Forensics Journal - Stevenson University 2013 | Page 34

FORENSICS JOURNAL FIGURE 6 Since file streams are a feature of NTFS, ADS is dependent on that file system. Once a file containing an ADS hidden file is moved to another file system, e.g. FAT 12/16/32, EXT2/3, CDFS, etc. the hidden data is discarded. Figure 7 shows that the file ‘test.txt’ will lose its hidden data ‘hidden.txt’ if it is copied to a drive that is formatted with the FAT file system.         As you can see, the images above appear to be the same. The image on the right has a copy of the US Constitution embedded in it using steganography. The first image has a file size of 66.9 KB while the second image has a file size of 81.3 KB. FIGURE 8 Forensic tools such as EnCase and FTK provide the investigator with the ability to create custom hash lists that are used to scan evidence files looking for matches. However, the investigator would first need to locate steganographic content before being able to populate this list with the hash values. FIGURE 7 Similar to traditional forms of steganography, ADS can be performed on any file type, including executable files. IMPACT ON LAW ENFORCEMENT FORENSIC DETECTION OF STEGANOGRAPHY In the SANS white paper “Steganalysis: Detecting Hidden Information with Compu \