Forensics Journal - Stevenson University 2014 | Page 13
STEVENSON UNIVERSITY
medications. In this case, a doctor will send the prescription and its
ingredient list to the computer design software. The 3D printer will
create the medication based on the doctor’s list and custom create a
patient’s prescription (Rosenbach and Schulz 2).
technology that will significantly impact the forensic field. Expansion
of printer forensics will be important as this technology advances.
Although there are a lot of benefits to this technology, the limitations
and vulnerabilities create concern. In order to stay ahead of the game,
forensic examiners must understand exactly how printers function.
This will allow them to fully grasp how these devices can be examined. The big questions are: What can be collected from a printer?
What data is physically stored on a printer? How is this information,
once identified, going to be useful in an investigation? After a forensic investigator learns what information a printer can provide, he or
she can identify what information can be recovered from such devices.
3D print technology will change the manufacturing business. The
most significant change will come in the form of profits. As 3D
companies expand with the success of 3D printers, more money will
flow into them. Production costs will be cut drastically as steps are
eliminated from the production cycle. Costs for making changes to
product prototypes will be reduced because a company will only have
to reprint the item (Rosenbach and Schulz 1). There will likely be a
surplus in new products because 3D printers will make it easier for
anyone to design and print prototypes.
The key to a computer forensic investigation is to figure out the facts:
who, what, when, where, why and how. The answer of “who,” in this
case, is the hacker. Why hackers? Because these are the individuals
who are sniffing open ports on a network to figure out how to gain
access. In this case, “what,” will be the data retrieved by the hacker as
a result of an unsolicited intrusion. It will also include figuring out
the type of information the examiner wishes to retrieve to prove an
intrusion or fraud occurred. Figuring out “when,” will be finding out
the date and time of an intrusion on a network. It will also be the date
and time a 3D object was printed. The answer to “where,” in this case,
will be the location of a potential crime. It will include the location of
traced attacks linked back to an Internet Protocol (IP) address contained on a specific suspects’ network. “Why was the crime committed?” The answer will always arise as the investigation progresses if
one is not readily apparent at the outset. Last but not least, is “how?”
This information will come based on the location of the evidence or
lack thereof. Figuring out “how” a hacker gained access to or control
of a printer is essential to solve an investigation and implement new
methods to prevent a crime involving a printer in the future.
It is obvious that the ability to print an item on a whim means fast
product delivery. This print technology device will alter the way
people shop. Not only will businesses and purchase patterns be
altered, but inventors and product makers will be able to enter the
consumer market at a lower cost than usual (Rosenbach and Schulz
1). This will happen because the cost to design, develop and produce
a product will be significantly lower.
In the future, 3D print technology will challenge society. When a
product has been on the market for a certain period of time, the size,
shape and functionality is modified in order to appeal to more consumers. 3D print technology will branch into full size scanning and
duplication in the future. The outcome of this spread or overlapping
of similar types of technologies will create a bigger challenge for forensics but will also bring innovations that have been previously unseen.
Based on further technical advances, the printer forensics branch of
computer forensics will evolve into a separate discipline. The evolution of print technology will create specialized forensic examiner
positions in 3D and 2D print technology, thus an understanding of
3D print technology will be critical.
Tools will need to be produced which allow an examiner to examine
print technology in a way that preserves data without alteration or
contamination. Once the body and components of a 3D printer
are fully understood, forensic recovery tools must be developed that
will function with the in-house software components. Tools created
specifically for 3D print devices must be able to collect history, print
files, and identify metadata and user data residing on the network.
Information will be easily recoverable for a forensic examiner seeking
to discover evidence with the creation of forensic print tools. It will
also be beneficial if the 3D printer companies shared the product map
of their devices to allow examiners to build efficient general tools with
applications.
CONCLUSION
The success of 3D printers means a rise in crime involving fraud,
copyright, product patent laws and licensing rules. 3D printers will
open the door for imitators to copy products, works of art, etc., which
will lead to stricter rules and ethical standards. Many legal conflicts
will arise in the face of this new technology. Because of the intricacies of patent and copyright laws, there will always be a debate about
product infringement. Unfortunately, issues regarding reproduction
are a separate topic of uncertainty in regards to 3D print technology.
To gain knowledge about these devices, forensic examiners will need
to complete courses in 3D print technology. As examiners familiarize
themselves with the intricacies of 3D technology, variety of printers
manufactured, and specific attributes, these forensic experts will be able
to provide insights regarding exploitation. Additionally, reverse engineering methods can provide tools to extract evidence while employing
In researching 3D and 2D print technology, it can be stated that both
have an effect on the forensic field. 2D technology currently impacts
forensics based on the hacking techniques and attacks outlined
previously. Conversely, 3D print technology is the specific print
12