Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand

The digital forensic tools used by law enforcement agencies for forensic investigations are mostly proprietary and commercially expensive; although open-source tools are used, the investigations conducted with such tools are not verified by reputable organisations, and hence, users are reluctant to...

Full description

Bibliographic Details
Main Authors: Zawar Shah, Arkar Kyaw, Hong Phat Truong, Imdad Ullah, Andrew Levula
Format: Article
Language:English
Published: MDPI AG 2022-06-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/12/5928
_version_ 1797490346781835264
author Zawar Shah
Arkar Kyaw
Hong Phat Truong
Imdad Ullah
Andrew Levula
author_facet Zawar Shah
Arkar Kyaw
Hong Phat Truong
Imdad Ullah
Andrew Levula
author_sort Zawar Shah
collection DOAJ
description The digital forensic tools used by law enforcement agencies for forensic investigations are mostly proprietary and commercially expensive; although open-source tools are used, the investigations conducted with such tools are not verified by reputable organisations, and hence, users are reluctant to practice such tools. To address this issue, we experimentally evaluate three open-source forensic tools based on various requirements recommended by the National Institute of Standards and Technology (NIST) framework for forensic investigation. The experimental setup consists of a forensic workstation, write-blocker, and purchased USB hard drives investigated via digital forensic imaging tools, i.e., DC3DD, DCFLDD, and Guymager. We create various test cases, which distribute USB hard drives in different groups and investigate the functional and optional requirements of NIST along with recovering and analysing remnant data. We evaluate these forensic tools by analysing the log information, following, anonymously (to ensure that data were not disclosed or misused during or after the investigations) collecting, examining, and classifying the remnant data restored from the USB hard drives. We observe that the percentage of hardware resources usage and the processing time of each tool are remarkably different, e.g., Guymager was the fastest tool and met all the functional requirements in each test case, but it utilised more CPU and memory resources than DC3DD, DCFLDD. We note that 88.23% of the USB hard drives contained sensitive personal or business information (e.g., personal photos, bank transactions, and contracts). Subsequently, the remnant data analysis shows that consumers in New Zealand are unaware of personal data security and the associated vulnerabilities of data leakages.
first_indexed 2024-03-10T00:31:40Z
format Article
id doaj.art-96963ff272cf4e9ba575d76bddf02b77
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T00:31:40Z
publishDate 2022-06-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-96963ff272cf4e9ba575d76bddf02b772023-11-23T15:24:47ZengMDPI AGApplied Sciences2076-34172022-06-011212592810.3390/app12125928Forensic Investigation of Remnant Data on USB Storage Devices Sold in New ZealandZawar Shah0Arkar Kyaw1Hong Phat Truong2Imdad Ullah3Andrew Levula4Department of Information Technology, Sydney International School of Technology and Commerce, Sydney, NSW 2000, AustraliaSchool of Information Technology, Wellington Institute of Technology (WelTec), Wellington 5012, New ZealandSchool of Information Technology, Whitireia Community Polytechnic, Auckland 5022, New ZealandCollege of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi ArabiaDepartment of Information Technology, Sydney International School of Technology and Commerce, Sydney, NSW 2000, AustraliaThe digital forensic tools used by law enforcement agencies for forensic investigations are mostly proprietary and commercially expensive; although open-source tools are used, the investigations conducted with such tools are not verified by reputable organisations, and hence, users are reluctant to practice such tools. To address this issue, we experimentally evaluate three open-source forensic tools based on various requirements recommended by the National Institute of Standards and Technology (NIST) framework for forensic investigation. The experimental setup consists of a forensic workstation, write-blocker, and purchased USB hard drives investigated via digital forensic imaging tools, i.e., DC3DD, DCFLDD, and Guymager. We create various test cases, which distribute USB hard drives in different groups and investigate the functional and optional requirements of NIST along with recovering and analysing remnant data. We evaluate these forensic tools by analysing the log information, following, anonymously (to ensure that data were not disclosed or misused during or after the investigations) collecting, examining, and classifying the remnant data restored from the USB hard drives. We observe that the percentage of hardware resources usage and the processing time of each tool are remarkably different, e.g., Guymager was the fastest tool and met all the functional requirements in each test case, but it utilised more CPU and memory resources than DC3DD, DCFLDD. We note that 88.23% of the USB hard drives contained sensitive personal or business information (e.g., personal photos, bank transactions, and contracts). Subsequently, the remnant data analysis shows that consumers in New Zealand are unaware of personal data security and the associated vulnerabilities of data leakages.https://www.mdpi.com/2076-3417/12/12/5928forensic investigationcomputer crimedigital devicesdata leakagedata security
spellingShingle Zawar Shah
Arkar Kyaw
Hong Phat Truong
Imdad Ullah
Andrew Levula
Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand
Applied Sciences
forensic investigation
computer crime
digital devices
data leakage
data security
title Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand
title_full Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand
title_fullStr Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand
title_full_unstemmed Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand
title_short Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand
title_sort forensic investigation of remnant data on usb storage devices sold in new zealand
topic forensic investigation
computer crime
digital devices
data leakage
data security
url https://www.mdpi.com/2076-3417/12/12/5928
work_keys_str_mv AT zawarshah forensicinvestigationofremnantdataonusbstoragedevicessoldinnewzealand
AT arkarkyaw forensicinvestigationofremnantdataonusbstoragedevicessoldinnewzealand
AT hongphattruong forensicinvestigationofremnantdataonusbstoragedevicessoldinnewzealand
AT imdadullah forensicinvestigationofremnantdataonusbstoragedevicessoldinnewzealand
AT andrewlevula forensicinvestigationofremnantdataonusbstoragedevicessoldinnewzealand