You are on page 1of 4

Feature

Digital forensics: the


missing piece of the
Internet of Things promise
Steve Watson, VTO Labs and Ali Dehghantanha, University of Salford Steve Watson Ali Dehgantanha

As technology advances at a blinding pace, the promise of new gadgets to


enhance every facet of our lives tempts every consumer and organisation. From
the ease of automation, control and monitoring of the most mundane aspects
of our lives to advanced lifesaving and monitoring capabilities, our world is conversation in our headlong rush to
changing daily. the promise of connecting every device
on the planet.
No longer do we need to remember to the devices have been compromised.4
water the house plants, feed the dog Yet no reliable forensics application Embedded technologies
or return home to see if the garage or digital forensics guidance exists to
door was closed. At the same time, retrieve the data from IoT devices in IoT devices, wearables, drones, 3D
advanced technologies from our mobile the event of a cyber-event, an active printers, even emerging medical devices
and connected devices can perform a investigation or a litigation request. have a common overlooked thread – all
hospital-grade EKG (electrocardiogram) Not only does guidance not exist, of these new technologies are making
from a remote location and forward industry does not know what data is use of embedded technologies in
the data to our doctors before we captured in most instances, what other their product designs. The concept of
arrive at the hospital. The industry devices the data lands on or – if the connecting devices to the Internet by
focus with these new technologies is data is readable and accessible – if it adding network capability is simply an
on compatibility and ubiquity across could be retrieved. expansion of the embedded technology
devices and experiences. The industry The digital forensics of IoT platforms that have existed for quite
has begun to grapple with securing technologies is the missing some time.
these new devices from both intrusion
and control.1,2

“No reliable forensics


application or digital
forensics guidance exists
to retrieve the data from
IoT devices in the event
of a cyber-event, an
active investigation or
a litigation request”

However a massive gaping hole exists


in our industry planning and execution
on the topic of the Internet of Things
(IoT). Every new device we create,
every sensor we deploy, every byte we
synchronise to other locations will at
some point come under scrutiny in
the course of investigations and legal
matters.3 The very principle that we
must ‘secure’ the devices implies that we Traditional forensics tools, such as FTK Imager, are geared towards conventional computers and their file
systems, and may not be suitable for IoT devices, which may lack operating systems and file systems.
will be able to accurately determine if

5
June 2016 Computer Fraud & Security
Feature

With the rapid growth and expansion figure out how to get started examining investigation are wearables, drones,
of these new network-connected the device. prototyping microcontrollers, medical
technology platforms, one area of Is there data with evidentiary value devices, sensor networks, home
science is struggling to keep pace. within these new technology devices? automation, IoT, vehicles, 3D printers,
Digital forensics is the branch of Does it exist on the device, or across connected appliances, security systems,
forensic science concerned with the a network connection retrieving and access control systems, mobile phones
recovery and investigation of data storing the information? and sensor network technologies.
found on digital devices. As these Most embedded device examples
new and updated platforms based Why embedded contain onboard flash to run a pared-
on embedded technologies emerge,
the industry and its practitioners are
technologies are down operating system or real-time
application executables. As the devices
struggling to develop the tools and challenging do not have traditional hard drives
procedures to keep pace with (magnetic or solid state) that can be
the technology. The challenge for digital forensic removed and are not running full
practitioners is that industry tools computer operating systems, new
“When you call your and capabilities have historically been techniques must be created to retrieve
investigation team to focused on traditional computer the data. In the instance where the
ask them if this Internet- operating systems or magnetic embedded device is using a modified
enabled refrigerator was the media. The industry development mobile operating system, some
source of infection on your of mobile forensic tools has made mobile forensic tools may assist in the
network, they will likely great inroads into a specific area of acquisition of the data or parsing the
look blank” embedded technologies (mobile phone data into usable formats.
technology). Yet even mobile forensic If the embedded device is running a
Embedded technologies are vendors are feeling the strain of new real-time application, decompiling the
electronics or computing systems with device types, encryption capabilities acquired application may be required
specific functions that may exist as part and the evolution of mobile operating to understand what the application
of a larger platform. An embedded systems into new embedded devices like is doing and where the data is being
technology design includes some or all wearables and automobiles. saved. Advance data recovery techniques
of the following components: a PCB are required when performing data
“Advance data recovery
(printed circuit board); microcontroller; acquisitions from embedded devices.
techniques are required
RAM; flash memory; and networking Analysis of the network traffic from the
when performing data
capabilities (eg, Bluetooth, wifi, GSM). device can provide clues to what the
acquisitions from embedded
In the case of modern embedded device is doing and where the data may
devices. Analysis of the
technologY designs, the larger platform be landing.
network traffic from the
may include other wireless connected Since the embedded devices may
device can provide clues to
devices and centralised storage systems have limited flash memory storage, it is
what the device is doing
(eg, wearable device connected to common for the device to be connected
and where the data may
smartphone, synchronising to to another device for expanded network
be landing”
the cloud). capability and offline storage. These
An Internet-enabled refrigerator or The digital forensic complexity for alternative storage locations may have
kitchen appliance is a great example embedded technologies centres around expanded data from what exists on the
of a new embedded technology device three issues: device, including a longer historical
that is not a full computer in the 1. The onboard data storage is not timeline, configuration information,
traditional form factor we have grown accessible via traditional digital even user information identifying
accustomed to, yet the device has forensics methods. further sources that may hold
enough technology inside for it to 2. The cumulative dataset may exist in additional data (eg, Internet storage aka
talk to a network, receive commands multiple locations. the cloud).
and send statuses. When you call your 3. Even if the data can be acquired it If data can be retrieved from the
investigation team to ask them if this may not be readable or accessible with wearable device, it may be that the data
Internet-enabled refrigerator was the existing tools. is encrypted or stored in a non-standard
source of infection on your network, Examples of embedded technology data format for which a viewer does
they will likely look blank as they try to areas that are challenging for forensics not yet exist. Extensive data parsing or

6
Computer Fraud & Security June 2016
Feature

conversion may be required to derive will be called upon to retrieve data that are working hard to identify tools,
meaningful content from the data may exist on these devices. techniques and capabilities to enhance
retrieved off the device. This challenge As we look ahead to a world of digital forensics capabilities against
is not new to those working in the expanding ubiquitous computing, the these new technology platforms. In
area of mobile device forensics as the challenge grows in this space. We don’t some instances, recovery of data from
technology has evolved very quickly in anticipate the numbers of end nodes some of these new technologies may
recent years. diminishing in the future but rather not be possible – or if it is possible,
expanding at rates faster than we have the data may not be readable. The
“What happens when encountered to date. If these devices are digital forensics community seeks your
someone’s IoT home more vulnerable on networks because of patience as we work through these new
automation system is immature security capabilities, we can and challenging areas.
disabled by a suspect to be assured that investigations will be Device manufacturers should
gain entry into a home? Or needed to understand what role these consider that, at some point in the
embedded sensor technology devices played in a breach. future, data from their new devices
in new IoT-equipped cities may very well be requested in a legal
captures hundreds of In conclusion matter. Device manufacturers should
additional data points at the consider at the outset how data may be
precise scene of a crime?” So far, it might be clear that embedded extracted from the device, or provide
technology forensics should be escalated a position statement if the data is
The Internet-enabled toaster would to senior digital forensic practitioners known to be inaccessible once retrieved.
be affected by each of these challenges. experienced in devices that present This guidance could be maintained
None of the industry tools would challenges. Practitioners experienced internally to assist legal teams in
support the toaster for digital forensics with mobile phone forensics including responding to subpoenas or requests for
today. Data about the commands that JTAG and chip-off, or general data when the needs arise.
were sent to the toaster could reside on practitioners experienced in damaged With the projected growth in IoT
the appliance, the connected devices devices may have relevant experience device development, the challenge for
or even a remote cloud account. Even to complete acquisitions. Techniques those securing and investigating these
if the data could be acquired from the used to parse data from hard drives and embedded technology devices will also
flash memory on the device, it is highly mobile device images may be successful continue to grow.
likely that the existing digital forensic on data acquired from embedded
tools in your toolbox will not know technologies. Consider the other About the author
how to interpret the data. locations where the embedded device Steve Watson is the founder of VTO Labs, a
may be located. In some instances, it firm focused on the most challenging areas
The need for forensics may be easier to acquire the necessary of data preservation, data recovery and
data from the connected devices than digital forensics. With nearly two decades
It is not a great leap to imagine from the primary embedded device. of experience in information technology,
wearable technologies being used as information security and investigations, he
corroborating evidence that a person “Device manufacturers is also an active digital forensic researcher
may have been asleep or exercising at should consider at the outset working in the areas of data recovery from
the precise time an event was occurring. how data may be extracted emerging technologies and damaged devices.
What happens when someone’s IoT from the device, or provide When he’s not destroying devices for damaged
home automation system is disabled by a position statement if devices research or taking apart the new
a suspect to gain entry into a home? Or the data is known to be technologies we see on the Internet, he
embedded sensor technology in new inaccessible once retrieved” supports clients in the areas of data recovery
IoT-equipped cities captures hundreds for litigation and investigations. Watson sits
of additional data points at the precise Moreover, legal authorities should on two Federal committees related to digital
scene of a crime? How will we know understand that digital forensic forensics and is pursuing a PhD in
when an edge node IoT device is capabilities in these new, emerging digital forensics.
compromised over an uncommon technologies are not on pace with Dr Ali Dehghantanha (www.alid.info)
network protocol, gaining a foothold digital forensics of traditional is a Marie-Curie International Incoming
into an existing network? In these computer technologies. Digital Fellow in Cyber Forensics and has served
instances, digital forensics practitioners forensics researchers and practitioners for many years in a variety of research and

7
June 2016 Computer Fraud & Security
FEATURE

industrial positions. In addition to a PhD S1361372315300282. 9th IEEE International Conference


in cyber-security, he holds many professional 2. Daryabar, F; Dehghantanha, A; on Collaborative Computing:
certificates such as GREM, CISM, CISSP Udzir, NI; bin Shamsuddin, S. Networking, Applications
and CCFP. He has served as an expert ‘Towards secure model for SCADA and Worksharing, 608-615
witness, cyber forensics analyst and malware systems’. In Proceedings Title: (ICST, 2013). doi:10.4108/icst.
researcher with leading players in cyber- 2012 International Conference collaboratecom.2013.254159.
security and e-commerce. on Cyber-security, Cyber Warfare 4. Tankard, C. ‘The security issues of
and Digital Forensics (CyberSec), the Internet of Things’. Computer
References 60-64 (IEEE, 2012). doi:10.1109/ Fraud & Security, Sep 2015, pp.11-
1. Liu, C. ‘Securing networks in the CyberSec.2012.6246111. 14. Accessed May 2016. www.
Internet of Things era’. Computer 3. Oriwoh, E; Jazani, D; Epiphaniou, sciencedirect.com/science/article/pii/
Fraud & Security, Apr 2015, pp.13- G; Sant, P. ‘Internet of Things S1361372315300841.
16. Accessed May 2016. www. Forensics: Challenges and
sciencedirect.com/science/article/pii/ Approaches’. In Proceedings of the

Making security
awareness training work
Tracey Caldwell, freelance journalist

Tracey Caldwell
Most security experts would agree that the weakest link in the security chain is
human. There is an increasing acknowledgement that all employees need to have some
level of understanding of the part they can play in keeping an organisation’s systems
and data secure. Many organisations are providing security awareness training but
there is real concern that this is simply not working. In fact, a recent survey by Axelos
has found that professionals responsible for security awareness training were reporting
that the training was largely ineffective.1

Axelos, a joint venture of the UK help employees spot email cyber-attacks Even where training is provided,
Government and UK firm Capita, and a quarter do so only once, when the it is widely failing to do its job. Ian
which produces the Resilia best practice employee joins the company, according Kilpatrick, chairman of the Wick
solutions, questioned 100 executives to Mimecast, which conducted a survey Hill Group, says: “There is plenty
responsible for information security of 436 IT experts at organisations in the of training available; however, there
training in organisations with more than US, UK, South Africa and Australia in is a significant difference between
500 employees. Only a third rated their March 2016. training staff and changing behaviour.
training as ‘very effective’ in reducing Many organisations can waste money
the chances of an information security training staff and fail to manage the
breach; less than half (42%) said their follow up to ensure that the training is
awareness learning is ‘very effective’ at effective in both the workplace and in
providing general awareness of security the individual’s approach to security.
risks; while fewer than a third said their Because of the mix and overlap between
cyber-security awareness training is ‘very work and home, if you don’t change
effective’ at changing staff behaviours in home security behaviour, it is hugely
relation to information security. more difficult to effect change in
This is against the backdrop of the office.”
the fact that companies that provide He warns: “One-off training, while
security awareness training are still Answers to the question: ‘How frequently do helpful, can create a false sense of
in the minority. In fact a quarter of you train your employees to spot email cyber- security. Over time, staff can and will
attacks’. Source: Mimecast.
companies never carry out training to drift back into old insecure habits.”

8
Computer Fraud & Security June 2016

You might also like