Skip to main content

DaP∀: Deconstruct and Preserve for All: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media

  • Chapter
  • First Online:
  • 2049 Accesses

Abstract

Human error is often a cause of contamination of potential digital evidence and can jeopardise an entire case. One of the biggest problems is the data acquisition stage that requires the Digital Forensic Analyst to make bit-for-bit copies of the device seized. This procedure, despite using write-blockers, can go wrong. The proposed Deconstruct and Preserve for all (DaP∀) aims at mitigating the risk involved in exposing any data to these procedures and ensures that third parties get an exact match; the process works on SSDs, GPT formatted devices, and other traditional formats, e.g. HDD. The results show a GPT TRIM enabled SSD imaged multiple times produces verification of matched hashes. With these results, it is proposed that DaP∀ should be considered as a Standard Operating Procedure (SOP) when completing data acquisition.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Depending on the operating system, the drive should be unmounted, e.g. Kali in Forensic mode.

  2. 2.

    Include HDD, Flash drives, SSD and similar storage devices.

References

  • 180-1, F.I.P.S.F. (1996). Secure hash standard.

    Google Scholar 

  • Bell, G. B., & Boddington, R. (2010). Solid state drives: The beginning of the end for current practice in digital forensic recovery? Journal of Digital Forensics, Security and Law, 5(3), 1–20.

    Google Scholar 

  • Carrier, B. (2005). File system: Forensic analysis. Boston: Addison-Wesley.

    Google Scholar 

  • Carrier, B. (2011). The sleuth kit. TSK – sleuthkit.org.

    Google Scholar 

  • DCFLDD 1.3.4-1. (2013). Test results for digital data aquisition tool (Technical report), Homeland Security.

    Google Scholar 

  • Forensic Science Regulator (FSR). (2017). Codes of practice and conduct for forensic science providers and practitioners in the criminal justice system (Technical report), UK Govt, Birmingham.

    Google Scholar 

  • Harbour, N. (2002). dcfldd. Defense Computer Forensics Lab. http:/dcfldd.sourceforge.net 5(5.2), 1.

  • King, C., & Vidas, T. (2011). Empirical analysis of solid state disk data retention when used with contemporary operating systems. Journal of Digital Investigation, 8, S111–S117.

    Article  Google Scholar 

  • Krishna Mylavarapu, S., Choudhuri, S., Shrivastava, A., Lee, J., Givargis, T. (2009). Fsaf: File system aware flash translation layer for nand flash memories. In: Design, Automation & Test in Europe Conference & Exhibition, 2009. DATE’09 (pp. 399–404). IEEE.

    Google Scholar 

  • Ligh, M. H., Case, A., Levy, J., & Walters, A. (2014). The art of memory forensics. Indianapolis: Wiley.

    Google Scholar 

  • McKemmish, R. (1999). What is forensic computing? (Trends and issues in crime and criminal justice, Vol. 118). Canberra: Australian Institute of Criminology.

    Google Scholar 

  • Mitchell, I., Anandaraja, T., Hadzhinenov, G., Hara, S., & Neilson, D. (2017). Deconstruct and preserve (DaP): A method for the preservation of digital evidence on solid state drives (SSD). In Global Security, Safety and Sustainability – The Security Challenges of the Connected World

    Google Scholar 

  • MSAB. (2015). XRY – Android basics: Debugging and extractions, available on XRY certification course.

    Google Scholar 

  • Nikkel, B. (2009). Forensic analysis of GPT disks and guid partition tables. Digital Investigation, 6, 39–47.

    Article  Google Scholar 

  • Nisbet, A., Lawrence, S., & Ruff, M. (2013). A forensic analysis and comparison of solid state drive data retention with trim enabled file systems. In: Australian Digital Forensics Conference (pp. 103–11).

    Google Scholar 

  • Scientific Working Group on Digital Evidence (SWDGE): Model standard operation procedures for computer forensics (ver. 3). https://www.swgde.org/.

  • Shu, F., & Obr, N. (2007). Data set management commands proposal for ata8-acs2. Management, 2, 1.

    Google Scholar 

  • Statista.com. (2016). Global shipments of HDDs and SSDs in PCs from 2012 to 2017. http://www.statista.com/statistics/285474/hdds-and-ssds-in-pcs-global-shipments-2012-2017/. Accessed June 2016.

  • Subramani, R., Swapnil, H., Thakur, N., Radhakrishnan, B., & Puttaiah, K. (2013). Garbage collection algorithms for nand flash memory devices–An overview. In 2013 European Modelling Symposium (EMS) (pp. 81–86). IEEE.

    Google Scholar 

  • Sylve, J., Case, A., Marziale, L., Richard, G. G. (2012). Acquisition and analysis of volatile memory from android devices. Digital Investigations, 8, 1–10.

    Google Scholar 

  • Tableau sata/ide bridge (March 2018). https://www.guidancesoftware.com/tableau/hardware//t35u.

  • U.S. Department of Justice. (2009). Electronic crime scene investigation: An on-the-scene reference for first responders. National Institute of Justice, November 2009.

    Google Scholar 

  • Williams, J. (2012). Good practice guide for digital evidence (Technical report), Association of Chief Police Officers (ACPO). http://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf. Accessed March 2018.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ian Mitchell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mitchell, I., Ferriera, J., Anandaraja, T., Hara, S. (2018). DaP∀: Deconstruct and Preserve for All: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media. In: Jahankhani, H. (eds) Cyber Criminology. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-97181-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-97181-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-97180-3

  • Online ISBN: 978-3-319-97181-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics