Welcome to our Dark Data Blog. I, Rob Zirnstein, have brought back some entries that I wrote in the past, and I plan to write new posts periodically. My intent is not to fill this blog with forced weekly posts, but
In 2008, I wrote a blog entry, Simple Techniques That Fool Forensic Tools, that included an introduction to Alternate Data Streams. Now, I’d like to go into more detail, so that you can better understand the use and danger of
With increasing data storage sizes comes waste. In the Digital Forensics (AKA Computer Forensics) industry, this waste is called slack. Early in the home computer, IBM PC & Macintosh world, the trend moved from floppy disks to hard drives. In
In June of 2021, people in Massachusetts noticed a new application (app) installed on their Android cell phones, that they didn’t initiate. What an unwelcome surprise! Where did that come from? Is someone messing with my phone? Even people driving
What data is Meta (Facebook) hiding about you? For many, Facebook is vital for sharing with friends and relatives. Businesses gain many customers through their advertising on this platform. Meta is a for profit company, and you can’t make a
Unstructured Data sounds like files that store disorganized data or simple text, but I see it as more of a classification term than the description of a file’s lack of internal data structures. Some examples, provided in an article by
If Dark Data is hidden, how can it be dangerous? How much of a threat can it possibly be? Dark Data is everywhere. It’s hidden in the firmware of the smallest devices, like survelance cameras, printers, TV streaming devices, your
What does Dark Data mean? We use this term on our website, as if it is obvious. In the most basic terms, Dark Data is information that is difficult to find. So, in effect it is sitting in the dark.
Recently, I’ve given some presentations on Dark Data. Back in May, I talked about “Dark Data in Live Forensics“, for the TechPoint – New Economy New Rules breakfast. Last month, I covered the topic in more detail with a presentation called, “Dark
The best approach to a Digital Forensics (aka Computer Forensics or Cyber Forensics) investigation has been to perform a “Dead” analysis of the data storage devices. This requires the imaging (or copying) of hard drives, flash drives, discs, etc. for