Menu
  • Home
  • Brett's Blog
  • My Books
  • Courses
  • About Me
  • Contact
  • Home
  • Brett's Blog
  • My Books
  • Courses
  • About Me
  • Contact

Brett Shavers | Ramblings

Brett's Ramblings

Subscribe to blog
Unsubscribe from blog
Settings
Sign In
If you are new here, Register
  • Forget Username
  • Reset Password
Font size: + –
Subscribe to this blog post Unsubscribe
Report
Print
2 minutes reading time (386 words)

Bio-hacked humans and digital forensic issues...

Digital Forensics
Brett Shavers
Wednesday, 03 February 2016
4283 Hits
1 Comment
Bio-hacked humans and digital forensic issues...

If you thought The Grudge was the scariest thing you’ve seen on screen, you must have not yet watched Showtime’s ‘The Dark Net’.  In short, the series show how humans are procreating less and merging digitally into technology with bio-hacks. That makes for a bad combination on a few different levels.

Without getting into non-techical issues (such as moral, ethical, or legal), I have a technical question: How the heck are we going to going to do a forensic analysis of a bio-hacked…human?

Before the human race ends up looking like robots, we are already in the era of implanting electronic data devices in our bodies.  Check out http://dangerousthings.com to find how you too can jab an injection device into your hand and shoot a RFID under your skin…all by doing it yourself. As for me, I don't think I'll be joining in that movement anytime soon.

RFID (http://en.wikipedia.org/wiki/Radio-frequency_identification) tags store data. Data such as medical, financial, personal, or any type of information can be stored on a RFID tag, although the amount is quite limited currently (2-10 kilobytes?).  That's not much data, but depending on the content, it may be more than enough to cause a war or bankrupt a company.

But even at that low amount of storage, it can raise suspicions in theft of intellectual property, trade secrets, or national security information.  Imagine the use of implanted RFID chips by criminals, terrorists, and corporate spies to exfiltrate and transport sensitive data.  Just when you thought the MicroSD cards presented a threat because of their small sizes, the RFID is even an even bigger problem.  We can find a USB since we can see it. RFID chips implanted under the skin…not so easy.

b2ap3_thumbnail_implant.JPG

Now back to my first question of how we will be doing forensic analysis on a bio-hacked human. When the time arrives where humans are embedded with multiple types of technology and devices, where and how do we start the data acquisition process?   Depending on how much technology is embedded, where it is embedded, and what it is connected to, forensic imaging takes on a whole new world.  

And what if the person (or man-machine cyborg…) doesn’t want to be forensically analyzed? 

b2ap3_thumbnail_robocop.JPG

Maybe for imaging software, we can try Robocopy (looks like the software is already here….).

b2ap3_thumbnail_header.JPGb2ap3_thumbnail_robocopy.JPGhttp://sourceforge.net/projects/robocoprobocopy/

 

 

 

 

 

 

 

 

Tweet
Share on Pinterest
0
Tags:
surveillance privacy imaging
Books written by practitioners are many times bett...
Tech Talk Can Get You Lost in Lingo

About the author

Brett Shavers

Brett Shavers

 

Comments 1

Guest
Guest - D. Eno on Thursday, 04 February 2016 09:24

"How the heck are we going to going to do a forensic analysis of a bio-hacked…human?" Is that a trick question? First of all.. we need to understand one thing.. in order to commit a 'hack' there has to be a point of intrusion. If there was an unauthorized point of access... there can be an authorized one. I can think of several methodologies that would work and be forensically sound. PS>> that photo of the hand w/ the RFID chip in it? Yeah.. supposed to be the "Right hand or Forehead."

0 Cancel Reply
"How the heck are we going to going to do a forensic analysis of a bio-hacked…human?" Is that a trick question? First of all.. we need to understand one thing.. in order to commit a 'hack' there has to be a point of intrusion. If there was an unauthorized point of access... there can be an authorized one. I can think of several methodologies that would work and be forensically sound. PS>> that photo of the hand w/ the RFID chip in it? Yeah.. supposed to be the "Right hand or Forehead." :)
Cancel Update Comment
Guest
Saturday, 25 March 2023

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.brettshavers.com/

direct link

DFIR Training

Be sure to check out my DFIR Training website for practically the best resources for all things Digital Forensics/Incident Response related.


Brett's blog

© 2023 Brett Shavers