayed University Abu Dhabi, United Arab Emirates David P. Biros Oklahoma State University Oklahoma, USA Philip Craiger Daytona State College Florida, USA Glenn S. Dardick Longwood University Virginia, USA Fred C. Kerr Consultant California, USA Linda K. Lau Longwood University Virginia, USA Wei Ren Chinese Univ. of Geosciences Wuhan, China Jill Slay Univ. of South Australia South Australia, Australia Editorial Board Il-Yeol Song Drexel University Pennsylvania, USA John W. Bagby The Pennsylvania State Univ. Pennsylvania, USA Bernd Carsten Stahl De Montfort University Leicester, UK Copyright © 2012 ADFSL, the Association of Digital Forensics, Security and Law. Permission to make digital or printed copies of all or any part of this journal is granted without fee for personal or classroom use only and provided that such copies are not made or distributed for profit or commercial use. All copies must be accompanied by this copyright notice and a full citation. Permission from the Editor is required to make digital or printed copies of all or any part of this journal for-profit or commercial use. Permission requests should be sent to Editor, JDFSL, 1642 Horsepen Hills Road, Maidens, Virginia 23102 or emailed to [email protected]. ISSN 1558-7215 1 Journal of Digital Forensics, Security and Law, Vol. 7(3) Call for Papers The Journal of Digital Forensics, Security and Law has an open call for papers in, or related to, the following subject areas: 1) Digital Forensics Curriculum 7) Digital Forensics Case Studies 2) Cyber Law Curriculum 8) Cyber Law Case Studies 3) Information Assurance Curriculum 9) Information Assurance Case Studies 4) Digital Forensics Teaching Methods 10) Digital Forensics and Information Technology 5) Cyber Law Teaching Methods 11) Law and Information Technology 6) Information Assurance Teaching Methods 12) Information Assurance and Information Technology Guide for Submission of Manuscripts Manuscripts should be submitted through the JDFSL online system in Word format using the following link: http://www.jdfsl.org/submission.asp. If the paper has been presented previously at a conference or other professional meeting, this fact, the date, and the sponsoring organization should be given in a footnote on the first page. Articles published in or under consideration for other journals should not be submitted. Enhanced versions of book chapters can be considered. Authors need to seek permission from the book publishers for such publications. Papers awaiting presentation or already presented at conferences must be significantly revised (ideally, taking advantage of feedback received at the conference) in order to receive any consideration. Funding sources should be acknowledged in the "Acknowledgements" section. The copyright of all material published in JDFSL is held by the Association of Digital Forensics, Security and Law (ADFSL). The author must complete and return the copyright agreement before publication. The copyright agreement may be found at http://www.jdfsl.org/copyrighttransfer.pdf. Additional information regarding the format of submissions may be found on the JDFSL website at http://www.jdfsl.org/authorinstructions.htm. 2 Journal of Digital Forensics, Security and Law, Vol. 7(3) Contents Call for Papers ...................................................................................... 2 Guide for Submission of Manuscripts ................................................ 2 From the Editor-in-Chief ..................................................................... 4 The Science of Digital Forensics: Analysis of Digital Traces ............ 5 Fred Cohen On the Development of a Digital Forensics Curriculum ................. 13 Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, & Kyle Cronin Automatic Crash Recovery: Internet Explorer's Black Box .......... 33 John Moran & Douglas Orr Extraction of Electronic Evidence From VoIP: Identification & Analysis of Digital Speech .............................................................. 55 David Irwin, Arek Dadej, & Jill Slay To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners .... 83 Thomas Lonardo, Doug White, & Alan Rea Book Review: Dispute Resolution and e-Discovery (Garrie & Griver) .............................................................................. 111 Milton Luoma Subscription Information.................................................................. 115 Announcements and Upcoming Events ........................................... 117 3 Journal of Digital Forensics, Security and Law, Vol. 7(3) From the Editor-in-Chief Welcome to the third issue of Volume 7. We continue with our regular columns. The Digital Forensics as Science column contains a new installment by Fred Cohen about information physics. Milton Luoma provides a review of a book about e-discovery and conflict resolution. While slightly off the topic of computer forensics, the book touches on these two related -- but different -legal problems. Finally, Nick Flor has part 2 of his Technology Corner article on automated data extraction using Facebook. And, of course, we have four peer-reviewed papers in this issue. The first paper, "On the Development of a Digital Forensics Curriculum" (Tu, Xu, Wira, Balan, & Cronin), is a broad overview of the development of digital forensics curricula over the last ten years. The paper also reports on a survey about what tools are being used by practitioners and in the classroom. "Automatic Crash Recovery: Internet Explorer's Black Box" (Moran & Orr) provides a detailed examination of IE's Web history contents. This paper pays particular attention to IE's Automatic Crash Recovery feature, a source of a great deal of information that is generally unknown to most users (meaning that they don't attempt to delete its contents) and to many computer forensic examiners (meaning that they don't look there for evidence). The third paper, "Extraction of Electronic Evidence From VoIP: Identification & Analysis of Digital Speech" (Irwin, Dadej, & Slay), describes software intellectual property and methods with which one can determine whether a particular Android application is using code pirated from another app. The Android's Java virtual machine architecture enables rapid app development but also allows straightforward ways to analyze -- and reverse engineer -- those apps. Our final paper, "To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners" (Lonardo, White, & Rea), is an up-to-date glimpse of the status of state statutes requiring digital forensic examiners to be licensed as private investigators in order to practice. This issue is perhaps one of the most pressing for practitioners in our field. We continue to actively solicit academic and practitioner papers and, in particular, look for papers with an international perspective. As always, we welcome feedback and comments about the Journal. Gary C. Kessler, Ph.D., CCE, CISSP [email protected] 4 Journal of Digital Forensics, Security and Law, Vol. 7(3) Column: Analysis of Digital Traces Fred Cohen In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces. “Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: "A set of bit sequences produced from the execution of a finite state machine." (FSM)”1 Starting with a bag-of-bits As a fundamental, when handed some set of digital evidence, it is a good working assumption that the examiner doesn't know what it is other than the fact that it is a trace or traces. This is sometimes called a “bag of bits” to indicate that, other than the fact that it is comprised of bits, the examiner really knows nothing more about it. In cases where the examiner also performed collection, the details of the collection process may also be known, and so forth. The examiner may also rely on statements, paperwork, claims, and all manner of other things to put the bag of bits into context, but at the start of the examination, anything outside of the personal knowledge of the examiner2 should be treated as speculative and subject to refutation. Analysis is largely about performing computations on the bag of bits and related information to produce analytical products and derived traces. These products are then used to interpret, attribute, reconstruct, present, and otherwise work with the evidence to other examiners, lawyers, triers of fact, etc. But in order to do this, something about the bag of bits must support or refute hypotheses about what it contains. Redundancy within and between the bag of bits Redundancy is inherent in human and current computer language, it is fundamental to the notion of syntax and the ability to differentiate legitimate 1 2 F. Cohen, “Digital Forensic Evidence Examination”, 4th ed. 2012. Chapter 5 is used without further citation throughout this column and should be referred to for a more in-depth review of the subject matter. Note that knowledge is not the same as the other elements of the required basis for expertise in US courts; experience, training, skills, and education. Personal knowledge in this case is intended to imply only things the examiner did and saw. 5 Journal of Digital Forensics, Security and Law, Vol. 7(3) from illegitimate syntax, and without redundancy, reliability3 cannot be assured. Fortunately, there is a great deal of redundancy in most digital traces. This redundancy comes in two general forms; internal redundancy (within) and external redundancy (between). Internal redundancy is present within the internal structure of bit sequences within the bag of bits. For example, if the bag of bits contains a sequence of bits produced by a particular global positioning system (GPS) receiver, it might use the GPX format4 which uses and XML schema5 and includes the name of the vendor and sequences of points in 4-dimensional space-time. Internal redundancy comes in syntactic requirements of the language and the specific implementation of the device. GPX, “tags” such as “<time>” and “</time>” surround ASCII text indicated in a format “YYYY-MM-DDTHH:mm:ssZ”. If content includes a sequence “<time> 2012-05-10T17:35:23Z</time>” an examiner should readily determine it as inconsistent with the internal format of these files, a type C (internal) inconsistency6, and doubt the reliability of the record. In this case, is that there is no “ “ (space) between tags and content in the implementation.7 Thus a header indicating the GPS type combined with the syntax is internally inconsistent. External redundancy, also called “between” records, relates to external information. For example, we can determine that GPS systems did not exist in 1901 and that therefore, any record indicating a date and time of that era would be inconsistent with the external records. A date indicating “1901-23-49...” would be of the correct format but externally inconsistent, a type D inconsistency, and an examiner should readily doubt its reliability. Thus, the examiner uses analysis methods to examine traces in light of the redundant nature of such traces to confirm or refute hypotheses about the content in context. In effect, the examiner uses analysis to place content in context and turn the bag of bits into one or more hypothesized meaningful expressions in a syntax associated with mechanisms that produce such sequences. In addition, the examiner uses analysis to exclude hypothesized event sequences and contexts based on type C and D consistency. Turning the bag of bits into meaningful content in context The manner in which examiners typically proceed short cuts this, in that they typically start with assumptions and, unless the assumptions are obviously and dramatically violated, continue under them, even in the face of increasing 3 4 5 6 7 Reliability relates to the extent to which it reflects the reality it purports. See: http://en.wikipedia.org/wiki/GPS_eXchange_Format See: http://www.w3.org/XML/Schema Details of Type C and D in “Digital Forensic Evidence Examination” I.b.i.d. e.g., GPX file produced by a Garmin Oregon 400t hand-held GPS unit. 6 Journal of Digital Forensics, Security and Law, Vol. 7(3) evidence to the contrary. For example, using a tool like EnCase™,8 an examiner might load a “disk image”9 and start “analysis”. EnCase might identify the disk image as containing a region with a Windows™ NTFS file system partition based on the content of the first 512 bytes of the disk image, assuming that region of the image to be a “partition table”, and attempt to analyze that region of the disk as if it were such a file system. As long as this process seems to produce sensible results, the examiner will typically ignore all other possibilities, and proceed on that basis. The tool uses designer assumptions to do an analysis, interpret the results of that analysis, and present those interpretations under the set of assumptions provided by the designer and the user, typically doing so implicitly rather than explicitly. The user typically sees only the presentation of interpreted analysis results, and if desired, can drill down into the presentation of interpreted bases in traces for those results. An example of a misinterpretation based on analytical assumptions presented to an examiner by EnCase10 was the presentation of a date and time indicating writing a document in the middle of the Atlantic ocean when in fact it could not have been produced there.11 In this particular case, erroneous interpretation and representation was the result of a shift in time zones between daylight savings and standard times between the date used by the examiner and present at the beginning of the records under examination and the dates associated with the specific file under examination. In the same case, automated analysis also ignored the second of pairs of date and time stamps within files where there were differences between those dates and times indicative of different time bases in different systems. All current tools that perform automated analysis, interpretation, and presentation, produce these sorts of results, and it is the job of the modern examiner to understand this. In particular, it is important for the examiner to understand the specifics of the analytical process, examine the results of analysis against the original traces and methods used, and recognize inconsistencies leading to false interpretation and presentation. Just because these sorts of faulty assumptions and mechanisms are present in these tools, doesn't make the results invalid. It does, however, put the onus on the examiner to understand the limits of their tools. 8 This is one of the most popular and commonly used tools in digital forensics today and is produced by Guidance Software. 9 Typically a representation of the bit sequence found on a disk drive or partition within a disk drive. 10 There is no intent to disparage this product as opposed to others, it is only a popular example. 11 United States v. Bayly, et. al., United States District Court, Southern District of Texas, case no. Cr. No. H-03-363. 7 Journal of Digital Forensics, Security and Law, Vol. 7(3) Analytical methods There are a relatively small number of well understood, published, and peer reviewed analytical methods used in digital forensics today. The generally fall into a set of areas outlined here, and differ between structured (i.e., following specific rules for syntax and typically produced by fully automated mechanisms based on digital data) and unstructured (i.e., the result of codification of naturally occurring phenomena into digital representations, such a digital photographs or sound recordings) content. Feature and characteristic detection and analysis Based on assumptions and hypotheses regarding the bag of bits, and subject to refutation at any time, traces are parsed into syntactic structures and the particular elements within those structures. This is a finitely recursive process of identifying a context (i.e., characteristic), identifying content (i.e., features) within that context, and then treating the content as context for further feature and characteristic detection and analysis. For structured content, characteristics like the document type and its syntax form the context for identifying features like combinations of words used within it and types of spelling errors, if any. In the unstructured content arena, characteristics like the arrangement of pixels in a two dimensional grid contained within a graphical image are treated as context for extracting and analyzing features, such as areas that look like eyes, tables, or grass. Recursively, sentences and may be analyzed for language, syntax, spelling, sentence structure, word usage, and so forth. And eyes in a picture may be analyzed as for presence within a face, number and placement, eye color, and so forth. The resulting recursive structures may be further analyzed for consistency with internal or external records, such as whether any people have 5 eyes, or when capitalization is normally used. Symbol set identification Part and parcel of the analysis process is the assumption and validation of symbol sets. For example, XML is generally composed of ASCII character sets, excluding select byte codes and forcing other byte codes (e.g., the code for “<”) to be used only in specific ways and in specific places. Identifying symbol sets is vital to parsing and to differentiating internal and external consistencies. Structured and unstructured content are generated from and analyzed to produce symbolic representations. The symbol sets of representations act to define and restrict the analytical framework, and inconsistencies with the analytical framework above base rates are strong indicators of an error in assumptions or hypotheses of the analysis process. Trace typing Based on symbol set identification, trace typing is done to identify the specific type of the trace. Typically, this can exist at many levels, such as determining 8 Journal of Digital Forensics, Security and Law, Vol. 7(3) that content is consistent with ASCII text, in a line-oriented format with fields separated by commas, containing fixed and variable length fields, etc. This can be used to hypothesize about the mechanisms associated with the trace, for example, if the trace is typed to a particular version of a particular device. This may then be used to perform other analysis under the assumptions regarding the operation of the mechanisms known to produce these types of traces. Parsers, search methods, and related mechanisms Search is one of the mainstays of digital forensic analysis. In its essence, search looks for patterns within bit sequences. Well known and longstanding methods for computerized search have been studied over many years and they are applied to look for exact sequence matches and regular expressions. Other sorts of search are far more rare, but in the broad sense, parsers may also be used for search. In this case, finite state machines (FSMs) are run against sequences of bits to identify symbol structures within the syntax assumed for parsing. They typically produce parse trees that are then analyzed further to identify content of interest, or elements are placed in databases for subsequent searching and analysis. Normalization and derived traces Rather than trying to specify all ways in which the same content may be expressed, normalization is used to translate traces into derived traces that reflect a standardized form of the content. For example, all ASCII coded characters may be mapped into lower case characters so that searches may proceed regardless of the case of the lettering. Similarly, “Jim”, “James”, “Jimmy”, “Jimbo”, and “[email protected]” might be mapped into “James” as normalization and placed into a derived trace so that searches for the named individual will find all of those forms. Time and dates may all be translated into YYYY-MM-DDTHH:mm:ss.dddd format, while multiple spaces, tabs or other whitespace separators may be translated into a single space. The list goes on and depends on notions of equivalence or similarity in syntax and semantics. Similarity analysis and related methods Similarity analysis is based on some definition of relationships between traces. The relationship is codified in a metric which is then measured between different traces. The result of applying the metric is then used to establish similarity relative to that metric. For example, two email messages may be similar in size if they contain the same number of bits. Multiple relationship metrics may be applied to establish a set of factors that are similar between sets of bit sequences, so that groups of traces are identified as similar or dissimilar to a level with respect to the defined relationship metric. Time sequencing, travel patterns, and related methods Analysis of time, movement, and event sequencing is particularly interesting in digital forensics because of the desire to establish what happened when and the 9 Journal of Digital Forensics, Security and Law, Vol. 7(3) availability of a very rich set of records relating time at varying precision and accuracy. While timestamps may record time and date to the second or millisecond, the basis for those times relative to events at issue are somewhat more dubious. For example, an accurate record of the execution of a program to the nearest second is commonly available, but the process of execution may have lasted for a period of minutes, hours, or days. Understanding what the timestamp actually reflects in terms of that execution may not be provided by the timestamp. Most analysis today simply sorts by time and providers the ordered list of identified records, but this is often misleading in terms of the actual event sequence or relevance. Time sequences are often used to establish travel patterns, such as the use of sequences of credit card transactions at different retail outlets being used to establish that the person using the credit card went from place to place or was or was not capable of being at a particular place at a particular time. But analysis is not attribution. Anchor events Anchor events are events external to the traces that can act to tie down traces to externalities. For example, if a message contains bit sequences that are typically associated external systems, events in those external systems may be used to anchor the events asserted to be related to the records reflected in the traces. Traces produced by electronic mail processes typically include sequences bits that include “Received:” headers reflecting timestamps added by mail transfer agents in the path from origination to destination. By finding records of other messages passing through the same external MTAs in the same time frame, and when those records' timestamps are independently determined reliable (e.g., by the examiner having operated the systems that allow timestamps to be validated as reliable), those anchor events provide external context that can be used in analysis. Building sieves and counting things Many examinations involve producing counts of various things. For example, a count of how many times a particular telephone number appeared in a log of calls made by a suspect might be relevant to establishing that a relationship existed between two parties or their phone numbers. Many other things are counted in analysis, and this is an area where computers are particularly useful and reliable, if properly applied. In order to count things, computers typically sieve in or out the things of interest or non-interest, leaving the sieved portion of traces to be counted. For example, to find the number of times two phone numbers communicated to each other when the individuals associated with those phone numbers were known to be in different cities, a sieve might be produced to extract relevant phone records and the results counted. Note that such a sieve is not typically available off-hand, and that the examiner is typically called upon to build such a sieve. Once build, many examiners share the details of their methods with others and thus build up a library of partial solutions to analytical problems that they reuse or alter for another purpose 10 Journal of Digital Forensics, Security and Law, Vol. 7(3) over time. Presentation and human cognitive analysis The human visual cortex and brain is far better at rapidly detecting certain classes of patterns than computers. As a result, one of the most common analytical techniques is to produce a graphical image reflective of a set of traces relative to a context and have the examiner identify things of interest to the matter at hand. An example of this is in the analysis of graphical depictions of patterns of communications between groups, where people very quickly identify “key players” once the data is presented in an amenable manner. Similarly, when experts examine things like email headers, they rapidly detect things that “just don't look right”, and can often explain them once seen. After this has been done a number of times, there is a tendency for someone to come up with automation to perform such analysis, and the automation of the analysis area largely grows by turning human cognitive methods into automated programs to perform the same or similar functions without the dependency on human judgment, and with repeatability and scalability that far exceeds what people can do. Traceability to original traces. A final critical factor in analysis is that analytical results are normally traceable directly to the specific traces associated with those results. Thus, unlike programs that merely sort times, a forensic analysis of times associated with traces will ultimately have to be able to be shown to relate the sorted times to the traces used to producing those times. Thus derived traces need to link back to their origins, normalization requires association with the original traces that were normalized, and so forth. A final comment This description of analysis and its methods is not comprehensive, but it may be a reasonable starting point. To the extent that many things are missed in this description, other works attempt to be more comprehensive.1 But this is a growing and evolving field, and more is better when it comes to identifying methods that have been applied, studied, tested, and published. As always, we welcome your expansion of the art and science and our lists of elements of those. In our ongoing efforts to define and detail the science and art of digital forensics, standard terminology and common understandings have been found to be an important and largely unfulfilled need.12 But findings also indicate that by starting to use common words we produce common understandings and consensus around the issues of the emerging science. By describing the field as 12 F. Cohen, “Update on the State of the Science of Digital Evidence Examination”, Conference on Digital Forensics, Security, and the Law, 2012 11 Journal of Digital Forensics, Security and Law, Vol. 7(3) a whole, and in this short piece the elements of analysis, we hope to bring about a unified language and understanding of the field that will help the emerging science to form and the practitioners of the art to communicate and operate as scientists. But consensus does not come from me telling you what to think or how to say it. It comes from increasing numbers of members of the field adopting common definitions, terminology, and methodology, applying it themselves, and demanding it of others. This is up to you as my readers to decide. As always, feedback helps, and we welcome it. Add your voice to the consensus by responding to this editorial with your views. 12 Journal of Digital Forensics, Security and Law, Vol. 7(3) On the Development of a Digital Forensics Curriculum Manghui Tu1 Department of Computer Information Technology and Graphics Purdue University Calumet Dianxiang Xu College of Business and Information Systems Dakota State University, USA Samsuddin Wira Department of Public Service Malaysia Cristian Balan Computer and Digital Forensic Program Champlain College Kyle Cronin College of Business and Information Systems Dakota State University, USA Abstract Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digital forensics curriculum for an academic program. In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated. Both digital forensics educators and practitioners were surveyed and results were analyzed to determine the industry and law enforcement need for skills and knowledge for their digital forensic examiners. Based on the survey results and the topics that make up certificate programs in digital forensics, topics that are desired in digital forensics courses are identified. Finally, based on the research findings, six digital forensics courses and required 1 Corresponding author. Tel: +1 219 989 3253, Email: [email protected] 13 Journal of Digital Forensics, Security and Law, Vol. 7(3) topics are proposed to be offered in both undergraduate and graduate digital forensics programs. Keywords: Digital Forensics, curriculum, survey, undergraduate program, graduate program 1. INTRODUCTION With continuing advances of computer and Internet technology, the use of digital devices has become embedded in our business and personal lives (Rogers, 2003; Rogers & Seigfried, 2004). For example, communication using email and online chat has become ubiquitous. Businesses and organizations use computer systems and the Internet for e-commerce, business communication, and internal management. Society is very dependent on computers and Internet technologies such that the Internet infrastructure has become the foundation of communications, banking, healthcare, transportation, warfare, etc. (Berghel, 2003; Huebner, Ben, & Ruan, 2008; NIPC, 2003). With the high impact on our society, the computing infrastructure has become the target of criminals, fraudsters, and terrorisms (Berghel, 2003; Huebner et al., 2008; NIPC, 2003; Wolf, 2009). In recent years, many criminals employ computers and computer programs to commit sophisticated financial frauds (Singleton, Singleton, Bologna, & Lindquist, 2006), and more and more hackers attack the computing infrastructure for various reasons (CERT, 2003, 2006; Huebner et al., 2008; Kessler & Haggerty, 2008; Kessler & Schirling, 2006; Rogers, 2004; Wolf, 2009). Computer crime and computer related incidents continue their prevalence and frequency (CERT, 2003, 2006) and result in billions of dollars in losses (Singleton et al., 2006), which introduces the urgency to build a suitable workforce to contain, prevent and prosecute these crimes, frauds, and attacks by effectively conducting digital investigations (Yasinsac, Erbacher, Marks, Pollitt, & Sommer, 2003). However, computer and Internet technologies are very complex and dynamic, which require digital forensic practitioners to have appropriate knowledge and a wide set of skills (Carlton, 2007; Yasinsac et al., 2003). The U.S. Government Accountability Office (GAO) reported that there are many challenges in fighting against computer crimes and attacks. Some examples include the lack of mechanisms to detect and report cyber-crimes, the lack of education or training standards to ensure adequate analytical and technical capabilities for law enforcement and the lack of guidelines to implement information security practices and raise awareness (Carlton, 2007; Wolf, 2009). Key to addressing such challenges is a comprehensive forensics education, development of better forensic techniques for forensics practitioners and improvement of forensics and security awareness for user. The computer forensics community is very concerned with the lack of education and training standards for its industry (Huebner et al., 2008; Kessler & Schirling, 2006; Rogers, 2004; Yasinsac et al., 2003). Until now, only a few efforts have been devoted to the development of digital forensics program guidelines (FEPAC, 14 Journal of Digital Forensics, Security and Law, Vol. 7(3) 2008; Huebner et al., 2008; NIST, 2007; Rogers, 2004; Yasinsac et al., 2003). The American Academy of Forensics Science (AAFS) has provided guidelines for forensic science education and training that was developed by the Forensic Science Education Programs Accreditation Commission in 2008 (FEPAC). These works only give general guideline on digital forensic education and training, such as the number of credits needed, the core forensics topics that should be taught, etc. The National Institute of Standards and Technology (NIST) also published guidelines for forensic science education and training that was developed by West Virginia University Forensics Science Initiative (NIST, 2007; West Virginia, 2007). NIST gave general guidelines for program development as well as detailed topics for digital forensics curriculum design. One such example is the student learning in 24 proposed courses amounting to 57 credit hours that includes sample topics (West Virginia, 2007).This work can be an excellent guide for educational program development. However, it would be too expensive for education and training institutes to design an educational program strictly following these recommendations; 24 courses is a substantial amount in an academic program. Actually, none of the existing educational and training programs have implemented such large number of courses in digital forensics. A recently revised program at Champlain College is comprised of 11 digital forensics courses, which is one of the more in-depth curriculums in an undergraduate program. There are some other guidelines for computer related program development. The IEEE and ACM communities provide great recommendations for computer related program design and curriculum development, but very little on addressing the computer forensics program and its curriculum (Liu, 2006). In the past few years, many more universities and colleges started offering courses and even developing programs in computer forensics (Gottschalk, Liu, Dathan, Fitzgerald, & Stein, 2005; Huebner et al., 2008; Kessler & Haggerty, 2008; Kessler & Schirling, 2006; Lang, 1999; Liu, 2006; Troell, Pan, & Stackpole, 2003). Unfortunately, due to the lack of standards, the quality of some these academic courses are suspect (Rogers, 2004). There are a few research works addressing the computer forensics curriculum design (Berghel, 2003; Gottschalk et al., 2005; Kessler & Schirling, 2006; Liu, 2006; Rogers, 2004; Yasinsac, 2002; Yasinsac et al., 2003). Most of these programs in higher education contain general and survey courses on digital forensics topics (Gottschalk et al., 2005; Kessler & Schirling, 2006), others have modules or topics in computer courses (Yasinsac et al., 2003) and few have a full, in-depth digital forensics curriculum to support an expanded program (Kessler & Schirling, 2006; Peterson, Raines & Baldwin, 2007). Some of the research works recommend courses that should be offered in digital forensic education or training programs (Kessler & Schirling, 2006; Liu, 2006). These research works describe the design of digital forensics courses but do not clearly outline specific learning modules that should be embedded in digital forensics curriculum. Hence, we feel it is necessary to conduct a survey of the digital forensics education programs in 15 Journal of Digital Forensics, Security and Law, Vol. 7(3) the U.S. in order to develop a more detailed curriculum for digital forensics. The work in West Virginia (2007) provides detailed topics for digital forensics curriculum design; however, the large number of courses in digital forensics makes it difficult to implement in a college program. Therefore, there is an urgent need to identify what digital forensics topics are most needed, and then attempt to create guidelines with a highly compact digital forensics curriculum. Due to its multidisciplinary nature, digital forensics deals with the arrests, investigations, seizures, preservation, and storage of physical digital devices and objects. As such, digital forensics education is composed of large set of topics (Berghel, 2003; Yasinsac et al., 2003). The objective in this research is to identify the most important topics that should be part of digital forensics courses as viewed by both practitioners and academics. For example, some programs focus on free and open source tools (FOSS), while forensics practitioners in public sectors prefer commercial software tools that have been accepted in the industry (Sam Houston State University, 2009). This point introduces the questions on what tools should be used in the academic classroom, and what skill levels should the students have with these tools. The average cyber-crime perpetrator tends to lack technical skills beyond that of a typical end user, however, hackers may commit a crime using sophisticated computer and Internet techniques (Berghel, 2003; Sam Houston State University, 2009; Yasinsac, 2002; Yasinsac et al., 2003). This leads to questions about the additional topics that should be covered beyond the general forensics skills. Do future digital forensics practitioners need to know the hacking methodologies and approaches? Should an ethical hacking course be part of a digital forensic program? These and other topics should be carefully discussed and examined to ensure that future graduates of digital forensic programs and training are adequately prepared for this constantly changing professional field. In this research, some of the existing works on digital forensics curriculum design will be first discussed. Then, a survey is presented on courses offered by the existing digital forensic programs, as evident from an analysis of course catalogs and syllabuses. After that, we present the results of a survey of digital forensics educators and practitioners and the analysis of the different sets of questions and responses that were collected. The results of this survey were analyzed to support the proposed course modules. The main contribution of the research is to provide a list of modules for digital forensics courses and to identify digital forensics analysis tools and software to be used in the laboratory environment in preparation for professional work in the field. 2. RELATED WORK Yasinsac et al. (2003) proposed a model for digital forensics education and training. Their model illustrated digital forensics training based on the role of digital forensics practitioner. Their model divides digital forensics practitioners into four roles, namely, Computer Network Forensics Technician, Computer 16 Journal of Digital Forensics, Security and Law, Vol. 7(3) Network Forensics Policy Maker, Computer Network Forensics Professional, and Computer Network Forensics Researcher. The topics that are part of the education program are fundamentally different than a training program. An education program focuses on theory and knowledge, while a training program focuses more on practical skills and application. The authors of the model argue that an undergraduate program can ideally integrate topics that are found in both education and training programs. (Troell et al., 2003) describes the development of an undergraduate and graduate course in computer forensics. The undergraduate course introduces the student to the basic tools and procedures of the field. The graduate course has the above undergraduate course as a prerequisite and discusses advanced issues related to analysis and presentation of evidence, as well as the customization and integration of available tools into standard operating procedures. It does not give a detailed guide on the specific topics, especially the practical use of tools, and skills that would fit into the forensics education programs. The High Tech Crime Consortium (HTCC) proposed an online certification program, which demonstrates the perspectives or competencies required of a graduate of a computer forensics program (Lang, 1999). Two programming courses, security concepts, system administration, web publishing, and two courses in computer forensics were recommended. Its main focus was on topics of network and security, and students are not expected to learn practical skills and tools. Erbacher and Swart (2007) pointed out the need to integrate training and education topics in computer forensics education programs, but its main focus is on the managerial or administrative aspect of digital forensics. Other research works focus on the implementation of the computer forensics curriculum (Huebner et al., 2008; Kessler & Haggerty, 2008; Kessler & Schirling, 2006; Liu, 2006; Wassenaar, Woo, & Wu, 2009). Liu (2006) describes the design of the computer forensics undergraduate program at Metropolitan State University. Their curriculum is made up of forensics laws and criminal justice topics and has a solid foundation in computer technologies. Huebner et al. (2008) summarize the computer forensic courses developed in Australia, however, a detailed computer forensics curriculum and the topics covered in these programs were not given. Kessler & Haggerty (2008) focus on the online delivery of a computer forensics program in forensics management, while Kessler & Schirling (2006) give a very detailed description of the computer forensics curriculum, which focuses largely on the legal procedures. Wassenaar et al. (2009) gives an overview of a computer forensics certificate program and listed a series of courses included in the program, but failed to provide details on computer forensics topics and module in these courses. 17 Journal of Digital Forensics, Security and Law, Vol. 7(3) 3. EXISTING AND PROPOSED DIGITAL FORENSICS COURSES Champlain College was one of the first colleges to provide a comprehensive computer forensics program (Kessler & Schirling, 2006). The Champlain program offers a broad range of courses related to computer forensics, such as criminal justice, basic computer science courses, and some core computer forensics courses. The two computer forensic courses (Computer Forensics I and II) focus on the investigation of digital data following legal rules of evidence and forensics investigation procedures. Advanced topics such as anti-forensics and networks forensics are introduced in the anti-forensics course along with network security topics that are introduced in the network security course. Due to the success of Champlain College undergraduate program, they moved one step ahead by offering a Master’s degree program (Kessler & Haggerty, 2008; Kessler & Schirling, 2006). This program concentrates on digital forensics investigation management and has a limited number of courses that include practical or handson training on computer technology. Prominent digital forensics education programs have been developed at other universities such as Metropolitan State University (Liu, 2006), Sam Houston State University (2009), Bloomsburg University of Pennsylvania, University of Central Florida (Craiger, Ponte, Whitcomb, Pollitt, & Eaglin, 2007; UCF, 2010), and University of Rhode Island (URI, 2012). These programs offer courses covering basic digital forensics investigation topics. Some of these programs offer some unique courses. Sam Houston State University (2009) offers an excellent course on hardware forensics and file system forensics that cover different types of digital media, such as cell phones, and uses basic digital forensics tools such as hex editor. Bloomsburg University of Pennsylvania offers courses focusing on topics of various file systems and searching for evidence in windows environment, as well as a course focusing on forensics analysis of small digital media, such as cell phone, PDAs, etc. At Bloomsburg, the primary tool for forensics analysis is Encase. The University of Rhode Island probably offers the most comprehensive courses in digital forensics. They focus on forensics tools practices, network forensics, enterprise computer server forensics, and research topics in digital forensics. The University of Central Florida offers a unique course on forensics practice which focuses on legal procedures of data acquisition, and a special track that gives the student courtroom experience. There are numerous educational digital forensics programs developed throughout the United States that offer many courses covering various topics, but each with a different focus. Many state laws in the United States require computer forensic expert witnesses and private investigators to have a professional certification or a private investigator's license (Barbara, 2009). A group of professionals from academia met with the aim to change the state requirements by providing guidance for higher learning institutions to develop a neutral digital forensics program that does not rely on any vendor’s products. As a result, a model for digital forensics programs at four different levels (i.e., associate degree, baccalaureate degree, 18 Journal of Digital Forensics, Security and Law, Vol. 7(3) graduate degree, and academic certificate) was developed (West Virginia, 2007). This group proposed that a baccalaureate program should consist of general education, computing and information science core, forensics science core, other additional required courses, digital forensics laboratory and additional upper division digital forensics courses, These upper division courses consist of advanced digital forensics, technical electives, and university level electives open to all students (West Virginia, 2007). They suggested that each of the technical subjects must be accompanied by one-hour labs to practice the procedures and skill they learned from class lectures. The purpose of this lab is to provide students with hands-on experience in digital forensics (West Virginia, 2007). 4. SURVEY RESULTS In order to determine the technical skills computer forensics practitioners should possess and the tools that should be taught in digital forensics courses, digital forensics practitioners in both public and private sectors were surveyed, each group with a different set of questions. Digital forensics educators were asked what analysis tools they used in their digital forensics program and were questioned on their willingness to collaborate with digital forensics practitioners for education purposes. Additionally, they were surveyed on their reasons for not collaborating with digital forensics practitioners for education purposes. The survey also asked their opinion in improving digital forensics education. These survey questions were sent out to universities/colleges with computer forensic programs. Digital forensics practitioners were queried on the involvement of their organization in digital forensics, the type of organization that they are representing, the type of digital forensics investigations they conduct in house, most frequent operating systems found in their investigation, digital forensics analysis tools used, and the willingness to collaborate with a college or university for education purposes. Similarly, the survey also asked digital forensics practitioners’ opinion in improving digital forensics education. The survey was conducted among the participants of 2008 Digital Forensics Research Workshop, being that they were experienced researchers and practitioners in the computer forensics field. In this section, we will discuss the findings of the survey that has been conducted among both digital forensics practitioners and colleges or universities that offer a digital forensics program. Seventeen volunteers from a variety of colleges and universities along with nine volunteers from the digital forensics practitioner group within the United States participated in this survey. Among them, 67% of digital forensics practitioner respondents have less than 10 years of experience with digital forensics. The highest number of respondents was from the digital forensics practitioners group, of which 44.4% was from corporation or private companies. The next largest group of respondents was from law enforcement agencies and non-government organizations at 22.2%. Meanwhile, 11.1% of 19 Journal of Digital Forensics, Security and Law, Vol. 7(3) digital forensics practitioners were from government agencies and there were no respondents from private investigation. Figure 1 – Digital forensics analysis tools usage 20 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 1 shows the usage of popular digital forensics tools by both digital forensics practitioners and digital forensics educators. In this figure, both 94.1% of digital forensics educator and 66.7% of digital forensics practitioners use EnCase as their main digital forensics acquisition and analysis tool and they seem to be the most widely used tool for both educators and practitioners. The secondmost widely used tool is FTK, as 70.6% of digital forensics educators use it and 56.6% of digital forensics practitioners use it. Some other tools, such as WinHex, HELIX, md5sum and MOBILedit! Forensic are also widely used by digital forensics practitioners, but they seem to be rarely used by educators. Other tools that are not used by digital forensics educators but are used by some digital forensics practitioners are iLook and SMART, PTK, CellDEK, VideoFOCUS, dTective, ClearID, dVelepor and Magnifi. Meanwhile, the tools that are not used by digital forensics practitioners, but used by digital forensics educators, are Foremost, pyFLAG, and OUTGUESS. Also, in this survey, digital forensics practitioners were asked to describe the type of cases that are involved in their investigations. The result is shown in Figure 2. The most common digital forensic investigation cases, 77.8% of overall cases, are those that deal with single personal computer (PCs). Surprisingly, the secondmost common digital forensic investigation cases, 55.6% of overall cases, involve mobile media. The third-most common digital forensic investigation cases, 44.4% of overall cases, involve networks, hacking, and multimedia. Only a small number of cases, i.e., 11.1% of overall cases, are concerned with stenography and other sophisticated computer techniques. Note that the total percentage is over 100% due to the fact that some cases may involve multiple devices. For example, a cell phone, PDA, as well as desktop PCs, laptops, etc may be part of the same case. 90.00% 80.00% 77.80% 70.00% 55.60% 60.00% 50.00% 44.40% 44.40% 40.00% 30.00% 20.00% 11.10% 11.10% Stegnography Others 10.00% 0.00% Computer Forensic Network Forensics Mobile Forensics Multimedia Forensics Figure 2 –The percentages of different digital forensics investigation cases 21 Journal of Digital Forensics, Security and Law, Vol. 7(3) Furthermore, digital forensics practitioners were also asked to indicate what types of operating systems were encountered in their recent investigations and the results are shown in Figure 3. It is not surprising that 100% of digital forensics practitioners responded that the Windows operating environment was part of their investigations. It is followed by Mac OS and Sun Solaris with 55.56%, Linux and FreeBSD with 44.44%, and UNIX and other operating systems with 22.22%. We did not expect Sun Solaris to command such a high percentage as it is not prominently taught in education and training programs. This might be an indication of an important oversight by both education and training programs. Figure 3 Operating System involved in investigations To find how close the industry and related organizations can work together with academia for digital forensics education, the willingness to conduct collaborative work for the two entities (e.g., digital forensics educators and practitioners) were surveyed. The survey results are shown in Figure 4. Figure 4 – The willingness of digital forensics educators and digital forensics practitioners to work together in the development of digital forensics education 22 Journal of Digital Forensics, Security and Law, Vol. 7(3) Answer Options (a) Budget Security No networking (contacts) Lack of experience lecturers Response Percent 100.0% 0.0% 0.0% 0.0% Answer Options (b) Budget Security issues No networking (contacts) No time to participate Response Percent 0.0% 50.0% 0.0% 50.0% Figure 5. Digital forensics educators’ (a) practitioners’ (b) reasons for not collaborating with each other It is not surprising that 93.8% of digital forensics educators and 77.8% of digital forensics practitioners are willing to cooperate in the development of digital forensics education programs. The most predominant reason or concern why digital forensic educators (6.3% of digital forensics educators) would not (or cannot) work with digital forensics practitioners in the near future is related to the budget (Figure 5a). Meanwhile, the reasons that 22.2% of digital forensics practitioners are not willing to collaborate with educators revolve around security issues and time to devote to the collaboration. In certain cases collaboration with educators is simply irrelevant to their scope of work (Figure 5b). It has been discussed in the digital forensics community that a close collaboration between industry, government agencies, and educational institutes would be beneficial to every party. Within such collaborative infrastructure, faculty members and researchers will collaboratively have a better knowledge of what is needed for the forensic community. Students will have a stronger learning motivation associated with the application of what they have learned to real world scenarios. The industry and government agencies will have a better channel to recruit forensics examiners to staff their laboratories and incidents response teams. 5. PROPOSED DIGITAL FORENSICS MODULES As indicated by Figure 1, it is not difficult to notice that most of the digital forensic practitioners either use Encase or FTK as digital forensics examination tool in their investigations, and this is easily explained by the large market share that these two commercial products command.. Aside from these two tools, WinHex, HELIX, md5sum and MOBILedit! were selected as frequently used digital forensics analysis. To examine cell phones, MOBILedit! is one of the most frequently used tools for analysis. In addition, HELIX is becoming popular among digital forensics practitioners and digital forensics educators. One of the reasons for its popularity is the fact that HELIX is a complete digital forensics analysis tool that has a large set of programs and plug-ins that are required for digital investigation. Based on the survey results, there is an indication that a digital forensic practitioner should be proficient in using most popular tools, such as FTK and Encase. Thus, it is beneficial to have students graduating from 23 Journal of Digital Forensics, Security and Law, Vol. 7(3) forensic programs to have ample training on these tools. Moreover, a heavy module on forensic tools, which focuses on FTK and Encase, and covers Helix, WinHex, and other open source tools, should be built into forensic courses. The Technical Working Group for Education and Training in Digital Forensics recommends that a designated computer forensics lab should be designed to provide equipment and software to train student on the practical skills (West Virginia, 2007), especially using the popular digital forensic tools presented in our results. Digital forensics requires an investigator to have ample knowledge on a variety of operating systems. As shown in Figure 3, almost all operating systems were part of investigations carried on by digital forensics practitioners, such as Windows, which was the most common, followed by Unix/Linux and Mac OS. Based on practitioners’ experience, Windows machines are the most common in the investigative caseload, while Unix/Linux comprises about 20% of the overall systems (Pogue, 2008). This indicates that a variety of operating systems should be addressed in digital forensics curriculum, but the focus should be primarily on Windows, with a secondary focus on Unix/Linux and Macintosh. Even though theoretically, it is desirable to teach as many operating systems as possible, unfortunately, there are limited resources available in educational programs, including time, equipment, and faculty resource. Due to the rapid development of learning tools available, student or digital forensics practitioners would be able to learn from external sources, such as the Internet, conferences and vendor specific training. While not part of the survey, it is our opinion that the use of virtual machines has minimized the need for multiple hardware platforms and has made access to multiple Operating Systems in the classroom more affordable. Most white-collar crimes in the public sector deal with single machines. The counter-investigative skills involved are not beyond typical end users (Berghel, 2003). However, there are substantially increasing numbers of cases dealing with networks, protocols/devices, and Internet applications as observed from the survey results shown in Figure 2. Furthermore, there are many incidents in the private sector that go unreported due to various reasons (Berghel, 2003; Rogers, 2004). Many of these incidents deal with adversaries that have a set of skills that are well beyond that of normal end users. These skills deal with a variety of protocols/software to include end user applications, operating systems, networks, and Internet. To effectively and efficiently investigate these criminal cases and their perpetrators, to find relevant evidence, digital forensic practitioners need to have a more elaborate set of knowledge and skills, which introduce the discipline of network/internet forensics. Until now, there are very few education programs that offer such training, and no consensus exists as to the tools and topics that should be covered in education courses to address network/internet forensics. To successfully investigate Internet crimes, students need to understand the fundamental mechanisms, methodologies, and approaches employed by these sophisticated criminals while committing such crimes, as well as possible 24 Journal of Digital Forensics, Security and Law, Vol. 7(3) countermeasures organizations and companies can use to defend themselves. Based on the above observations, network forensics related courses need to cover a large amount of topics, such as operating systems, network and internet protocols, malwares, devices, applications, network hacking methodology and techniques as well as countermeasures and security mechanisms. With the advances in computer and Internet technology, mobile computing has become more and more popular. A large number of mobile devices are available and have been used to play music and store photos, contacts, and files or even play movies (Kiley, Shinbara, & Rogers, 2007). Tools such as XRY, Cellebrite, and Oxygen can be used for logical extraction from mobile devices, while the tools such as XACT and Cellebrite PA can be used for physical extraction of data from mobile devices. Some of the tools, such as Paraben Device Seizure, can be used for both physical and logical extraction from mobile devices, but each has its limitations as each mobile vendor uses their own operating system. The popularity and ubiquity of mobile devices continue to grow in every corner of our personal and business lives, and also in modern cybercrimes (Kiley et al., 2007). The survey indicates that more than half of the cases included mobile devices. Additionally, due to vast difference in configurations and settings among mobile devices, digital forensics practitioners need to have ample exposure to mobile devices. It is important to include a module in computer forensics curriculum that addresses mobile forensics topics, such as wireless Local Area Network (WLAN), Personal Digital Assistant (PDA), iPod, iPhone, Blackberry, etc. There seems to be a great deal of concern on how to train students to meet both the industry and law enforcement needs (Liu, 2006). There are multiple approaches to address this issue; the proposed approach is to collaborate with digital forensics practitioners from both industry and law enforcement community. Based on the survey results, more than 75% of digital forensics educators and digital forensics investigators agreed to cooperate in the development of a digital forensics program at universities or colleges. The reasons why forensics practitioners and educators resist collaboration include budget, security reasons, time, and lack of applicability to their scope of work. It is unrealistic to have digital forensic practitioners devote a large block of time to the development of educational programs and these road blocks include budgetary and scheduling constraints. It is imperative that coursework in digital forensics should incorporate the experience and ideas from the industry and law enforcement. Appropriate courses that can be fit into this category are professional project, internships and/ or courtroom experience. Further research should explore the relationship between students completing professional projects and internships and the students competiveness in the job market once they graduate. Anecdotal data indicates that students completing internships in the field obtain relevant employment within six months of graduation, more so than students that did not undergo an internship. 25 Journal of Digital Forensics, Security and Law, Vol. 7(3) The Professional Project course should be a research project which requires the application of the knowledge, techniques, methodology, and skills learned from other digital forensics courses. Topics could be either from academia or from industry. The survey result indicates that multimedia forensic analysis has been conducted by digital forensics practitioners, which requires the use of a suite of tools including VideoFOCUS, dTective, ClearID DAC, dVeleloper and Magnifi Spotlight. Several research issues on multimedia forensics exists which need to be undertaken to improve the efficiency and accuracy of the results. Another important topic is the deployment of a honeypot which has been recently used for cyber security protection and network forensic investigation (Spitzner, 2003), due to its cost effectiveness and usefulness for security and forensic education and research. Other important topics include malware forensics analysis, social computing forensics (for example, forensics investigation on Facebook, MySpace, Twitter, Blogosphere, etc.), accounting and financial fraud detection and investigation. Furthermore, evidence should be presented in a in a clear, concise, professional way so that audiences in a courtroom, such as a jury, judge, and attorneys, can easily understand it. The Courtroom Experience course is an application of the knowledge, skills, and methodology learned from all the courses in the education program, including forensic law, criminal justice, communication, digital forensics investigation, and other computer courses. In a mock courtroom, judges and attorneys from industry and law enforcement can participate, and the cases may be a simulation of real world scenarios. In a mock trial course, the students can apply what they have learned and gain real world experiences. Another approach to collaborate with industry and law enforcement is to incorporate topics emphasized in certification programs into the curriculum design of educational programs. There are many certification programs available, including EC Council’s CHFI (Compute Hacking and Forensic Investigator Certification), AccessData’s ACE (AccessData Computer Examiner), Guidance Software’s EnCE (Encase Certified Examiner), CCE (Certified Computer Examiner) administrated by the International Society of Forensic Computer Examiners, CIFI (Certified Information Forensic Investigator) offered by International Information Systems Forensic Association, CFCE (Certified Forensic Computer Examiner) managed by the International Association of Computer Investigative Specialists, DFCP and DFCA Certifications managed by DFCB (Digital Forensic Certificate Board), and GCFA (GIAC Certified Forensics Analysts) managed by SANS. Some common topics were identified from these certification programs that would be appropriate for an education program. Modules from CHFI, CCE, ACE, and EnCE could be included in both graduate and undergraduate curriculum. As a matter of fact, AccessData offers its training material to colleges that sign up for their educational bundle and have two faculty members that are ACE certified. 26 Journal of Digital Forensics, Security and Law, Vol. 7(3) Courses and topics Digital Forensics Fundamentals Digital forensic investigation procedures, private regulations and public law issues, Windows FAT and NTFS, *nix and Mac File Systems, open and commercial forensic tools (Encase, FTK), evidence acquisition, preserving, analysis, report, and presentation. Advanced Computer Forensics Advanced features of forensics tools (search, KFF Management, encryption and decryption, data carving), windows registry, memory analysis, advanced file system analysis (deleted and hidden data, metadata, temporary file, unknown\executable file analysis), applied decryption Network/ Internet Forensics Internet and Network security, ethical hacking, network traffic analysis, log analysis, web attack and DOS investigation, Email forensics, internet application forensics, social computing forensics (social networks/Web2.0), malware analysis Mobile Digital Forensics Wireless security and attacks, wireless track and investigation, cell phone, IPhone, IPod, PDA, Blackberry, etc. Professional Project on Digital Forensics Integrate existing knowledge and skills in digital forensics and conduct research to understand advanced cyber-crime methodologies and techniques and research on advanced digital forensics investigation and analysis techniques (honeynet, etc) Courtroom Experience Work with digital forensic practitioners from public/ private sectors on a mock case, integrating knowledge and skills from forensics law, criminal justice, forensic psychology, and digital forensics fields, and present in a mock courtroom Figure 6 –Proposed Digital Forensics courses. Based on the survey results, the following six courses are proposed as the core digital forensics topics for digital forensics education programs: 1) Digital Forensics Fundamentals, 2) Advanced Computer Forensics, 3) Network/Internet Forensics, 4) Mobile Digital Forensics, 5) Digital Forensics Professional Project and Courtroom Experience. These courses could be designed to fit both undergraduate and graduate programs with minor adjustments. For example, the professional project could be optional for undergraduate studies but it could be required by graduate programs. Another example would be mobile forensics being required by undergraduate programs but it could be optional for graduate studies. The detailed topics for each course are shown in Figure 6. Note that in this paper, only those courses related to computer technology are discussed. The coursework in criminal justice and forensic law are not discussed here as they have been discussed in many other publications (Gottschalk et al., 2005; Huebner et al., 2008; Kessler & Schirling, 2006; Liu, 2006; Rogers, 2004). The above courses and modules have been recently implemented at Champlain 27 Journal of Digital Forensics, Security and Law, Vol. 7(3) College in the Computer and Digital Forensics Program Curriculum in 2011 (Champlain College, 2011). For example, the topics defined in Digital Forensics Fundamentals are implemented in FOR 320 (File System Forensics) and FOR 340 (Operating System Forensics), the topics defined in Advanced Computer Forensics are implemented in FOR 430 (Advanced Practice in Digital Investigations), the topics defined in Mobile Digital Forensics are implemented in FOR 310 (Mobile Device Forensics), the topics defined in Professional Project on Digital Forensics are implemented in FOR 490 (Computer Forensics Internship), the topics defined in Network and Internet Forensics is implemented in FOR 270 (Anti-Forensics & Network Forensics) and FOR 420 (E-Discovery and Data Analytics), and the topics defined in Courtroom Experience are implemented in CRJ 480 (Crime Scene Investigation) and CCC 410 (Capstone). 6. CONCLUSION This research investigated digital forensics curriculum design and existing education programs, which provides a list of computer forensics courses in general, but without much indication on what topics should be included and what tools should be taught. To determine the set of knowledge, methodology and skills that the industry and law enforcement require, both digital forensics educators and practitioners were surveyed and the results were analyzed. The most prevalent tools in use are commercial tools, such as Encase and FTK, and most cases deal with Windows operating systems, followed by Unix/Linux and Macintosh. Also, most digital forensics educators and practitioners are willing to collaborate to develop digital forensics educational programs, but most organizations are limited by budget and time availability. Based on the identified digital forensics topics, courses that support the industry and law enforcement needs are recommended. Specifically, courses that simulate real world digital forensics investigation are designed to enhance the collaboration with digital forensics practitioners from industry and law enforcement sectors. Based on our findings, some future research directions are recommended. First, to provide flexibility and cost-effectiveness, as well as improve enrollment, we would like to investigate the issues and approaches to design online security and forensic courses. The online courses should have access to all the commercial and open source tools similar to on-campus learning environment, and the solution should be well scaled and flexible to adapt to the rapid changing computer and forensics technologies. Second, the design of both undergraduate and graduate digital forensics programs should be explored on how to incorporate with those existing computer and network security programs. Clear delineation between information security and digital forensics, especially when discussing network forensics, does not appear to exist. There is evidence to suggest that students can benefit professionally from information assurance skills and knowledge when undertaking network forensics incidents. Third, it is recommended to integrate a large portion of the business management and business information systems 28 Journal of Digital Forensics, Security and Law, Vol. 7(3) component into the digital forensics program design, since fraud and other whitecollar crimes are significant threats to businesses. Such interdisciplinary curriculum design and education fit the mission of many business programs and can be incorporated in criminal justice, information systems, and computer science programs at other colleges and universities. 7. REFERENCES Barbara, J.J. (2009). The Case Against PI Licensing for Digital Forensic Examiners. Forensics Magazine, 6(2), 23-29. Berghel, H. (2003). The discipline of Internet forensics. Communications of the ACM, 46(8), 15-20. Brueckner, S., Guaspari, D., Adelstein, F., & Weeks, J. (2008) Automated computer forensics training in a virtualized environment. Journal of Digital Investigation, 5(2008), S105-S111. Carlton, G.H. (2007). A grounded theory approach to identifying and measuring forensic data acquisition tasks. Journal of Digital Forensics, Security and Law, 2(1), 35-56. CERT. (2003). CERT statistics. Retrieved from http://www.cert.org/stats/ CERT. (2006). CERT statistics. Retrieved from http://www.cert.org/stats/ Champlain College. (2011). Computer & Digital Forensics Major. Retrieved from http://www.champlain.edu/Undergraduate-Studies/Majors-andPrograms/Computer-and-Digital-Forensics.html. Craiger, P., Ponte, L., Whitcomb, C., Pollitt, M., & Eaglin, R. (2007). Master's Degree in Digital Forensics. In Proceedings of the 40th Hawaii International Conference on System Sciences. Erbacher, R.F., & Swart, R. (2007) Computer Forensics: Education and Training. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.97.6123&rep=rep 1&type=pdf FEPAC. (2008). America Academy of Forensics Science. Forensics science education programs accreditation commission, accreditation standards. Retrieved from http://aafs.org/sites/default /files/pdf/FEPACStandards072410DRAFT.pdf Gottschalk, L., Liu, J., Dathan, B., Fitzgerald S., & Stein, M. (2005). Computer 29 Journal of Digital Forensics, Security and Law, Vol. 7(3) Forensics Programs in Higher Education: A Preliminary Study. Metropolitan State University. In Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education. Huebner, E., Ben, D., & Ruan, C. (2008). Computer Forensics Tertiary Education in Australia. 2008 IEEE International conference on computer Science and Software Engineering. Dec 12-14, 2008. Kessler, G.C. (2007). Online Education in Computer and Digital Forensics: A Case Study. In Proceedings of the 40th Hawaii International Conference on Systems Sciences (HICSS 40), Jan 3-6, 2007, Hawaii, USA. Kessler, G.C. & Haggerty, D. (2008). Pedagogy and Overview of a Graduate Program in Digital Investigation Management. In Proceedings of the 41st Hawaii International Conference on System Sciences. Kessler, G.C. & Schirling, M.E. (2006) The Design of Undergraduate Degree Program in Computer & Digital Forensics. Journal of Digital Forensics, Security & Law, 1(3), 37-50. Kiley, M., Shinbara, T., & Rogers, M. K. (2007). IPod Forensics Update. International Journal of Digital Evidence, 6(1), 1-9. Lang, D. (1999). Design and Development of a Distance Education Paradigm for Training Computer Forensics Examiners: A Limited Review of Literature. Retrieved from http://www.computerteacher.org/CFLR.htm Liu, J. (2006). Developing an innovative baccalaureate program in computer forensics. In Proceedings of the 36th ASEE/IEEE Frontiers in Education Conference. October 28–31, 2006, San Diego, CA. NIPC. (2003). National Infrastructure Protection Center white paper -- Risk Management: An Essential Guide to Protecting Critical Assets. Retrieved from http://www.nipc.gov/publications/ nipcpub/newnipcpub.htm NIST. (2007). National Institute of Standards and Technology (NIST). Education and Training in Digital Evidence: A Guide for Law Enforcement, Educational Institutions, and Students. Gaithersburg, MD: NIST, Technical Working Group for Education -- Digital Evidence. Peterson, G.L., Raines, R.A., & Baldwin, R.O. (2007). Graduate Digital Forensics Education at the Air Force Institute of Technology. In Proceedings of the 40th 30 Journal of Digital Forensics, Security and Law, Vol. 7(3) Annual Hawaii International Conference on System Sciences (HICSS’07).15301605/07. Jan 3-6, 2007, Hawaii, USA Pogue, C., Altheide, C., & Haverkos, T. (2008). Unix and Linux Forensics Analysis DVD Toolkit. Syngress. Rogers, M.K. (2003). The role of criminal profiling in computer forensic investigations. Journal of Computer Security, 22(4), 292-298. Rogers, M.K. & Seigfried, K. (2004). The future of computer forensics: A needs analysis survey. Journal of Computer and Security, 23, 12-16. Sam Houston State University. (2009). The Digital Forensics undergraduate program. Department of Computer Science. Retrieved from http://www.shsu.edu/catalog/df.html#df390 Singleton, T.W., Singleton, A.J., Bologna, G.J., & Lindquist, R.J. (2006). Fraud Auditing and Forensics Accounting, 3rd ed. John Wiley & Sons, Inc. Spitzner, L. (2003). The Honeynet Project: Trapping the hackers. IEEE Security and Privacy, 1(2), 15-23. SWGIT. (2004). Scientific Working Groups on Digital Evidence and Imaging Technology. SWGDE/SWGIT Guidelines & Recommendation for Training in Digital Multimedia Evidence. Version 1. Taylor, C., Endicott-Popovsky, B., & Philips, A. (2007, April). Forensic Education: Assessment and Measures of Excellence. IEEE ADFE. 155-165. Troell, L., Pan, Y., & Stackpole, B. (2003). Forensic Course Development. In Proceedings of the Conference on Information Technology Curriculum 4 (CITC4 ‘03) (Lafayette, IN, October 16-18, 2003). 265-269. UCF. (2010). Master of Science in Forensic Program. University of Central Florida. Retrieved from http://msdf.ucf.edu/curriculum.html URI. (2012). Digital Forensics Programs. The University of Rhode Island. Retrieved from http://forensics.cs.uri.edu/courses.php Wassenaar, D., Woo, D., & Wu. P. (2009). A Certificate Program in Computer Forensics. Journal of Computing Science in College, 24(1), 158-167. West Virginia University. (2007). West Virginia University Forensic Science Initiative. Technical Working Group for Education and Training in Digital Forensics. 31 Journal of Digital Forensics, Security and Law, Vol. 7(3) Wolf, U. (2009). Cyber-Crime: Law Enforcement Must Keep Pace With TechSavvy Criminals. Retrieved from http://www.govtech.com/dc/articles/575223 Yasinsac, A. (2002). Information Security Curricula in Computer Science Departments: Theory and Practice. The George Washington University Journal of Information Security, 1(2) 1-9. Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., & Sommer, P.M. (2003). Computer Forensics Education. IEEE Security & Privacy, 1(4), 15-23. 32 Journal of Digital Forensics, Security and Law, Vol. 7(3) Automatic Crash Recovery: Internet Explorer's black box John Moran County of Cumberland Portland, Maine [email protected] Dr. Douglas Orr Special Investigations Unit Spokane Police Department Spokane, Washington [email protected] Abstract A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of recent browsing history in spite of the users attempts to delete historical artifacts. As investigators, we must continually be looking for new sources of evidence; Automatic Crash Recovery is it. Keywords: Automatic Crash Recovery, ACR, Internet Explorer, IE8, IE9, Browsing history, RecoverRS, Compound files. 1. INTRODUCTION TO AUTOMATIC CRASH RECOVERY In order to understand the potential value of Automatic Crash Recovery to investigators, some background in to what exactly Automatic Crash Recovery does is required. According to Microsoft, "Automatic Crash Recovery (ACR) is a feature of Windows® Internet Explorer® 8 that can help to prevent the loss of work and productivity in the unlikely event of the browser crashing or hanging" (Microsoft, 2008, p. 3). From the user's perspective, ACR is what provides the option to 'Restore Session' when Internet Explorer closes improperly. Providing this functionality requires Internet Explorer to store numerous pieces of information about the history of the browsing session. ACR can be disabled by going to 'Tools' -> 'Internet Options' -> 'Advanced' and unchecking "Enable automatic crash recovery" in the 'Browsing' section. 33 Journal of Digital Forensics, Security and Law, Vol. 7(3) Interestingly, research shows that even with ACR disabled, Internet Explorer will continue to store information for its use. Similarly, research shows that even with InPrivate Browsing enabled, ACR artifacts will still be created. Several common "cleaning" utilities were tested and not a single utility removed the files created by ACR. It appears that there is currently no way to prevent Internet Explorer from creating ACR artifacts and furthermore that the only reliable way for a user to remove ACR artifacts is to manually delete and overwrite them after each session. 2. ARTIFACTS CREATED BY ACR The files of interest created by ACR are initially written to the C:\Users\<user>\AppData\Local\Microsoft\Internet Explorer\Recovery\Active directory in Windows 7 or the C:\Documents and Settings\<user>\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active directory in Windows XP. Internet Explorer creates two types of files in this directory. The first type uses the naming convention 'RecoveryStore.{<GUID>}.dat' and is created when Internet Explorer is first executed. Referred to from this point on as the "recovery store file," only one such file is created regardless of the number of tabs or windows opened by the user (except when using InPrivate Browsing a second recovery store file is created for the InPrivate Browsing session). The second type created uses the naming convention '{<GUID>}.dat'. One of these files is created when Internet Explorer is first executed and one additional file is created for each additional tab or window that is opened. These files will be referred to from this point on as the "tab data files." The globally unique identifiers (GUIDs) created for both the recovery store files and the tab data files are in hexadecimal and display as ########-####-####-############. The format of these GUIDs as well as the information they contain is explained in greater detail in the following section. When Internet Explorer is closed by the user, the recovery store file and the tab data files are removed from their existing locations and recreated in the C:\Users\<user>\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active directory in Windows 7 or the C:\Documents and Settings\<user>\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Last Active directory in Windows XP with new GUIDs. Any GUIDs stored within the recovery store files and tab data files are also updated unless otherwise noted. One registry value that may be of interest during an investigation is HKCU\Software\Microsoft\Internet Explorer\Recovery\AutoRecover. A DWORD value of 0x00000000 indicates that ACR is enabled; a DWORD value of 0x00000002 indicates that ACR is disabled. As mentioned previously, ACR files will be created even when this value is set to 0x00000002, however this value may be an indication the user was attempting to hide their browsing 34 Journal of Digital Forensics, Security and Law, Vol. 7(3) activities. Another registry key that may be of interest is HKCU\Software\Microsoft\Internet Explorer\Recovery\Active. When Internet Explorer is executed and the recovery store file is created, a new DWORD value is created in this key using the GUID of the recovery store file as the name and 0x00000000 as the value. For example, if the recovery store file created was RecoveryStore.{3519D794-44E1-11E08CA1-005056C00008}.dat, a new DWORD value named {3519D794-44E111E0-8CA1-005056C00008} would be added to the key. When Internet Explorer is closed properly, this value is deleted from the key. This key appears to be what Internet Explorer checks to see if there are previous browsing sessions that can be recovered; manually adding previous ACR files to the C:\Users\<user>\AppData\Local\Microsoft\Internet Explorer\Recovery\Active directory and adding the GUID of the recovery store file to this registry key caused Internet Explorer to offer to restore the browsing session from the previous ACR files. Two other registry keys seen in Windows 7 environments are HKCU\Software\Microsoft\Internet Explorer\Recovery\AdminActive, which contains the GUID of the recovery store file currently open in Internet Explorer when run as Administrator and HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete, which contains the GUIDs of the tab data files currently being used by Internet Explorer. 3. ANALYSIS OF ACR FILES By the very nature of their function, ACR files must store several key pieces of information that can be of use to investigators, such as dates, times, and browsing history that might be otherwise unavailable through other means. In order to get the most from ACR artifacts and more importantly be able to articulate the method by which these artifacts are created and the process of recovering these artifacts, the next several sections will detail the file format and where key evidence may lie. 3.1 GUID Format The GUID itself can provide some important information and is important to mention, most notably the date and time the file was created. The first eight bytes of the GUID contain the date/time the file was created, or in other words, the date/time Internet Explorer was opened or closed (in the case of a recovery store file) or the date/time an individual tab was opened or closed (in the case of a tab data file). The date/time is stored as the number of 100 nanoseconds since October 15, 1582 in little endian; a very similar format to the filetime format, which begins January 1, 1601. In order to calculate the date/time from the GUID, we must extract the first eight bytes from the GUID, then change the byte order from little endian to big endian. The first 4 bits of the big endian value represents the version number and are not 35 Journal of Digital Forensics, Security and Law, Vol. 7(3) part of the date/time and we should ignore them. We should then subtract 0x146BF33E42C000 (5,748,192,000,000,000) to account for the difference in epochs and convert the resulting value to filetime (Parsonage, 2010). A sample calculation can be seen in Figure 1. Tab data file name: Extract first 8 bytes: Convert to big endian: Drop the 1st 4 bits: Subtract 146BF33E42C000: Convert to FileTime: 6E165296-3930-11E0-8FE9-000C29EF1366 6E165296-3930-11E0 0x11E039306E165296 0x01E039306E165296 0x1CBCD3D2FD39296 (129422676989285014) Tuesday, February 15, 2011 1:21:39 PM UTC Figure 1 (Sample Date/Time Calculation from Tab Data File) The last six bytes of the GUID contain a node ID that may also be of interest depending on the nature of the investigation. In most cases, the node ID will be one of the available IEEE 802 medium access control (MAC) addresses on the system. Yet in other instances, a random ID may be used (Leach, Mealling, & Salz, 2005). The remaining two bytes of the GUID not previously mentioned make up the variant and sequence numbers that are of no value in the examination to these particular files. 3.2 ACR File Format Both the recovery store file and the tab data files are stored in a format called the compound file binary file format file, which will henceforth be referred to simply as a compound file. These files may also be referred to as object linking and embedding (OLE) compound files. Although some level knowledge regarding the compound file format is necessary when discussing carving these files from unallocated space, a complete explanation of the compound file format is beyond the scope of this paper. In fact, a complete explanation of the compound file format has already been issued by Microsoft (2012a), titled [MS-CFB]: Compound File Binary File Format. Fortunately, a basic understanding of the compound file format will suffice for examination of these files. Like many other files, compound files have a common header that can be used to locate and identify these files in unallocated space (discussed below). However, that is where the similarities with other common file formats end. A compound file functions very much like a File Allocation Table (FAT) file system on a disk; it contains a FAT, which tracks all sectors in the file, as well as directory entries and folder- and file-like structures. The folders in a compound file are referred to as storages and the files are referred to as streams. Like any other file system, a storage can contain other storages or streams. A stream however cannot contain a storage. There is one other important structure within the compound file - the property set. Unlike a stream that can contain Unicode text of any length, a property set 36 Journal of Digital Forensics, Security and Law, Vol. 7(3) follows a strict format. Once again, a thorough explanation of property sets is well beyond the scope of this paper. However, Microsoft has come to the rescue again with a complete explanation of property sets titled [MS-OLEPS]: Object Linking and Embedding (OLE) Property Set Data Structures (Microsoft, 2012b). For the purposes of examining ACR files, it is important to know that property sets contain one or more properties with a unique numeric identifier, a value type (such as date [VT_DATE], four-byte unsigned integer [VT_UI4] or Unicode string [VT_LPWSTR]) and a value. Making sense of compound files in their raw hexadecimal form can be a daunting task, even with an expert knowledge of the compound file format. While it is possible to identify some text from the file, it is very difficult to attribute context without a great deal of time and effort. Thankfully, there are numerous tools capable of reading the compound file. Several forensics suites, such as the Forensic Toolkit (FTK) and EnCase, are capable of reading the compound file. There are also several free utilities available that will read compound files with varying success. Another product available for reading these files is the Compound File Explorer (CFX) by CoCo Systems Ltd. (http://www.coco.co.uk/developers/CFX.html). CFX is not free but well worth the price of 20 GBP. Unlike most programs, CFX is capable of reading not only the text streams in compound files but also the property sets in an easy to read format. Tools such as CFX are key to the examination of ACR artifacts as they present the information inside the compound file in a much easier to understand way and add a measure of context. 3.3 The Recovery Store File The recovery store file contains basic information about the browsing session. Only one recovery store file is created by Internet Explorer regardless of the number of tabs or windows the user opens. The one exception to this is when InPrivate browsing is used; when a user selects InPrivate browsing, a new window with the InPrivate Browsing logo opens, and a second recovery store file is created in the \Active directory. If both the original window and the InPrivate browsing window remain open, both recovery store files will remain in the \Active folder. Opening additional InPrivate browsing windows will not create additional recovery store files. At a minimum, each recovery store file contains three streams: the 'TS#' stream (where # is an integer starting at 0, discussed in greater detail in the next section), the 'FrameList' stream and the '{0B00252A-8D48-4D0B-7B79887F2B96}' stream. A fourth stream, the 'ClosedTabList' stream, may also be present in some recovery store files (Figure 2). The purpose of these streams and the data commonly stored within are described below. 37 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 2 (Recovery Store File Streams as Viewed in CFX) 3.3. 1 The 'TS#' Stream A 'TS#' stream is created for each tab or window opened by the user. The numbering for the 'TS#' stream starts at 0 and, in most cases, increments by 1 for each new tab or window that is opened by the user, although in a few cases, numbers appeared to be skipped. The 'TS#' stream contains a list of the GUIDs of the tabs or windows that are currently open (or were if the entire session has been closed). The GUIDs are broken in to four sections and are displayed as ########-####-####-############. Figure 3 shows four 16-byte GUIDs that were open in the last browsing session. Figure 3 (Sample 'TS0' Stream from Recovery Store File) The first eight bytes of each GUID are stored in little endian in a group of four bytes, two bytes and two bytes while the last eight bytes of the GUID are stored in big endian. In order to associate the data in the 'TS#' stream with tab data files found on the system, some translation needs to occur. For example, the first GUID shown in Figure 3 is displayed in the TS0 stream as 0xEF 50 89 E8 BA 12 E0 11 86 80 00 50 56 C0 00 08; which translates to 0xE8 89 50 EF 12 BA 11 E0 86 80 00 50 56 C0 00 08. Therefore, the file '{E88950EF-12BA-11E0-8680005056C00008}.dat' should be associated with this recovery store file. 3.3.2 The 'FrameList' Stream The format of the 'FrameList' stream is not entirely understood. Each open window is represented by 12 bytes of data in three 4-byte chunks. The first four bytes indicates the window number, shared with the # in the 'TS#' stream. The second four bytes were 0x00000001 in each circumstance. The final four bytes of the first window entry varied between test platforms, whereas the final four bytes of each subsequent window entry remained 0x00000004 across all platforms. These final four bytes of the first window entry may be 0x50000085 on one 38 Journal of Digital Forensics, Security and Law, Vol. 7(3) computer, while they may be 0x00000005 on another computer under the same circumstances. While this changed between platforms, the final four bytes remained the same in most circumstances throughout recovery store files per computer. It is possible to detect the use of InPrivate browsing through the 'FrameList' stream by examining the least significant bit of the last 4 bytes of the first window entry. When InPrivate browsing is used, 0x40 (64) is added to the least significant bit. For example, if the last 4 bytes of the first window entry are 0x50000085 (Figure 4), the last four bytes of the first window entry will be 0x500000C5 when InPrivate browsing is used (Figure 5). The 'FrameList' stream created by Internet Explorer 9 Beta also appears to include the GUID of the currently active tab for each window (Figures 6-7). 00 00 00 00 01 00 00 00 85 00 00 50 Figure 4 (FrameList Stream with Single Window from Internet Explorer 8) 00 00 00 00 01 00 00 00 C5 00 00 50 Figure 5 (FrameList Stream with Single Window from Internet Explorer 8 InPrivate Browsing) 00 01 04 04 00 00 00 00 00 00 00 00 00 00 00 00 01 04 03 01 00 00 00 00 00 00 00 00 00 00 00 00 85 02 01 04 00 00 00 00 00 00 00 00 50 01 00 00 00 00 01 00 00 00 00 04 00 00 00 00 Figure 6 (FrameList Stream with Multiple Windows from Internet Explorer 8) 00 A5 01 8B 04 56 00 45 00 CF 00 C0 00 E0 00 00 00 00 00 11 00 50 00 08 01 8B 04 56 E6 00 CF 00 C0 8A 00 00 00 00 09 00 50 00 08 DE 05 56 FB 02 A5 00 C0 92 00 45 00 00 4E 00 E0 10 08 D7 00 11 68 01 A5 01 8B A5 00 45 00 CF 87 00 E0 00 00 CF 00 11 00 50 Figure 7 (FrameList Stream from Internet Explorer 9) 3.3.3 The 'ClosedTabList' Stream The 'ClosedTabList' stream contains a list of the GUIDs for the tabs used in the browsing session, but were closed prior to closing the entire window. These GUIDs are stored in the same format as those stored in the 'TS#' stream. Even when a tab closed, the associated tab data file remains on the system until the user 39 Journal of Digital Forensics, Security and Law, Vol. 7(3) exits Internet Explorer (Figure 8). Figure 8 (Sample 'ClosedTabList' Stream from Recovery Store File) 3.3.4 The '{0B00252A-8D48-4D0B-7B79887F2B96}' Stream The '{0B00252A-8D48-4D0B-7B79887F2B96}' stream is a property set that usually contains three properties (Figure 9). The first common property value in this property set has a numeric ID of 0x00000002 and a type value of VT_UI4 (4-byte unsigned integer). The value of this property is initially set to 0x00000005. When the browser crashes and the files ACR files remain in the '\Active' folder, this value remains 0x00000005. When the browser closes without process failure and the ACR files are moved to the '\Last Active' folder, this value is 0x00000006. The second common property value in this property set has a numeric ID of 0x00000003 and a type value of VT_CLSID (CLSID). This value should be the same as the GUID of the recovery store file. The final common property value in this property set has a numeric ID of 0x00000007 and a type value of VT_CLSID (CLSID). When the recovery store file is first created, this value contains a value of the GUID of the recovery store file minus a value of 2 to 4 in the least significant nibble (for example a value of 93E43B49-3931-11E0-8FE9-000C29EF1366 in 0x00000003 may show a value of 93E43B46-3931-11E0-8FE9-000C29EF1366 in 0x00000007), meaning that this GUID was created 200 to 400 nanoseconds earlier than the GUID used as the file name. As mentioned previously, when Internet Explorer is closed without process failure by the user, the ACR files are removed from the '\Active' folder and recreated in the '\Last Active' folder. When this occurs, the 0x00000003 value will reflect the new GUID of the recovery store file, while the 0x00000007 value will reflect the previous GUID of the recovery store file as it existed in the '\Active' folder. From these two values, the date/time the browsing session was opened and the date/time the browsing session was closed can be determined. One other property ID of interest is 0x00000005. If present, 0x00000005 should have a type value of VT_UI4 (4 byte unsigned integer). In testing, the only time this value appeared in the recovery store files was when InPrivate browsing was used and on each occasion, it contained a value of 0x00000001. 40 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 9 (The '{0B00252A-8D48-4D0B-7B79887F2B96}' Stream of a Recovery Store File as Viewed in CFX) 3.4 The Tab Data Files The tab data files contain more detailed information about the history of each tab in a browsing session (Figure 10). As stated previously, one tab data file is created for each tab that is opened within the browsing session. At a minimum, each tab data file contains a minimum of two streams; the 'TravelLog' stream and the '{0B00252A-8D48-4D0B-7B79887F2B96}' stream. Additional streams are created for each page that is loaded within the tab and follow the naming convention 'TL#' where the # is a unique number starting at 0 and incrementing by 1 for each new page that is loaded. A 'TL#' stream is not always created until the next page is loaded. This will be discussed in more detail below. Figure 10 (Tab Data File Streams as Viewed in CFX) 3.4.1 The 'TL#' Stream The 'TL#' stream contains detailed information about each page that is loaded within the tab. The numbering for the 'TL#' stream starts at 0 and in most cases, increments by 1 for each new tab that is opened by the user, although in a few cases, numbers appeared to be skipped. A 'TL#' stream is not always immediately created when a new page is opened within the tab. Consequently, one may encounter a tab data file that contains one less 'TL#' stream than it appears it should or none at all if only one page was opened. If a 'TL#' stream is not created immediately, once the next page is loaded within the tab, a 'TL#' stream will be created for the previous page. If no 'TL#' streams are present, the URL of the first and only paged opened will still be stored in the property set within the 41 Journal of Digital Forensics, Security and Law, Vol. 7(3) '{0B00252A-8D48-4D0B-7B79887F2B96}' stream discussed later. The information stored in these streams varies among pages. At minimum, the full URL and page title are stored at the beginning of the stream. Other data stored inside this stream can include additional frames that are loaded within the page, links to content within the page and default text within text boxes on the page depending on the page content. Viewing these streams in a hex editor, it is clear the streams contain a mix of Unicode strings and binary data. However, it is the Unicode strings that should interest us. The binary data may be a mix of information stored by Internet Explorer, data stored as part of the compound file format, or slack space within the compound file 'sector'. Because the Unicode and binary data are conflated, a hex editor and CFX are not the most efficient means of examining these streams. FTK does an excellent job of extracting the Unicode data when the stream is viewed using the 'View Files in Filtered Text Format' option. A portion of a sample 'TL#' stream viewed using FTK's 'Filtered Text Format' option can be seen in Figure 11. http://www.cnn.com/ CNN.com - Breaking News, U.S., World, Weather, Entertainment & Video News http://www.cnn.com/ http://www.cnn.com/ http://www.cnn.com/ http://www.cnn.com/ http://www.cnn.com/?fb_xd_fragment#?=&cb=f29c9ce8c7e4408&r elation=parent&transport=fragment&frame=f23f6a82334bd84 http://www.cnn.com/?fb_xd_fragment#?=&cb=f29c9ce8c7e4408&r elation=parent&transport=fragment&frame=f23f6a82334bd84 #?=&cb=f29c9ce8c7e4408&relation=parent&transport=fragment& frame=f23f6a82334bd84 http://www.cnn.com/ http://www.cnn.com/?fb_xd_fragment#?=&cb=f29c9ce8c7e4408&r elation=parent&transport=fragment&frame=f23f6a82334bd84 …… Figure 11 (Sample 'TL#' Stream Viewed Using FTK's 'Filtered Text Format' Option) As shown in Figure 11, when viewed in this manner, the first line of the 'TL#' stream contains the full URL of the website. The second line contains the title of the website. Subsequent lines display additional information about page content as described above. One additional artifact of interest noted in the 'TL#' streams is the behavior of Internet Explorer when a page is opened from a link on another page. In the example below (Figure 12), the search term 'Forensic Focus' was used in Google 42 Journal of Digital Forensics, Security and Law, Vol. 7(3) and the first search hit was opened in a new tab by right clicking and selecting open in new tab. The URL http://www.google.com appears twice in the 'TL#' stream containing the information for the tab in which http://www.forensicfocus.com was opened. In addition, the full URL, including the search term used in Google, also appears in the stream. http://www.forensicfocus.com/ Digital Forensics - Digital Forensics, Computer Forensic Training, eDiscovery http://www.forensicfocus.com/ http://www.forensicfocus.com/ http://www.forensicfocus.com/ http://www.google.com/ http://www.forensicfocus.com/ http://www.google.com/#sclient=psy&hl=en&q=forensic+focus& aq=0&aqi=g4go1&aql=f&oq=&pbx=1&bav=on.2,or.&fp=ce4eb09fec0d07a5 …. <a href="http://www.forensicfocus.com" target="_blank"><img src="http://www.forensicfocus.com/images/other/forensicfocus-button.gif" alt="Forensic Focus" border="0" /></a> http://www.google.com/ Figure 12 (Sample 'TL#' Stream Opened in New Tab) These artifacts also appear if the link is opened within the same tab. While the location of this referring page information seems to vary slightly between pages, the last Unicode string always appears to be the URL of the referring page when the link is opened in a new tab, when appropriate. 3.3.5 The 'TravelLog' Stream The 'TravelLog' stream contains the tabs back/forward information. Data is stored as 4-byte integers in little endian that indicates the order the 'TL#' information should be displayed in when the user uses Internet Explorer forward or back options. For example, if the user had navigated to three websites in a single tab, 'TL0', 'TL1', and 'TL2 streams should exist and the travel log may appear as it does in Figure 13. Figure 13 (Sample 'TravelLog' Stream as Viewed in CFX) As shown in Figure 13, the proper order of the 'TL#' information is 0x00000000, 0x00000001, 0x00000002. If property ID 0x00000004 in the '{0B00252A-8D48- 43 Journal of Digital Forensics, Security and Law, Vol. 7(3) 4D0B-7B79887F2B96}' stream (discussed next) (which contains the currently displayed page number) contained the value 0x00000001, the website from 'TL0' would be displayed in Internet Explorer's 'Previous' menu. The website from 'TL1' would be displayed as Internet Explorer's current page while the website from 'TL2' would be displayed in Internet Explorer's 'Next' menu. 3.3.6 The '{0B00252A-8D48-4D0B-7B79887F2B96}' Stream The '{0B00252A-8D48-4D0B-7B79887F2B96}' stream is a property set with the same GUID as that stored in the recovery store files that usually contains three properties (Figure 14). As with the recovery store files, the first common property value in this property set has numeric ID of 0x00000002 and a type value of VT_UI4 (4 byte unsigned integer). When the browser crashes and the files ACR files remain in the '\Active' folder, this value is 0x00000005. When the browser closes without process failure and the ACR files are moved to the '\Last Active' folder, this value is 0x00000006. The second common property value in this property set has numeric ID of 0x00000003 and a type value of VT_LPWSTR (Unicode string). This value should be the current URL of the tab. The final common property value in this property set has numeric ID of 0x00000004 and a type value of VT_UI4 (4 byte unsigned integer). This value should contain the number of the active 'TL#' stream. For example, if the current tab is that stored under the 'TL3' stream, property 0x00000004 should read 0x00000003. Other property IDs (0x00000007 and 0x00000008) were also occasionally seen in testing and were both a type value of VT_UI4 (4 byte unsigned integer). At this time their significance is unknown. Figure 14 (The '{0B00252A-8D48-4D0B-7B79887F2B96}' Stream of a Tab Data File as Viewed in CFX) 4. FILES OPENED IN INTERNET EXPLORER Although the most common use for Internet Explorer is web browsing, Internet Explorer can also be used to view files on the local machine. Similar to web browsing, opening files from the local machine causes Internet Explorer to create recovery store and tab data files, although obviously the information stored within varies between local files and web browsing. 44 Journal of Digital Forensics, Security and Law, Vol. 7(3) One common example of such an action might be opening Multipurpose Internet Mail Extension (MIME) Hypertext Markup Language (MHTML) (.mht) or web archive files. MHTML files allow the user to save an entire web page and its resources to a single file, which can then be accessed offline at a later date or sent to another user. The .mht format is the default format using the 'Save as' function in Internet Explorer. Notable differences in the tab data file include property ID 0x00000003 in the '{0B00252A-8D48-4D0B-7B79887F2B96}' stream, which will store the full path of the file instead of the URL and the data stored in the 'TL#' stream for the tab in which the .mht file was opened (Figure 15). Users Users @shell32.dll,-21813 [[blinded]] [[blinded]] Desktop Desktop @shell32.dll,-21769 | Google.mht Google.mht Google Users Users @shell32.dll,-21813 john john Desktop Desktop @shell32.dll,-21769 | Google.mht Google.mht mhtml:file://C:\Users\[[blinded]]\Desktop\Google.mht file:///C:/Users/[[blinded]]/Desktop/Google.mht mhtml:file://C:\Users\[[blinded]]\Desktop\Google.mht … Figure 15 (Sample 'TL#' Stream From .mht File) As seen in Figure 15, the full path to the file, the page title and the user account along with other information is stored in the 'TL#' stream. Another instance in which a local file may be opened in Internet Explorer is when Internet Explorer is used as an image viewer. As with .mht files, property ID 0x00000003 in the '{0B00252A-8D48-4D0B-7B79887F2B96}' stream will store the full path of the file and the 'TL#' stream will contain information similar to what is shows in Figure 15. 45 Journal of Digital Forensics, Security and Law, Vol. 7(3) 5. MALWARE It is not uncommon for malware to open hidden Internet Explorer windows to access malicious sites, open command and control channels or simply increase the hit count of a website. On a test machine, we opened a hidden Internet Explorer window to http://www.google.com using the VB code "Shell Environ("programfiles") & "\Internet Explorer\iexplore.exe http://www.google.com", vbHide". Analysis of the C:\Users\<user>\AppData\Local\Microsoft\Internet Explorer\Recovery\Active directory revealed the same artifacts were generated with the same content as when an Internet Explorer window was opened to http://www.google.com in a traditional manner. Knowing how and where Internet Explorer stores and verifies ACR files also presents an interesting mechanism for redirecting users to malicious websites. By simply copying ACR files containing a malicious URL to the C:\Users\<user>\AppData\Local\Microsoft\Internet Explorer\Recovery\Active directory and modifying the HKCU\Software\Microsoft\Internet Explorer\Recovery\Active registry key, the user will be prompted to restore the last browsing session to the malicious site. 6. DIFFERENCES BETWEEN INTERNET EXPLORER 8 AND 9 Very little has changed with Automatic Crash Recovery between Internet Explorer 8 and 9. Perhaps the single largest change took place in the 'FrameList' stream of the recovery store file. While the 'FrameList' stream in Internet Explorer 8 only contained a list of the window numbers, the 'FrameList' stream in Internet Explorer 9 also includes the GUIDs of the tab data file active for that window (Figure 16). Figure 16 (FrameList Stream from Internet Explorer 9) The only other significant change took place in the '{0B00252A-8D48-4D0B7B79887F2B96}' stream of the recovery store and tab data files. While property ID 0x00000002 was initially set to 0x00000005 in Internet Explorer 8 and only reset to 0x00000006 when Internet Explorer was closed normally, this property appears to be set to 0x00000006 at all times in Internet Explorer 9. 7. ACR FILES IN UNALLOCATED SPACE 46 Journal of Digital Forensics, Security and Law, Vol. 7(3) Only the most recently closed session information will remain in the '\Last Active' folder. Once a more recent session is closed properly, the corresponding ACR files will be moved from the '\Active' folder to the '\Last Active' and the previous ACR files in the '\Last Active' will be deleted. In order to obtain the most evidence from ACR files, it is vitally important to be able to find and carve them from unallocated space. The file header for the compound file is 0xD0 CF 11 E0 A1 B1 1A E1 (Microsoft, 2012a). However since the compound file format is not unique to ACR files, searching only for this header will likely create a large number of false positives when searching unallocated space. Using other static fields in the file header, it is possible reduce the number of false positives. Table 1 lists the static fields following the file signature and their byte offset. Table 1 Byte Offset 0x0008 0x0018 0x001A 0x001C 0x001E 0x0020 0x0022 0x0028 Name Header CLSID Minor Version Major Version Byte Order Sector Size Mini Stream Sector Size Reserved Number of Directory Sector Value 0x0000000000000000 0x003E 0x0003 0xFFFE 0x0009 0x0006 0x000000000000 0x00000000 Using these static fields, we can build a search string of 0xD0 CF 11 E0 A1 B1 1A E1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3E 00 03 00 FE FF 09 00 06 00 00 00 00 00 00 00 00 00 00 00. This 44-byte search pattern will reduce false positives, but will still locate most compound files. In all files reviewed, the first time the Unicode text 'http' appeared in the binary data was 2,500 to 3,500 bytes from the file header. The GUID of the ACR property sets, 0B00252A8D48-4D0B-7B79887F2B96, appears to be unique to these files and will also help reduce false positives when searching. Carving a compound file format file from unallocated space can be more complicated and time consuming than other file types because of the random nature of the file format and the fact that it does not contain a file footer. However it is still possible to accomplish using information from the file header and the file's FAT. Sector 0x1C contains a 2-byte value indicating the sector size used in the compound file. This value should always be 0x0009 indicating 512 bytes (Figure 17).3 47 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 17 (Sector Size) Sector 0x2C contains a 4 byte value indicating the number of FAT sectors in the file (Figure 18) (Microsoft, 2012a). Each 512-byte FAT sector can address up to 128 sectors within the file; since each sector is 512 bytes, each FAT sector accounts for up to 65,536 bytes of a file. For example, if sector 0x2C's value is 0x0002, the file must be larger than 65,536 bytes and smaller than 131,073 bytes. Figure 18 (Number of FAT Sectors) Sector 0x4C contains a 4-byte value containing the sector number of the first FAT sector (Figure 19) (Microsoft, 2012a). This can be converted to an offset by using (sector number+1) x 512. In this case, the first FAT sector begins at (3+1) x 512 = 2048 or 0x800. Since it has already been determined that this file contains only one FAT sector, the entire FAT must be located from 0x800 to 0x9FF (Figure 20). Figure 19 (First FAT Sector Number) Much like the FAT file system on storage media, the FAT of a compound file contains a linked chain of sectors. Each 4-byte FAT entry will contain the next sector in the chain or reserved value as seen in Table 2 (Microsoft, 2012a). Value 0x00000000 – 0xFFFFFFF9 0xFFFFFFFA 0xFFFFFFFC 0xFFFFFFFD 0xFFFFFFFE 0xFFFFFFFF Description Next Sector in Chain Max Regular Sector Number DIFAT Sector FAT Sector End of Chain Unallocated Sector Table 2 48 Journal of Digital Forensics, Security and Law, Vol. 7(3) To determine the total size of the file we should count the number of bytes from the beginning of the FAT to the last allocated sector (Figure 20). The file size must be the number of bytes from the beginning of the FAT to the last allocated sector divided by 4 (because FAT each entry is four bytes), plus one (because the header is not included in the FAT) multiplied by 512 (the sector size). In other words, (Number of Bytes / 4 + 1) x 512. Figure 20 (FAT) In the example shows in Figure 21, there are 40 bytes from the beginning of the FAT to the last allocated sector, which indicates there are nine allocated sectors in this file we should add one additional sector to include the header and multiply by 512 bytes and the file size should be 5,120 bytes, which is confirmed by Windows. With the total file size known it is now possible to carve the file from unallocated space. 49 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 21 (Allocated Sectors) If sector 0x2C indicates the file contains more than one FAT sector (Figure 22), the Double-Indirect File Allocation Table (DIFAT) must be used (Figure 23). The DIFAT is a directory of all the FAT sectors in the compound file and their offsets (Microsoft, 2012a). Sector 0x4C, the 4-byte value containing the sector number of the first FAT sector mentioned previously is actually DIFAT[0]. The last 432 bytes of the 512-byte header contain DIFAT[1] through DIFAT[108]. In the case of Active Crash Recovery files, no file should ever come close to requiring 109 DIFAT entries. Figure 22 (Multiple FAT Sectors) Because of the nature of compound files, every sector addressed by a FAT sector must be allocated before a new FAT sector is created. Accordingly, it is safe to assume that each FAT entry in every FAT sector except the last accounts for a fully allocated 512-byte sector within the file. For example, if sector 0x4C indicates there are two FAT sectors, one must be completely allocated. Therefore, the file contains at least 65,536 bytes ((512 / 4) x 512). The important entry in the DIFAT when determining the complete file size is the last entry. Since the header indicated this file contains two FAT sectors, the last entry should be DIFAT[1], which can be confirmed by examining offset 0x50 (DIFAT[1]). This contains a value of 0x0000003B and offset 0x54 (DIFAT[2]) indicates an unused value of 0x0FFFFFFFF. 0x3B = 59; using the formula (sector number + 1) x 512, the second and final FAT sector should be located at offset 30,720 or 0x7800. 50 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 23 (DIFAT) Once the last FAT sector has been located, calculating the file size the last FAT sector is done in the same manner as it was with only one FAT sector. We should count the number of bytes from the beginning of the last FAT sector to the last allocated sector (Figure 24), divided by 4 (because FAT each entry is four bytes), plus one (because the header is not included in the FAT) multiplied by 512 (the sector size). In other words, (Allocated Sectors / 4 + 1) x 512. Figure 24 (Second FAT Sector) In the example shown in Figure 25, there are eight bytes from the beginning of the last FAT sector to the last allocated sector, which indicates there are two allocated sectors, accounting for 1,024 bytes of the file plus an additional 512 bytes for the header for a total of 1,536 bytes. It was already determined that each prior FAT sector accounts for 65,536 bytes. In this case, there was only one prior FAT sector. So 65,536 bytes can be added to the 1,536 bytes of the last FAT sector and header. The final total in this case is 67,072 bytes, which is confirmed by Windows. This process can be expressed using the formula (((Total Number of FAT Sectors – 1) x 512 / 4) x 512) + ((Number of Bytes in the Last FAT Sector / 4 + 1) x 512). 51 Journal of Digital Forensics, Security and Law, Vol. 7(3) Using the previous example, the equation would be (((2 – 1) x 512 / 4) x 512) + ((8 / 4 + 1) x 512) = 67,072 bytes. Figure 25 (Second FAT Sector) Since files carved from unallocated space will no longer be associated with their file names (their GUIDs), it will not be possible to associate the tab data files with their respective recovery store files. 8. RECOVERRS Based on the research of Internet Explorer's Automatic Crash Recovery files, two command line applications were developed called RipRS and ParseRS; collectively, these tools are known as RecoverRS. RipRS is designed to extract ACR files from a raw disk image using known decimal offsets. A list of known offsets can be obtained by using the search string discussed in the above section (titled 'ACR Files in Unallocated Space') using programs such as EnCase or FTK. Using these known offsets, RipRS uses the methodology discussed in the above section titled 'ACR Files in Unallocated Space' to determine the compound file's size. RipRS first searches the compound file for the GUID that is unique to ACR files then searches the ACR file for strings unique to either recovery store files or tab data files to determine the file type. Once RipRS has determined the ACR file type, the file is written to the output directory using the naming convention RecoveryStore.{offset<offset>}.dat or {offset<offset>}.dat for recovery store files and tab data files respectively. ParseRS is designed to extract browsing information from ACR files; either those found on the system or those carved from unallocated space by RipRS. As mentioned previously, if ACR files are carved from unallocated space, information linking the tab data files with their respective recovery store files and some date/time information will be lost. RecoverRS can be downloaded from http://www.jtmoran.com/tools. 9. CONCLUSION While the information recovered from the Automatic Crash Recovery files may not replace the bounty of information obtained from the cookies and the index.dat files of Internet Explorer, it provides yet another tool for examiners to retrieve valuable evidence. As the Automatic Crash Recovery files seem to be a lesser known source of information, these files may provide valuable data when other 52 Journal of Digital Forensics, Security and Law, Vol. 7(3) sources are not available as well as to supplement information found in other locations. REFERENCES Leach, P., Mealling, M., & Salz, R. (2005, July). A Universally Unique IDentifier (UUID) URN Namespace (RFC 4122). Internet Engineering Task Force. Retrieved June 25, 2012, from http://www.ietf.org/rfc /rfc4122.txt Microsoft Corporation. (2008, March). Automatic Crash Recovery: Windows Internet Explorer 8 Beta 1 for Developers. Retrieved June 25, 2012, from http://www.softwaretipspalace.com/whitepapers/microsoft /Automatic%20Crash%20Recovery.pdf Microsoft Corporation. (2012a, March 28). [MS-CFB]: Compound File Binary File Format. Retrieved June 25, 2012, from http://download.microsoft .com/download/a/e/6/ae6e4142-aa58-45c6-8dcfa657e5900cd3/[MS-CFB].pdf Microsoft Corporation. (2012b, March 28). [MS-OLEPS]: Object Linking and Embedding (OLE) Property Set Data Structures. Retrieved June 25, 2012, from http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcfa657e5900cd3/[MS-OLEPS].pdf Parsonage, H. (2010, July). The Meaning of LIFE. Retrieved June 29, 2012, from http://computerforensics.parsonage.co.uk/downloads /TheMeaningofLIFE.pdf ABOUT THE AUTHORS John Moran received his Bachelor's Degree in Computer Forensics from Champlain College in 2011. He holds CFCE, EnCE, CCNA and CEH certifications. John currently works for the County of Cumberland, Maine as a Public Safety Software Specialist and is also a certified police officer. Douglas A. Orr received his Ph.D from Washington State University in Criminal Justice with a concentration in Political Psychology. He currently serves as an adjunct professor with Chaplain College in their Master of Science Digital Forensic Management Program. Dr. Orr is also a commissioned police detective assigned to the Special Investigations Unit of the Spokane Police Department in Spokane, Washington. He currently serves as their chief computer forensic examiner. 53 Journal of Digital Forensics, Security and Law, Vol. 7(3) 54 Journal of Digital Forensics, Security and Law, Vol. 7(3) EXTRACTION OF ELECTRONIC EVIDENCE FROM VoIP: IDENTIFICATION & ANALYSIS OF DIGITAL SPEECH David Irwin University of South Australia, Australia [email protected] Arek Dadej University of South Australia, Australia [email protected] Jill Slay University of South Australia, Australia [email protected] ABSTRACT The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required. This research investigates the analysis and recovery of digitised human voice, which persists in computer memory after a VoIP call. This paper outlines the ongoing development of a software tool, the purpose of which, determines how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of a personal computer. This digital format is unencrypted whist stored in Random Access Memory (RAM) before it is passed to the VoIP application for encryption and transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output. A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital audio after a VoIP audio call with known 55 Journal of Digital Forensics, Security and Law, Vol. 7(3) conversation. The identification and analysis of digital audio from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call. This research focuses on the analysis of RAM captures acquired using XWays Forensics software. This research topic, guided by a Law Enforcement Agency, uses X-Ways Forensics to simulate a RAM capture which is achieved covertly on a target machine without the user's knowledge, via the Internet, during or after a VoIP call has taken place. The authors assume no knowledge of the technique implemented to recover the covert RAM capture and are asked to base their analysis on a memory capture supplied in the format of a file with a ‘.txt’ extension. The methods of analysis described herein are independent of the acquisition method applied to RAM capture. The goal of this research is to develop automated software that may be applied to a RAM capture to identify fragments of audio persisting in RAM after a VoIP call has been terminated, using time domain and signal processing technique, frequency domain analysis. Once individual segments of audio have been identified, the feasibility of reproducing audio from a VoIP call may be determined. Keywords: Computer forensics, digital evidence, electronic evidence, Voice over Internet Protocol, VoIP, Random Access Memory, RAM, Fast Fourier Transform, Frequency Domain analysis 1. INTRODUCTION Voice over Internet Protocol technology, called VoIP, is an attractive alternative to the Public Switched Telephone Network (PSTN) which may be appealing to criminals, because of (1) VoIP being a global telephony service, in which it is difficult to verify the user’s personal identification (2), the security of placing such calls, as many implementations use strong encryption to secure both the voice payload and control messages, and (3) monitoring or tracing such VoIP calls being difficult since conventional methods such as wire-tapping are not applicable to VoIP calls. Therefore, other methods of recovering evidence and information from voice over IP protocol are required. It is essential that forensic computing researchers devise methods to allow law enforcement agencies to overcome some of the aspects of this method of telephony that are advantageous to criminals. This research aims to develop automated software that may be applied to a RAM capture to identify fragments of audio persisting in RAM after a VoIP call has been terminated. An algorithm searches the RAM capture to identify audio like samples displaying a symmetrical pattern similar to human voice. Digital signal processing techniques are then applied to the suspected audio fragments for analysis in the frequency domain looking at the power spectrum of each sample. An introduction to digital signal processing techniques for 56 Journal of Digital Forensics, Security and Law, Vol. 7(3) forensic investigators is briefly discussed in section 3. Voice over Internet Protocol Stack This introduction provides an overview of the VoIP related protocols for the reader unfamiliar with this technology. VoIP is not a single protocol in itself but rather a collection of a number of co-existing protocols for the encapsulation and transport of voice packets over the Internet, referred to as the protocol stack. The Internet Protocol (IP) (Postel, 1981) is responsible for providing the internet addresses in its internet header allowing packets to be routed from their source to a destination IP address. The IP header format is shown in Figure1. Figure 1 – IP packet header format The User Datagram Protocol (UDP) (Postel, 1980) is an unreliable transport protocol because it does not guarantee delivery of packets. However, due to its simplicity and ability to transmit packets immediately after they have been created, UDP is well suited to the requirements of VoIP. A single packet may be measured in the order of 10s of milliseconds of audio and the human ear will not be able to detect the loss of packets until the threshold of human audibility is reached, an order of several 100 milliseconds. The UDP header format is shown in Figure 2. Figure 2 – IP/UDP stack showing the UDP packet header format 57 Journal of Digital Forensics, Security and Law, Vol. 7(3) The research undertaken in this paper involves a series of experiments using the VoIP application Skype (2009) which makes use of the above mentioned protocols for Internet audio communications. To understand how human audio is converted to a packetised digital format contained within the payload of the IP packet, we briefly outline the common techniques employed in pulse code modulation (PCM). PCM is the technique whereby a digital value is assigned to the analogue value of a short sample of human audio. 1.2 Pulse Code Modulation PCM is a technique used to digitally represent sampled analogue signals, to produce digital audio in computers and digital telephone systems. The frequency at which the analogue signal is sampled is termed the sampling rate, the number of times per second that a sample is taken. The quality of the sampled audio is determined by the sampling rate and the number of bits assigned to represent the digitised sample. The higher the number of bits the greater the accuracy of the digital representation of the analogue signal, often referred to as the bit-depth. Figure 3 demonstrates the digital representation of an analogue signal, in which the magnitude of the analogue signal is sampled regularly at uniform intervals, with each sample being assigned to the nearest value within a range of digital steps, referred to as quantisation. Bits Time Figure 3 – 4-bit quantisation of an analogue signal The original analogue signal, in this instance a sinusoid, depicted as the red curve, is sampled at regular intervals in time. The corresponding value for the 58 Journal of Digital Forensics, Security and Law, Vol. 7(3) 4-bit PCM quantisation is determined by using an imaginary vertical line on the time axis until it intersects the sinusoid and reading the digital value pointed at on the 'bits' axis with an imaginary horizontal line. The PCM value for the sample shown in the figure is '1101'. A technique called companding, commonly deployed in digital telephony systems is the act of applying compression to the analogue input signal before passing through the analogue-to-digital converter. Figure 4a shows an analogue signal prior to compression whereas Figure 4b shows the compressed signal. After compression, the analogue signal is digitised for transmission in a suitable format for VoIP applications. After the signal is transmitted across the Internet and received at the destination, it needs to be expanded to its original form. The International Telecommunication Union Telecommunication Standardization Sector (ITU-T) proposed recommendations on speech coding to standardise interoperability between telecommunications carriers resulted in the G.711 codec (ITU-T G7.11, 1972), which defines two main compression algorithms, A-law (Europe) and µ-law (U.S.A.). The choice of codec will be determined by the VoIP application if it is proprietary or may be chosen by the user from a list. original signal 1.2 1 0.8 0.6 0.4 0.2 -2E-16 -0.2 0 -0.4 -0.6 -0.8 -1 10 20 30 Figure 4a – Original signal 59 40 Journal of Digital Forensics, Security and Law, Vol. 7(3) A-law compressed 1.2 1 0.8 0.6 0.4 0.2 0 -0.2 -0.4 0 -0.6 -0.8 -1 20 40 Figure 4b – After compressing 1.3 Defining Digital Forensics Digital forensics as d e f i n e d b y Beebe, Clark, Deitrich, Ko and Ko (2011) i s the extraction of data from digital devices (e.g. personal computers, mobile phones, digital cameras, networking devices, web/file/email servers etc.) to reconstruct events, confirm or refute allegations of criminal activities and/or obtain intelligence information. Additionally, Yasinsac and Manzano (2001) define the digital forensic domain stating that digital forensics involves the analysis of electronic devices for the purpose of discovery and retrieval of information regarding the criminal use of technology. Within Australia, McKemmish (1999) defines digital forensic investigations with the use of a four-phase model to describe digital forensic investigations is widely cited and considered seminal research within the domain of digital forensics. The phases are defined as the Identification, Preservation, Analysis and Presentation (IPAP) of digital evidence. The results of activities performed upon digital evidence in order to retrieve information must be legally acceptable f or court proceedings. The legal requirements of digital forensics defined by Civie and Civie (1998) states: ‘The pursuit of knowledge by uncovering elemental evidence extracted from a computer in a manner suitable for court proceedings.‛ Therefore the combination of both legal and technical requirements is required to demonstrate in court proceedings the phases of the digital forensics investigation, analysis and results in a manner acceptable in a court of law. Carrier (2003) introduces a scientific approach to the definition of digital forensics methods stating: ‘The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, 60 Journal of Digital Forensics, Security and Law, Vol. 7(3) interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.‛ To this end, the research and development of the software tool described herein for the analysis and recovery of fragmented audio from a VoIP call cannot be referred to as ‘forensic’ based on the definitions above at this time. However, this paper will outline the achievements and worthiness of this software tool so far and its suitability as a tool to assist forensic investigators in the analysis of captured memory. 1.4 Memory Acquisition Traditional forensics memory capture takes place whilst the forensic investigator is on-site, and performs the physical memory capture from the target machine to the investigator’s destination disk/image file system. The difference between ‘dead’ and ‘live’ acquisition is described below. Dead Acquisition – Occurs when the data from a suspect system is copied without the assistance of the suspect operating system. – Historically, the term ‘dead’ refers to the state of only the operating system, so a dead acquisition can use the hardware from the suspect system as long as it is booted from a trusted CD or floppy. Live Acquisition – Where the suspect operating system is still running and being used to copy data. – Acquisition tool needs to be able to access ‘open’ files (files in use) – Beneficial in circumstances where an encrypted data volume is mounted 61 Journal of Digital Forensics, Security and Law, Vol. 7(3) – On a compromised system, there is the risk that the attacker has modified the operating system or other software to provide false data during acquisition. Imaging a computer's hard disk can be a lengthy process. During the acquisition process, if the forensic investigator saves the data to a file, he/she will have the choice of what format the image will be e.g. A raw image contains only the data from the source device. Easy to compare the image with the source data. An embedded image contains data from the source device and additional descriptive data about the acquisition. User inputted data, hash values, dates & times Some tools will create a raw image and save the additional descriptive data to a separate file. As most forensic tools support raw images, the raw image it is the most flexible format. A freely available utility for most operating systems called ‘dd’ (The Open Group, 2010) can make exact copies of memory that are suitable for forensic analysis without the need to own commercial forensic software packages. 1.5 Why RAM Acquisition? Digital forensics tools play a vital role in reliably extracting information for analysis and presentation for industrial or legal purposes. These tools are typically used to investigate computer crimes, by identifying evidence that can be of probative value in a court of law. Digital forensics tools are rapidly becoming a substantial part of investigations all over the world, in both the law enforcement and private sector domains (Hibishi, Vidor, & Cranor, 2011). Efficient examination of digital evidence would not be possible without the use of digital forensic tools. While an understanding of the scientifically derived processes and the volatility of digital evidence is required by analysis teams and technicians, it is not feasible to interpret the volumes of evidence required for investigation on a given case manually. Both expert witnesses and digital forensic practitioners are reliant on a set of tools for interpreting digital evidence and to help bridge the gap of understanding between the technical details of digital technologies and the evidence presented to a jury in court (Schatz, 2007). Due to the vast and complex variety of devices required for analysis by digital forensics teams, there exist many different tools suited to handling each. These tools perform different roles including acquisition, examination and analysis. 62 Journal of Digital Forensics, Security and Law, Vol. 7(3) The use of RAM captures is more easily explained in terms of the increasing sources of digital evidence complexity and the technological advancements in the volume size of storage media. Digital evidence complexity, the vast array of different digital evidence sources, each with their own ways of storing data and retrieving data increases the difficulty of forensic investigation. Similarly the volume of digital evidence, i.e. the amount of digital evidence required for practitioners of digital forensics to preserve, analyse and present in a given case is increasing exponentially. It is both a difficult and time consuming process to search and comprehend large quantities of digital evidence. These issues are supported by key researchers within the domain as pertinent issues for study (Casey, Gordon, & Leeson, 2005; Mohay, 2005). This may impact court proceedings due to increased case backlogs and the inability for digital forensic investigation teams to complete cases in a reasonable period. The current tools and techniques used to analyse digital evidence are not scaling and adapting to the increased data volume or complex array of devices now required for analysis with manual analysis remaining commonplace throughout the digital forensics industry. The Windows Forensics Analysis Tool Kit (Carvey, 2007) discusses remote response methodology, whereby a series of commands may be executed against a system across a network using a Windows batch file comprising the name or IP address of the target system and the username/password logon credentials. The batch file contains executable code, which can be copied to and run on the target system with the corresponding output saved in a file on the target machine. The only limitation to perform analysis of the target machine is the ability to remotely login to the target system via the network. This research introduces novel techniques and approaches with respect to the analysis of captured memory, required to address the key issues above resulting in Law Enforcement choosing ‘live’ RAM capture to minimise the complexity and volume of data to be analysed. 1.6 X-Ways Forensics This focus of this research is on the analysis of the contents of RAM captures and as such it does not investigate memory acquisition techniques. No Law Enforcement Agency supplied RAM captures from a target machine, thus requiring the researchers to simulate a RAM capture, using X-Ways Forensics, computer forensics software, as shown in Figure 5. The option exists to capture an individual running process and the RAM allocated to that process e.g. VoIP application Skype, expanded in Figure 5b. However, to maintain the same conditions for each capture, the entire physical memory is captured, as show in Figure 5a. The X Ways Forensics RAM editor allows one to examine the physical 63 Journal of Digital Forensics, Security and Law, Vol. 7(3) RAM/main memory and the logical memory of a process (i.e. a program that is being executed) where all memory pages committed to a process are presented in a continuous block. If one selects one of the listed processes, one may access either the so-called primary memory or the entire memory of this process, or one of the loaded modules. The primary memory is used by programs for nearly all purposes. Usually it also contains the main module of a process (the EXE file), the stack; and the heap. The “entire memory” contains the whole logical memory of a process including the part of memory that is shared among all processes, except system modules. Figure 5a – Entire RAM physical memory. 64 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 5b – Individual RAM processes e.g. Skype When one opens the local physical RAM, processes will be listed in the directory browser, even hidden processes, with their timestamps and process IDs, and their own respective memory address spaces can be individually viewed with pages concatenated in correct logical order as seen by each process. The purpose of this research is not to use the powerful capability of the XWays Forensics RAM editor to reverse engineer captures and identify running processes, shown in Figure 6. 65 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 6– Byte offsets within a RAM capture for modules and objects. 2 METHODOLOGY & EXPERIMENTS This research approach draws on the strengths of both quantitative and qualitative research approaches. This research focuses on outcomes that are of practical use, the creation of knowledge that advances digital forensics based on tangible and measurable results. This research strives for objectivity and measurability via controlled experiments using algorithms developed to pattern recognise human speech. 2.1 Baseline Experiments X-Ways Forensics software was installed on the target Windows XP virtual machine initiating the VoIP call, and the capture taken after the VoIP call was terminated and the VoIP application closed down. The amount of RAM captured is 512MB. However, to reduce the possibility of false positives, identifying suspect audio fragments, which in fact are not audio and false negatives, failing to identify audio which is indeed fragments of suspect audio, the experiment shown in Table 1 was implemented. Table 1 – Initial results from RAM capture analysis. RAM Capture 1 2 3 Detection Method Expected outcome Visual inspection Visual inspection Visual inspection No audio No audio No audio 66 Actual outcome Sinusoids Sinusoids Sinusoids Byte size 4096 4096 4096 Segments 24 24 24 Journal of Digital Forensics, Security and Law, Vol. 7(3) The initial analysis technique involved displaying the byte values of RAM graphically, and visually inspecting the RAM contents. This is a time consuming process but produced some unexpected results. No audio was introduced to the system, however, a sinusoidal pattern with an amplitude offset was detected, in all three RAM captures tested and was repeatable. The authors believe this to be the Windows XP sound that is played at system start up shown in Figure 7. Figure 7 – Windows XP signature audio at start up. The audio segments found resembled those shown in Figure 8b whereas Figure 8a displays the similar sinusoid with no amplitude offset. This initial technique of creating baseline knowledge of the RAM contents before introducing known audio fragments and a VoIP call is essential. Direct current voltage (dc) is an electronics term to identify an offsetting of a signal from zero. This offset may be implemented in hardware such as a sound card. 67 Journal of Digital Forensics, Security and Law, Vol. 7(3) Sinusoidal signal 6 4 2 0 0 2000 4000 6000 -2 -4 -6 Figure 8a – A sinusoidal signal. Sinusoidal signal - dc offset 6 4 2 0 0 2000 4000 6000 -2 -4 -6 Figure 8b – A sinusoidal signal with amplitude offset. 2.1 Introduce Known Audio The next round of experiments involved introducing a known audio pattern into the RAM contents, still without the introduction of a VoIP call at this time. The audio signal has been selected from the TIMIT Corpus (Garofolo, 68 Journal of Digital Forensics, Security and Law, Vol. 7(3) Lamel, Fisher, Fiscus, Pallett, Dahlgren, & Zue, 1993) which provides speech data for acoustic phonetic studies. These are 16-bit, 16 KHz time aligned speech waveforms i.e. the byte locations within the waveform have been identified for each uttered word and the phonemes that constitute that word. The chosen phonetic sentence known as ‘LDC93S1W’ is single channel PCM. Five samples of audio extracted from the phonetic sentence, each 3000 bytes in size, were randomly inserted into a RAM capture using X-Ways hex editor. An example of one segment of the known audio is shown in Figure 9. Symmetrical nature of human voice 800 600 400 200 0 -200 0 200 400 600 800 1000 1200 1400 -400 -600 -800 Figure 9 – An audio extract from the known phonetic sentence inserted into RAM. This experiment was repeated three times, each with a different ordering of the known audio and its location within the RAM capture. The results are shown in Table 2. Table 2 – The insertion of known audio pattern into RAM captures. RAM Capture Detection Method 1 Automatic algorithm Automatic algorithm Automatic algorithm 2 3 Known audio sequence ABCDE Expected outcome Actual outcome Byte size Segments audio ABCDE 3000 5 CAEBD audio CAEBD 3000 5 DCEAB audio DCEAB 3000 5 This set of experiments involved the detection of known audio segments 69 Journal of Digital Forensics, Security and Law, Vol. 7(3) implanted into the RAM capture to test and develop an algorithm that detects the features of human audio. The inserted audio segments were all detected in the order in which they were inserted into the RAM capture. 2.2 Introduce VoIP Call The following experiments consisted of using VoIP application Skype to make a VoIP call to the Skype sound test service. The call was then terminated and a RAM capture performed on the computer initiating the VoIP call using XWays Forensics (2009). This was then repeated after the lapse of a 24-hour period whereby the laptop on which the RAM capture was performed, was powered down to allow the RAM contents to dissipate. Audio analysis tool, ESection (2010) was also used as the basis for the starting point in audio signal identification whilst performing VoIP calls. The VoIP calls were initiated and the RAM captured from inside a virtual machine (VM) using VMware (2009). The amount of RAM that is subsequently captured and analysed in the VM may be reduced The ESection software is operated externally to the virtual machine whilst running on the host machine supporting the virtual machine. This prevents the identification of audio within the RAM capture inside the virtual machine from being confused with the audio input at the microphone captured using ESection. Therefore all ESection audio captures saved on the host do not appear in the VM RAM capture The ESection capture allows us to further develop an algorithm based on the properties of the captured audio, magnitude and symmetry to identify the type of signal that should be searched for within the VM RAM capture as shown below in Figure 10. 16-bit Sinusoidal signal 10000 5000 0 0 200 400 600 800 1000 -5000 -10000 Figure 10 – Initial signed sinusoidal signal (x-axis: No. of samples, y-axis: Amplitude) 70 Journal of Digital Forensics, Security and Law, Vol. 7(3) Several of the sinusoidal-like signals observed are believed to form part of the VoIP application dialling tones and not human speech. This is later confirmed by frequency domain analysis in Section 3. The ESection capture allows us to develop an algorithm based on the properties of the captured audio, magnitude and symmetry to identify the type of signal that should be searched for within the VM RAM capture as shown below in Figure 11. Figure 11 – ESection audio capture (x-axis: No. of samples, y-axis: Amplitude) This allows one to focus on the specific attributes of human speech within the ESection captured signal in order to implement an algorithm which can automatically search a block of computer memory. By close inspection of the properties of captured human speech such as changes in amplitude and symmetry, one can construct an algorithm that will exclude signals which do not show the typical attributes of digitised human speech such as symmetry and repetition of the waveform. The use of virtual machines allows a much smaller amount of virtual RAM to be captured e.g. 512MB as opposed to the order of Giga bytes. This may decrease the amount of human speech captured from the VoIP call but the purpose of this research is to demonstrate that suspected audio fragments may be human speech identified from analysis of a memory capture. The individual components of identified audio tend to be typically 4096 bytes in length and as such will require a sequence of these audio fragments to be reconstructed to form one continuous piece of human speech to form playable audio. 71 Journal of Digital Forensics, Security and Law, Vol. 7(3) Suspected audio samples of digitised human speech are fragmented throughout the physical memory due to virtual address translation by the operating system shown below in Figure 12. The virtual address pages are linked to a page table entry (PTE) highlighted by the dashed line. The PTE contains the mapping from the virtual address to the physical address. This diagram highlights how three consecutive virtual pages of digitised human speech are mapped to three non-consecutive pages in the physical memory (Solomon & Russinovich, 2005). Figure 12 – x86 Virtual address translation 2.3 X-Ways Analysis The virtual machine consisted of a Windows XP operating system with the Skype VoIP application downloaded within it. A VoIP call to the Skype sound Test Service was made then the call was terminated. X-Ways forensic software, installed within the virtual machine, was used to capture the 512MB of RAM. Whilst the call was being made, ESection audio capture software 72 Journal of Digital Forensics, Security and Law, Vol. 7(3) was also started on the host to record the audio input. This experimental setup allowed for the search of RAM as outlined above, in addition to this, the RAM was opened in the X-Ways hexadecimal editor and specific keywords were searched for e.g. Sound Test Service. Figure 13a shows an extract from the hexadecimal editor for search string ‘sound test service’, providing 237 hits. Figure 13a – X-Ways search hit for 'sound test service' The bytes immediately following the ‘sound test service’ string were plotted and produced an audio signal extract as shown in Figure 13b. Figure 13b – 4096 bytes immediately following search string (x-axis: No. of samples, y-axis: Amplitude) Using known Skype caller id as a search string also allows the call information attributed to the VoIP call to be extracted as shown below in Figure 13c, such as the caller identities in raw xml format, call initiator and timestamps. This is using X-Ways hex editor to view the captured RAM and perform string searches. Not only does the software tool search for audio fragments, it can retrieve information related to the VoIP call. 73 Journal of Digital Forensics, Security and Law, Vol. 7(3) “RT INTO Messages (id,is_permanent,convo_id,chatname,author,from_dispname,gu id,dialog_partner,timestamp,type,sending_status,body_xml,i dentities,reason,participant_count,chatmsg_type,chatmsg_st atus,body_is_rawxml,pk_id,call_guid) VALUES (164,0,30,'#david_t_irwin/$echo123;b4f208bd4c2c737c', 'david_t_irwin','davidirwin',x'61b6a47d0ab0894bca8bdb65 8307051d9bb9f2e42e126198a1aaeca2f68658fa','echo123',130590 1540,30,2, '<partlist alt=""> <part identity="david_t_irwin"><name>davidirwin</name></part> <part identity="echo123"><name>Echo / Sound Test Service</name></part> </partlist>', 'echo123','',2,18,2,1,1160776592,'f1676bd45b6963ef2522d976d59b361 9');” Figure 13c – X-Ways extract of Skype VoIP call setup to Sound Test Service The use of a programmed search algorithm is more efficient than a visible search. A number of possible segments of human speech have been identified based on amplitude and symmetry and displayed on a single graph for the user to visually inspect for the difference between a pure or amplitude-modulated sinusoidal trace and that typical of human speech. This reduces the search space of a RAM capture to a single point of investigative analysis but none the less still requires human intervention in the form of visual inspection. Table 3 indicates the number of suspect audio fragments detected from each VoIP call. Table 3 – VoIP call to Skype Test Call Centre made from inside virtual machine. RAM Capture 1 2 3 Detection Method Automatic algorithm Automatic algorithm Automatic algorithm VoIP Call Skype Skype Skype Expected outcome dialing tone, automated voice & caller’s voice 74 Actual outcome sinusoids & suspect human voice Byte size 4096 4096 4096 Segments 48 46 53 Journal of Digital Forensics, Security and Law, Vol. 7(3) It would not be an unreasonable question to ask 'why use the capture of memory for the purpose of obtaining audio, why not just capture the microphone input or speaker output directly'? The capture of computer memory allows information to be retrieved including specific information relating to the use of VoIP applications, such as call identifiers, user names, date and timestamps, the captured information may subsequently be used to testify to the authenticity of such a call having been made. The test of a known audio dissected into five segments of equal audio length and inserted into the RAM capture as outlined in 2.1 yielded all five segments being detected. Five segments are easily re-assembled into its original form visually. However, the amount of audio segments recovered from the VoIP call are significant and potentially three distinct sources, the VoIP application dialling tone, the automated answering of the call to the Skype test sound service and the caller. Dialling tones are easily identified using a signal processing technique called frequency domain analysis. A brief introduction to digital signal processing is discussed in section three however the removal of dialling tone still requires two separate call stream to be identified. This requires an additional algorithm to interrogate the start and ending bytes of each segment retrieved and attempt to find another once with which matches to form two separate streams of continuous audio. Similarly, one may ask the question “why focus on a RAM capture, without extending the search to a hard disk(s) as the contents of RAM are continually being swapped out from virtual memory to physical memory stored on the hard disk(s). The answer is simple; it wasn’t within the remit of the Law Enforcement Agency to require analysis of anything other than a perceived RAM capture represented as a file with a ‘.txt’ extension. However, the analysis techniques described in this research are easily extended to include analysis of the hard disk(s) and information and files related to the transfer of virtual memory pages to a physical location. 3. INTRODUCTION TO DIGITAL SIGNAL PROCESSING Although information stored in RAM is paged in Windows operating systems, the information within each page e.g. a fragment of human speech is ordered sequentially in time. Therefore all research until now has taken place in the time domain with graphical plots of signal samples on the y-axis appear as how they are digitised in time in memory. The main research theme is to demonstrate the ongoing development of an automatic audio search functionality to identify the fragments of human speech. Having identified a series of signal components from the RAM capture which exhibit a symmetrical pattern (Figure 13b) based on simple characteristics of 75 Journal of Digital Forensics, Security and Law, Vol. 7(3) human speech displayed in Figures 9 and 11, one can further remove composite sinusoidal signals unrelated to human speech by processing the sampling values through a Fast Fourier Transform (FFT) and viewing the result in the frequency domain. A FFT is itself an algorithm for calculating the Discrete Fourier Transform (DFT) which decomposes a sequence of values, in this case, amplitudes of suspected audio fragments into components of different frequencies. For the purpose of drawing comparison, how do other files such as word documents or excel worksheets appear when graphically displayed in the time domain. The technique employed displaying the file on 50 graphs where each graph displays 4096 byes. Each graph has a different starting point within the file, e.g. graph 1 (top row, 1st column) starts at 0 bytes and displays the first 4096 bytes and graph 2 (top row, 2nd column) starts at 1/50th of the file length and displays the next 4096 bytes. This process is repeated for the fifty graphs, and with one click of a button, all graphs advance 4096 bytes. The word document shown in Figure 14 was visually inspected and contained no similarities to composite sinusoids or audio fragments. Figure 14 – Visual display of byte values for a word document. Based on the above visual inspection, no audio-like byte segments are detected and subsequently would not be passed to the frequency domain for analysis. Note that the document tested and one you are reading are the same document. Similarly for an excel document, the document tested was the one containing 76 Journal of Digital Forensics, Security and Law, Vol. 7(3) the power spectrum plots and sinusoids and suspected audio fragments. Once again a visual inspection of the file contents displayed as a graphical plot of the bytes making up the file revealed no audio like fragments. The visual inspection of graphical memory displayed in Figure 14 was laborious and the first step in searching for audio like fragments to determine their properties for automatic algorithm development. 3.1 Power Spectrum Analysis in the Frequency Domain For the purpose of this research, the programming code for the FFT has been extracted (and manipulated to suit) from Audacity (2011), a free crossplatform audio editor developed by a team of software developers, translators, documentation writers. The Audacity application contains the function “Plot Spectrum”, which analyses a section of audio and converts it to a graph of frequencies against amplitudes using the FFT algorithm to provide a value for each narrow band of frequencies that represents how much of those frequencies are present. This research is based upon the code contained in the Audacity “Plot Spectrum” function to analyse the portions of RAM capture, which are suspected of being fragments of audio. The term, aliasing, is used to describe the effect of different signals becoming indistinguishable from each other. To counter the effect of aliasing, the FFT is used in conjunction with a Hann Window function, to process the suspected audio fragments in the time domain. The code for the Hann Window function is also extracted from Audacity, which allows a smaller subset of the suspected audio to be analysed, just as the name infers, applying an overlapping window, which traverses the original FFT input to produce the corresponding frequency domain output. The composite sinusoidal signal shown in Figure 10 produces a frequency domain plot as shown in Figure 15, highlighting its composition from more than one frequency. A periodic sinusoid would display as a single frequency component in the frequency domain. 77 Journal of Digital Forensics, Security and Law, Vol. 7(3) Sinusoidal Power Spectrum 6E+11 5E+11 4E+11 3E+11 2E+11 1E+11 0 0 1000 2000 3000 4000 5000 6000 7000 8000 Figure 15 - Frequency domain analysis (x-axis: Frequency (Hz), y-axis: Raw amplitude) The FFT transforms the time domain signal into a frequency domain representation of that signal. It generates a description of the distribution of the energy in the signal as a function of frequency. The vocal range of human speech varies from approximately 70 Hz to 7 KHz. However, most of the information conveyed in human speech does not exceed 4 KHz. The modelling of human speech and the pronunciation of vowels, shown below in Figure 16 indicates that the majority of the energy is concentrated below 4 KHz. Three different vocal tract shapes are shown corresponding, from top to bottom, to the vowels "ah" (/a/), "ee" (/i/), and "oo" (/u/). Plotted in the same graph for each tract shape is the spectrum. Note all three vowels have differing spectra due to the different vocal tract shapes. A variety of methods are being used to explore this mapping (Kawato, 1989; Saltzman, Munhall, 1989; Jordan, 1990). Nyquist’s theorem states that the sampling frequency must be at least twice as high as the highest input frequency (4 KHz) thus a sampling frequency of 8 KHz will allow the digitised voice to correctly represent the original signal. A pure sinusoid in the frequency domain will appear as a single spike, whereas the signal shown has 2 spikes at similar frequencies (440 Hz and 485 Hz) and also have a mirror image of itself (7515 Hz and 7560 Hz), with even symmetry around the centre point of half the sampling frequency, 4 KHz. 78 Journal of Digital Forensics, Security and Law, Vol. 7(3) Figure 16 – Energy distribution versus frequency of human speech. The phenomenon of reflection around the point of half the sampling frequency for periodic signals is counteracted by the software via automatically removing the part of the spectrum for frequencies exceeding half of the sampling frequency. The resulting spectrum can now be compared against frequency domain plots of sections of human speech where most of the energy is concentrated below 4 KHz e.g. as shown in Figure 17. Signals that do not fall within the range of pattern representing human speech can therefore be removed. Power Spectrum of section of human speech 1.5E+09 1E+09 500000000 0 0 1000 2000 3000 4000 5000 6000 7000 8000 Figure 17 - Frequency domain analysis of speech (x-axis: Frequency (Hz), yaxis: Raw amplitude) 79 Journal of Digital Forensics, Security and Law, Vol. 7(3) The resulting collection of signals that remain after the removal of non-speech signals based on both time domain and frequency domain analysis are believed to be fragments of human speech which have been digitised after processing by the sound card. 4. CONCLUSIONS & FUTURE WORK The techniques described in this research have been applied only to RAM captures. The RAM captures discussed in experimental setup have been forensically acquired using X-Ways Forensics. The research has aimed to introduce novel techniques for the analysis of physical memory such as graphical visualisation (albeit time consuming) and the development of automatic algorithms to identify possible audio fragments based on their symmetrical appearance. The use of visual inspection aimed to review the full RAM capture visually to avoid developing an algorithm that would detect false positives and omit false negatives. This was aided by the introduction of known segments into the RAM capture out with a VoIP call to test the detection properties of the algorithms. The use of digital signal processing techniques to view possible audio fragments in the frequency domain is also novel. However, this research is ongoing to develop further algorithms that will inspect the leading and trailing edges of the suspect audio fragments to see if they can be joined together to identify different call streams and form continuous segments of audio. Once segments of continuous audio have been reconstructed, it is anticipated that they would provide a high degree of probability that a particular individual has had access to a specific computer and made a VoIP call by matching their voice against the recovered audio from memory. 5. ACKNOWLEDGEMENTS The authors would like to acknowledge the support of the Australian Research Council in this work via Linkage Grant LP0989890 and additional scholarship contributions from the Australian Federal Police. REFERENCES Audacity (2011, June 19). Audacity application downloaded. Retrieved from http://http://audacity/sourceforge.net Beebe, N.L., Clark, J.G., Deitrich, G.B., Ko, M.S., & Ko, D. (2011, November). Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies. Decision Support Systems, 51(4), 732-744. Carrier, B. (2003, Winter). Defining Digital Forensic Examination and 80 Journal of Digital Forensics, Security and Law, Vol. 7(3) Analysis Tools Using Abstraction Layers. The International Journal of Digital Evidence, 1(4). Retrieved from http://www.digitalevidence.org/papers/ijde_define.pdf Carvey, H. (2007). Windows Forensic Analysis DVD Toolkit. Burlington, MA: Syngress Publishing. Casey, E., Gordon, G., & Leeson, L. (2005, February). Origins and Progress. Digital Investigation, 2(1), 1-2. Civie, V, & Civie, R. (1998). Future Technologies from Trends in Computer Forensic Science. Presented at the Forensic Science in Trial - Seventh Report of Sessions, London: House of Commons. ESection (2010, November 5). ESection application downloaded. Retrieved from http://www.phon.ucl.ac.uk/resources/sfs/esection European Telecommunications Standards Institute (ETSI). (2001). Telecommunication Security - Lawful Interception - Issues on IP Interception. TR 101 944 V1.1.2. Garofolo, J. S., Lamel, L.F., Fisher, W.M., Fiscus, J.G., Pallett, D.S., Dahlgren, N.L., & Zue, V. (1993). TIMIT Acoustic-Phonetic Continuous Speech Corpus, Linguistics Data Consortium. Hibishi, H., Vidor, T., & Cranor, L. (2011). Usability of Forensics Tools: A User Study. In Proceedings of the 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (IMF), pp. 81-91. Hornig, C. (1984). A Standard for the Transmission of IP Datagrams over Ethernet Networks. IETF RFC 894. Jordan, M. (1990). Motor learning and degrees of freedom problem. In M. Jeannerod (Ed.), Attention and Performance XIII, pp. 221-229 (Hillsdale, NJ: Erlbaum). Kawato, M. (1989). Motor theory of speech perception. In Proceedings of the 8th Symposium on Future Electron Devices, pp. 141-150. Keller, E. (1994). Fundamentals of Speech Synthesis and Speech Recognition. Chichester: John Wiley & Sons. McKemmish, R. (June 1999). What is Forensic Computing? The Australian Institute of Criminology. Mohay, G. (2005). Technical Challenges and Directions for Digital Forensics. In Proceedings of the First International Workshop on Systematic Approaches 81 Journal of Digital Forensics, Security and Law, Vol. 7(3) to Digital Forensic Engineering (SADFE), Washington, D.C. Pirani, G. (1990). Advanced Algorithms and Architectures for Speech Understanding. London: Springer-Verlag. Postel, J. (1980). User Datagram Protocol. IETF RFC 768. Postel, J. (1981). Internet Protocol. IETF RFC 791. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., & Schooler, E. (2002). SIP: Session Initiation Protocol. IETF RFC 3261. Saltzman, E.L., & Munhall, K.G. (1989). A dynamic approach to gestural patterning in speech production. Ecological Psychology, 1(4), 333-382. Schatz, B. (2007). Digital Evidence: Representation and Assurance. Information Security Institute, Queensland University of Technology. Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (2003). RTP: A Transport Protocol for Real-Time Applications. IETF RFC 3550. Solomon, D., & Russinovich, M. (2005). Microsoft Windows Internals, 4th ed. Seattle, WA: Microsoft Press. Skype. (2009, August 22). Skype application downloaded. Retrieved from http://www.skype.com The Open Group. (2010). DD. Retrieved http://pubs.opengroup.org/onlinepubs/009604499 /utilities/dd.html from VmWare. (2009, July 15). VM Workstation application downloaded. Retrieved from http://www.vmware.com X-Ways Forensics. (2009, July 18). X-Ways downloaded. Retrieved from http:// www.x-ways.net Forensics application Yasinsac, A, Manzano, Y. (June 2001). "Policies to enhance computer and network forensics," IEEE Workshop on Information Assurance and Security. 82 Journal of Digital Forensics, Security and Law, Vol. 7(3) TO LICENSE OR NOT TO LICENSE UPDATED: AN EXAMINATION OF STATE STATUTES REGARDING PRIVATE INVESTIGATORS AND DIGITAL EXAMINERS Thomas Lonardo Gabelli College of Business Roger Williams University One Old Ferry Road Bristol, RI 02809 Phone: 401-254-3580 E-mail: [email protected] Doug White FANS Center, School of Justice Studies Roger Williams University One Old Ferry Road Bristol, RI 02809 Phone: 401-254-3165 E-mail: [email protected] Alan Rea Haworth College of Business Western Michigan University 1903 West Michigan Avenue Kalamazoo, MI 49008-5412 Phone: 269-387-1444 E-mail [email protected] ABSTRACT In this update to the 2009 year's study, the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners, but do see a trend of more states making some distinction. The authors contacted all state regulatory agencies where statutory language was not explicit, and as a result, set forth the various state approaches to professional Digital Examiner licensing. As was the case in the previous two iterations of this research, the authors conclude that states must differentiate between Private 83 Journal of Digital Forensics, Security and Law, Vol. 7(3) Investigator and Digital Examiner licensing requirements and oversight. Keywords: Digital Examiner, Computer Forensics, State Statutes, Private Investigator, Licensing Requirements 1. INTRODUCTION 1.1 Historical Background In the United States (US), state statutes set the guidelines for identification, oversight, and licensing of various investigative functions. Many years ago some states passed legislation to manage commercial police and security specialists who undertook roles similar to officers of the court, but neither no longer, nor ever had, held badges. In most statutes these individuals are identified as Private Detectives, Private Investigators (PI), or security officers. However, these state statutes were defined in a period when not all areas of highly technical investigation, such as Digital Examiners and Computer Forensics existed. Hence, we see confusion among state statutes and the role of these new investigative professionals. For example, many statutes commonly define all investigators as "someone who attempts to prove the truth or falsity of a statement." Unfortunately, this language is so broad that it provides the opportunity for the inclusion of virtually any investigative profession, including Digital Examiners (DE), who routinely examines systems and media to provide investigative evidence. This situation is problematic for all involved. Some states, such as Texas, have gone so far as to interpret investigation to include computer technicians and computer repair personnel (Kramer, 2009). This situation may complicate and prevent individuals from working, as they may not be able to obtain the license given the requirements of that state. Many organizations continue to address this disconnect between statutes and new forms of digital and computer forensic investigation. The American Bar Association issued an opinion in which they specifically urge states to realize that Digital Forensics, and by extension Digital Examiners, is a separate field. Moreover, they argue that DEs and other similar technical investigative professions, such as penetration testers, should not be required to obtain a PI license (ABA, 2009). In our previous studies (Lonardo, White, & Rea, 2008, 2009) we reported that state legislatures appeared to be providing additional attention to this issue due to the controversy surrounding licensing. Since our last review in 2009, there has been some movement in those states who have reported that no license is required and those who report a license is required. Georgia has codified the licensing requirement for Digital Examiners under their PI statue as did Maine (although Maine's statue is somewhat contradictory as discussed in Section 2.4). South Carolina attempted to amend and Virginia amended statutes to exclude Digital Examiners under their respective statues. Illinois issued an opinion letter (dated 7-12-10) stating no PI license is required. 84 Journal of Digital Forensics, Security and Law, Vol. 7(3) 1.2 Addressing the Situation In our original paper (Lonardo et al., 2008), we examined how each state, as well as Washington DC, interpreted and implemented Digital Examiner licensing. We found that the licensing requirements can create a conflation between DE activities and PI licensing requirements that may be detrimental to both if not correctly interpreted and implemented. In the requirements we routinely discovered interpretations of language permitting any sort of security task (e.g., Penetration Testing) to be part of the PI realm. As has been mentioned earlier, some states have gone beyond this standard to begin including other areas as well. Moreover, there are diverse requirements. In some states there are no licensing requirements for Private Investigators; while in others, the profession is governed by statute and or regulatory bodies charged with the oversight and licensing. In some statutes, requirements are implicitly defined; in others the role of DE and PI is either conflated or distinguished. And in other statutes there is no guidance whatsoever. These disparities cause confusion and hinder attempts to identify and license qualified professionals. It must be granted that Digital Examiner is a relatively new profession, but we have found that many states determine how the profession is regulated. Unfortunately, many states default to their PI licensing boards to do so. This is a matter of procedure since it allows them to combine all professional investigative licensing requirements. We see many repercussions to this decision resulting, such as the lawsuit filed in Texas by computer repair technicians who claim that this prevents them from being able to work since they cannot obtain the license based on the diverging requirements of the two professions (Rife, 2007). In this paper, we update our original (Lonardo et al., 2008) study that provided the first set of responses from the state boards and discuss changes from our followup paper (Lonardo et al., 2009). We first review statutes for amendments and changes, analyze and interpret existing regulations, then discuss results of our third round of requests from state agencies for statute interpretations. We caution that we do not offer legal advice to practitioners; however, we do offer a starting point from which practitioners can make informed decisions about licensing in their state and take action accordingly. Moreover, we must stress that state legalization and statutes are continually changing because of new legal interpretations and other changes in agency perspectives. Subsequent research will follow as we track the evolution of state licensing statutes. Moreover, we have created a Twitter feed called pilaws (White, Lonardo, & Rea, 2012) to provide interim updates during the course of the year between paper updates. We encourage interested parties to follow and contribute. 2. METHODOLOGY 2.1 STUDY APPROACH To retain consistency, we use our original definition of a Digital Examiner as a 85 Journal of Digital Forensics, Security and Law, Vol. 7(3) means of posing questions to the states: A Digital Examiner deals with the extracting, gathering and analyzing data from a computer or computers, networks, and other digital media with subsequent preparation of reports and opinions on this media for evidentiary or other stated purposes such as data/digital security, audit, or assessment. (Lonardo et al., 2008) We also use all of the reviewed state statutes from our 2009 paper (Lonardo et al., 2009) as a starting point for this research. The state statutes were first examined for any legislative updates including those states where there was no apparent licensing requirement for the Private Investigators as noted in Lonardo et al. (2008, 2009). Additionally, the statutes were then scrutinized to determine whether the PI licensing statutes were contained in the typical "business regulation" statutory titles as found in the vast majority of states. Unless the statute clearly exempted the DE from a licensing requirement or there was no apparent PI licensing requirement at all, the appropriate regulatory body was contacted by email, postal mail, or a follow up by phone if the mail-based methods were not successful in obtaining a response. Those groups that had indicated a response to the 2009 paper were asked if there was a change in the position from the preceding year and those who had not responded previously were sent the full inquiry letter found in Figure 1. Dear ________________ I am researching the requirements of various Private Investigator/Detective licensing requirements relating to Digital/Computer Forensic Examiners. I reviewed the ______ statute; however, I did not see any exclusion in the statute relating to whether a Private Investigator/Detective license is required for Digital/Computer Forensic Examiners. The role and activities of a Digital/Computer Forensic Examiner may include: Acquiring data from a computer Examining that data and opine on content Processing that data to obtain information to answer questions Processing that data to prepare it as evidence In short, the activities of a Digital/Computer Forensic Examiner deals with the extracting, gathering and analyzing data from a computer or computers and preparing reports on the same. For example, if a government agency or private concern hires a digital examiner to 86 Journal of Digital Forensics, Security and Law, Vol. 7(3) determine if the information on a computer was used for fraudulent or inappropriate purposes, the examiner will extract the information from a computer or computers and make an assessment to that end. I would greatly appreciate it if you could let me know 1) What the position of the State of ______ is relating to the question as to whether a Private Investigator/Detective license is required for the aforementioned activities of a Digital/Computer Forensic Examiner 2) If a rule or regulation exists covering this area 3) If this issue has been settled by a hearing of the Licensing Board could you please send me the official decision/position of the Board. Figure 1 All requests were sent via email when this was possible which allowed for ease of contact, simplification of analysis, and a record of the provided response. Inquiries were conducted from July 2010 to June 2011 because many legislative sessions conclude in April or May and resume in September or October. Our survey time frame situates itself as best suited to the analysis with regards to likely changes in the state statutes. It is worth noting that each state manages these regulating bodies in differing ways and thus we use the term "regulatory body" as a means to describe the various entities (e.g. Protective Services Board, Department of Public Safety, etc.). As per our previous research (Lonardo et al., 2008, 2009), when we advocated an opinion, we based it solely on the language contained in the state's code. For example, if a state used language, such as "to prove the truth or falsity of a statement," or "performing investigations for the court," or similar language, we classified our opinion as "likely required." Other states used strong exclusionary language without being specific, such as "exceptions include engineers and scientists." When we encountered this language that implies scientific investigation, we classified our opinion as "likely not required." As in the past, all of the opinions are subjective and based on our reading of present state codes and the continuation of those opinions from the 2008 and 2009 papers. As our study demonstrates, state regulatory bodies have varying opinions; language is subject to varying interpretations and in cases where we did not receive responses from state officials, our opinion should be taken in the same context. 2.2 Examination of Language Used Lonardo et al. (2008, 2009) provides a review of the language that is typical of the 87 Journal of Digital Forensics, Security and Law, Vol. 7(3) various states. Still we pose some brief samples here to illustrate the challenges faced when determining a particular state statute application to the licensing question. Figure 2 provides an illustration from Arizona: The Arizona Statute Title 32 § 2410 defines a Private Investigator: "Private investigator" means a person other than an insurance adjuster or an on-duty peace officer as defined in section 1-215 who, for any consideration, engages in business or accepts employment to: (a) Furnish, agree to make or make any investigation for the purpose of obtaining information with reference to: (i) Crime or wrongs done or threatened against the United States or any state or territory of the United States. (ii) The identity, habits, conduct, movements, whereabouts, affiliations, associations, transactions, reputation or character of any person or group of persons. (iii) The credibility of witnesses or other persons. (iv) The whereabouts of missing persons, owners of abandoned property or escheated property or heirs to estates. (v) The location or recovery of lost or stolen property. (vi) The causes and origin of, or responsibility for, a fire, libel, slander, a loss, an accident, damage or an injury to real or personal property. (b) Secure evidence to be used before investigating committees or boards of award or arbitration or in the trial of civil or criminal cases and the preparation therefor. (c) Investigate threats of violence and provide the service of protection of individuals from serious bodily harm or death. Figure 2: Arizona Statute Title 32 § 2410 A similar set of language is found in Texas as is seen in Figure 3: 88 Journal of Digital Forensics, Security and Law, Vol. 7(3) Sec. 1702.104. INVESTIGATIONS COMPANY. (a) A person acts as an investigations company for the purposes of this chapter if the person: (1) engages in the business of obtaining or furnishing, or accepts employment to obtain or furnish, information related to: (A) crime or wrongs done or threatened against a state or the United States; (B) the identity, habits, business, occupation, knowledge, efficiency, loyalty, movement, location, affiliations, associations, transactions, acts, reputation, or character of a person; (C) the location, disposition, or recovery of lost or stolen property; or (D) the cause or responsibility for a fire, libel, loss, accident, damage, or injury to a person or to property; Figure 3: Texas Occupations Code Title 10 § 1702.104 (a) excerpt As noted earlier in our discussion, Texas has extended this code to include specifics regarding Computer Technology as seen in Figure 4. This has caused some contention from computer-based business owners and technicians. (b) For purposes of Subsection (a)(1), obtaining or furnishing information includes information obtained or furnished through the review and analysis of, and the investigation into the content of, computer-based data not available to the public. Figure 4: Texas Occupations Code Title 10 § 1702.104(b) The Connecticut statute under Chapter 534 Sec. 29-152u (4) defines a PI in almost the same terms as the Arizona statute: "Private detective" means any person engaged in the business of, or advertising as engaged in the business of (A) investigating crimes or civil wrongs, (B) investigating the location, disposition or recovery of property, (C) investigating the cause of accidents, fire damage or injuries to persons or to property, except persons performing bona fide engineering services, (D) providing the personal protection of individuals, (E) conducting surveillance activity, (F) conducting background investigations, or (G) securing evidence to be used before a court, board, officer or investigation committee; Figure 5: Connecticut statute under Chapter 534 Sec. 29-152u (4) 89 Journal of Digital Forensics, Security and Law, Vol. 7(3) However, under Connecticut's statutory language, the regulator we contacted noted that a PI license--and by extension a Digital Examiner--is not required. We have found that this open-ended interpretation has resulted in many states interpreting the Digital Examiner role and profession disparately and inconsistently. Vague language and diverse interpretation is still the norm, such as with the language used to determine licensing requirements in Nebraska's statute (Neb. Rev. Stat. § 71-3201): (6) Private detective shall mean any individual who as a sole proprietor engages in the private detective business without the assistance of any employee; (8) Private detective business shall mean and include any private business engaged in by any person defined in subdivision (4) of this section who advertises or holds himself or herself out to the public, in any manner, as being engaged in the secret service or private policing business; Figure 6: Nebraska Rev. Stat. § 71-3201 Under Nebraska's statute a private detective is one who is "engaged in the secret service or private policing business." However, neither the functionality of Arizona's nor Connecticut's statutes is incorporated into the language of the Nebraska statute. Thus, in Nebraska's opinion, a license is not required. However, we did find that Nebraska's Chapter 1 § 002 of the "Rules & Regulations for Private Detective, Plain Clothes Investigators and Private Detective Agencies" does explain the profession's functionality in greater detail even though it is not as specific as others we examined: 002. Secret service or private policing business shall mean and include: general investigative work; non-uniformed security services; surveillance services; location of missing persons; and background checks. Figure 7: Nebraska Chapter 1 § 002 2.3 Exemptions in the Language We must point out that a number of the state statutes did not need interpretation because they listed exemptions to the PI licensing requirement. Most, if not all, of 90 Journal of Digital Forensics, Security and Law, Vol. 7(3) these exemptions would exclude a Digital Examiner from PI licensing requirements, but perhaps not from other professional licensing requirements (e.g., State Bar Exam) or certification (e.g., CPA). However 21 of the states that reflect either a license is, or is not required, is based on the appropriate regulatory body's opinion and thus the PI statute is silent on whether it applies to Digital Examiners. The exemptions typically included: Persons under the regular employment of an employer where there is a bona fide employer-employee relationship; An officer or employee of the United States, the state where the public employee is employed, or a political subdivision of the state; The business of obtaining and furnishing information as to the financial standing, rating, and credit responsibility of persons or as to the personal habits and financial responsibility of applicants for insurance, indemnity bonds, or commercial credit; A charitable philanthropic society or association; An attorney admitted to practice in the state in performing his or her duties as an attorney at law; A collection agency or finance company licensed to do business under the laws of this state or any employee of a collection agency or finance company while performing within the scope of their duties; Claims adjusters of insurance companies; A professional engineer acting within the scope of his or her licensed professional practice who does not perform investigative services; A certified public accountant acting within the scope of his or her licensed professional practice who does not perform investigative services; Bail agents. The state of Virginia went further in 2011 by codifying the exemption language to be more explicit and certain. Prior statutory review reflected an exemption from the PI licensing requirement through interpretation of the then existing exemption language that stated that the provisions of the article did not apply to: 17. Any certified forensic scientist employed as an expert witness for the purpose of possibly testifying as an expert witness" (emphasis added) The code was amended retaining the above exemption but also adding: 29. Any individual engaged in (i) computer or digital forensic services as defined in § 9.1-138 or in the acquisition, review, or analysis of digital or computer-based information, in order to obtain or furnish 91 Journal of Digital Forensics, Security and Law, Vol. 7(3) information for evidentiary purposes or to provide expert testimony before a court, or (ii) network or system vulnerability testing, including network scans and risk assessment and analysis of computers connected to a network. In a similar fashion to the requirements, the exemptions follow no particular pattern but do in some cases exclude practitioners either directly or indirectly. Moreover, we are seeing a new trend in what we have termed "limited exclusions." 2.4 Limited Exclusions Cases where we have identified "Limited Exclusions" involve those regulatory opinions that add some guidance but needs further clarification. For example, New Hampshire has rendered an opinion that a license is not required "as long as it is strictly the examination of evidence." This opinion leaves the reader to wonder what exactly "examination of evidence" means in the context of a digital examiner's function. Would this include retrieving the information from the computer or storage device (i.e., external hard drive or thumb drive) in order to examine evidence? We are currently awaiting a response to this inquiry. Another example of a "limited Exclusion" is seen in the 2009 board meeting minutes for the Nevada Private Investigators Licensing Board that exempts licensing if the DE engages solely in "data retrieval." However, the question then becomes how is this reconciled with the language of the statute? Would a DE be permitted to retrieve data but not secure it without running afoul of the statute, NRS 648.012 (4): …any person who for any consideration engages in business or accepts employment to furnish, or agrees to make or makes any investigation for the purpose of obtaining, information with reference to: Securing evidence to be used before any court, board, officer or investigating committee; Finally, Maine has somewhat clouded the waters. Previously, Maine did not require licensing, but in 2011 has conflated the role of Private Investigator and Digital Examiner with statue 8103(4)(A) that now requires PI licensing for any collected evidence, "including evidence derived through computer forensics" (emphasis added). However, Maine's statue does provide an exception in 8104(2)(L) for 92 Journal of Digital Forensics, Security and Law, Vol. 7(3) A person acting within the scope of the person's professional practice to analyze facts, evidence or other data for the purposes of supplying expert testimony in a legal proceeding; [2011, c. 366, §26 (NEW).] (emphasis added) In other words, one needs to be licensed to collect evidence, but not to analyze it and present it. This is a troubling distinction. For now, we are classifying this as "license required." 3. DISCUSSION OF FINDINGS 3.1 INITIAL REVIEW As noted above, we began our review by reexamining the state statutes from the previous year. We list all the statues in Table 1. Table 1: State Statutes State Statute Alabama No Requirement Alaska No Requirement Arizona Chap. 24 - 32 – 2401 Arkansas 17-40 California 7520 State Law Colorado 12-58.5-104 Connecticut Chap. 534 Sec 29 Delaware 24 – 1301 District of Columbia Division VIII Title 47 Florida Title 32 Chap. 493 Georgia Title 43 - Chap. 38 Hawaii HRS Chap. 463 Idaho No Requirement 93 Journal of Digital Forensics, Security and Law, Vol. 7(3) Illinois 225 ILCS 447 Art 5-10.1.2 Indiana IC 25-30 Iowa IC Chap. 80A Kansas Chap. 75 - 7b Kentucky KRS 329A Louisiana LA RS:37 3500 Maine 8103(4)(A), 8104(2)(L) Maryland Title 13-101 Massachusetts Title XX 147 s22 Michigan Chap. 338.822 Minnesota 326.338 Mississippi NA Missouri NA Montana 37-60-105 Nebraska 72-3201 Nevada 648.012 New Hampshire 106-F New Jersey 45:19-9 New Mexico 61 Article 27B New York Article 7 Sec 71 North Carolina 74C-3(b) North Dakota 43-30 94 Journal of Digital Forensics, Security and Law, Vol. 7(3) Ohio 4749.01 Oklahoma Title 59 - 42a-1750 Oregon 703.401, 405, 407, 411 Pennsylvania Unknown Rhode Island Chap. 5-5 South Carolina Title 40 Chap. 18 South Dakota No Requirement Tennessee Title 62 Chap. 26 223 Texas 1702.104 Utah 53-9-102 Vermont Title 26 Chap. 59 Virginia 9-1-138; 9-1-140 Washington 18.165.10 West Virginia 30-18 Wisconsin 440.26 Wyoming No Requirement 3.2 Summary of Responses After we reviewed the statutes, we began a new round of inquiries to the states as per our methodology. The response categories ranged from "No License Required," "License Required," "Under Review," "No Response," "No Opinion" and "License required with limiting circumstances." For example, the District of Columbia requires a physical presence in DC in order to require a license. However, if the computer or data is originally obtained in DC, but the examination of the evidence is conducted in a state not requiring a license, a DC license is not required. 95 Journal of Digital Forensics, Security and Law, Vol. 7(3) In Nevada, the board opined that "The Board did not license data recovery, but what was done with that information would require an investigators license." This would then exclude imaging but would cover examination. Wisconsin and California have taken a similar position to Nevada. We expect states to make more distinctions such as these are they begin to understand the differences between PI and DE. Colorado recently (July 2012) distinguished between "licensed private investigator" and "private investigator" with the former requiring a license. When we examined this distinction within the context of our paper we determined the only thing this does is allow a title of "Licensed Private Investigator" under a voluntary program with certain requirements and a $320 fee. It doesn't affect Digital Examiners/Computer Forensic professionals. However, this may be one step towards mandatory licensing in the future. The statute has a sunset clause and expires in 2016, so this is definitely one we must monitor because this may lead to more confusion than clarity. Voluntary license-title protection-penalty 12-58.5-104. 1(b) b) Nothing in this article requires a private investigator engaging in private investigations in this state to obtain a license under this article, but a private investigator who is not so licensed shall not refer to himself or herself as a "licensed private investigator". In South Carolina, a proposed statute change would have permitted a licensing exception for DEs and thereby added another state that recognized the necessary distinction between roles. However, on June 18, 2012, the governor vetoed the exception. South Carolina remains a state that requires the licensing of DEs. Unfortunately, one major change between 2009 and this current study is reflected in the response rate. In 2009, we received "no response" from only three (3) states. This study however reflects six (6) states that failed to generate a follow-up response of some kind. However, five (5) of the "no responses" were from states previously rendering an opinion of "No License Required," whereas one (1) has never responded to any survey requests. Table 2 provides linkages to the state statutes with the Title and Part of the statute that directly refers to this study. Table 2: State Statutes and Links State Belief Alabama No PI Licensing Requirement Alaska No PI Licensing Statute 96 Website Journal of Digital Forensics, Security and Law, Vol. 7(3) Requirement Arizona Not specific but statements Chap. 24 - 32 2401 http://www.azleg.state.az.us/FormatDocume nt.asp?inDoc=/ars/32/02401.htm&Title=32&D ocType=ARS Arkansas Not Specific but statements 17-40 http://www.arkleg.state.ar.us/bureau/Publica tions/Arkansas%20Code/Title%2017.pdf California Not Specific but statements 7520 State Law http://www.leginfo.ca.gov/cgibin/displaycode?section=bpc&group=0700108000&file=7520-7539 Colorado Voluntary PI if use "licensed" in title 12-58.5104.1(b) http://www.michie.com/colorado/lpext.dll/co code/1/17f02/1ab8a/1d2ed/1ed47/1ed7a?f=t emplates&fn=documentframe.htm&q=private%20investigator&x=Adv anced&2.0#LPHit1 Connecticut Not Specific but statements Chap. 534 Sec. 29 http://www.cga.ct.gov/2005/pub/Chap534.ht m#Sec29-153.htm Delaware PI but excludes CCE 24 1301 http://delcode.delaware.gov/title24/c013/ind ex.shtml District of Columbia Seems to require but unknown Division VIII Title 47 Florida Not Specific but statements Title 32 Chap. 493 http://www.flsenate.gov/Statutes/index.cfm? App_mode=Display_Statute&URL=Ch0493/titl 0493.htm Georgia Not Specific but statements Title 43 – Chap. 38 http://www.lexisnexis.com/hottopics/gacode/Default.asp Hawaii May imply as it states all investigation HRS Chap. 463 http://hawaii.gov/dcca/pvl/hrs/hrs_pvl_463.p df/view 97 Journal of Digital Forensics, Security and Law, Vol. 7(3) Idaho No PI Licensing Requirement Illinois Includes "electronics" in the definition of investigation. 225 ILCS 447 Art 5-10.1.2 http://ilga.gov/legislation/ilcs/ilcs5.asp?ActID =2474&ChapAct=225%A0ILCS%A0447%2F&Ch apterID=24&ChapterName=PROFESSIONS+AN D+OCCUPATIONS&ActName=Private+Detectiv e%2C+Private+Alarm%2C+Private+Security%2 C+and+Locksmith+Act+of+2004%2E Indiana Not Specific but statements IC 25-30 http://www.in.gov/legislative/ic/code/title25/ ar30/ch1.html Iowa Not Specific but statements IC Chap. 80A http://www.dps.state.ia.us/asd/pi/pi80a03co de.pdf Kansas Not Specific but statements Chap. 75 - 7b http://www.kslegislature.org/legsrvstatutes/index.do Kentucky Not Specific but statements KRS 329A http://www.lrc.state.ky.us/KRS/329A00/CHAP TER.HTM Louisiana Excludes technical experts LA RS:37 3500 http://www.lsbpie.com/pilaw_4_02.pdf Maine Not Specific but statements 8103(4)( A), 8104(2)( L) http://www.mainelegislature.org/legis/st atutes/32/title32sec8103-A.html http://www.mainelegislature.org/legis/st atutes/32/title32sec8104.html Maryland Not Specific but statements Title 13101 http://michie.lexisnexis.com/maryland/lpext. dll/mdcode/1564/227a?fn=documentframe.htm&f=templates&2.0# Massachusett s Not Specific but statements Title XX 147 s22 http://www.mass.gov/legis/laws/mgl/gl-147toc.htm Michigan Not Specific but statements Chap. 338.822 http://www.legislature.mi.gov/(S(543gjn45g1 xwihrunhpsds45))/mileg.aspx?page=getObject 98 Journal of Digital Forensics, Security and Law, Vol. 7(3) &objectName=mcl-Act-285-of-1965 Minnesota Not Specific but statements Mississippi Not Specific but statements Missouri Not Specific but stateme nts 326.338 http://www.dps.state.mn.us/pdb/Resources/ PDPA_Minnesota_Statutes.pdf XXII 324.1100 http://www.moga.mo.gov/statutes/chapters/c hap324.htm Montana Not Specific but statements 37-60 http://data.opi.state.mt.us/bills/mca_toc/37_ 60_1.htm Nebraska Should not apply unless you advertise as private detective 72-3201 http://www.sos.state.ne.us/rules-andregs/regsearch/Rules/Secretary_of_State/Titl e-435.pdf Nevada Not Specific but statements 648.012 http://www.leg.state.nv.us/NRS/NRS648.html#NRS648Sec006 New Hampshire Not Specific but crime statement 106-F http://www.gencourt.state.nh.us/rsa/html/vii /106-f/106-f-mrg.htm New Jersey Not Specific but statements 45:19-9 http://www.state.nj.us/njsp/about/pdf/06010 6_amendedstat.pdf New Mexico Not Specific but statements 61 Article 27B http://www.conwaygreene.com/nmsu/lpext. dll/nmsa1978/9b0/1d78b/1ef8f/1f105?f=tem plates&fn=document-frame.htm&2.0 New York Not Specific but statements Article 7 Sec 71 http://www.dos.state.ny.us/lcns/lawbooks/pi beawgpa.html North Carolina Excluded Indirectly 74C-3 http://www.ncleg.net/EnactedLegislation/Stat utes/HTML/ByChapter/Chapter_74C.html 99 Journal of Digital Forensics, Security and Law, Vol. 7(3) North Dakota Excluded 43-30 http://www.legis.nd.gov/cencode/t43c30.pdf Ohio Not Specific but statements 4749.01 http://codes.ohio.gov/orc/4749 Oklahoma Not Specific but statements Title 59 42a1750 http://www.oscn.net/applications/oscn/Deliv erDocument.asp?CiteID=96644 Oregon Not Specific but statements 703.4 http://www.leg.state.or.us/ors/703.html Pennsylvania License is required in some counties. Rhode Island Not Specific but statements Chap. 55 http://www.rilin.state.ri.us/Statutes/Title5/55/INDEX.HTM South Carolina Not Specific but statements Title 40 Chap. 18 http://www.scstatehouse.net/code/t40c018.h tm South Dakota No PI Licensing Requirement Tennessee Not Specific but statements Title 62 Chap. 26 223 http://michie.lexisnexis.com/tennessee/lpe xt.dll/tncode/24296/24fbc/24fc3/25044?f= templates&fn=documentframe.htm&2.0#JD_62-26-223 Texas Specifically includes CF 1702.10 4 http://www.statutes.legis.state.tx.us/Docs/O C/htm/OC.1702.htm Utah Not Specific but statements 53-9-102 http://le.utah.gov/UtahCode/getCodeSection ?code=53-9-102 Vermont Not Specific but statements Title 26 Chap. 59 http://www.leg.state.vt.us/statutes/fullchapt er.cfm?Title=26&Chapter=059 Virginia Specifically excludes forensics examiners 9-1-138 http://leg1.state.va.us/cgibin/legp504.exe?000+cod+9.1-138 100 Journal of Digital Forensics, Security and Law, Vol. 7(3) Washington Specifically excludes forensics examiners 18.165.1 0 http://apps.leg.wa.gov/RCW/default.aspx?cit e=18.165.010 West Virginia Not Specific but strong language 30-18 http://www.legis.state.wv.us/WVCODE/Code. cfm?chap=30&art=18 Wisconsin No Specific language at all but focused on advertising as private detective 440.26 http://www.legis.state.wi.us/statutes/Stat044 0.pdf Wyoming No PI Licensing Req. 3.3 Explanation of Data During the time frame of July 2010 to June 2011, we solicited responses from the various states using our established methods. The data is presented in tables based upon several factors. In some cases, the state has a statute that requires the license or does not require the license. In other cases, the opinion of the governing regulatory body was used based on their response to our inquiry. In all cases, we have attempted to provide an informational resource for practitioners but again must caution that both opinion and statute are dynamic and can change rapidly. Thus, as ever, the practitioner should use caution and contact a licensed attorney or the state licensing board before conducting forensics examinations in any given locale. The data is presented as follows: States that require a PI license and specifically address DEs by statute. (Table 3) States that require a PI license, but do not specifically address DEs. There is an opinion issued that includes DEs. (Table 4) States that require a PI license, but do not specifically include DEs. There is a present opinion issued that excludes DEs. (Table 5) States that require a PI license and specifically exclude DEs by statute. (Table 6) States that do not require a PI license by statute. (Table 7) 101 Journal of Digital Forensics, Security and Law, Vol. 7(3) States that require a PI license but have limited exclusions for DE (Table 8) States that did not respond to our inquiry (Table 9) States that issues a response of no opinion (Table 10) Table 3: States that require a PI License and specifically include DEs by statute State Requires PI for DE Statute ME Yes 8103(4)(A), 8104(2)(L) MI Yes Chap. 338.822 OR Yes 703.401,405,407,411 TX Yes TC 1702.104 102 Journal of Digital Forensics, Security and Law, Vol. 7(3) Table 4: States that require a PI license, but do not specifically address DEs. There is an opinion issued that includes DEs. State Opinion AR License Required AZ License Required CA Licensed Required * DC License Required * GA License Required HI License Required IA License Required LA License Required * MD License Required MO License Required NM License Required NV License Required * NY License Required SC License Required WI License Required WV License Required *Indicates a state that indicated some limited exclusions (see Table 8). 103 Journal of Digital Forensics, Security and Law, Vol. 7(3) Table 5: States that require a PI license, but do not specifically include DEs. There is a present opinion issued that excludes DEs. State Opinion CO 12-58.5-104 (Required if use the term "licensed") CT No License Required KS No License Required UT No License Required Table 6: States that require a PI license and specifically exclude DEs by statute. State Statute DE DSC 24 – 1301 MT 37-60-105 NC 74C-3(b) ND NDSC 43-30 NE Rev. Stat. 72-3201 RI RSC Chap 5-5 VA VSC 9-1-138; 9-1-140 WA WSC 18.165.10 104 Journal of Digital Forensics, Security and Law, Vol. 7(3) Table 7: States that do not require a PI license at all. State Requirement AL None AK None ID None IL None MS None PA May be required by county SD None WY None Table 8: States indicating a limited exclusion but otherwise requiring a license State Exclusion CA Via Phone Interview, written or verbal inquiries would require PI but working only on a computer would not. (continued opinion) DC Work not being physically done in DC would not require a license. LA 37:3500.8(a)(iv) excludes technical experts NV Licensing board minutes indicate retrieval is not licensed but analysis requires license 105 Journal of Digital Forensics, Security and Law, Vol. 7(3) Unfortunately, in the latest round of queries six (6) states—up from three (3) the previous year-- did not reply to email, mail, or telephone contact attempts. When applicable, we have noted each state's response from our 2009 survey; however, we have removed these states from other tables as their exact status could not be determined. We will add additional inquiry opportunities for these states in the upcoming survey. The six (6) nonresponding states and our opinion are listed below in Table 9. Table 9: States with Unknown Status State Status Our Opinion FL Previous Response No License Requirement. Opinion excludes DEs. MA No Response Hearsay indicates required NH Previous Response No License Requirement. Opinion includes DEs. OH Previous Response No License Requirement. Opinion excludes DEs. OK Previous Response No License Requirement. Opinion excludes DEs. VT Previous Response No License Requirement. Opinion excludes DEs. 106 Journal of Digital Forensics, Security and Law, Vol. 7(3) Of states that did respond, five (5) declined to render an opinion on DE licensing requirements (Table 10): Table 10: States that issued a response of No Opinion State Response Our Opinion IN No Opinion Only if you advertise as a PI KY No Opinion Implies any sort of investigation requires a license. MN No Opinion May be required NJ Indicated it was under review Waiting for review TN No Opinion May be required 3.4 Initial Analysis Our review of the 50 states and the District of Columbia indicates that four (4) states require DEs to have a license (Table 3). Sixteen (16) additional states have issued opinions that their statute would require a PI license to operate in that state (Table 4). Four (4) of those states indicated there were some limited exclusions to this opinion (Table 8). Four (4) states issued opinions that DEs are excluded (Table 5). Eight (8) states exclude DEs by statute (Table 6). Eight (8) states require no licensing of PIs or DEs (Table 7). The remaining states either did not respond (Table 9) to this year's survey or issued a no opinion on the matter (Table 10) for a total of eleven (11) states. 4. RECOMMENDATIONS We would argue that it is not in the best interests of Digital Examiners, nor is it in the best interest of citizens, that DEs be licensed as Private Investigators. This is not to say that states should not license Digital Examiners, but rather should separate the two specializations into their respective parts. Digital Examiners have a specific role in investigations that does not overlap with those duties normally performed by Private Investigators. Conversely, the implication that PIs are capable of conducting DE investigations because they are licensed is harmful to all concerned. Upon review of the requirements in various states it is often the case that PI licensing requires thousands of hours of apprenticeship as a PI or a law enforcement background. Neither of these skill sets necessarily intersects with that of DE. This prevents Digital Examiners from doing their job and thus denies 107 Journal of Digital Forensics, Security and Law, Vol. 7(3) citizens and organizations access to these individuals in those states or deprives those individuals of the right to work in those states. These two investigative specializations rarely, if ever, converge. Thus, we recommend that states approach their regulation, licensing, and enforcement of Digital Examiners and Private Investigators as follows: 1) Adopt a clear definition of Digital Examiners. 2) Adopt a clear definition of Private Investigators. 3) Review certifications and determine which certifications are recognized by that state for the role of DEs. 4) Create a license for DE that is not governed by the PI board of the state. PI boards do not necessarily understand what is involved in DE practice. This board should be comprised of DE certified citizens holding vendor neutral certifications that include ethics policy and review, as well as regular recertification (e.g., Certified Computer Examiner type certifications [ISFCE, 2009]). 5) Barring the above, states should exclude DE from the requirement of a PI license much as they do forensic accountants, engineers, and others as per Rhode Island, Delaware, and others listed in Table 6. 5. CONCLUSION We strongly encourage state constituents and practitioners to initiate action with their legislatures to implement the five (5) steps outlined above as well as to review professional recommendations such as ABA 301 (2009). Digital Examiners would, of course, be the best coalition to advocate for these changes. However, we would advocate a series of targeted educational materials first be made to inform DEs of their particular state's regulations and licensing because only a small fraction know whether PI licenses are obtainable, desirable, or relevant to their profession (White & Micheletti, 2008). We also encourage Computer Forensic and other technology-related organizations to advocate for state regulatory and licensing changes. Ultimately, we would argue that it is best to exclude Digital Examiners from an established Private Investigator licensing requirement, and rely on other professional certifications, such as the Certified Computer Examiner (ISFCE, 2012) or the GCFA (SANS, 2012). This ensures that citizens, state governments, and businesses have access to the most ethical and qualified individuals to conduct their forensics examinations and manage digital evidence. 6. REFERENCES Addo Enterprises, Inc. (2009). PI State Licensing Requirements. Safety Basement. Retrieved from http://www.safetybasement.com/category_s/377.htm 108 Journal of Digital Forensics, Security and Law, Vol. 7(3) American Bar Association (ABA). (2009). Section of Science and Technology Law, 301. Retrieved from http://www.abanet.org/leadership/2008/annual/recommendations/ThreeHundre dOne.doc International Society of Forensic Computer Examiners (ISFCE) (2012). Certified Computer Examiner. Retrieved from http://www.certified-computerexaminer.com/ Kramer, J. (2009). Texas Government-mandated Computer Repair License Does Not Compute. Institute for Justice. Retrieved from http://www.ij.org/index.php?option=com_content&task=view&id=2189 &Itemid=129 Lonardo, T., White, D., & Rea, A. (2008). To License or Not to License: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. The Journal of Digital Forensics, Security, and Law. 3(3). Lonardo, T., White, D., & Rea, A. (2009). To License or Not to License Revisited: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. The Journal of Digital Forensics, Security, and Law, 4(3). Mesis, J. (2011). Private Investigator License Requirements by State. Private Investigator Magazine. Retrieved from http://www.pimagazine.com/links_Licensing.htm Rife vs. Texas Private Security Board. (2007). cTex. Occ. Code § 1702.381 SANS. (2012). GIAC Certified Forensics Analyst. Retrieved from http://www.giac.org/certifications /security/gcfa.php White, D., Lonardo, T., & Rea, A. (2012). pilaws. http://twitter.com/pilaws White, D., & Micheletti, C. (2008). Annual Survey of CCE Results. In Proceedings of the Decision Sciences Institute Conference. Baltimore, MD. November. 109 Journal of Digital Forensics, Security and Law, Vol. 7(3) 110 Journal of Digital Forensics, Security and Law, Vol. 7(3) BOOK REVIEWS Jigang Liu Editor Metropolitan State University St. Paul, MN 55106 [email protected] If you have any suggestions on books for review, or you would like to write a book review for us, or you have any comments and concerns on the book reviews published on this column, please feel free to send an email to Jigang Liu at [email protected]. BOOK REVIEW Garrie, D.B., & Griver, Y.M., Eds. (2012). Dispute Resolution and e-Discovery. Thomson Reuters Westlaw, 570 pages, ISBN-13: 9780314604484, US$149.00. Reviewed by Milton Luoma, JD, ([email protected]) As is apparent from its title, this book tackles two very current and difficult legal issues – electronic discovery and dispute resolution. The authors tie the two legal concepts together in an effort to provide litigants and practitioners a less expensive and less time consuming alternative than is typically the case with traditional litigation and court proceedings. By including electronic discovery in the discussions, the authors recognize the importance and significance of electronic discovery in mediation and arbitration as it is in traditional litigation. The book consists of 11 chapters, each written by a different author who is an expert in the area of the particular chapter. In addition, there are 45 appendices that include all of the outside sources a professional would need – everything from arbitration protocols, sample court orders, to the electronic rules for the London Court of International Arbitration. The book is easy to read and comprehend, but it is written for the professionals who work in the area of electronic discovery, attorneys, forensic experts, as well as mediators and arbitrators. The book begins with a discussion and definition of electronic discovery followed by an explanation of Federal Rules of Civil Procedure, and finally, dispute resolution options. The chapters give tips and suggestions for the professional throughout the book. In civil litigation a party and his or her attorneys are required to come to meetand-confer proceedings prepared and ready to provide and request electronically stored information (ESI). The reality of these meet-and-confer sessions is that attorneys are often confused or unprepared. As a Craig Ball, an attorney and 111 Journal of Digital Forensics, Security and Law, Vol. 7(3) forensic consultant, has stated that meet-and-confer sessions involve “two lawyers who don’t trust each other negotiating matters neither understands.” This book tackles the most difficult issues that arise in electronic discovery, including costs and the burdens of e-discovery, key word searches, and proportionality. The book then discusses the two most popular forms of dispute resolution – mediation and arbitration. The authors discuss the benefits and issues involved in both mediation and arbitration and compare the two. The authors conclude that many e-discovery problems can be avoided through dispute resolution. With the complexity and costs associated with e-discovery, the alternatives of mediation or arbitration are much more appealing. In mediation, the goal of the mediator, or third-party neutral, is to resolve the case or issue on terms all parties can accept. The authors point out that to settle issues in e-discovery, the mediator must be able to address issues that are not directly related to the merits of the case. The author gives the example that in pursuing a claim in a lawsuit the cost of pursuing the claim or the risk or losing at trial may play a part in the decisions of litigation. A party may decide to drop all or a portion of the case for reasons other than the merits of the case. Daniel Gelb, one of the authors of this book, wrote “… mediation is a productive means to determine whether e-discovery should function as a quantifiable in reaching settlement or whether it is collateral to the dispute and risks of being improperly leveraged to drive up costs.” This chapter by Gelb has a list of 25 issues that can be addressed in mediation. They range from what experts should be retained to the method and type of electronically stored information to be provided. Gelb further points out that mediation demands creative use of technology to cut costs and time. Lack of understanding of the e-discovery process is one of the stumbling blocks to the process and that mediation can help that process. In addition, Gelb suggests tools to review in determining whether mediation would help litigants in the e-discovery area. This book has numerous tips for the practitioner, including suggestions for keyword searches and agreement in mediation. The author tells the mediator and parties once they have agreed upon the keywords to use that the parties should use sampling to see if these keywords are adequate and do not produce too little or too much information before finalizing the agreement. Then, as another suggestion, the book explores the use of arbitration in ediscovery. In arbitration the parties choose a neutral fact finder. Unlike mediation where the parties must come to an agreement, in arbitration the arbitrator listens to the testimony, evidence and arguments of the parties, and reviews their arguments and information, and then makes the final decision. The parties can agree that the arbitration is either binding or nonbinding in nature. If the parties decide the arbitrator’s decision is nonbinding then they can bring motions to the court to reargue their e-discovery issues. The chapters on arbitration discuss strategies litigants can use in difficult areas in e-discovery, 112 Journal of Digital Forensics, Security and Law, Vol. 7(3) such as preservation, proportionality, cost allocation, search terms and privilege. One suggestion is that the parties can agree or one party can convince the arbitrator to limit certain areas of e-discovery. The book also discusses the use of a Special Master, the process of selecting Special Masters and final reports. In the chapter concerning the use of the Special Master, the author discusses several case studies. One case study shows how the Special Master may be appointed to determine whether parties have complied with court orders to provide ESI. The book also discussed the potential minefields and dispute resolution strategies for the practitioner. They include forms of ESI production, key word searches, scope and proportionality in ediscovery, and cost allocation. The author of this section, Maura Grossman, has given the reader some key take-away points to help in these difficult areas. This book thoroughly covers all the relevant topics and choices in this area of ediscovery and alternate dispute resolution. Most of the major cases in this area are listed mainly in the footnotes. The book also contains a glossary and index. The only criticism this reviewer has is that more case studies showing the success of the methodology in mediation and arbitration would help illustrate the authors’ points. Further, it would be helpful if the authors had done a cost analysis comparing and contrasting the use of alternate dispute resolution in lieu of court litigation. However, throughout the book the authors give tips to the professional, make key points and give helpful suggestions while providing alternate actions for litigants. Electronic discovery is an area in which litigants can be sanctioned for provided too much information, too little information, or providing information in the wrong format. This book is a helpful resource for the professional to guide them to methods that may save time, money, and stress. 113 Journal of Digital Forensics, Security and Law, Vol. 7(3) 114 Journal of Digital Forensics, Security and Law, Vol. 7(3) Subscription Information The Journal of Digital Forensics, Security and Law (JDFSL) is a publication of the Association of Digital Forensics, Security and Law (ADFSL). The Journal is published on a non-profit basis. In the spirit of the JDFSL mission, individual subscriptions are discounted. However, we do encourage you to recommend the journal to your library for wider dissemination. The journal is published in both print and electronic form under the following ISSN's: ISSN: 1558-7215 (print) ISSN: 1558-7223 (online) Subscription rates for the journal are as follows: Institutional - Print & Online: $395 (4 issues) Institutional - Online only: $295 (4 issues) Individual - Print & Online: $80 (4 issues) Individual - Online only: $25 (4 issues) Subscription requests may be made to the ADFSL. The offices of the Association of Digital Forensics, Security and Law (ADFSL) are at the following address: Association of Digital Forensics, Security and Law 1642 Horsepen Hills Road Maidens, Virginia 23102 Tel: 804-402-9239 Fax: 804-680-3038 E-mail: [email protected] Website: http://www.adfsl.org 115 Journal of Digital Forensics, Security and Law, Vol. 7(3) 116 Journal of Digital Forensics, Security and Law, Vol. 7(3) Announcements and Upcoming Events The ADFSL 2013 Conference on Digital Forensics, Security and Law Richmond, Virginia USA June 10-12, 2013 http://www.digitalforensics-conference.org ============================================================ The ADFSL 2013 Conference on Digital Forensics, Security and Law will be hosted by Longwood University and held at the Wyndham Crossings Hotel in Richmond, Virginia on 10-12 of June 2013. The ADFSL Conference on Digital Forensics, Security and Law is a unique and innovative event. It is managed by the Association of Digital Forensics, Security and Law (ADFSL). The conference focuses on the current and expanding role of digital forensics within investigations and the courts as well as its important role within cyber security - both national as well as corporate. Topics not only include technology and evidence, but also are very much focused on how to prepare students for careers in digital forensics. Curriculum is a very important topic and the new DoD initiative on certification and Centers of Academic Excellence will be very important areas of discourse. Conference submissions are double blind refereed and provide a forum for high quality research, communication and debate on the subject of digital forensics and directly related fields. 117 Journal of Digital Forensics, Security and Law, Vol. 7(3) AA# 53-2-114 & 53-2-115 Two Professors in Digital Forensics. Full time tenure track at Assistant or Associate level beginning Fall 2012. The Department of Mathematics, Computer Science and Statistics at Bloomsburg University of Pennsylvania seeks two individuals to work in its Digital Forensics major. Since its beginning, the Digital Forensics program at Bloomsburg has continually grown in the number of courses offered, the number of students enrolled and the accomplishments of its faculty. The Department seeks faculty who can help this program to continue to advance. Applicants with a background in any computing field will be considered. Applicants with a forensics, security or networks background are most appropriate. An earned Ph.D. or doctorate from an accredited institution by August 24, 2013 is required, however ABD may be considered with a one year contingency contract. A demonstrated ability to work with diverse populations is preferred. Successful candidates will be expected to teach existing courses in the digital forensics major and to develop new courses in digital forensics. The normal teaching load is four courses per semester. They will also advise digital forensics majors. Professional growth through scholarly activities along with departmental and university service are required. Prior to a final offer of employment, the selected candidate will be required to submit to a background check including, but not limited to, employment verification, educational and other credential verification, and criminal background check. Finalists for this position must communicate well and successfully complete an interview process and teaching demonstration, as judged by the department faculty. Recommendation by the majority of the regular, full-time departmental faculty is necessary for appointment. A complete application consists of a cover letter, résumé, unofficial graduate transcripts, a statement of teaching experience and philosophy, a statement of research interests and plans for scholarly growth, and three letters of recommendation. Application materials may be submitted via email. References for finalists will be telephoned. Review of complete applications will be ongoing. Those received by 4:30 PM, EST, January 4, 2013 will be assured consideration; however the positions will remain open until filled. Bloomsburg University encourages applications from historically under-represented individuals, women, veterans and persons with disabilities and is an AA/EEO employer. Completing this search is contingent upon available funding. Send application materials to Digital Forensics Search Committee Department of Mathematics, Computer Science and Statistics Bloomsburg University of Pennsylvania 400 East Second Street Bloomsburg, PA 17815 Email applications should be sent to [email protected] with the subject line Digital Forensics Position. Bloomsburg University of Pennsylvania encourages applications from historically underrepresented individuals, women, veterans, and persons with disabilities and is an AA/EEO Employer. 118 Journal of Digital Forensics, Security and Law, Vol. 7(3) Champlain College Dean, Division of Information Technology and Sciences Champlain College, a private, independent, entrepreneurial, teaching institution that is considered a national leader in educating today’s students to become skilled practitioners, effective professionals and global citizens, seeks an innovative and accomplished academic leader to become its next dean of the Division of Information Technology and Sciences (ITS). Founded in 1878, Champlain offers professionally focused master's, bachelor's and associate's degree programs and professional certificates on campus, online and abroad. The college enrolls over 2,100 undergraduate and 440 graduate students in a diverse array of leading edge programs. Champlain’s reputation for a transformative educational experience earned it a coveted spot in The Princeton Review’s “The Best 376 Colleges: 2012 Edition.” Annually, editors at U.S. News and World Report rank it in the top tier of Regional Colleges in the North and named it a “Top Up-and-Coming School” in 2010. In the 2013 edition of U.S. News’ “America’s Best Colleges”, the college ranked in the top 15 Regional Colleges in the North. This past year, Champlain experienced an increase of 70 percent in the number of applicants to the college resulting in an incoming Class of 2016 that numbered more than 600. The average SAT combined score of enrolled freshmen was 32 points higher than in 2011. Located in idyllic Burlington, Vermont, perennially ranked as one of America’s most exciting small cities, the campus enjoys views of New York’s Adirondack Mountains from its picturesque setting overlooking Lake Champlain. Champlain’s campus is beautiful, well-maintained and engineered for sustainability. Its new student welcome and admissions center is one of three buildings in Vermont to achieve LEED Platinum Certification, the highest green certification obtainable. In April, The Princeton Review recognized Champlain College as one of 322 Green Colleges for its commitment to sustainability throughout campus. Champlain is accredited by the New England Association of Schools and Colleges. The college seeks a dean for its Division of Information Technology and Sciences (ITS), an accomplished, energetic and engaging academic leader, committed to innovative curriculum and student success, with the ability to inspire and motivate faculty. Qualified candidates will possess a doctorate or an equivalent terminal degree in a relevant discipline, an outstanding portfolio of teaching, research or practice, and service that will warrant appointment to the rank of full professor. This is an exceptional opportunity for individuals with the drive, skill and administrative expertise to bring creative leadership to the organization and to play a meaningful role in shaping its future. Reporting to the provost, the dean will serve as the chief academic and administrative leader of the ITS division, working in close collaboration with the provost, senior administrators and other deans to pursue common interests in support of the college’s overall institutional priorities. The dean will be responsible for articulating a clear vision and developing a strategy, through engaged dialogue with the faculty within the division, to identify priorities and appropriate directions for future growth, innovation and change. The new dean will focus on enhancing the overall excellence of the division, including ensuring the continued academic success of students and placing a high priority on the recruitment and retention of a distinguished faculty at all levels, promoting excellence as well as diversity in all its programs. The ITS division is comprised of 18 full-time faculty and enrolls 387 students, 112 of whom are entering freshmen in 2012. Additional information about the Division of Information Technology and Sciences can be found at: http://www.champlain.edu/undergraduate-studies/majors-and-programs/academic-divisions/division-ofinformation-technology-and-sciences-x14423.html Nominations, expressions of interest and applications are invited. Review of candidates will begin immediately and will continue until the position is filled, with the goal that the new dean will take office in July, 2013. To apply, please submit via email a letter of interest, a current curriculum vita and the names of five references (who will not be contacted without permission) to: [email protected]. Word or pdf documents preferred. All correspondence will be treated as confidential. Inquiries by phone for the search for the Dean of Information Technology and Sciences should be directed to Champlain’s Witt/Kieffer consultants, Jane Courson at (508) 257-0109 or Mary Elizabeth Taylor at (212) 686-2676. Champlain College is an affirmative action/equal opportunity employer, and it seeks candidates who are committed to the highest standards of scholarship and professional activities and to the development of a campus climate that supports equality and diversity. 119 Journal of Digital Forensics, Security and Law, Vol. 7(3) 120 Journal of Digital Forensics, Security and Law Volume 7, Number 3 2012 Contents Call for Papers ............................................................................................................ 2 Guide for Submission of Manuscripts ...................................................................... 2 From the Editor-in-Chief ......................................................................................... 4 The Science of Digital Forensics: Analysis of Digital Traces ................................ 5 Fred Cohen On the Development of a Digital Forensics Curriculum ..................................... 13 Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, & Kyle Cronin Automatic Crash Recovery: Internet Explorer's Black Box .............................. 33 John Moran & Douglas Orr Extraction of Electronic Evidence From VoIP: Identification & Analysis of Digital Speech .......................................................................................................... 55 David Irwin, Arek Dadej, & Jill Slay To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners ..................................... 83 Thomas Lonardo, Doug White, & Alan Rea Book Review: Dispute Resolution and e-Discovery (Garrie & Griver) ............. 111 Milton Luoma Subscription Information ..................................................................................... 115 Announcements and Upcoming Events .............................................................. 117