IoT Forensics: What Your Smart Home Knows About You

Please Share This Story!
This article was received as an email from MIT, but it reveals new information about the topic of IoT forensics, or, discovering what data is hoovered up and stored on you smart home devices. If your home ever becomes a crime scene, all that data could be extracted and analyzed to bite hard. These are the very dangers that TN has been warning about since its inception. ⁃ TN Editor

Do you know how many internet-connected devices there are inside your home? I certainly don’t. These days, it could be almost anything: a thermostat, a TV, a lightbulb, an air conditioner, or a refrigerator. But what I do know, thanks to some of the conversations I’ve had over the past few weeks, is just how much data they’re producing, and how many people can access that data if they want to. Hint: it’s a lot.

I’ve been speaking to people who work in a field called IoT forensics, which is essentially about snooping around these devices to find data and, ultimately, clues. Although law enforcement bodies and courts in the US don’t often explicitly refer to data from IoT devices, those devices are becoming an increasingly important part of building cases. That’s because, when they’re present at a crime scene, they hold secrets that might be invisible to the naked eye. Secrets like when someone switched a light off, brewed a pot of coffee, or turned on a TV can be pivotal in an investigation.

Mattia Epifani is one such person. He doesn’t call himself a hacker, but he is someone the police turn to when they need help investigating whether data can be extracted from an item. He’s a digital forensic analyst and instructor at the SANS Institute, and he’s worked with lawyers, police, and private clients around the world.

“I’m like … obsessed. Every time I see a device, I think, How could I extract data from there? I always do it on test devices or under authorization, of course,” says Epifani.

Smartphones and computers are the most common sorts of devices police seize to assist an investigation, but Epifani says evidence of a crime can come from all sorts of places: “It can be a location. It can be a message. It can be a picture. It can be anything. Maybe it can also be the heart rate of a user or how many steps the user took. And all these things are basically stored on electronic devices.”

Take, for example, a Samsung refrigerator. Epifani used data from VTO Labs, a digital forensics lab in the US, to investigate just how much information a smart fridge keeps about its owners.

VTO Labs reverse-engineered the data storage system of a Samsung fridge after it had primed the appliance with test data, extracted that data, and posted a copy of its databases publicly on their website for use by researchers. Steve Watson, the lab’s CEO, explained that this involves finding all the places where the fridge could store data, both within the unit itself and outside it, in apps or cloud storage. Once they’d done that, Epifani got to work analyzing and organizing the data and gaining access to the files.

What he found was a treasure trove of personal details. Epifani found information about Bluetooth devices near the fridge, Samsung user account details like email addresses and home Wi-Fi networks, temperature and geolocation data, and hourly statistics on energy usage. The fridge stored data about when a user was playing music through an iHeartRadio app. Epifani could even access photos of the Diet Coke and Snapple on the fridge’s shelves, thanks to the small camera that’s embedded inside it. What’s more, he found that the fridge could hold much more data if a user connected the fridge to other Samsung devices through a centralized personal or shared family account.

None of this is necessarily secret or undisclosed to people when they buy this model of refrigerator, but I certainly wouldn’t have expected that if I were under investigation, a police officer—with a warrant, of course—could see my hungry face each time I opened my fridge hunting for cheese. Samsung didn’t reply to our request for comment, but it’s following pretty standard practices within the world of IoT. Many of these sorts of devices access and store similar types of data.

Devices don’t even have to be particularly sophisticated to prove helpful in criminal investigations, according to Watson and Epifani.

Both of them have both worked on devices more discreet than smart fridges. Once, VTO Labs examined a circuit board from an ocean buoy in an effort to find out whether it contained any data about the shipping movements of drug traffickers. Watson says that the circuit board revealed a satellite communications provider and, ultimately, the account number associated with a smuggler.

Just to compound the plentiful security and privacy risks, many IoT devices also run on out-of-date, and thus less secure, operating systems, because users rarely remember to update them. “Can you imagine people updating their fridge? No, they don’t,” says Epifani.

This problem is only going to grow as we stuff our homes with more and more things that connect to the internet. Recently, the Atlantic wrote a great pieceabout the data that smart TVs collect on their couch-bound watchers. My colleague Eileen Guo showed how Roomba vacuums can take invasive pictures, in an investigation about how data was collected on people who were testing the products.

Watson is not especially worried about the government or the tech companies spying on you through your thermostat, per se. He’s more worried about all the ways your data is being sold and accumulated by data brokers.

“That’s where the risks are that people don’t understand: if my bed tracks my sleep and tracks my heart rate, and that company is selling off this information to an insurance company that realizes you have a near cardiac event every time you go to sleep, or that you have sleep apnea or whatever,” he says.

“The more technology encroaches into our lives in every facet … we lose the ability to have any measure of control over where it’s going, how much is collected, who’s getting their hands on it, and what they are doing with it.”

Read full story here…

About the Editor

Patrick Wood
Patrick Wood is a leading and critical expert on Sustainable Development, Green Economy, Agenda 21, 2030 Agenda and historic Technocracy. He is the author of Technocracy Rising: The Trojan Horse of Global Transformation (2015) and co-author of Trilaterals Over Washington, Volumes I and II (1978-1980) with the late Antony C. Sutton.
Notify of

Newest Most Voted
Inline Feedbacks
View all comments

I’ve been working in the security “industry” for the past thirty years. I don’t have any wireless devices in my home (other than my cell phone); no wifi, no bluetooth. My computer and all its periferals are hard wired. I don’t have and won’t buy anything that has IoT capabilities. I’ve installed a bunch of this stuff and integrated all the customer’s devices and I just cannot comprehend the need for all this “convenience”. I’ve been working in homes when I’ve heard the homeowner say “Alexa”. I don’t talk inside the home after I have heard that. None of this… Read more »

[…] Sourced from Technocracy News & Trends […]

[…] „Acest articol a fost primit ca e-mail de la MIT, dar dezvăluie noi informații despre subiectul criminalisticii care implică IoT, descoperind ce date sunt colectate și stocate pe dispozitivele dvs. inteligente de acasă. Dacă locuința ta devine vreodată o scenă a crimei, toate aceste date pot fi extrase și analizate. Acestea sunt chiar pericolele cu privire la care Technocracy News a avertizat încă de la începuturi.” (Patrick Wood) […]

[…] „Acest articol a fost primit ca e-mail de la MIT, dar dezvăluie noi informații despre subiectul criminalisticii care implică IoT, descoperind ce date sunt colectate și stocate pe dispozitivele dvs. inteligente de acasă. Dacă locuința ta devine vreodată o scenă a crimei, toate aceste date pot fi extrase și analizate. Acestea sunt chiar pericolele cu privire la care Technocracy News a avertizat încă de la începuturi.” (Patrick Wood) […]