Computer Forensics - Past Present Future
Computer Forensics - Past Present Future
This paper is the property of Ewa Huebner, Derek Bem and Oscar Bem. Copyright and other intellectual
property laws protect it. Reproduction or retransmission of the paper, in whole or in part, in any manner,
without the prior written consent of the copyright holder, is a violation of copyright law.
The information in the paper is provided in good faith without any express or implied warranty. No guarantee
is provided or should be inferred as to the accuracy or currency of the information in the paper. No
responsibility is accepted for any loss or damage occasioned by use of the information contained in the paper.
A single copy of the paper may be made, solely for personal, noncommercial use. Individuals must preserve
this copyright note. Contact information for requests for permission to reproduce or distribute the paper are
listed below.
Abstract
In this paper we examine the emergence and evolution of computer crime and computer
forensics, as well as the crisis computer forensics is now facing. We propose new directions
and approaches which better reflect the current objective of this discipline. We further
discuss important challenges that this discipline will be facing in the near future, and we
propose an approach more suitable to prepare for these challenges. We focus on the
technical aspects, while at the same time providing insights which we believe would be
helpful for the legal profession to better understand the unique issues related to computer
forensic evidence when presented in the court of law.
Keywords: computer forensics, computer crime, electronic evidence
1. Introduction
In this paper we present a brief overview of the historical emergence of computer crime,
and propose its classification into three areas: activity targeting computer systems,
computer assisted crime, and incidental computer crime. We also discuss how computer
forensics emerged as a new discipline, what it has achieved in the first thirty or so years of
its existence, and what challenges it is facing in the near future. New directions and
approaches are proposed which better reflect the objectives of computer forensics today.
We believe that the content may be useful for the legal profession, which lacks literature
explaining computer forensics without excessive amount of technical terms and references.
Other target readers for this paper are business professionals, computer forensic analysts
and examiners, law enforcement personnel, system administrators and managers, and
anyone involved in computer security.
It should be noted that this paper describes international issues. References to case law
and statute law in different countries are an integral part of the paper, and should be seen as
illustrative examples only. We endeavoured to balance the discussion and used, where
appropriate, examples from the USA, Australia, and Europe, while at the same time not
limiting the analysis of issues to any specific country. When quoting, the original spelling
is retained, while Australian spelling is used in the remaining parts of the paper.
4
5
See, eg, 'Concepts and terms' (2005) High Tech Crime Brief
<www.aic.gov.au/publications/htcb/htcb001.pdf> at 12 August 2006.
See Terrell Bynum, 'Computer Ethics: Basic Concepts and Historical Overview' (Winter 2001)
Stanford Encyclopedia of Philosophy <http://plato.stanford.edu/archives/win2001/entries/ethicscomputer/> at 12 January 2007.
Michael P. Dierks, 'Computer Network Abuse' (1993) Volume 6 Number 2 Harvard Journal of Law &
Technology.
Lawrence A. Gordon et al, '2006 CSI/FBI Computer Crime and Security Survey' (2006)
2006 Australian Computer Crime and Security Survey (2006).
In the 1970s and 1980s relatively inexpensive personal computers became common, and
individuals and businesses began to use them on a regular basis; subsequently law
enforcement agencies noticed the emergence of a new class of crime: computer related
crime.6 The emergence of computer forensics was largely in response to a demand for
service from the law. By the 1990s law enforcement agencies in every technologically
advanced country were aware of computer crime, and had a system in place to investigate
and to prosecute such activities. Many research centres and scientific groups were also
formed, and the software industry started to offer various specialized tools to help in
investigating computer crime.7
For the sake of clarity and to assist in the understanding of computer crime we propose the
following classification:
This classification, like many others, should be seen only as an aid to understand the area it
is describing. One can imagine a scenario where certain criminal activities may span more
than one area, or are difficult to classify as fitting into any of the three areas just described.
Computer crime led directly to attempts to combat it. In the early days various tools or tests
were used by courts to help determine the scientific merits of the evidence presented. In
1993 a legal precedent was set by the U.S. Supreme Court regarding the admissibility of
expert witnesses' testimony, which came to be known as the Daubert test, the Daubert
standard, or just Daubert.8 The Daubert test largely replaced previously used standards
(Frye, Federal Rules of Evidence9). In the Daubert ruling the U.S. Supreme Court
suggested four criteria for determining whether science was reliable and, therefore,
admissible:10
6
9
10
In the case of a particular technique, does it have a known error rate and standards
controlling its operation?
In short, Daubert helps to decide what is good science and what is bad science.
However, when dealing with complex technical issues it can only be seen as a general
guide. Thus while it helps to assess the suitability of computer forensic evidence, it still
leaves many questions unanswered.
11
12
13
14
15
Saferstein, above n 9.
Barry A.J. Fisher, Techniques of Crime Scene Investigation (7 ed, 2003).
See one of the first Australian sources which defines computer forensics: Rodney McKemmish, 'What
is Forensic Computing?' (Australian Institute of Criminology, 1999).
Digital Forensic Research Workshop (DFRWS) <http://www.dfrws.org/ > at 22 April 2005.
Carrie Morgan Whitcombe, 'An Historical Perspective of Digital Evidence: A Forensic Scientist's
View' (Spring 2002) Volume 1(Issue 1) International Journal of Digital Evidence.
commonly accepted, and often used in a broader sense in relation to devices which are,
strictly speaking, not computers.
In 1999 Farmer and Venema16 defined computer forensics as the process of:
"gathering and analysing data in a manner as free from distortion or bias as
possible to reconstruct data or what has happened in the past on a system"
To comply with conventional investigative methods they also suggested a series of stages a
computer forensics investigator should follow:17
Secure and isolate.
Record the scene.
Conduct a systematic search for evidence.
Collect and package evidence.
Maintain chain of custody.
While the above set is quite accurate and logical, depending on the specific focus some of
the points could perhaps be expanded further.
Another more computer specific definition of computer forensics was offered in 199918 by
the Australian Institute of Criminology:
the process of identifying, preserving, analysing and presenting digital evidence in
a manner that is legally acceptable
The same guide also defines four key elements of this process:
Identification.
Preservation.
Analysis.
Presentation.
The guide also recommends that this process should comply with a series of basic rules:
Minimal handling of the original.
Account for any change.
Comply with the rules of evidence.
Do not exceed your knowledge.
Subsequently various researchers offered similar, often more detailed descriptions of the
computer forensics process. For example Mandia, Prosise and Pepe19 describe seven
components of incident response:
1. Pre-incident preparation.
16
17
18
19
Dan Farmer and Wietse Venema, Forensic Discovery (1st ed, 2005).
Dan Farmer and Wietse Venema, 'Murder on the Internet Express' (6 August 1999)
<http://www.porcupine.org/forensics/> at 15 June 2006.
McKemmish, above n 13.
Kevin Mandia, Chris Prosie and Matt Pepe, Incident Response & Computer Forensics, Second Edition
(2nd ed, 2003).
2. Detection of incident.
3. Initial response.
4. Formulate response strategy.
5. Investigate the incident: data collection followed by data analysis.
6. Reporting.
7. Resolution (security measures, lessons learned, long-term solutions).
All definitions of computer forensics have the following features in common:
1. They are based on the conventional crime handbook approach, which in turn
follows Locard's Exchange Principle. Rationale: such compliance is necessary if the
findings are to be used as evidence in court.
2. They formally describe detailed steps, often including decision charts or additional
procedures, thus creating rather long lists and sets of steps to follow. Rationale: to
make the process less error prone, and to demonstrate that sound forensic rules were
adhered to, thus the results are valid and admissible in court.
3. The definitions are broad and not uniquely matched to a computing environment. If
one were to remove computing specific terms, the definitions would remain valid.
The definitions do not clearly indicate that they are dealing with the computing
field.
4. Some definitions miss the necessary link between forensics in computer forensics,
and suitable for use in court. It does not matter how well computer forensics is
defined if it misses a statement saying in effect: all evidence must be collected and
presented in a manner that is legally acceptable. Rationale: a definition should
reflect that computer forensic experts are agents of the court.
While these organisations are aware that computer forensics exists, none of them formally
recognises it as a separate, distinct scientific discipline.
As a result the Australian courts use the general Supreme Court Rules24 to determine the
suitability of a person to be a computer expert witness or an independent computer expert:
Expert means a person who has specialised knowledge based on the persons
training, study or experience.
An expert witness has to demonstrate the appropriate qualifications and experience, and has
to present clear and logically arranged documentation. Still no formal accreditation to
become an expert is required or even possible to obtain. Some private institutions offer
computer forensics training,25 and many offer vendor specific software training.26 While
such training is often useful it can not be seen as leading to a recognized certification. A
similar situation is prevalent in other technologically advanced countries.27, 28
21
22
23
24
25
26
27
28
29
Many books dealing with digital evidence were written during the last decade,30 and
computer forensics methodology was well developed to handle simple, typical cases. A
good example of the development of a consistent methodology is a series of publications
from the U.S. Department of Justice, the National Institute of Justice (NIJ).31 The NIJ
publications are probably the most complete set of materials to come from a single source,
and can be collected to form a small library which covers all main areas of interest to
personnel involved in all aspects of digital forensics. Some areas covered are:
A Guide for First Responders,32 for use by first responders who have the
responsibility for protecting an electronic crime scene and recognizing, collecting,
and preserving electronic evidence.
The NIJ also tests and publishes the test results of various tools, for example disk imaging
tools and write blockers (devices that prevent writing to storage media).36
When the need to perform an in-depth analysis of computer systems and media emerged
there were no special tools available, and early investigators relied on various collections of
existing utilities which they considered appropriate to the task at hand. One of the most
useful tools was a hex editor, which allowed for the underlying structure of computer media
to be looked at. Some software developers noticed the potential of the new emerging field
and developed their products in this direction. A good example is the German company XWays, which many years ago offered free hex editor software. This software is now further
30
31
32
33
34
35
36
University of Western Sydney Computer Forensics, Books And Journals University of Western Sydney,
Australia
<http://www.scm.uws.edu.au/compsci/computerforensics/Books%20And%20Journals/index.php> at 20
January 2007.
National Institute of Justice <http://www.ojp.usdoj.gov/nij/> at 20 January 2007.
John Ashcroft, 'Electronic Crime Scene Investigation: A Guide for First Responders' (July 2001), U.S.
Department of Justice Office of Justice Programs, Technical Working Group for Electronic Crime
Scene Investigation <http://www.ojp.usdoj.gov/nij/pubs-sum/187736.htm>.
Sarah V. Hart, 'Forensic Examination of Digital Evidence: A Guide for Law Enforcement' (April 2004),
U.S. Department of Justice Office of Justice Programs, Technical Working Group for Electronic Crime
Scene Investigation <http://www.ojp.usdoj.gov/nij/pubs-sum/199408.htm>.
David W. Hagy, 'Investigations Involving the Internet and Computer Networks' (January 2007), U.S.
Department of Justice Office of Justice Programs, Technical Working Group for Electronic Crime
Scene Investigation <http://www.ojp.usdoj.gov/nij/pubs-sum/210798.htm> at 20 January 2006.
David W. Hagy, 'Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors'
(January 2007), U.S. Department of Justice Office of Justice Programs, Technical Working Group for
Electronic Crime Scene Investigation <http://www.ojp.usdoj.gov/nij/pubs-sum/211314.htm>.
National Institute of Justice <http://www.ojp.usdoj.gov/nij/> at 20 January 2007.
developed to offer more functionality, and the company also created a range of dedicated
computer forensics tools.37 Since the 1990s many other companies developed software
tools aimed at the forensic market, and there are also many free and open source tools.38
6. Emerging Problems
The current philosophy and the state of digital crime investigations faces a problem, which
can be noticed for example in the U.S. Department of Justice digital evidence guide39 which
states: Acquire the subject evidence to the examiners storage device using the
appropriate software and hardware tools. Acquire the evidence is still seen by the vast
majority of investigators and law enforcement as making a physical copy of computer
storage, typically performing a disk-to-disk copy. This approach is becoming increasingly
difficult to implement and impractical, because we are facing the following technological
challenges:
37
38
39
40
41
42
43
44
By 2007 single hard disk drives reached the capacity of 1TB (terabyte) in standard
PC form, and 20GB in microdrive form. The drives use perpendicular magnetic
recording technology which promises even higher capacities.40 Large capacity
drives create practical issues: copying data is slow, and searching acquired data
takes even more time. To visualize the problem: a single 1TB disk can digitally
store all world literature produced in one year.41
Data file systems used in computers allow for data to be hidden from a normal user,
and made visible only if special tools are used.42
On-line storage (also known as Internet storage or virtual hard drive) became more
popular and accessible.44 Some Internet service providers offer free storage space,
X-Ways Software for Forensics, Data Recovery and IT Security X-Ways Software Technology AG
<http://www.winhex.com/> at 1 March 2005.
University of Western Sydney Computer Forensics, Software University of Western Sydney, Australia
<http://www.scm.uws.edu.au/compsci/computerforensics/Software/index.php> at 20 January 2007.
Hart, above n 33.
Hitachi Global Storage Technologies was formed in 2003 as a result of the strategic combination of
IBM and Hitachis storage technology businesses. The company became a storage market leader with
combined 80 years of hard disk drive expertise. See: Hitachi Global Storage Technologies
<http://www.hitachigst.com/portal/site/en/menuitem.368c8bfe833dee8056fb11f0aac4f0a0/> at 1
February 2007.
JISC, 'The Data Deluge: Preparing for the explosion in data' (2004) <http://www.jisc.ac.uk/> at 18
January 2007.
Ewa Huebner, Derek Bem and Cheong Kai Wee, 'Data hiding in the NTFS file system' (Spring 2002)
Volume 3(Issue 4) Digital Investigation.
Derek Bem and Ewa Huebner, 'Alternate Data Streams in Forensic Investigations of File Systems
Backups' (Paper presented at the ATINER, Athens, Greece, 2006).
Internet Virtual Storage <http://www.cryer.co.uk/resources/virtualstorage.htm> at 3 January 2007.
45
46
47
48
49
50
51
It became easy to establish and maintain a Web site which is physically located
beyond local legal jurisdiction,46 and securing the cooperation of other countries
legal systems can be slow, costly, and difficult. In lower profile cases it may simply
be too impractical to obtain the data. Even the Web hosting sites located in
countries with well developed electronic crime laws often create complex rules
preventing the release of any client details to investigators unless a valid subpoena
is presented and subpoena compliance costs are paid.47
Data encryption algorithms became so good that breaking a password using a brute
force attack method (trying all possible values of encryption key till the right key is
found) to access protected data is practically impossible. As an example, one older
source estimated that it would take 270 days to break 56-bit RC5 encryption using
4000 teams operating 10,000s machines.48 While such estimates are continuously
changing as more powerful computers became available, standards for encryption
keys are also changing. Longer encryptions keys are even more difficult to break.
To illustrate: assuming so called AES-128 encryption (Advanced Encryption
Standard with 128-bit long key) and an attacker with a system that tries one billion
keys
per
second,
a
totally
unrealistic
time
of
10 000 000 000 000 000 000 000 years would be required to check all possible key
combinations.49 Various strong encrypting tools, which not so long ago had only
limited distribution, are now available freely to anyone.50
Small, easy to hide (or destroy) storage devices became common and inexpensive.
By the end of 2006 USB flash drives reached capacities of up to 64GB.51 There are
free solutions available which allow users to carry your favorite computer
programs along with all of your bookmarks, settings, email and more with you and
use them on any Windows computer. All without leaving any personal data
Tom Clark, Storage Virtualisation technologies for Simplifyng Data Storage and Management (1 ed,
2005).
Joshua Gordon, 'Illegal Internet Networks in the Developing World' (2004)
<http://cyber.law.harvard.edu/home/research_publication_series> at 6 December 2005.
See, eg, USA based company, Domains by Proxy 's Privacy Policy
<http://www.domainsbyproxy.com/popup/subpoenapolicies.aspx> at 12 December 2006.
Jason Siegfried et al, 'Examining the Encryption Threat' (2004) Volume 2(Issue 3) International
Journal of Digital Evidence.
This example illustrates that an approach where all possible key combinations are tried leads to time
required to break the encryption which is approximately in the same range as the estimated life of the
Universe. See: Svante Seleborg, 'About AES Advanced Encryption Standard' (2004) at 2 November
2006.
See, eg, robust and free encryption software, True Crypt - Free Open-Source On-The-Fly Disk
Encryption Software TrueCrypt Foundation <http://www.truecrypt.org/> at 10 March 2006
One of many manufacturers of large capacity USB flash key memory: Kanguru Flash Drive Max
<http://www.kanguru.com/flashdrive_max.html> at 20 November 2006.
behind. The hardware required is a USB flash key with capacity of 256MB or
more.52
The main conceptual problem in computer forensics is the need to understand that data we
intend to capture is not static, but dynamic. While making a static copy of a hard disk may
produce some useful results, it may as well be that all crucial data was lost when the
computer was powered off. An investigator should be aware that data has a certain span of
life, and it naturally disappears (sometimes irrecoverably) in a certain order dictated by the
architecture of computer systems and the technology used to build them. Data life span can
be only nanoseconds if it resides in computer registers or caches, a bit longer when it
resides in the main memory or on the network, and relatively longer (seconds to years)
when it resides on hard disks. Finally, it is assumed that data stored on backup media has a
life span of many years.53 This is often referred to as the Order of Volatility.54
In particular, computer memory can potentially reveal more than just information regarding
the current state of the computer system. When pages of memory are used by a process and
the process terminates, these pages are marked as free, but the data is not overwritten
immediately, often not until the pages need to be reused by the system. There are no
specialised software tools or techniques that have been developed which can be used to
assist in collecting and analysing the data contained in these pages in such a way that it is
admissible in a court of law. The data in these pages is invisible to standard software tools
used in the analysis of physical memory images, because logically this data no longer
exists.55 Similarly data streaming over network connections, unless continuously
monitored, is irretrievably lost.
7. Lack of Standards
As information security magazine Security Wire Digest noticed in 2003:56
In order for computer forensics to be a legitimate scientific discipline, it must meet
the same standards as other forensic sciences. These include formal testable
theories, peer reviewed methodologies and tools, and replicable empirical research.
Sadly, these standards are not being met.
There have been many attempts to formulate a set of standards, but none of these sets is
developed and updated as often as the discipline requires, and none is commonly accepted.
Some are listed below:
52
53
54
55
56
The National Institute of Standards and Technology (NIST) produced the Guide to
Integrating Forensic Techniques into Incident Response58 which provides a good
basis for describing the computer forensics process. The guide correctly noticed that
acquiring data involves collecting volatile data and duplicating non-volatile data
(many other guides ignore the volatile data aspect of the collection process). The
NIST also offers a series of reports on disk imaging.59
The International Organization on Computer Evidence (IOCE)60 does not offer any
relevant publications on the matter.
Probably the most consistently updated series of publications are offered by the NIJ
(National Institute of Justice), the research, development, and evaluation agency of the U.S.
Department of Justice.61 The guides cover all aspects of computer forensics, and include a
cautionary statement defining their scope and role like the one below:62
The recommendations presented in this guide are not mandates or policy
directives and may not represent the only correct course of action. The guide is
intended to be a resource for those who investigate crimes related to the Internet
and other computer networks. It does not discuss all of the issues that may arise in
these investigations and does not attempt to cover traditional investigative
procedures.
Despite this caution, compliance with the NIJ guides is probably as close to following a
standard as is currently possible, while proper, formal standards are missing.
In summary, there are many best practice guides or recommendations from many sources,
but no single and widely accepted international standard. It is probably unrealistic to expect
that such an internationally accepted and up to date standard will be created in the near
future, or indeed ever.
57
58
59
60
61
62
ISO/IEC 17799:2005 Information technology - Security techniques - Code of practice for information
security management (2005) International Organization for Standardization
<http://www.iso.org/iso/en/prods-services/popstds/informationsecurity.html> at 12 January 2007
Karen Kent et al, 'Guide to Integrating Forensic Techniques Into Incident Response' (2006), National
Institute of Standards and Technology (NIST) <http://csrc.nist.gov/publications/nistpubs/>.
NIST National Institute of Standards and Technology, Computer Security Resource Centre (CSRC)
<http://csrc.nist.gov/> at 12 January 2006.
International Organization on Computer Evidence (IOCE) <http://www.ioce.org/> at 12 January 2007.
National Institute of Justice <http://www.ojp.usdoj.gov/nij/> at 20 January 2007.
David W. Hagy, 'Investigations Involving the Internet and Computer Networks' (January 2007), U.S.
Department of Justice Office of Justice Programs, Technical Working Group for Electronic Crime
Scene Investigation <http://www.ojp.usdoj.gov/nij/pubs-sum/210798.htm> at 20 January 2006.
... all investigators used the same approach, from sys admins and IT security
specialists right through to police;
... we could be sure that the same approach would be followed by investigators in
other jurisdictions;
... the companies running e-services had systems running which could prove what
was going on (pre-investigation).
And sooner or later a project is founded to make these wishes a reality. One such attempt is
analysed here in more detail to demonstrate what problems are faced by the computer
forensics discipline.
The CTOSE (Cyber Tools On-Line Search for Evidence) project was founded by three
Universities, two R&D organizations and two commercial companies, supported by the
European Commissions IST program.64 The aim was to develop a methodology,
architecture, a process model, and a common set of tools and procedures for an electronic
investigation. Three pilot scenarios were developed to demonstrate the need for new
methodology. The project closed in September 2003, and it did not deliver any significant
results. It closed with a promise of future development:
The project partners, along with SIG members, are now setting up an electronic
evidence research network, provisionally called ENDEM, which will bring together
researchers interested in further work on the challenges posed by electronic
evidence
The ENDEM research network never eventuated, and the CTOSE project folded without
providing any significant input to the field. This story illustrates the typical life span of
computer forensic research projects which often start enthusiastically, but due to unforeseen
complexities of the field and its multi-disciplinary characteristics do not produce the
expected results and are eventually abandoned.
Cases like this show that computer forensics is still in the very early days of development,
suffering from a lack of clear direction and appropriate development support.
64
Neil Mitchison, 'The challenge of electronic evidence the European response' (2003) at 12 September
2005.
CTOSE Cyber Tools On-Line Search for Evidence <http://www.ctose.org/info/index.html> at 12
October 2006.
evidence collected from computer systems is not like other physical evidence, and it cannot
be subjected to the same rules. If the demands of physical evidence are placed on computer
evidence, much of the data which can be collected will not be admissible as evidence in
court, and many computer crimes will escape prosecution. In a sense even in simple cases it
is misleading to treat the hard disk storing data as synonymous with that data.
Computer forensics is already moving beyond the analysis of hard disk images. Memory
forensics and live system investigation methodology are developing both in terms of
research and specific forensic software tools. Collecting memory images, the system
footprint and unallocated pages invariably changes the data being collected. So far no
universal method has been discovered to avoid this, and perhaps such a method will never
be devised. Similarly, live investigation by its very nature modifies the data stored in
memory, hard disks and other storage devices. It has to be accepted that this is inevitable,
and evidence collected in this manner has to become acceptable to the courts of law.
Further, computer systems are increasingly complex, and analysing their parts, like the disk
or memory image, may not readily reveal all available information. A new approach to
computer forensics investigation is to attempt to recreate the computer system and its
immediate environment by reproducing the collected images in a controlled way on similar
or simulated hardware, and observe its behaviour. This has the potential to provide a
valuable insight into the dynamic relationship of the investigated system with the outside
computer networks and systems, as well as the specific setups and functions of the system
itself.
The important difference of the proposed approach is that it removes the expectation of
certainty that somehow the investigator will be able to obtain the original evidence, and
create a perfect copy not only of the hard disk, but also the full environment being
investigated. The evidence obtained this way is not a physical object, like a hard disk, but
resembles more a visit to the crime scene. The advantage is that this process can be
repeated any number of times without any further damage to the evidence already collected.
The reconstruction of the computer system from known parts may appear not to add
anything new to the investigation. This is only superficially true. As stated already a
computer system is complex, and analysis of its parts may demand too much time and
expert knowledge to be of practical use. This may be compared to attempting to determine
the colour of a cat by examining its DNA. Although this is in theory possible, it demands
sophisticated tools and knowledge. If we can see the cat, its colour can be determined
instantly.
We propose to expand the Computer Forensics definition to include collection of hardware
and software details of the investigated computer system with the aim to recreate the
environment being investigated as closely as possible. It has to be accepted that it is not
possible to copy the investigated computing environment completely, or to recreate it later
in a completely faithful way. It is also not possible to measure precisely how much of the
environment was recreated.
There are already software tools available which allow for the creation of virtual systems
following required specifications.65 These tools can be further developed to create
65
dedicated forensic software to make the reconstruction process more suitable for a forensic
investigation. We do not envisage that this will replace the currently used analysis of hard
disk images. Rather it should proceed in parallel once the forensically sound disk images
are available. In practice the recreation of the system may provide valuable clues for the
conventional investigation. This way even if the evidence provided by reconstruction is not
admissible in court, it may significantly speed up obtaining results by conventional
methods.
While following legal requirements is necessary to ensure the validity of findings, the
computer forensics process may also be used in certain situations where it is known that
legal prosecution is unlikely. For example the same process may be used to determine the
reason of a security breach which was caused by a bug in software when criminal intentions
are not present.
10. Conclusion
U.S. Attorney General Janet Reno said in 1995: "As technology advances, computer crime
has grown. We have to ensure that the law keeps up with changing times."66 Twelve years
later the gap between computer crime and the means to respond to computer crime still
exists. We believe that to avoid a crisis it should be acknowledged that it is not possible to
formalize, describe and predict every situation, and that a purely mechanistic approach of
copy all without disturbing the original, analyse the copy, present unquestionable findings
may never be possible in computer forensics. Thus we are proposing a new direction for the
development of computer forensics with the aim of providing a better understanding of the
strengths and limitations of this discipline.
66