Bio-hacked humans and digital forensic issues...

Bio-hacked humans and digital forensic issues...

If you thought The Grudge was the scariest thing you’ve seen on screen, you must have not yet watched Showtime’s ‘The Dark Net’.  In short, the series show how humans are procreating less and merging digitally into technology with bio-hacks. That makes for a bad combination on a few different levels.

Without getting into non-techical issues (such as moral, ethical, or legal), I have a technical question: How the heck are we going to going to do a forensic analysis of a bio-hacked…human?

Before the human race ends up looking like robots, we are already in the era of implanting electronic data devices in our bodies.  Check out http://dangerousthings.com to find how you too can jab an injection device into your hand and shoot a RFID under your skin…all by doing it yourself. As for me, I don't think I'll be joining in that movement anytime soon.

RFID (http://en.wikipedia.org/wiki/Radio-frequency_identification) tags store data. Data such as medical, financial, personal, or any type of information can be stored on a RFID tag, although the amount is quite limited currently (2-10 kilobytes?).  That's not much data, but depending on the content, it may be more than enough to cause a war or bankrupt a company.

But even at that low amount of storage, it can raise suspicions in theft of intellectual property, trade secrets, or national security information.  Imagine the use of implanted RFID chips by criminals, terrorists, and corporate spies to exfiltrate and transport sensitive data.  Just when you thought the MicroSD cards presented a threat because of their small sizes, the RFID is even an even bigger problem.  We can find a USB since we can see it. RFID chips implanted under the skin…not so easy.

b2ap3_thumbnail_implant.JPG

Now back to my first question of how we will be doing forensic analysis on a bio-hacked human. When the time arrives where humans are embedded with multiple types of technology and devices, where and how do we start the data acquisition process?   Depending on how much technology is embedded, where it is embedded, and what it is connected to, forensic imaging takes on a whole new world.  

And what if the person (or man-machine cyborg…) doesn’t want to be forensically analyzed? 

b2ap3_thumbnail_robocop.JPG

Maybe for imaging software, we can try Robocopy (looks like the software is already here….).

b2ap3_thumbnail_header.JPGb2ap3_thumbnail_robocopy.JPGhttp://sourceforge.net/projects/robocoprobocopy/

 

 

 

 

 

 

 

 

Books written by practitioners are many times bett...
Tech Talk Can Get You Lost in Lingo
 

Comments 1

Guest - D. Eno on Thursday, 04 February 2016 17:24

"How the heck are we going to going to do a forensic analysis of a bio-hacked…human?" Is that a trick question? First of all.. we need to understand one thing.. in order to commit a 'hack' there has to be a point of intrusion. If there was an unauthorized point of access... there can be an authorized one. I can think of several methodologies that would work and be forensically sound. PS>> that photo of the hand w/ the RFID chip in it? Yeah.. supposed to be the "Right hand or Forehead."

"How the heck are we going to going to do a forensic analysis of a bio-hacked…human?" Is that a trick question? First of all.. we need to understand one thing.. in order to commit a 'hack' there has to be a point of intrusion. If there was an unauthorized point of access... there can be an authorized one. I can think of several methodologies that would work and be forensically sound. PS>> that photo of the hand w/ the RFID chip in it? Yeah.. supposed to be the "Right hand or Forehead." :)
Already Registered? Login Here
Guest
Tuesday, 17 October 2017