Police Magazine Logo
MenuMENU
SearchSEARCH

New Challenges in Cyber Forensics

Today's digital investigator must learn how to extract evidence from drones, encrypted portable devices, cryptocurrency trades, and a growing range of appliances and products defined as the Internet of Things (IoT).

July 13, 2018
New Challenges in Cyber Forensics

Don't say the wake word to a Smart Speaker at a crime scene. If you do and the system hears it, you will destroy evidence. (Photo: Getty Images)

7 min to read


A little more than a decade ago the work of a digital forensic specialist was pretty much about computers. Then along came the iPhone and Android and the challenge of the spread of portable devices. Now new challenges are arising from technologies that few people even imagined before they burst upon the market. Today's digital investigator must learn how to extract evidence from drones, encrypted portable devices, cryptocurrency trades, and a growing range of appliances and products defined as the Internet of Things (IoT).

Drone piloting is one of the most popular hobbies in the United States, and these aircraft are now being used in crime. (Photo: Getty Images)

Flying Things

Ad Loading...

One of the most popular gifts found under the Christmas trees of average Americans the last two years were hobby drones. These small remote-controlled aircraft look like toys, but they are actually extremely sophisticated devices capable of capturing 4K-quality video, carrying payloads, and flying programmed routes well beyond line of sight. So it's little wonder that drones have caught the eyes of enterprising criminals, miscreants, and even terrorists.

The most common criminal activity involving drones is smuggling. These little birds can carry a few pounds of drugs or cellphones or other contraband into prisons. And they have been discovered doing so in the United States and in numerous foreign countries.

Drones can also carry drugs across the border. At least one such failed attempt was discovered south of the California border town of San Ysidro in 2015. Since then more crashed drones have been discovered. And only the unsuccessful ones make the news or fall into law enforcement hands.

The second most common category of drone crimes falls under the heading of harassment and surveillance. Drones are being used by stalkers and sex offenders to monitor their prey. They have also been used to spy on and even disrupt law enforcement operations. Drone pilots have even accidentally or intentionally buzzed and even struck police aircraft.

Weaponized hobby and commercial drones are also common in war zones. In Iraq terrorists have used drone swarms to carry out IED attacks. Last year in one of the most devastating drone attacks ever, pro-Russian separatists hit a huge Ukrainian military munitions storage facility with a single drone carrying a thermite grenade. The attack reportedly destroyed more than $1 billion in arms and ammunition. The size of the drone has not been reported, but the grenade did not have to be large, and there are numerous commercial and even hobby drones that could have done the job.

Ad Loading...

The growing use of drones in criminal activity means that law enforcement is recovering them at crime scenes. Some have crashed; some were intentionally brought down by officers.

Regardless of how a drone that was used in a crime falls into law enforcement hands, pulling evidence off of it will involve digital forensic analysis. But even officers and detectives at the scene need to know how to handle the device. No matter what the drone looks like, it is not a toy. Don't handle it without proper crime scene protocol because you might contaminate physical evidence left on the device by the perps. And don't turn it on because doing so might alter the digital evidence. Also, don't do what some agencies have done and auction off a drone as seized property without having it analyzed for evidence.

Drones are becoming such a concern for forensic investigators that three of the largest makers of cyber evidence analysis software, Cellebrite (www.cellebrite.com), MSAB (www.msab.com), and Oxygen Forensics (www.oxygen-forensic.com), recently demonstrated their new drone analytics tools at the Techno Security & Digital Forensics Conference held last month in Myrtle Beach, SC.

These new drone tools are being incorporated into the companies' flagship cyber forensics software products and can interpret data captured by drones, including flight path, altitude, and speed. They can also help analysts recover video and photos captured by the drone and metadata from any photos or video recovered.

Experts say the amount of evidence that can be pulled off of a drone is limited by what is actually captured by law enforcement. Most of the time, the drone is recovered but not the controller or the smart device used to operate it. And as for data stored in the cloud, that's a non-starter because the servers are in China or controlled by Chinese companies.

Ad Loading...

But there are at least two depositories of cyber evidence on the typical hobby drone: the camera memory and the internal memory. Cellebrite, MSAB, and Oxygen offer training to teach digital forensic specialists how to properly access and analyze this data.

Encoded Cash

One of the greatest challenges now facing law enforcement is the development of cryptocurrencies such as Bitcoin. It's estimated that 25% of all Bitcoin users are involved in some kind of criminal activity. This means that cryptocurrency evidence is becoming more common at crime scenes.

Example of a Bitcoin wallet. (Photo: Aaron Strain)

A cryptocurrency is an encrypted piece of code that can only be read by someone with the keys. It was recently estimated that there are 1,600 of these financial devices available. Only about four of them are really common: Bitcoin, Litecoin, Ethereum, and Monero. There's a reason why these coded currencies are so popular with crooks: They are pretty much untraceable unless you have the public and private keys. Which should be target number one of any investigation of criminal activity involving computers these days.

Let's say you are investigating a scene where someone perpetrated a ransomware attack. Don't think this unlikely. You don't have to be a computer genius to hit an organization or individual with ransomware. Kits for launching such attacks are available on the Dark Web and the bad guys can even hire someone to do it for them and just take a cut.

Ad Loading...

So back to our scenario; you are investigating the home or office of someone suspected of launching a ransomware attack. One of the primary targets of your search is the suspect's cryptocurrency "wallet." This wallet could be a piece of software on a device, it could be a thumb drive-looking piece of hardware, or it could be paper with a series of words or numbers on it, often as many as 16 different sequences or words.

Treat this scene as extremely fragile. Whatever you do, do not turn off any devices or disconnect the drives. Get the experts on scene to capture RAM memory (the memory that erases when the device is shut down).

Alexa, Record My Murder

WiFi technology in our homes and offices has enabled the development of a wide variety of appliances and devices that are connected to the Internet, including smart TVs, refrigerators that track consumption of foods and create shopping lists, and the smart speaker.

The smart speaker, most commonly the Amazon Echo with Alexa software or the Google Home, is by far the most popular device in the Internet of Things (IoT), which is the fastest growing category of digital devices on the market. It is estimated that by 2020, there will be more IoT devices in America than people.

Ad Loading...

Some homes and offices have more than one of these Amazon or Google devices. (The author has three.) These devices listen for their wake words and execute spoken commands such as telling time, setting alarms, playing online radio stations, and answering simple questions. With additional accessories, they can also manipulate thermostats, lighting, and other controls.

Smart speakers are showing up at more and more crime scenes. During a presentation at last month's Techno Security & Digital Forensics Conference four out of approximately 50 digital forensics analysts attending a presentation on IoT devices said they had dealt with smart speakers.

The presence of such devices at crime scenes means officers and analysts need to know how to handle them. The most important thing to know is what not to do. Don't say the wake word. If you do and the system hears it, you will destroy evidence. The system has very limited onboard memory. Saying the wake word erases one of its most recent commands.

Most of the data from smart speakers, however, is captured in the app on the owner's phone or tablet or on the cloud. These devices are not computers; they are portals to computers in the cloud that tell the Alexa or Home or whatever to execute your commands. That's why they are basically paperweights when they lose their WiFi connection.

The good news from an investigative standpoint is that everything ever asked of these devices is stored on the cloud until the user erases it from the app. The bad is that the cloud servers are controlled by huge companies that tend to ignore warrants or fight them. If you really need the command data from a smart speaker your best bet is to access it from the app on the owner's phone or tablet. And of course, the easiest way to do this is to get the victim, suspect, or other individual with legal standing to give you the user name and password.

Ad Loading...

That's exactly what happened in the most publicized instance of investigators seeking evidence from a smart speaker. Benton County, AR, prosecutors served Amazon with a warrant for the cloud data from a murder suspect's Alexa. Amazon fought the warrant, as it probably didn't want to set a precedent of handing over such data. After months of legal wrangling, no precedent was set. The suspect's attorney gave the prosecution the user name and password for the app.

Subscribe to our newsletter

More Technology

Rooftop view off a drone detection devise with two small rubber antennas with an view overlooking a large domed event venue.
TechnologyApril 9, 2026

D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology

D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.

Read More →
Graphic showing four priorities for secure enterprise cloud adoption and a logo for Genetec.
TechnologyApril 2, 2026

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.

Read More →
police car geotab thumbnail for services whitepaper
SponsoredApril 1, 2026

A police department’s guide to fleet management and vehicle health

Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.

Read More →
Ad Loading...
An automated license plate reader mounted on rear trunk of a car.
TechnologyMarch 26, 2026

Public Safety Surveillance Technology: Built on Compliance and Trust

ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.

Read More →
Promotional graphic for Patrolfinder featuring a police chief’s headshot inside a circular frame alongside a police SUV in the background. The headline reads: “Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture.”
SponsoredMarch 17, 2026

Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture

Patrol work hasn’t changed—but the expectations on officers have. See how one police chief helped officers get the right information at the right time, improve patrol visibility, and strengthen trust without adding complexity or surveillance. This real-world story shows how patrol-driven technology can make the job safer, smarter, and more effective—starting on day one.

Read More →
Back small device with headline ATD Gunshot Detection System and a logo for Acoem set against a tinted blue background image of a large city.
TechnologyFebruary 25, 2026

Acoem ATD to Showcase 96-Attribute Acoustic Intelligence Engine for Gunshot Detection

Unlike legacy gunshot detection architectures that require multiple sensors arranged in fixed meshes, Acoem ATD localizes threats with a single sensor by analyzing both the muzzle blast and the ballistic shockwave of a projectile.

Read More →
Ad Loading...
Image of a persons hands on keyboard of laptop with screen that displays multiple images from security cameras
TechnologyFebruary 11, 2026

Genetec Adds New Capabilities for Security Center SaaS Users

Genetec has launched new investigation capabilities in Genetec Security Center SaaS to reduce investigation time from hours to minutes across complex, multi-site, and multi-vendor environments.

Read More →
man in business attire against a black and blue corrugated background and headlines for Versaterm and the man's name and title.
TechnologyJanuary 28, 2026

Versaterm Appoints New Chief Technology Officer

Johann Jooste brings more than two decades of experience designing scalable platforms for law enforcement and emergency services to his new role as chief technology officer at Versaterm.

Read More →
Image of two police officers working on a laptop with logo for CentralSquare and headline Milestone: 1,000+ Cloud Deployments.
TechnologyJanuary 28, 2026

CentralSquare Surpasses 1,000 Cloud Deployments

CentralSquare Technologies has exceeded its Cloud 1000 initiative, reaching 1,065 cloud deployments for public safety agencies.

Read More →
Ad Loading...
Screenshot image of gun detection software showing images of firearm detections.
TechnologyJanuary 21, 2026

ZeroEyes Marks Successful 2025 Highlighted by Rapid Growth, Expanded Partnerships, 1,000+ Confirmed Real World Firearm Detections

AI gun detection company ZeroEyes has doubled its partner channel and expanded its operations center to meet growing demand, plus has surpassed 1,000 verified alerts of confirmed gun detections.

Read More →