{"id":1461,"date":"2025-10-18T00:50:26","date_gmt":"2025-10-17T22:50:26","guid":{"rendered":"https:\/\/peritajesgamez.es\/expert-report-on-iot-projects-in-commercial-proceedings-for-information-leakage\/"},"modified":"2026-03-21T01:11:36","modified_gmt":"2026-03-21T00:11:36","slug":"expert-report-on-iot-projects-in-commercial-proceedings-for-information-leakage","status":"publish","type":"post","link":"https:\/\/peritajesgamez.es\/en\/expert-report-on-iot-projects-in-commercial-proceedings-for-information-leakage\/","title":{"rendered":"Expert report on IoT projects in commercial proceedings for information leakage"},"content":{"rendered":"\n<p>At the request of the <strong>Commercial Court No. 10 of Madrid<\/strong>, I was appointed as a computer forensic expert in an ordinary procedure.<\/p>\n\n<p>The plaintiff company offered a solution developed with <strong>Internet of Things technologies<\/strong> (<em>IoT<\/em>). This product allowed for the monitoring of activity in homes inhabited by elderly or dependent persons living alone. By placing different types of sensors in various rooms of the home, it was possible to record the presence and movements of the inhabitant. The information collected by these sensors was transmitted to a central device (<em>gateway<\/em>) located in the same home. This central device then transmitted the received information to the computer servers of the service provider company.    <\/p>\n\n<p>Furthermore, the IoT solution provided a mobile application through which the reception of informative notices or alerts could be configured in response to anomalous presence or behavior patterns in the monitored home. In this way, the relatives of the monitored person could take the actions they deemed appropriate. <\/p>\n\n<p>The company initiated the lawsuit due to the fact that a <strong>former employee had implemented a commercial solution with very similar characteristics<\/strong>; therefore, the company suspected that an information leak had occurred regarding one or several components or computer systems over which it held copyright and\/or intellectual property rights.<\/p>\n\n<p>Given this scenario, the court, <strong>at the request of the defendant<\/strong>, asked me to investigate both the hardware components (sensors and gateways) and software (back office, front office, mobile applications, etc.) of both IoT solutions, in order to answer various questions raised by the defendant&#8217;s counsel. The purpose of answering these questions was to determine whether there was actually any type of plagiarism or leakage of information owned by the company that could be evidenced in the former employee&#8217;s IoT project. <\/p>\n\n<p>The preparation of the expert report required conducting interviews with the managers of the IT projects from both parties, as well as with technical staff, as it was necessary to transfer certain knowledge to be able to operate, in a laboratory environment, the computer systems, their components or working frameworks, and the devices involved in each of the two projects. The project managers from both sides offered the requested collaboration, providing all the information I required. <\/p>\n\n<p>The information provided by the company was substantial, as there were <strong>multiple software projects even for the same system architecture service<\/strong>. Additionally, both the sensors and the gateway implemented source code developed by the company itself, so that sensor communications could be optimized using the Narrowband IoT technological standard. To align the different projects, respective architecture diagrams were prepared, both high-level and detailed, so that the submitted expert report could properly relate, describe, and link each system and its computer components under study.  <\/p>\n\n<p>The work I performed was deep and exhaustive, to the point of analyzing source code in different components of both projects, both automatically and manually, placing special emphasis on those software components where some degree of plagiarism or copying of computer code could be evidenced. <strong>This detailed work was reflected in a report of nearly 200 pages, prepared over approximately 2 months of work.<\/strong><\/p>\n\n<p>The former employee had used a range of sensors that implemented open communication protocols easily accessible on the market, while the hardware architecture of his gateway was based on standard elements, notably the use of Raspberry Pi. Regarding the software architecture, standard software components were also used, such as PostgreSQL, Mosquitto, and Zigbee. Consequently, the forensic investigation concluded that there were no signs of plagiarism in the IT project developed by the company&#8217;s former employee.  <\/p>\n\n<p>Once the preparation of the expert report was finalized, the various pieces of evidence provided by each of the parties were returned to the court. Following the submission of my expert report, <strong>my ratification was not required because, as I was informed, the lawsuit was allegedly withdrawn at the preliminary hearing that took place after the submission of my report<\/strong>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the request of the Commercial Court No. 10 of Madrid, I was appointed as a computer forensic expert in an ordinary procedure. The plaintiff company offered a solution developed&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[96,93,94,95,66],"tags":[],"class_list":{"0":"post-1461","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-commercial","8":"category-highlights","9":"category-information-leakage","10":"category-iot","11":"category-news"},"_links":{"self":[{"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/posts\/1461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/comments?post=1461"}],"version-history":[{"count":1,"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/posts\/1461\/revisions"}],"predecessor-version":[{"id":1464,"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/posts\/1461\/revisions\/1464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/media\/1463"}],"wp:attachment":[{"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/media?parent=1461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/categories?post=1461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/peritajesgamez.es\/en\/wp-json\/wp\/v2\/tags?post=1461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}