Sei sulla pagina 1di 15

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/269400823

Anti-Forensic Tool Use and Their Impact on Digital Forensic Investigations: A


South African Perspective

Conference Paper · December 2014

CITATION READS

1 2,162

4 authors, including:

Adrie Stander Jean-Paul W Van Belle


University of Cape Town University of Cape Town
24 PUBLICATIONS   147 CITATIONS    169 PUBLICATIONS   592 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Masters Thesis View project

M-Government Framework development View project

All content following this page was uploaded by Jean-Paul W Van Belle on 20 November 2015.

The user has requested enhancement of the downloaded file.


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

Anti-Forensic Tool Use and Their Impact on Digital Forensic Investigations: A South
African Perspective

Richard de Beer, Adrie Stander and Jean-Paul Van Belle


Department of Information Systems, University of Cape Town
Private Bag, Rondebosch, 7701, South Africa
Jean-Paul.VanBelle@uct.ac.za

ABSTRACT KEYWORDS
Digital evidence is becoming an integral part of Digital forensics; anti-forensic tools; anti-forensic
most cases presented to court. From computers, to methods; digital forensic evidence; South Africa.
mobile phones, ATMs and surveillance cameras,
1 INTRODUCTION AND
our daily life is so inextricably entwined with
technology that it is difficult to find court cases BACKGROUND TO RESEARCH
where technology plays no part. Thus the Forensics as a scientific discipline is the
responsibility placed on a Digital Forensics (DF) process whereby science is used to investigate
practitioner to present usable evidence to a court is
artefacts or transfer of evidence and interpret its
increasing fast. However, potential criminals have
equally compelling reasons to prevent DF
relevance to an investigation [1]. The goal of
practitioners from getting their hands on the DF practitioner is the collection and
information of probative value and use tools and analysis of digital evidence with a view towards
methods known as Anti-Forensics (AF). presenting such evidence in a court of law or
other legal proceeding. Key to the success of
The purpose of this study is to identify the abilities
of DF practitioners to identify the impact that AF
this process is the probative value of the
has on their active investigations. We created a collected evidence [2].
research model that attempts to identify all the Anti-forensics (AF) involves the use of
factors and constructs that impact the AF methods specifically designed to hinder or
phenomenon. This model was then used to develop negate entirely, the use of science applied to
a survey instrument to gather empirical data from
criminal and civil law by interfering with the
South African DFs.
digital forensic practitioner’s ability
We found that whilst South African DF successfully complete the collection,
practitioners perceive DF as having an impact on examination and analysis of digital forensic
their investigations, they also perceive electronic artefacts (Harris, 2006). Due to the ever-
evidence as forming only part of the evidence
increasing frequency of AF tool use, greater
presented to court, and that some usable evidence
will generally remain. Unfortunately, we found also
vigilance by DF investigators will be required
that most DF practitioners in South Africa are well to ensure the integrity of investigative results
versed only in the more commonly known AF [3]. Anti-forensics is a multi-faceted issue and
techniques whilst not rating their abilities on more will require ingenuity and persistence to
complex techniques well. Finally, most DF overcome, and investigators can expect to
practitioners appear not to actively attempt to encounter more sophisticated challenges more
identify AF techniques as part of their frequently as the digital forensics capabilities
investigations. This combined with a lack of that exist become more commonly known to
understanding of more complex AF techniques computer users. By all indications this is a
could leave South African DF practitioners exposed constantly evolving problem and DF
by missing important evidence due to lack of
practitioners will have to ensure that they are
technical proficiency. The research and its findings
should be of benefit to academia and practicing DF
equally versed in DF as a science and AF as a
investigators with a view to assisting them better countermeasure.
prepare for the onslaught of AF.

ISBN: 978-1-941968-03-1 ©2014 SDIWC 7


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

All research into this phenomenon up to this Courts of law base the adjudication of all cases
point has come out of the developed world, on evidence presented. In examining AF and its
with the USA, Europe and Australia leading the effect on the punctiliousness of digital evidence
way. The 2012 Verizon data breach report presented, it is first necessary to examine
states that one third of all DF investigations digital evidence closely. Evidence can be
undertaken by Verizon are affected by AF [4]. defined as anything presented to logically prove
No similar research has been conducted in or disprove an issue at hand in a judicial case
South Africa, and as such the current scope of [6]. Digital evidence is information of legal
the AF problem is South Africa is not known. probative value that is stored or transmitted in
Due to the risks inherently posed by AF and the electronic form [3]. Digital evidence is similar
fact the electronic evidence in South African to traditional evidence in that it contains
law is still in its infancy, a real risk exists that information that is used to confirm or refute a
DF practitioners in South Africa are either not hypothesis placed before the court or legal
aware of the AF practices being used or are proceeding [7].The only difference is that such
incorrectly identifying information that information is stored digitally. As such the
indicates the use of AF practices or quality of such evidence remains a critical
applications, and are negatively impacting court factor as with any other case.
rulings based on the acceptance of digital The proliferation of electronic devices has
evidence meant that digital evidence can be relevant to
This research aims to establish to what extent any case and not just to computer crimes. By its
the use of AF by the subjects of DF very nature digital evidence is fragile. Incorrect
investigations has affected the ability of DF handling, examination or intentional destruction
practitioners to complete such investigations or modification can alter digital evidence to a
successfully in the South African context. In point where it is no longer usable. The greatest
this instance success is defined as the existence challenge to using digital evidence in court is
of digital evidence of sufficient probative value the fact that manipulation or alteration of the
to ensure the presentation of admissible evidence can be achieved very easily without
evidence in a court or other legal proceeding. leaving any manifest indication of such actions
[5]. Whilst digital evidence is valuable as a
The motivation for this research is the
source of evidence in any variety of
furtherance of the knowledge of AF practices,
investigations, it also introduces a new level of
techniques and applications for the benefit of
complexity that could potentially confound
practicing DF investigators and aims to provide
digital forensic investigators [3].
a basis for further research into this
phenomenon with a view to expanding the 2.2 Anti-forensics
academic knowledge in this area.
Anti-forensics (AF) in the digital realm is the
2 LITERATURE REVIEW process of removal or obfuscation of digital
forensic artefacts with the aim of invalidating
2.1 Digital Forensics and Digital Evidence
digital forensic investigations [8]. Typically,
Digital forensics as a discipline is aimed at one or more of the following strategies are
identification, collection and analysis of digital used: data hiding, data destruction, trail
evidence following at attack [5]. The goal is to obfuscation, data contraception, data
determine the identity of the attacker or suspect fabrication, file system attacks [9]. AF aim to
(who), their actions (what), when their actions remove all traces of a digital event, invalidate
were taken, how they perpetrated the attack or the data or increase the complexity of the
crime and their motivations (why), i.e. investigation, remove evidence of its own use,
monetary gain, revenge, harassment etc. or generally cast doubt on the investigation

ISBN: 978-1-941968-03-1 ©2014 SDIWC 8


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

[10]. The various AF methods are discussed Encryption


below in more detail.
Encryption is simply a process of protecting
Data hiding data by using an algorithm to scramble the data
and make it either intelligible or undetectable
Data hiding refers to the practice of storing data
unless a key is used to decrypt the data [14].
where it is likely not to be found, or employing
Encryption has been used since ancient times in
the method of security through obscurity [9].
one way or another to protect against the
Simple methods such as extension renaming or
interception of messages [15]. Encryption is
signature editing exist, but these are generally
used in many facets of digital data storage and
easily identified by the astute investigator. In
transmission. When seen in the context of AF
data communications, data hiding refers to the
data-hiding, encryption tools provide the user
art of adding an obscure message signal in a
who is attempting to thwart the efforts of the
host signal without any perceived distortion of
DF investigator with an extremely powerful
the host signal. This composite signal is
tool.
typically referred to as the ‘stego’ signal, and
follows a different communication scheme than Open-source Cryptography software is
normal data communications [11]. becoming more mainstream. Software such as
TrueCrypt even offers the ability to hide one
One of the simplest and most effective methods
encrypted volume within another. TrueCrypt is
of data hiding is Steganography. Whilst the
cross-platform encryption tool that uses the so-
practice of hidden writing has been around for
called ‘On the fly encryption (OTFE)’ to
millennia, the ability to hide any form of digital
encrypt and decrypt files as they are accessed
data within another carrier file poses a difficult
and makes all data within the encrypted area
challenge for digital forensic investigators [8].
available as soon as the decryption key is
In addition to its versatility to hide any data,
entered [16].
Steganography is also very hard to detect. The
only Open Source tool effectively detect data The most popular forms of data storage
hidden by modern steganography tools is encryption include the encryption of a virtual or
StegDetect by www.outguess.org [12]. physical disk or partition and system encryption
whereby the system (boot) files are encrypted.
Some steganography algorithms hide
Network traffic can also be quite easily
information in such a way that it is impossible
encrypted using standard protocols such as SSL
to recover such information without knowing
(secure sockets layer), SSH (Secure shell) or
the key to the algorithm. Whilst that may sound
TLS (transport layer security). Whilst these
like cryptography, it is accomplished
protocols were developed as security protocols
simultaneously with the cloaking of the
for legitimate protection of information
information in a masquerade file, and as such,
transmitted over either a public or private
is still steganography [13]. The most obvious
network, they can be used by an AF practitioner
difference between cryptography and
to transmit data securely.
steganography is that cryptography essentially
hides data by disguising it as completely Program packers
random data which is sometimes referred to as
Program packers such as Armadillo and UPX
random noise. Stenographic algorithms, on the
are used to encrypt and/or compress and attack
other hand, are generally not trivial to break,
program and then incorporate the file in a new
even if the examiner has learned that there is
‘packed’ file that is wrapped with a suitable
hidden data to be discovered, which is often not
extractor. When the seemingly innocuous
simple to achieve in the first place.
process is run the packed attack application is
then run simultaneously.

ISBN: 978-1-941968-03-1 ©2014 SDIWC 9


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

Hiding data in system areas not visible to the general computer user, such
data is easily recoverable using data recovery or
There are methods available to hide
forensic tools.
information in areas reserved as system space
or file slack (area between the end of the logical By using any one of a number of freely
file data and the end of the cluster). One such available data wiping tools (Including, Eraser,
tool is 'Slacker', by the Metasploit Project [17]. PGP etc.) the user is able to securely delete
Creators of this project claim that Slacker is the files by overwriting the clusters occupied by
first ever tool that allows you to hide files those files with random data, any number of
within the slack space of the NTFS file system. times, according to existing standards such as
In addition, custom attacks created using Guttmann (35 times) and DoD standard
software exploit frameworks such as the 5220.22-M (US DoD, 1995) (7 times) [10].
Metasploit framework are generally delivered Recovery of such securely deleted data is for all
using payloads created using tools such as intents and purposes impossible [8].
‘Msfpayload”, which allow the creator to create In addition to these tools, another suite of tools
custom file signatures that will not be detected exist that focus on securely removing artefacts
by forensic signature analysis. More advanced that pertain to activities of the user such as
tools such as ‘FragFS’ exist that have the internet history, file access, file downloads,
ability to store information in the NTFS file peer to peer networking, chat and so forth. A
system’s Master file table ($MFT file) [9]. good example of a tool such is this is CCleaner
Rootkits represent a particularly pernicious by Piriform which is available as a free
method of data hiding. Such programs allow download. Tools such as these perform a secure
attackers consistent and undetected delete of the artefacts mentioned above to
administrative access to a computer [18]. In this ensure that such remnants are not recoverable,
instance the attacker can affect multiple states post delete. Such tools can also quite easily be
on the infected computer such as executing configured so securely wipe all hard drive free
programs, logging keystrokes or even storing space, including slack space, either when
data. Rootkits are mostly installed on manually initiated by the user or at scheduled
computers through the binding of a malicious intervals.
program to a seemingly innocuous one. An In addition to data destruction by wiping or
example of this is where a user downloads an overwriting, there are also more drastic
MP3 or e-book from a file sharing site, and measures that cybercriminals sometimes revert
once the user runs the file they inadvertently to. These are degaussing the drive – sweeping
install the rootkit on their computer. To further the drive with a powerful magnet, thereby
confound the issue, many rootkits are self- rendering the data unstable – or the physical
healing, and will automatically reinstate destruction of the storage media.
themselves if deleted or uninstalled. An
example of this is the Computrace client that Trail obfuscation
consists of both an application agent and a Trail obfuscation follows three basic methods.
persistence module. The first has the aim of obscuring required
Data destruction information from the would-be investigator.
This is achieved by either replacing relevant
The destruction of data by wiping or shredding information with false information (such as IP
of files is a commonly used AF method which address spoofing) or using third parties to act as
has been around for a long time. For the proxies of the source data in order to remove all
cybercriminal the most perspicacious course of traces of the origin of the data from the
action is to simply remove all traces that resulting data at the destination (such as mail
anything untoward took place [19]. A simple anonymizers). The second form of obfuscation
delete essentially leaves the data intact. Though

ISBN: 978-1-941968-03-1 ©2014 SDIWC 10


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

involves altering the data associated to forensic Data fabrication


artefacts by altering metadata such as date and
This practice, also referred to as evidence
time stamps. Finally, trail obfuscation can also
counterfeiting, aligns very closely with some of
take the form of log deletion or modification in
the practices followed for trail obfuscation as
order to hide tell-tale log file entries that would
discussed in section 6.6 of this document. In
identify the identity or action of the perpetrator.
Windows the Modified, Accessed and Created
Securely wiping or modifying log files can be
dates are referred to as the MAC information.
achieved by using freely available tools such as
Modifying the MAC information on the
Touch [8].
computer serves both the purpose of
Data contraception obfuscating the original data and also
constitutes fabricated data [18]. Another
Data contraception, also referred to as evidence
practice that is employed in this scenario is the
source avoidance, is the process whereby the
creation of excessive amounts of data of a
perpetrator uses software and methods that
certain type in order to side-track and
have been designed to leave no traces on the
investigation to the point where cost-
host operating system where they are used. A
effectiveness becomes the deciding factor in the
number of different methods can be used [20]:
continuance of the investigation.
• Portable applications – applications that do
not install any files on the host computer File system attacks
(e.g. TrueCrypt and FTK imager lite). When an attack of sufficient severity is
• Live distros – fully functional operating launched on a file system it might inhibit the
systems from bootable devices such as ability of a forensic application to make sense
CD’s or Flash drives. As all functions run of the data contained therein. An example of
in memory no traces are left on the local such sabotage would be to damage the master
hard drive, as the local hard drive is in fact file table of an NTFS file system to such an
not even required (e.g. Windows CE or extent that a forensic analysis of the logical
BartPE) [18]. drive is unable to extrude any meaningful data.

• Syscall proxying – A local system call or 2.3 Trace Evidence of Anti-forensic Tool Use
function is proxied to another system to As with any other computer application, the
complete. actual use of an AF tool to remove forensic
• Remote library injection – Information artefacts will in itself leave trace evidence.
(typically a Dynamic Link Library) is Steganography is probably one of the most
inserted directly in RAM of the host leaving difficult methods of data hiding to detect and
no traces on the hard drive. decipher and steganography combines the art of
• DKOM (Direct Kernel Manipulation) – The hiding data that is not visible to human
process whereby the memory space utilized perception and cryptography [9]. The DF
by kernel objects are penetrated and used practitioner must therefore first develop the
by other inserted processes. knowledge or suspicion that steganographic
data hiding is present in any given case, and
• Utilizing ‘in-private’ browsing on web then the practitioner has to establish which files
browsers such as Mozilla Firefox will keep out of all data that falls within the scope of the
all cache and history in RAM and will not investigation could be affected. As there could
write any information to disk for later potentially be hundreds of thousands of files on
analysis. a suspect computer this is often difficult. In this
instance the detection of files affected by
Steganography will often depend on the
intuition and experience of the DF examiner. In

ISBN: 978-1-941968-03-1 ©2014 SDIWC 11


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

the event that Steganography is suspected and When using a tool such as slacker to hide
the DF practitioner has identified files to target, information in system areas, the forensic
the practitioner may use methods similar to the investigator will likely have no specific
one below to confirm the presence of indication that such an indication has occurred
steganography and to attempt to decipher the as the only change to the file assigned to
contents. legitimately occupy that sector, will be a
change in the ‘date modified’ field. An AF
Encryption is often quite obvious to detect. An
practitioner who is thorough in their attempt at
example of this may be where a DF practitioner
data hiding will then quite simply use another
has attempted to image a suspect computer and
tool such as ‘Timestomp’ to change that
is not able to access any of the data on the drive
metadata attribute back to a value that would
due to full disk encryption. In such examples
not arouse suspicion [21]. The data written to
the DF practitioner will not be able to access
the slack area is not encrypted, but the metadata
any of the data on the suspect drive unless such
of the files written into slack space is
a password is provided, and it is often more
encrypted. This is intended to complicate
practical to attempt to extract the password
efforts to locate a list of files created using
from the suspect using legal means than it
Slacker by doing metadata analysis. The most
would be to use technology. Other forms of
likely indication of the use of slacker will be
encryption may not be as easy to detect, such as
the discovery of the Slacker executable on the
a virtual encrypted disk. In this instance the DF
suspect drive or in the event of volatile memory
practitioner will have to rely on other methods
analysis or virtual memory analysis, a keyword
of detection such as identifying suspiciously
search may indicate that the program had been
large files and files with an unknown or no file
loaded into memory. In the absence of such
signature. However, even in the event of
trace evidence the DF practitioner may still find
detecting an encrypted volume, the challenge of
information relating to the case in slack space
decrypting such a volume still remains. Without
by making use of a simple keyword search.
the passkey required to decrypt and mount such
Whilst this information may relate to the case,
a volume it is near on impossible to decrypt the
it will not provide any proof that a product such
information contained therein [15]. Attempting
as Slacker was used to place it there.
to break the password to the volume using any
number of traditional methods such as brute Most anti-virus software claims to be able to
force attacks, dictionary attacks or rainbow detect rootkits. The reality is unfortunately that
tables may take years to achieve [18]. In this most Anti-virus software may stop a computer
instance the most viable option is often to from being infected with new rootkits, but
attack the human factor. Encrypted volumes are established rootkits will often remain
often not breakable in the traditional sense for undetected [9]. This is not to say that the DF
any practical purposes and will require a practitioner need not run an AntiVirus scan on
password. the acquired forensic image, as this remains an
available tool for detecting rootkits and viruses
Most forensic software will detect signatures of
and can be useful in the event that the suspect
commercial file packers. The astute forensic
decides to pursue a ‘Trojan- defence’. When
investigator should also be aware that such file
assessing the ability to detect rootkits from a
packers typically have file signatures that can
forensic analysis perspective, it is important to
be searched for manually. An example of the
look at two basic modes of forensic operation.
UPX file packer a manual keyword search can
These are live incident response i.e. volatile and
be completed for the search term ‘UPX’, which
non-volatile data analysis on a live computer,
will identify executable files that have been
and dead’ forensics, the analysis of static
packed using this packer.
system data

ISBN: 978-1-941968-03-1 ©2014 SDIWC 12


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

Data destruction is often time consuming and itself leave trace evidence.
very often the applications used do not destroy  How prevalent is AF tool use in the South
all data, as advertised. In addition to these African environment? This research will
factors there will very often be indications that attempt to establish the prevalence of AF
data destruction applications have been used on tool use as experienced by South African
a computer. A detailed discussion can be found DF practitioners.
in [22].
3.2 Research Methodology and Proposed
Finally, commonly used trail obfuscation tools Model
often leave certain artefacts behind e.g. by
A positivistic research philosophy was adopted
changing time/date stamps in only one system
for this research. A cross-sectional time-
area but not others.
horizon is used, as the study will aim to
3 RESEARCH METHODOLOGY understand the status of the problem at a point
in time. This research will assume a deductive
3.1 Research Question and Hypotheses
approach. To that end, a research model was
The core research question is whether the use of developed as per figure 1.
AF is affecting the ability of South African DF Figure 1. Proposed research model
practitioners to complete DF investigations?
Some of the constructs warrant further
To answer the main research question the explanation. Under the Individual
research will endeavour to find answers to the Characteristics, “DF” refers the Digital
sub-questions listed below: Forensics exposure and capabilities, including
 What AF tools are being used, and how DF experience, formal DF training, any
they are being used? Specific applications qualifications obtained and the industry
are designed and released to the public with environment in which they are deployed (DF
the single purpose of removing or hiding vertical: civil, criminal or corporate
DF artefacts. As with any application the environment). The AF abilities refer to specific
way in which such tools are used will result Anti-Forensic tool and method abilities. The
in varying degrees of success of their value of AF artefacts refers to the knowledge of
intended purpose. This research will and ability to identify AF artefacts (i.e.
identify which of the available AF tools are evidence left behind by AF tools) including the
being used and for what purpose. knowledge of artefacts left behind by AF tools
 Are South African DF practitioners able to and techniques, the ability to identify AF tools
identify AF tool use by the artefacts that by their artefacts and knowledge of the
such tools leave behind? As with any other evidentiary value of the artefacts left by AF
computer application, the actual use of an use.
AF tool to remove forensic artefacts, will in The impact of AF is measured by evidence
recovery (the DF practitioner’s ability to
recover useable evidence), evidence
presentation (the DF practitioner’s ability to
present evidence of probative value) and
acquittals (where AF leads to acquittals). The
Impact of AF as part of all evidence refers to
the impact AF has on electronic evidence when
seen as part of the entire case and all other
types of evidence presented and convictions
refers to the impact of AF on convictions when
seen as part of the entire case and all other
types of evidence presented.

ISBN: 978-1-941968-03-1 ©2014 SDIWC 13


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

The model as such could not be tested 4 DATA ANALYSIS


statistically, since testing the multiple
4.1 Demographic Profile of Respondents:
relationship simultaneously would require a
sample size far exceeding the number of digital The greatest majority (85.7%) of respondents
forensics practitioner community in South were male and most fall in the 31-40 years age
Africa. Instead, the model served as a guide for range. These sample characteristics are fairly
the development of constructs to include in the representative of the DF practitioner
questionnaire, generating descriptive statistics community in South Africa.
and doing limited inferential statistical tests Figure 2. Age distribution of respondents
such as construct correlations and ANOVA.
Most DF practitioners were practicing although
3.3 Research Instrument and Sampling nine respondents (25.7%) indicated that they
Approach were not practicing DF investigators. Six of
Collection of data was by means of a survey to these non-practicing AF investigators (67%) are
assess the state of events as experienced by DF in the corporate environment. It is possible that
practitioners. A mostly original survey the 9 (25.7%) survey participants have
instrument was created. Due to the large branched into other areas of their organization,
number of constructs, usually only one question some even into managerial positions. The
(test item) was formulated for each of the reason for these respondents completing the
constructs. survey is unknown.

South African DF practitioners were targeted to A wide spread of experience in DF was borne
ensure inclusion of practitioners that operate in out by the respondents. In line with the
criminal, civil, and corporate environments.
The aim was to include practitioners that deal
with evidence in traditional, mobile and internet
/ e-commerce forensics. Thus a probability-
sample using the stratified random-sampling
technique was used in order to identify forensic
practitioners functioning across the strata. A
limitation is the relatively small size of the
South African DF fraternity. One of the
researchers has access to a great portion of the
current South African DF fraternity through
previous interactions, and we consequentially stratified random-sampling method a
feel that we managed to cover most of the DF satisfactory spread of employment sectors was
community. achieved.
No individuals were interviewed, no personal Figures 3a & 3b. Experience, employment sector of
information was gathered about any DF respondents.
practitioners or their places of employment and
this research abided by the research ethics
guidelines set out by our academic institution.

ISBN: 978-1-941968-03-1 ©2014 SDIWC 14


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

Whilst all but two respondents (94.3%) was lower.


indicated that they had received formal DF Figures 5a & 5b. Knowledge of AF tools and techniques
training, only 57.1% of respondents followed and prior exposure to AF
such training up with a qualification. However,
Very few respondents rate their prior exposure
on the other hand, 77% of them had a tertiary
to AF as excellent
4.2 Interesting Correlations between
Independent Variables
Possible correlations between demographic
variables and other independent variables were
investigated. For instead, there was a
significant difference between the sectors in
which an FP was employed and their
investigation environments. FPs employed in
the law-enforcement and private sectors tend to
investigate computer/networks, internet/e-
qualification. commerce whereas those in corporate
Figure 4. DF qualifications environments tend to limit their investigations
mainly to computer/network forensics and, to a
More than half (54%) of respondents claim to lesser extent, internet/e-commerce (Chi-square
have had training in AF techniques and tools. χ2 value=7.79, DF=2, p-value = 0.0203).
The same respondents who have completed AF
training have also tested AF tools and However, there was no statistical evidence to
techniques. Most respondents rate their suggest that a difference exists between the
knowledge of AF tools and techniques as knowledge, qualifications and training in Anti-
average to good but their prior exposure to AF Forensic investigations between the 3
employment sectors, or that they were exposed
to different types of AF threats. However, no
surprisingly, there is a statistically significant
correlation between completed AF tools
training and a respondent’s own rating of
knowledge of anti-forensics tools and
techniques (χ2 value=8.241, DF=1, p-
value=0.0041). In fact, respondents with AF
tools Training completed are 8.4 times more
likely to rate their knowledge of AF tools and
techniques as “Good/Excellent”.
Formal Forensics training, Digital Forensics
Qualification and Tertiary Qualification has no
association (or relationship) with respondent’s
prior exposure to AF. However, specific AF
training” has an association (or relationship)
with prior exposure to AF (χ2 value=4.61,
DF=1, p-value=0.0318) and persons with AF
training are 4 times more likely to rate their
prior exposure to AF as GOOD. Even more so,
“specific AF tools testing” has an association
with prior exposure to AF (χ2 value=12.61,

ISBN: 978-1-941968-03-1 ©2014 SDIWC 15


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

DF=1, p-value=0.0004) with those who have


Familiarity with Anti-Forensic tools
completed AF tools testing are 18.7 times more
likely to have GOOD prior AF exposure. This The complete A-Z of open
1 34
shows that generic formal digital forensics source tools out there
training is deficient in imparting AF-specific Transmogrify (by Metasploit) 3 32
skills or knowledge. This should be remedied
Rootkits 4 31
by addressing the curricula of (generic)
forensics training courses. Timestomp (by Metasploit) 10 25
On the whole, respondents seem to be familiar Steganography tools
(Quickstego etc.)
14 21
with the more common AF techniques i.e. data
Encryption tools (Truecrypt
hiding and data destruction. The twelve (34%) etc.)
27 8
respondents that rate their prior AF exposure as Data wiping and history
“poor” have hardly any familiarity with the AF removal (CCleaner, Eraser etc.)
28 7

techniques of data contraception, trail 0% 20% 40% 60% 80% 100%


obfuscation, data fabrication and file system
attacks, although half of them were exposed to Yes No
data hiding and data destruction, respectively.
These respondents are familiar with an average Figure 7. Familiarity with AF tools (all respondents)
of only 1.2 AF techniques whereas respondents
However, there is no relationship (association)
who rate their prior exposure as average to
between respondent’s rating of the probative
excellent have an exposure to an average of 2.9
value of artefacts that AF tools leave behind,
techniques.
and their familiarity with AF tools. (Chi-Square
tests performed). Neither is there a relationship
(association) between respondent’s rating of
their efforts to actively identify anti-forensics
as part of investigations, and their familiarity
with AF tools. (Chi-Square tests performed)
The following graph summarizes respondent’s
view of AF techniques that most affected their
cases. The more common techniques appear to
be more prevalent, however respondents
previously indicated that they are less familiar
with the more complex techniques such as data
contraception, which may indicate that such
Figure 6. Familiarity with AF techniques (all techniques are not identified.
respondents)
As with AF techniques, most respondents
appear to be familiar with the more commonly
known AF tools such as data wiping and
encryption.

ISBN: 978-1-941968-03-1 ©2014 SDIWC 16


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

The items were subjected to a reliability


analysis to determine the internal consistency
between items to measure a single construct.
The overall Cronbach Alpha was 0.825 which
is considered a very good reliability. A mean
score of approximate 2.8 for this construct was
achieved
The influence of the biographic profile of
respondents, employment sector, type of
forensic investigation participation, education
and training level was tested using ANOVA. In
the absence of normality, a non-parametric test
Figure 8. AF Techniques that most affect investigations (Mann-Witney U test for 2 groups and Kruskal-
Wallis for more than 2 groups) was performed.
As with the AF techniques, respondents feel If the variances of the scores of the groups are
that the more common AF tools are most unequal, the result of the Welch test is reported.
prevalent during their investigations. Data
destruction and Data-hiding are the most The male respondents rate themselves
prevalent AF techniques that respondents significantly more highly in AF ability than
experience. Data contraception, Trail their female counterparts (Welch test p =
obfuscation, System file attacks and data 0.0361). The age groups 31-40 and 41-50 years
fabrication are the least AF experienced AF also rated themselves significantly higher than
techniques. the two other (smaller) age groups i.e. those
younger than 31 or above 50 years old (Welch
test p = 0.0088).
Respondents who are practicing digital forensic
investigators rate themselves significantly
higher than those who are currently not
practicing (Welch test p = 0.0385). Finally,
respondents with more than 2 years of
experience rate their AF abilities higher than
the group with 2 or less years’ experience (p =

Impact of Anti-Forensics
During your investigations, anti-
forensics has an effect on the
ability to recover evidence.
Anti-forensics has impacted your
Figure 9. AF tools most prevalent in investigations ability to present usable
evidence in a case
4.3 Respondents Rating of Their AF Abilities
Anti-forensics regularly impacts
Respondents were asked to rate their own Anti- your ability to present usable
evidence in a case
Forensics abilities by means of three questions:
their own knowledge of AF, their prior
exposure to AF and their ability to counteract
the use of AF tools. The 3 items were
considered as a single construct as they
logically represent respondent’s abilities to Anti-forensics has no marked
investigate AF. effect on case outcomes as
electronic evidence is only a…

0% 20% 40% 60% 80% 100%


Strongly agree Agree
ISBN: 978-1-941968-03-1 ©2014 SDIWC Not sure Disagree 17
Strongly Disagree
The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

0.0355) test items (Cronbach Alpha of the resulting


construct was 0.8433) and the Impact of AF.
However, there was no significant correlation
between the AF ability of the respondent and: The influence of: Biographic profile of
the sector in which employed, the type of respondents, Employment sector, Type of
forensic participation or the respondent’s forensic investigation participation, Education
training and education level. and training level, Knowledge of AF tools and
techniques(own rating), Prior exposure to
4.4 The Impact of Anti-Forensics upon
AF(own rating), Familiarity with various AF
Investigations techniques, Exposure to various AF Tools upon
Figure 10 summarizes the responses for the the constructs (Impact of AF and Effect of AF
questions related to the impact of AF on upon evidence) was investigated using Analysis
investigations. of Variance (ANOVA) since the mean scores
Figure 10. Impact of Anti-Forensics
derived from the Likert scale statements can be
viewed as continuous variables and their
Factor analysis was performed on the above test distributions were found to be roughly normally
items to see if the five statements can be distributed. However, only one factor was
summarized into meaningful constructs. This found to exert a significant influence and that
was done using Principal Component extraction was one particular type of forensic participation
and Varimax (orthogonal) rotation techniques. that significantly influences the mean score of
Table 1. Construct creation after factor analysis. Impact of AF, namely mobile device
Test Item (Question) Factor Factor investigation (χ2 statistic=4.26, DF=1, p-value
1 2 =0.039). It is possible that this is an artefact of
During your investigations, anti- the data or small sample size.
forensics has an effect on the ability to 0.9132 0.0582
recover evidence. 5 DISCUSSION AND CONCLUSION
Anti-forensics has impacted your The main purpose of this research was to
ability to present usable evidence in a 0.8727 0.2216
case
establish the impact of AF on DF investigations
In your environment anti-forensics has
in a South African context.
directly led to acquittals due to 0.7331 0.3592 Contextual factors and individual
unavailability of evidence characteristics did not exert a significant
Anti-forensics regularly impacts your influence of respondent’s rating of their
ability to present usable evidence in a 0.5583 0.5489
case knowledge of AF tools and techniques. More
Convictions for your cases are
surprisingly, neither the respondent’s
generally not affected by AF tool use, familiarity with the various AF tools and
0.3488 0.6433
as there is always some usable digital techniques nor their exposure to AF appeared to
evidence. affect score for Effect of AF upon evidence or
Anti-forensics has no marked effect on their score for impact of AF.
case outcomes as electronic evidence is
0.0301 0.9433 Perhaps contradictorily, although DF
only a portion of the evidence
presented to court or legal proceeding. practitioners rate the value of AF artefacts
The factor analysis yielded 2 underlying highly, they don’t make an effort to identify
constructs (factor loadings > 0.4), although them as part of their investigations, as can be
item 4 (“Anti-forensics regularly impacts your seen in table 2 below.
ability to present usable evidence in a case”) is Table 2. Probative value of AF artefacts and relative
ambiguous as it loads strongly upon both effort used to identify AF.
factors. Rating of probative value of artefacts
that AF tools leave behind N
Two new constructs were created: the Effect of
Critically valuable 6
AF on evidence, which was composed of four
Very valuable 12

ISBN: 978-1-941968-03-1 ©2014 SDIWC 18


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

Valuable 14 investigations, due to the low value placed on


Moderately valuable 2 AF artefacts leaves a potential gap for usable
Useless 1 evidence of probative value to be overlooked,
Rating of efforts to actively identify as the AF technique or tool used to destroy or
anti-forensics as part of misrepresent that evidence is not identified.
investigations N
Always 4 The main contributions of this paper to the
Often 12 body of academic knowledge is the application
Sometimes 13 of a model-driven empirical investigation as
Rarely 4 well as a number of findings which partly
Never 2 collaborate and partly extend current
knowledge. For the practitioner community, it
is clear that additional effort and resources must
The concern is that investigators who do not
be deployed to inform and educate practitioners
place a high value on AF artefacts and do not
about common anti-forensic tools and activities.
employ significant efforts to identify AF as part
of their investigations could potentially be Apart from further empirical research to
overlooking evidence of AF use, or indeed the establish comparative baselines in other
opportunity to recover usable evidence. countries or, longitudinally, one or two years
into the future, we also strongly recommend
Whilst the current research attempted to
additional in-depth research into the advanced
understand the impact of Anti-forensics on
AF techniques and tools to establish the actual
evidence, a troubling trend emerged as part of
effect of these advanced techniques on
this research. Whilst most respondents (89.9%)
investigations.
list their knowledge of AF tools and techniques
as average to good, it appears that that exposure 6 REFERENCES
is limited to certain types of AF tools and [1] R. Harris, “Arriving at an anti-forensics consensus:
techniques. From the findings, it is clear that Examining how to define and control the anti-
investigators are quite familiar with the more forensics problem,” Digital Investigation, 2006,
common AF techniques such as data hiding and 3(Supplement 1), pp. 44-49.
data destruction, but much less familiar with [2] M. Pollitt, “Applying traditional forensic taxonomy
the more complex techniques such as data to digital forensics” in Advances in Digital
Forensics IV (pp. 17-26), New York: Springer,
contraception amongst others. Correspondingly, 2008.
respondents were much more familiar with the
[3] E. Casey, Handbook of digital forensics and
tools related to data wiping and encryption than investigation (Non Trans.), San Diego, California:
they are with the more complex tools such as Elsevier, 2010.
steganography, rootkits and data contraception. [4] Verizon, “Data breach investigations report”,
This trend is also supported by the finding that Retrieved 05/14, 2012, from
most respondents feel that their cases are http://www.verizonbusiness.com/resources/reports/r
affected mainly by the more common AF p_data-breachinvestigations-report-2012_en_xg.pdf
techniques such as data destruction and data [5] E. Casey, Digital evidence and computer crime.
Burlington: Elsevier, 2004.
hiding.
[6] K.M. Hess, Criminal investigation (9th ed.). New
The risk is that DF investigators are not York: Delmar, Cengage Learning, 2009.
properly versed in the more complex [7] B. Carrier, File system forensic analysis. Addison
techniques and tools, and as such does not have Wesley Professional, 2005.
the skills to identify the use of such tools and [8] G.C. Kessler, “Anti-forensics and the digital
may be ignorant to their presence and effect on investigator,” paper presented at the Proceedings of
the 5th Australian Digital Forensics Conference,
the cases that they participate in. This
2007, 1(1) 5. Retrieved from
combined with the results that show a lack of http://scissec.scis.ecu.edu.au/proceedings/2007/fore
active identification of AF as part of nsics/00_Forensics2007_Complete_Proceedings.pdf

ISBN: 978-1-941968-03-1 ©2014 SDIWC 19


The Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014

[9] B. Blunden, The rootkit arsenal escape and evasion


is the dark corners of the system, Wordware
Publishing, 2009.
[10] D. Forte, “Dealing with forensic software
vulnerabilities: Is anti-forensics a real danger?”
Network Security, 2008(12), 18.
[11] H. Sencar, M. Rankukar, & A. Akansu, Data hiding
fundamentals and applications. San Diego,
California: Elsevier, 2005.
[12] A. Philipp, D. Cowen, D., & C. Davis, C., Hacking
exposed computer forensics, second edition:
Computer forensics secrets & solutions (Second
Ed.) New York: McGraw-Hill Osborne Media,
2009.
[13] P. Wayner, Disappearing cryptography, second
edition: Information hiding: Steganography &
watermarking. The Morgan Kaufmann series in
software engineering and programming, New York:
Morgan Kaufman, 2003.
[14] J. Pan, H. Huang, L. Jain, & W. Fang, Intelligent
multimedia data hiding. New York: Springer, 2007.
[15] H/ Nemadi, & L. Yang, Applied cryptography for
cybersecurity and defense: Information encryption
and cyphering. Hershey, PA: Information Science
Reference, 2011.
[16] L. Roy, “Lockdown: Secure your files with
TrueCrypt”, Makeuseof.com.
[17] D.O. Kennedy, J. Gorman, & M. Aharoni,
Metasploit: The penetration tester's guide. No Starch
Press, 2011.
[18] D. Behr, “Anti-forensics – what it is what it does
what you need to know,” New Jersey Lawyer
Magazine, 2008, 255, 4-5.
[19] D. Forte, & R. Power, “A tour through the realm of
anti-forensics,” Computer Fraud & Security,
2007(6), 18-20.
[20] M. Kedziora, “Anti-forensics overview,” retrieved
16/02, 2011, from http://www.forensics-
research.com
[21] D. Maynor, Metasploit Toolkit for Penetration
Testing, Exploit Development, and Vulnerability
Research, San Diego, California: Elsevier, 2011.
[22] M. Geiger, “Counter-forensic tools: Analysis and
data recovery,” 18th Annual FIRST Conference,
Maltimore, Maryland, 25-30 June 2006.

ISBN: 978-1-941968-03-1 ©2014 SDIWC 20


View publication stats

Potrebbero piacerti anche