You are on page 1of 2

Digital Investigation 27 (2018) 1e2

Contents lists available at ScienceDirect

Digital Investigation
journal homepage: www.elsevier.com/locate/diin

The knowledge management gap in digital investigations

Digital investigations are straining under competing demands to processes should not go beyond their expertise and attempt to evaluate
respond rapidly to the growth in cybercrime, to following method- digital evidence. This distinction can help international efforts to
ical scientific practices, and to protect privacy. Mistakes in digital improve digital investigations and forensic science by clarifying which
investigations are gaining more attention, and raising criminal jus- activities require the rigorous quality controls of a laboratory environ-
tice concerns particularly in the UK. A House of Lords inquiry is ment, and which do not. At an organizational level, evaluation of dig-
assessing concerns about digital forensics, the Attorney General's ital evidence can be integrated with existing forensic laboratories,
Office is addressing disclosure concerns related to digital forensics, while technical processes can be kept separate to serve both investiga-
and the Forensic Science Regulator is advancing accreditation of tive and forensic needs. Standards and guidelines that are being devel-
digital forensic service providers. oped by ASTM and SWGDE could be organized to cover technical
Many of the current problems in digital investigations boil down processes and evidence evaluation distinctly. ENFSI has started down
to inadequate knowledge management. This is a complex chal- this road with their guideline for evaluative reporting in forensic sci-
lenge. There are multiple forms of interdependent knowledge to ence. Even when a single person is responsible for generating investi-
be managed, including procedural, technical, investigative, scienti- gative leads, handling crime scenes, and addressing probative
fic, linguistic, behavioral, crime analysis and forensic intelligence. In questions, conscious separation of each phase helps ensure that appro-
addition, there are multiple knowledge producers and consumer, priate processes and oversight mechanisms are employed.”
including police, digital forensic specialists, criminal intelligence This divide-and-conquer strategy raises some challenging ques-
analysts, attorneys, and judges. To cover all of these areas and tions about current digital forensic practices. Should survey ⁄ triage
stakeholders there is a need for multiple knowledge management forensic inspections be accredited under ISO 17025, or is a lesser
strategies in combination. requirement more fitting? Should results of preliminary forensic
examinations performed by non-scientists be accepted as evidence
in court? Should non-scientists be permitted to perform in-depth
Defining roles and responsibilities forensic examination?

Ten years ago, in the Journal of Forensic Sciences (Investigation


Delayed Is Justice Denied), we proposed a three-tiered approach to Systematic knowledge reuse
conducting digital forensic examinations:
It is not feasible for digital investigators to be familiar with, or
1. Survey ⁄ triage forensic inspection: Targeted review of all available even aware of, every kind of digital trace. To avoid information be-
media to determine which items contain the most useful evi- ing overlooked or misinterpreted, it is necessary to use a systematic
dence and require additional processing. mechanism for capturing, codifying and reusing knowledge. The
2. Preliminary forensic examination: Forensic examination of items Hansken system developed by the Netherlands Forensic Institute
identified during survey⁄triage as containing the most useful and presented previously in this Journal is designed for this pur-
evidence, with the goal of quickly providing investigators with pose. New modules can be developed, tested, validated and added
information that will aide them in conducting interviews and to the system to extract information automatically and make it
developing leads. available in all future digital investigations. An added advantage
3. In-depth forensic examination: Comprehensive forensic exami- of the Hansken system is that its data model is strongly aligned
nation of items that require more extensive investigation to gain with the evolving CASE standard. Hansken is geared towards case
a more complete understanding of the offense and address investigations in The Netherlands, but the NFI is working on making
specific questions. it widely available for casework, research and knowledge sharing.
Another forensic framework called Plaso (spawned from log2ti-
The focus of this strategy was to reduce backlogs in laboratories, meline) developed by Google is open source and freely available,
and did not specify the forensic requirements for each of the three and has a modular design. Currently, Plaso can extract kinds of dig-
levels. Defining the level of knowledge and quality assurance ital traces from a variety of data sources, including mobile devices.
needed to perform each type of forensic examination helps clarify When there is a need to extract information from a new file format,
many hotly debated issues relating to digital investigations. As I smartphone app, IoT device or other data source, customized plu-
stated in “Differentiating the phases of digital investigations” (Vol gins or parsers can be developed, tested and added to the auto-
19): mated processing. Plaso has an export option directly to Elastic
“This distinction can help reduce the risk of privacy violations by for searching, filtering and correlating purposes. In addition, a plat-
clarifying that individuals who are only trained to perform technical form call TimeSketch has been developed to support investigative

https://doi.org/10.1016/j.diin.2018.11.001
1742-2876/© 2018 Elsevier Ltd. All rights reserved.
2 E. Casey / Digital Investigation 27 (2018) 1e2

teams working on data extracted using Plaso. Recognizing the need investigation is forensic science, which is addressed by the OSAC
to handle large amounts of data, Google has developed a cloud- Technical Series 0002 document “A Framework for Harmonizing
based framework called Turbinia to distribute plaso processing. Forensic Science Practices and Digital/Multimedia Evidence.”
Plaso has featured in DFRWS pre-conference workshops and Turbi- Most digital investigators do not have formal forensic science
nia was presented at DFRWS 2018. training, including formal scientific reasoning and probabilistic
In addition to enabling systematic knowledge codification, such evaluation of evidence. In addition, many digital investigators do
systems open opportunities for research and development of not know about limitations in forensic methods they use, or about
advanced analysis techniques. advanced capabilities that exist in digital forensic laboratories.
Other forensic disciplines have faced these same challenges, and
Community-developed knowledge curation addressed the gap by creating a new role called a “forensic case
coordinator” to provide guidance and expertise throughout the
Early in my career as an information security officer in higher investigative process. For instance, forensic case coordinators
education, I realized that existing computer security guidelines advise on which sources of evidence and forensic processes could
and technical solutions did not address all of the needs of the com- be most valuable for the case, and what questions to ask specialists
munity. To address the varying needs of institutions with different in the forensic science laboratory. The effectiveness of forensic case
resources and circumstances, I was retained by EDUCAUSE/ coordinators depends on changes in culture, organization and edu-
Internet2 to initiate a community developed knowledge resource cation which takes time.
called the “Information Security Guide: Effective Practices and So-
lutions for Higher Education.” The guide is structured to serve the
needs of all types of higher education institutions, and is aligned
with multiple information security industry standards. After more Conclusions
than a decade of community contributions, coordinated by a volun-
teer editorial board of information security and privacy practi- A combination of knowledge management strategies are needed
tioners, this resource grew into an invaluable resource of in order to cultivate a criminal justice system that treats digital
“practical approaches to creating higher education information se- traces effectively, has visibility across criminal activities, and ad-
curity programs and preventing, detecting, and responding to in- dresses crime and security more strategically. The importance of
formation security problems in a wide range of higher education knowledge management in digital investigations is evident from
environments.” This guide contains campus case studies, contrib- the many existing efforts to address this need. More coordination
uted by members of the community, describing how specific orga- across these efforts might strengthen their effectiveness, but at
nizations address particular issues and solve specific problems, and least they exist. The more serious problem is the lack of forensic
includes Incident Management and Response. case coordinators in digital investigations. It will take many years,
Knowledge exchange platforms exist specifically for digital in- if not decades, to fill this gap. In the meantime, there will be unac-
vestigations, including online forums and mailing lists. Effective ceptably high case backlogs, missed evidence, unscientific out-
mechanisms for sharing digital forensic knowledge include confer- comes, and miscarriages of justice.
ences and publications such as this Journal.
Eoghan Casey, Editor in Chief
Forensic case coordinators Digital Investigation

The weakest area of knowledge management in digital

You might also like