Forensics Journal - Stevenson University 2013 | Page 36

FORENSICS JOURNAL ing plans of mass destruction or other illegal content is increasing daily. Traditional forensics tools provide investigators with the ability to create hash sets that can be used to detect steganographic content, however, the changes to the carrier files are made at such a low level, that the forensic tools are not able to detect the hidden content on their own. By incorporating steganalysis tools as part of a forensic investigator’s professional toolkit, the investigator will be better prepared to detect hidden content during an investigation. RYAN SPISHOCK, CISSP, completed his Masters Degree in Forensic Studies, Information Technology concentration from Stevenson University in July 2012. He received his Bachelor of Science degree in Information Assurance with a minor in Legal Studies from Pennsylvania College of Technology in May 2009. In addition to his BS degree, Ryan also completed Associate of Applied Science degrees in both Cisco and Network Technologies, also from Pennsylvania College of Technology in December 2008. Ryan holds numerous industry certifications including; Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (C|EH), Certified Digital Forensic Examiner (CDFE), Certified Digital Media Collector (CDMC), as well as certifications from CompTIA and Cellebrite Inc. Ryan currently works as a digital forensic examiner at the Department of Defense Computer Forensics Lab (DCFL). Before joining DCFL, he worked as a Information Systems Security Engineer performing Certification and Accreditation security testing for a large defense contractor. REFERENCES Cole, Eric. Hiding in Plain Sight Steganography and the Art of Covert Communication. Indianapolis: Wiley, 2003. Print. Graves, Kimberly. CEH Certified Ethical Hacker Study Guide. Indianapolis: Sybex, 2010. 114-115. Print. Kellen, Michael. “Hiding in Plain View: Could Steganography Be A Terrorist Tool.” SANS Institute. N.p., 31 Oct. 2003. Web. 5 Mar 2012. http://www.sans.org/reading_room/whitepapers/stenganography/hiding_in_plain_view_could_steganography_be_a_terrorist_tool_551 Kessler, Gary. “File Signatures.” N.p., 27 Feb. 2012. Web. 6 Mar. 2012. http://www.garykessler.net/library/file_sigs.html Lau, Stephen. “An Analysis of Terrorist Groups Potential Use of Electronic Steganography.” SANS Institute. N.p., 2003. Web. 5 Mar. 2012. http://www.sans.org/reading_room/whitepapers/stenganography/analysis-terrorist-groups-potential-electronic-steganography_554 McGill, Lachlan. “Steganography The Right Way.” SANS Institute. N.p., 31 Oct. 2003. Web. 2005. http://www.sans.org/reading_room/ whitepapers/stenganography/steganography_the_right_way_1584 NTFS Alternate Streams: What, When, and How To. 2007. Graphic. flexhexWeb. 4 Mar. 2012. http://www.flexhex.com/docs/articles/alternatestreams.phtml Richer, Pierre. “Steganalysis, Detecting Hidden Information with Computer Forensic Analysis.” SANS Institute. N.p., 31 Oct. 2003. Web. 5 Mar. 2012.http://www.sans.org/reading_room/whitepapers/ stenganograp/steganalysis_detecting_hidden_iformation_with_computer_forensic_analysis_1014 “Operating Systems Market Share/Usage.” Stat Owl. N.p.. Web. 11 Dec. 2012. http://www.statowl.com/operating_system_market_share. php 35