Anti-Forensics: A Practitioner Perspective: Keywords
Anti-Forensics: A Practitioner Perspective: Keywords
Anti-Forensics: A Practitioner Perspective: Keywords
The Society of Digital Information and Wireless Communications, 2015 (ISSN: 2305-0012)
ABSTRACT
With the increase in cybercrime, digital evidence is
becoming an integral part of the judicial system.
Digital evidence is to be found everywhere from
computers, to mobile phones, ATMs and
surveillance cameras, and it is hard to imagine a
crime that does not contain any element of digital
evidence. It is however not simple to extract such
evidence and present it to court in such a way that
there is no uncertainty that it was not changed in
any way. Thus the responsibility placed on a Digital
Forensics (DF) practitioner to present usable
evidence to a court is increasing fast. In some
respects, however, it is relatively easy to get rid of
digital evidence or to hide it. Many tools exist for
cybercrime criminals to prevent DF practitioners
from getting their hands on information of probative
value. Such tools and methods known as AntiForensics (AF).
The purpose of this study is to identify the abilities
of DF practitioners to identify the use of AF in their
active investigations. The research model used,
attempts to identify all the factors and constructs of
AF that impacts on investigations. This model was
then used to develop a survey instrument to gather
empirical data from South African DFs.
The research has shown that whilst South African
DF practitioners perceive DF as having an impact
on their investigations, they also perceive electronic
evidence as forming only part of the evidence
presented to court, and that even if most of the
usable evidence of lost, some will generally remain.
It was also found that while most DF practitioners
in South Africa are well versed only in the more
commonly known AF techniques. They do not rate
their abilities on more complex techniques well.
Finally, most DF practitioners appear not to actively
attempt to identify AF techniques as part of their
investigations. This combined with a lack of
understanding of more complex AF techniques
could leave South African DF practitioners exposed
KEYWORDS
Digital forensics; anti-forensic tools; anti-forensic
methods; digital forensic evidence; South Africa.
1 INTRODUCTION
Forensics as a scientific discipline is the
process whereby science is used to investigate
artefacts or transfer of evidence and interpret its
relevance to an investigation [1]. The goal of
the DF practitioner is the collection and
analysis of digital evidence with a view towards
presenting such evidence in a court of law or
other legal proceeding. Key to the success of
this process is the probative value of the
collected evidence [2].
Anti-forensics (AF) involves the use of
methods specifically designed prevent the use
of scientific methods and tools to collect and
analyse forensic artefacts for use in court
proceedings. This is mainly aimed at the
destruction or hiding of evidence. (Harris,
2006).
Due to the ever-increasing frequency of AF tool
use, greater vigilance by DF investigators will
be required to ensure the integrity of
investigative results [3]. The use of antiforensics is a difficult issue to overcome and
digital forensics investigators can expect these
techniques and tools to become much more
sophisticated and also more widespread as
suspects become more aware of the techniques
and tools used by digital forensic investigators.
It appears that this is a growing problem and
that investigators will have to ascertain that
they stay informed about the latest anti-forensic
techniques and countermeasures.
390
Encryption
Encryption is simply a process of protecting
data by using an algorithm to scramble the data
and make it either intelligible or undetectable
unless a key is used to decrypt the data [14].
Encryption has been used since ancient times in
one way or another to protect against the
interception of messages [15]. Encryption is
used in many facets of digital data storage and
transmission. When seen in the context of AF
data-hiding, encryption tools provides the user,
who are attempting to thwart the efforts of the
DF investigator, with an extremely powerful
tool.
Open-source encryption software is becoming
more mainstream. Software such as TrueCrypt
even offers the ability to hide one encrypted
volume within another. TrueCrypt is a crossplatform encryption tool that uses On the fly
encryption (OTFE) to encrypt and decrypt files
as they are accessed, and makes all data within
the encrypted area available as soon as the
decryption key is entered [16].
The most popular forms of data storage
encryption include the encryption of a virtual or
physical disk or partition and system encryption
whereby the system (boot) files are encrypted.
Network traffic can also be quite easily
encrypted using standard protocols such as SSL
(secure sockets layer), SSH (Secure shell) or
TLS (transport layer security). Whilst these
protocols were developed as security protocols
for the legitimate protection of information
transmitted over either a public or private
network, they can be used by criminals to
transmit data securely.
Program packers
Program packers such as Armadillo and UPX
are used to encrypt and/or compress an attack
program and then incorporate the file in a new
packed file that is wrapped with a suitable
extractor. When the seemingly innocuous
process is run the packed attack application is
then run simultaneously.
392
Data fabrication
This practice, also referred to as evidence
counterfeiting, is very similar to some of the
practices followed for trail obfuscation as
discussed elsewhere in this document. In
Windows, the Modified, Accessed and Created
dates are referred to as the MAC information.
Data contraception
395
397
Table 1. DF qualifications
Education and training level
Do you have a Digital
forensics qualification?
(EnCe, ACE etc.)
Do you have a tertiary
qualification?
Have you completed any
Anti-forensic tool testing?
Have you had any Antiforensics training?
Have you had any formal
digital forensics training?
Yes
%(Yes) No
%(No)
3 33.33%
6 66.67%
8 88.89%
1 11.11%
2 22.22%
7 77.78%
5 55.56%
4 44.44%
8 88.89%
1 11.11%
Excellent
5.7%
Good
42.9%
Average
37.1%
Poor
11.4%
None
2.9%
Poor
34.3%
Average
28.6%
Good
28.6%
Excellent
8.6%
Figure 4. Experience.
398
%Yes
Data Hiding
28.6%
71.4%
Data destruction
31.4%
68.6%
Trail obfuscation
68.6%
31.4%
Data fabrication
77.1%
22.9%
77.1%
22.9%
Data contraception
85.7%
14.3%
88.6%
11.4%
No
%No
Yes
%Yes
20.0%
28
80.0%
Encryption tools
(Truecrypt etc.)
22.9%
27
77.1%
Steganography tools
(Quickstego etc.)
21
60.0%
14
40.0%
Timestomp (by
Metasploit)
25
71.4%
10
28.6%
Rootkits
31
88.6%
11.4%
Transmogrify (by
Metasploit)
32
91.4%
8.6%
34
97.1%
2.9%
Factor
1
Factor
2
0.9132
0.0582
0.8727
0.2216
0.7331
0.3592
0.5583
0.5489
0.3488
0.6433
0.0301
0.9433
Mean
2.61
12
2.44
14
3.02
4.33
Useless
Mean
Always
2.91
Critically valuable
Very valuable
Valuable
Moderately valuable
Often
12
2.38
Sometimes
13
2.97
Rarely
3.16
Never
4.16
403