Digital Forensics

1492 Words3 Pages

. Ten years later, there was a separate child pornography task force in half of all FBI offices; many other law enforcement agencies also operated their own task forces. This “new” violation resulted in the seizure of ever-increasing volumes of digital evidence and was a major driver in the growth of digital forensics" (Pollitt 9). Quickly, organized crime began to realize the potential of computers (and the internet) as well. The terrorists involved in the 9-11 attacks were using computers with a technical ability much higher than the average user at that time; "This was further reinforced on the battlefields of Iraq and Afghanistan. The intelligence community, law enforcement, and the military realized that the lack of digital forensic capabilities …show more content…

Each level poses its own challenges, both technical and legal. Included in these three categories are subdivisions "Various major areas make up the IoT. These include cloud, virtualization, fixed computer, sensor and RFID technologies, and artificial intelligence. Forensics in the IoT will, therefore, encompass forensics in all these areas and more" (Oriwoh 608). The device level includes potential data stored on the devices themselves, "an investigator may need to collect data from the local memory of the IoT devices. When a crucial piece of evidence needs to be collected from the IoT devices, it involves device level forensics" (Zawoad 2). Network forensics involves network captures or log files from the devices or networking tools. While this is not solely part of IoT forensics (network captures and logs may play a vital role in traditional digital forensic investigations), it would be remiss not to mention it as an important section of the IoT investigation structure. The third level of the IoT forensic investigation structure is cloud forensics. Due to the limited storage capacity and computing ability of these devices "data generated from the IoT devices and IoT networks are stored and processed in the cloud. This is because cloud solutions offer various …show more content…

Firstly, where are the sources of evidence? They can include computers, mobile phones, various cloud services, home appliances, cars, embedded systems, sensor nodes/networks, medical implants, and other IoT devices. While this is not an all-encompassing list, it gives one a general idea of the diversity of evidence in an IoT investigation. With these devices, the legal aspect comes into play as well. The jurisdiction of these devices can include individual, societal, company, government, and others. The complications involved with the legal portion of acquiring and analyzing the information in a court-approved way cannot be overlooked. It will take constant work with a legal team to ensure the data is extracted with the explicit permission of all necessary parties. Next, one must consider the types of networks involved. This can include Bluetooth, RFID, and sensor networks. Each device may not communicate in the same way, over the same kind of network. They can also interface differently between devices in one's Personal Area Network (PAN), Local Area Network (LAN), and Wide Area Network (WAN). Additionally, one must consider the types of evidence these devices produce. The types of evidence can include data stored in proprietary formats, which no commercial tool can interpret. Any format or extension is possible when dealing with proprietary data from different IoT devices. Finding a way to read

Open Document