Digital Forensics for Archives

Last updated on 2024-05-02 | Edit this page

Overview

Questions

  • Why might archivists, librarians, and other cultural heritage workers want to use digital forensics techniques and tools?
  • What are some known use cases of digital forensics usage amongst archivists, librarians, or others?
  • What is BitCurator? What is the BitCurator environment? Is it the same as “digital forensics”?

Objectives

  • Become familiar with digital forensics techniques and their application in cultural heritage and digital curation
  • Identify and understand various types of magnetic disk removable media, which might be encountered in collections
  • Describe and recommend tools and techniques for extracting content from legacy media, including use of write blockers and creation of disk images
  • Understand various types of metadata that can be generated for born-digital content extracted from legacy media Become familiar with BitCurator and its toolset

Digital Forensics


Digital forensics refers to a suite of activities and tools to preserve the original context of digital materials (e.g., the system timestamps and OS structure) and extract content at the bitstream level from damaged or deleted digital content.

Archivists + Digital Forensics: Why


What are some use cases for digital forensics with legacy born digital materials?

Discussion

Why are you interested in digital forensics for archives and other cultural heritage collections?

What potential uses for these tools are you considering in your context?

Enter BitCurator Environment (BCE)


To address this, a group of archivists and researchers developed the BitCurator Environment, or BCE. The BCE is a suite of open-source digital forensics softwares that are particularly useful to archivists in tracking creation metadata, structure, file identification, and documenting provenance. It even contains some built-in writeblockers and other tools to preserve original order and chain of custody. BitCurator tools are grouped within an Ubuntu-based Linux environment and can be run virtually or installed directly as the main OS of a workstation, and together this is all known as the BCE. We will discuss BCE more in the next episode.

Resources


There are many resources that explain how to use the BCE and other digital forensics tools. Given that this lesson focuses on BCE, most of the resources are geared toward this software environment, but the list also includes a few more general resources:

Key Points

  • Digital forensics identifies a range of activities which aim to extract and preserve contextual information about digital content on external devices, like laptops, servers, drives, and even legacy devices like floppy disks and USB drives
  • Digital forensics tools and techniques can help digital preservation work, particularly in maintaining information about original order, provenance, and chain of custody for digital objects
  • Digital preservation workers, particularly archivists, have used digital forensics techniques and tools to record information about, process, and preserve digital content, and particularly to address content stored on legacy digital devices