Digital Forensics - USB drive investigation

The importance of contemporaneous notes in digital forensics. A simulation where I act as a digital forensics expert to find malicious images from a USB drive taken as evidence.

800x400

This investigation focuses on the forensic analysis of a USB stick image, validated against its provided MD5 hash to ensure integrity. All actions taken during the investigation will be thoroughly documented, including accurate timestamps and the specific forensic tools used, along with their version numbers.

Contemporaneous notes will be maintained and digitally signed by the end of each day to preserve the chain of custody and support evidence admissibility. The investigation will address the questions provided by the line manager and will strictly remain within the defined scope of the case.

The investigation

ExhibitDescription
#DFT-USB-A-218Forensic image of a USB stick
#DFT-MD5-A-218Exhibit contains the MD5 hash value of the USB stick provided by the line manager.
Tools / Operating system usedVersionPurpose
Tsurugi Linux VM6.9.3Operating system
Autopsy4.21.0GUI Digital forensics platform
John the Ripper1.9.0Password cracking tool for recovered password protected zip files
Python3.9.0Create scripts to automate extracting hidden plaintext from stego images (steganography)

Questions:

  1. Evidence of weapon images: Does the USB stick (#DFT-USB-A-218) contain or appear to have previously contained weapon-related images? If so, how many unique images are present?
    • To determine uniqueness, I calculated the MD5 hash of each image (sufficient for this case, though SHA-256 would provide stronger collision resistance).
  2. Source of images: Is there evidence indicating how the images were obtained?
    • Possible acquisition methods include communication channels (e.g., email, instant messaging) or downloads from external sources. Further analysis of browser history is required.
  3. Individual vs group involvement: Are there signs that the suspect acted independently or as part of an organized group?
    • This requires tracking references to group names, aliases, or other individuals, then assessing their relevance to the case.
  4. Legality of imports: As possession of weapon images is not inherently illegal outside of England, is there evidence suggesting unlawful imports? If so, for what duration?
    • Clarification from the line manager is needed on the definition of “illegal imports” (e.g., whether it refers to foreign downloads, specific file origins, or geolocation). I will send an email to confirm this.
  5. Third-party access: Is there evidence that another individual accessed the USB stick?
    • File metadata will be examined for signs of different owners or users. A Python script can be written to automate this analysis.

Contemporaneous notes (digitally signed)

800x400

The screenshot above displays the contemporaneous notes (CN) recorded during my investigation. Each entry includes a Timestamp Query (TSQ) and a corresponding Timestamp Response (TSR) for every day changes were made. This process verifies the existence and authenticity of the CN at specific points in time.

This is important as it provides the following:

  • Verifies authenticity: Timestamping proves the contemporaneous notes were created at specific times and haven’t been altered, ensuring their integrity.

  • Supports legal admissibility: Time-stamped documentation strengthens credibility in legal or disciplinary proceedings by showing the notes were made during the actual investigation.

  • Maintains investigative transparency: It demonstrates a clear, verifiable timeline of actions taken, aligning with forensic best practices and chain of custody standards.

Outcome of my investigation

I’ve collected evidence from exhibit #DFT-USB-A-218 and ensure integrity of the notes by digitally signing at the end of each day. I ensured to timestamp anytime I use a tool such as Autopsy, Python, JtR and more. Any action made is timestamped with a statement to describe the choices I made in the investigation. In addition, I provided repeatable steps so further investigators can reproduce the same results. I was able to answer the following questions after doing my investigation (doesn’t include contemptuous notes):

  1. Evidence of weapon images: Does the USB stick (#DFT-USB-A-218) contain or appear to have previously contained weapon-related images? If so, how many unique images are present?

During my analysis of exhibit #DFT-USB-A-218, I identified 16 unique weapon images stored on the device:

  • 5 images were recovered from the deleted _ILES folder.
  • 11 images were extracted from compressed archives within the same folder.

Further investigation of the suspect’s web history uncovered 2 additional unique images that were not present on the USB stick itself.

In total, my investigation revealed 18 unique weapon images, with 16 directly linked to exhibit #DFT-USB-A-218.

  1. Source of images: Is there evidence indicating how the images were obtained?

The 16 weapon images recovered from the USB stick were traced back to a website operated by individuals identified as James and Dan. The suspect accessed these by downloading publicly available images from the site and applying a Least Significant Bit (LSB) steganography tool to extract hidden passphrases, which were then used to unlock the weapon images.

In addition, analysis of the browser history confirmed that the suspect accessed two further weapon images (not stored on the USB stick) via weapongrove.com and wikipedia.org.

  1. Individual vs group involvement: Are there signs that the suspect acted independently or as part of an organized group?

The investigation revealed evidence linking the suspect, Ben, to an organised group led by James and Dan. This conclusion is supported by two key findings:

  • A hidden message embedded within Crime.pdf.
  • A secret email from Dan referencing his collaboration with James.

Together, these findings point to a coordinated operation with a defined hierarchy.

  1. As weapon images are not illegal outside of England, is there evidence of potential illegal imports of such images? If so, for how long?

The investigation found no conclusive evidence of illegal imports. Available data indicated downloads from open sources such as Wikipedia and Google, but these did not provide reliable information about geographic origin or confirm any illegality.

  1. Is there evidence of another party having accessed the USB stick?

Forensic analysis found no indication of access by any user other than Ben on the USB stick.


© 2025. All rights reserved.

Powered by Hydejack v9.2.1