Digital Forensics and Digital Preservation

Vintage Equipment at the LOC Packard Campus

Vintage Equipment at the LOC Packard Campus

Libraries, archives, and museums are acquiring increasing numbers of born-digital collections. I’ve been interested to see the increased use of digital forensics tools in the appraisal and processing and accessing of such collections. But there are challenges.

Some of the software tools come from the realm of legal forensics, where chain of custody and recovery of maliciously destroyed or intentionally deleted files are among the key goals.  Some of the software introduces new technical concepts – what are Disk images? Or checksums?

Archives are looking at vintage media, which often requires vintage hardware and software, or specialized hardware.  What’s a FRED? And what could a Catweasel possibly be?   Libraries are setting up forensics labs to deal with these new collections (Stanford, the Bodleian, among others).  The collections at the Library’s Packard Campus or at the Computer History Museum are something to behold, but I shudder at what it will take to keep the equipment operational.

There is definitely a need to document computing history in aid of digital preservation. There are multiple initiatives to document and verify file formats (Sustainability of Digital FormatsGDFR, UDFR, JHOVE2, PRONOM, DROID). There is at least one initiative to document carrier media (MediaPedia). There are archives of manuals (University of Minnesota Charles Babbage Institute). I am thinking a lot about what other sorts of documentation are needed – operating systems, application software, hardware of all types… I heard these challenges subtly woven through many presentations and discussions at the Library’s 2010 storage architecture meeting.  To understand some of the challenges, I recommend two recent key reports:  Preserving Virtual Worlds and Digital Forensics in Cultural Heritage.

5 Comments

  1. wbriggs@nfb.org
    June 7, 2011 at 10:18 am

    Interesting

  2. Leo King
    June 7, 2011 at 1:24 pm

    About ten years ago I wrote a book about Amtrak’s Acela Express trains. It was completely digital, beginning with Microsoft Word 2.0 as I recall. Over the years since then, I have “translated” it into newer forms of Word, including the most current, Word 2010.
    Now, my book is being published (ISBN 978-1-59073-024-9) by Carstens Publications in New Jersey.
    My editor, Chris Lane, also got about a dozen digital photos. The were shot in a digital camera (Nikon Coolpix) but I had to increase the values to 300 dpi.
    Many more photos were film, and he is scanning the usable ones to digital format.
    I’m adding my e-mail address below in case anyone wants to ask questions.
    Albest,
    Leo King
    train1812@att.net

  3. Schelly Talalay Dardashti
    June 7, 2011 at 2:57 pm

    Would it be possible to change the feed title to read LOC Signal Blog? This would differentiate the blog posts from all the other frequent LOC messages on events and programs that are sent out. I cannot distinguish between the blog emails and the LOC emails from the title on the email.

    This might help many bloggers and others who receive mountains of emails each day.

    with best wishes
    Schelly Talalay Dardashti
    Tracing the Tribe: The Jewish Genealogy Blog
    http://tracingthetribe.blogspot.com

  4. Bill LeFurgy
    June 7, 2011 at 3:42 pm

    Thanks for the suggestion! We will pass it on to our web services team.

  5. Omajiman
    September 2, 2014 at 2:15 am

    If there is identity theft attack or phishing attack. What information can I gather about this attack using network forensics.

Add a Comment

This blog is governed by the general rules of respectful civil discourse. You are fully responsible for everything that you post. The content of all comments is released into the public domain unless clearly stated otherwise. The Library of Congress does not control the content posted. Nevertheless, the Library of Congress may monitor any user-generated content as it chooses and reserves the right to remove content for any reason whatever, without consent. Gratuitous links to sites are viewed as spam and may result in removed comments. We further reserve the right, in our sole discretion, to remove a user's privilege to post content on the Library site. Read our Comment and Posting Policy.

Required fields are indicated with an * asterisk.