What to do with the Bits? Triage, First Aid, Clean Room Patricia Galloway School of Information University of Texas at Austin.

Slides:



Advertisements
Similar presentations
Long-Term Preservation. Technical Approaches to Long-Term Preservation the challenge is to interpret formats a similar development: sound carriers From.
Advertisements

Know-It-All in 20 minutes: How to use a Finding Aid, your research tool.
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
Digital Preservation - Its all about the metadata right? “Metadata and Digital Preservation: How Much Do We Really Need?” SAA 2014 Panel Saturday, August.
COEN 252 Computer Forensics
The House Project Kane Cunningham, Artist and lecturer Simon Wilson, Senior Archivist.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
BACS 371 Computer Forensics
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Basic Electronic Records Management
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Old Fashioned Type Movies with New Technology. C-l-a-y-m-a-t-i-o-n or S-t-o-p A-n-i-m-a-t-i-o-n Making pictures come to life.
Untitled (Hidden Track): Born Digital Content Preservation Service at UIUC Tracy Popp, MS LIS, CAS Digital Preservation Coordinator University Library.
Records Management Overview. Why? It’s the Law It’s the Law It’s University Policy It’s University Policy Fiscal and Legal Compliance Fiscal and Legal.
MAC Times Modification (mtime) When the file contents were CHANGED Change = addition or deletion or change of any single BYTE/Character… even if it doesn’t.
ORGANIZING AND STRUCTURING DATA FOR DIGITAL PROJECTS Suzanne Huffman Digital Resources Librarian Simpson Library.
DSpace, CyberCemeteries and Other Active Sites for Community Networking Records Maria Esteva and Sue Soy School of Information, UT Austin Austin History.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Digital Crime Scene Investigative Process
Digital Preservation 101, or, How to Keep Bits for Centuries Julie C. Swierczek Digital Asset Manager and Digital Archivist Harvard Art Museums.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Digitizing Photographs For Sustainable Heritage Workshop, June 12-15, 2014 By Steven Bingo Project Archivist, Washington State University.
Guide to Computer Forensics and Investigations Fourth Edition
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Libraries, Archives, and Digital Preservation: The Reality of What We Must Do Leslie Johnston Acting Director, National Digital Information Infrastructure.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 7 File I/O 1. File, Record & Field 2 The file is just a chunk of disk space set aside for data and given a name. The computer has no idea what.
Creating documentation and metadata: Recording provenance and context Jeff Arnfield National Climatic Data Center Version a1.0 Review Date.
BUILDING ON COMMON GROUND: EXPLORING THE INTERSECTION OF ARCHIVES AND DATA CURATION Lizzy Rolando & Wendy Hagenmaier 6/3/2015IASSIST 2015.
INF 392K: P ROBLEMS IN P ERMANENT R ETENTION OF E LECTRONIC R ECORDS D R. L UKENBILL D IGITAL A RCHIVE M AY 5, 2010 Kathryn Brooks, Alexandra Myers, Jessica.
Digital Preservation: Current Thinking Anne Gilliland-Swetland Department of Information Studies.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
DIGITAL PRESERVATION PERSPECTIVES ARCHIVAL SCIENCE AND THE OPEN ARCHIVAL INFORMATION SYSTEMS MODEL Charles M. Dollar University of British Columbia
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
COEN 250 Computer Forensics Windows Life Analysis.
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Enterprise Solutions Chapter 10 – Enterprise Content Management.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Managing your research: Citation Management Systems Scott Johnston University of Victoria.
Donald G. Davis Collection 392K Amy Baker, Megan Peck, Zach Vowell.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
GETTING A GRIP ON DISPOSAL Carmela Gallo. Word origin of Disposal Disposal To dispose mid-14c., from Old.French. disposer (infl. by poser "to place"),
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Working with personal digital archives Susan Thomas Project Manager & Digital Archivist project Manuscripts Matter, Electronica panel London, October.
Creighton Barrett Dalhousie University Archives
Digital Stewardship Curriculum
Topics in Born Digital Archiving
How can I back up my QuickBooks file on my own computer's hard drive?
Testing appraisal models with digital corpora
Multimedia Training Kit
PITCHING 5 STEPS.
PITCHING 5 STEPS.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Storage Basic recommendations:
The Office Procedures and Technology
Digital Forensics CJ
Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)
Forensic Recovery of Evidence Device (FRED)
Music Creation Create, Record, Produce.
Presentation transcript:

What to do with the Bits? Triage, First Aid, Clean Room Patricia Galloway School of Information University of Texas at Austin

First step: DO NOTHING Digital records are harder to destroy completely than most believe But it is very easy to alter them and thus destroy their authenticity Hence: you must proceed forensically Ideas from digital discovery/digital forensics Archives CSI! First step: look but don’t touch

What do you have? Inventory Find media and computers in collection(s) Note any evidence from original order Categorize and date them based on physical evidence Media names and formatting as proclaimed on media Timeline: Labels on the media, even multiple ones (should you peel them off?)

How does it fit? Context What are your working hypotheses? Who created? (evidence from the fonds) When? (scope note?) How does it compare in amount to paper? How might it be relevant? What is the computing history of the fonds creator? Construct a technology timeline (cf. Maria Esteva’s discoveries)

Triage How old/outdated is it? How important is it? Does it likely have a paper counterpart? Will that counterpart maintain affordances? Might the digital amplify evidence? How much will it cost to retrieve? How much needs to be retrieved? Do you need to know what’s there before you can decide?

First aid: What can you find out without killing the patient? Media format + operating system + application software = accessibility BUT Media format + operating system + application software = potential danger to authenticity Mining a digital fonds without reading it (MPLP?) Without opening any file you can potentially see: File arrangement Detailed directory listing File naming conventions But how to do it without risk?

How can you find out? Do you have drives to read media? Do you have software to read/render/list the contents? Can you do this nondestructively? Does it matter? Are the materials well-documented and already an intentional copy? Do you need to recover process as well as content? If you don’t know, assume it does matter

Authenticity warning 1 Creation date is crucial to archival interest Creation date may appear in many forms Metadata as part of file Metadata as auxiliary file (Mac resource fork) Metadata as managed by OS Creation date as managed by the OS may be changed systematically On copy On saving an opened file

Authenticity warning 2 Creator/author metadata Placed by software Usually haphazardly set up by individuals May not reflect individuals if set up by company

Cheap and cheerful: checking out floppies Apply hardware write-protect Try to read the medium If no adverse message “Do you want to format this disk?” “Disk is unreadable” Then copy to another medium Using forensic-copy software: maintains metadata Using your OS dates and other metadata will be altered Metadata must be captured before copy And set original aside

Clean room procedure Digital environments can eat their young Alteration of metadata Alteration of format Neutral “clean room” environment needed: where object is seen ONLY as sequence of bits Tools for nondestructive copy out of original and into clean room: digital discovery Tools for nondestructive analysis of file system: digital forensics

Is this the future? What do we really know about paper, after all? What tools do we use to decide how valuable it is? What can we know about digital objects if we are careful? What tools can we use to decide how valuable it is? Compare in terms of MPLP Paper: settle for high-level aggregate knowledge Digital: organize at will, mine out subjects, locate every item