Medical Equipment Used for Forensic Data Extraction: A low-cost solution for forensic laboratories not provided with expensive diagnostic or advanced repair equipment

Abstract The data found on mobile phones, SIM cards, micro-SD cards, or Internet of Things devices are often decisive for judicial investigations because they provide a wealth of information to guide investigations; not to say solve them. However, investigators have to deal with two problems that greatly complicate the extraction of data from digital equipment: encryption of data and damage to the evidence (explosion, immersion, deliberate destruction, air crash, accidents). In these cases, investigators often have to be creative in order to successfully extract data from electronic devices in a judicial setting. Using medical equipment for data extraction is a new way that perfectly illustrates this creativity, which is necessary otherwise the investigator will be blocked by the new technology of protection and encryption. In this paper we will make use of four medical materials and equipment used routinely in the forensic autopsy field: the mobile 2D X-ray radiograph (used by dentists), the whole body 3D X-ray scanner, the dental control unit (burr and drill of dentists for legal odontolgy), and dental paste to model the teeth when identifying disaster victims. This work introduces medical materials and equipment that can be used by investigators for data extraction and introduces cheap alternatives for existing expensive solutions from the failure analysis industry. To demonstrate feasibility, we describe in detail experimental forensic cases in which medical devices could help data extraction: reverse-engineering, diagnostic samples, and preparation of mobile phones for forensic transplantation. In the final part, we look at the legal medicine of the future. We believe that the autopsy of tomorrow will definitely have to be supplemented by analysis of the electronic components present in the body (pacemaker, bio-sensor). Medical examiners and experts in electronics must now work together to put in place the forensic procedures of tomorrow.

[1]  Frank Breitinger,et al.  Anti-forensics , 2016 .

[2]  W. Haverkamp,et al.  Cardiac Implantable Electronic Device Interrogation at Forensic Autopsy: An Underestimated Resource? , 2018, Circulation.

[3]  Thibaut Heckmann,et al.  Reverse engineering secure systems using physical attacks , 2018 .

[4]  M. Thali,et al.  Why We Need Postmortem Analysis of Cardiac Implantable Electronic Devices , 2016, Journal of forensic sciences.

[5]  E. Gilbert-Barness,et al.  Handbook of Pediatric Autopsy Pathology , 2004 .

[6]  David Naccache,et al.  Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling and re-soldering , 2016, Digit. Investig..

[7]  Iosif Androulidakis Mobile phone security and forensics , 2012 .

[8]  Alex A. Volinsky,et al.  FIB Failure analysis of memory arrays , 2004 .

[9]  Mike Bond,et al.  Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.

[10]  Aurelien Maurel-Pantel Etude expérimentale et modélisation par éléments finis du procédé de fraisage : applications à l'identification paramétrique des lois de comportement , 2009 .

[11]  G. Herman,et al.  Algebraic reconstruction techniques (ART) for three-dimensional electron microscopy and x-ray photography. , 1970, Journal of theoretical biology.

[12]  E. Somersalo,et al.  Statistical inversion and Monte Carlo sampling methods in electrical impedance tomography , 2000 .

[13]  H. Calkins,et al.  Clinical Inferences of Cardiovascular Implantable Electronic Device Analysis at Autopsy. , 2016, Journal of the American College of Cardiology.

[14]  Nina Olesen European Public-Private Partnerships on Cybersecurity - An Instrument to Support the Fight Against Cybercrime and Cyberterrorism , 2016 .

[15]  David Naccache,et al.  Forensic smartphone analysis using adhesives: Transplantation of Package on Package components , 2018 .

[16]  Jean-Pierre Seifert,et al.  Hardware-software integrated approaches to defend against software cache-based side channel attacks , 2009, 2009 IEEE 15th International Symposium on High Performance Computer Architecture.

[17]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[18]  Adam R. Duncan,et al.  Impact of X-Ray Exposure on a Triple-Level-Cell NAND Flash , 2013, IEEE Transactions on Nuclear Science.

[19]  Rusydi Umar,et al.  Mobile Forensic Tools Evaluation for Digital Crime Investigation , 2018 .

[20]  Ronald van der Knijff Chapter 8 – Embedded Systems Analysis , 2010 .

[21]  Eoghan Casey,et al.  Handbook of Digital Forensics and Investigation , 2009 .

[22]  A. Paccagnella,et al.  A study on the short- and long-term effects of X-ray exposure on NAND Flash memories , 2011, IEEE International Reliability Physics Symposium.

[23]  J. Ludwig Handbook of Autopsy Practice , 2002, Humana Press.

[24]  David Naccache,et al.  Removing epoxy underfill between neighbouring components using acid for component chip-off , 2019, Digit. Investig..

[25]  B. Flannery,et al.  Three-Dimensional X-ray Microtomography , 1987, Science.

[26]  Peter Mygind Leth,et al.  The use of CT scanning in forensic autopsy , 2007, Forensic science, medicine, and pathology.