Abstract
The rapid pace of invention in technology and the evolution of network communication has produced a new lifestyle with variety of opportunities and challenges. Remotely Piloted Aerial Systems (RPAS) technology, which includes drones, is one example of a recently invented technology that requires the collection of a solid body of defensible and admissible evidence to help eliminate potential real-world threats posed by their use. With the advent of smartphones, there has been an increase in digital forensic investigation processes developed to assist specialized digital forensic investigators in presenting forensically sound evidence in the courts of law. Therefore, it is necessary to apply digital forensic techniques and procedures to different types of RPASs in order to create a line of defense against new challenges, such as aerial-related incidents, introduced by the use of these technologies. Drone operations by bad actors are rapidly increasing and these actors are constantly developing new approaches. These criminal operations include invasion of privacy, drug smuggling, and terrorist activities. Additionally, drone crashes and incidents raise significant concerns. In this paper, we propose a technical forensic process consisting of ten technical phases for the analysis of RPAS forensic artifacts, which can reduce the complexity of the identification and investigation of drones. Using the proposed technical process, we analyze drone images using the Computer Forensics Reference Datasets (CFReDS) and present results for the Typhoon H aerial vehicle manufactured by Yuneec, Inc. Furthermore, this paper explores the availability and value of digital evidence that would allow a more practical digital investigation to be able to build an evidence-based experience. Therefore, we particularly focus on developing a technical drone investigation process that can be applied to various types of drones.
Highlights
According to the National Institute of Standards and Technology (NIST) [1], criminal drone operations are rapidly increasing and criminals are constantly developing new approaches.These criminal operations include invasion of privacy, drug smuggling [2], terrorist operations [3], and the disruption of critical infrastructure [3]
It is necessary to apply digital forensic techniques and procedures to be able to generate a unified technical process that aids in the forensic analysis of drones in order to create a line of defense against aerial incidents
This paper introduces an enhanced Drone Technical Forensic Investigation Process based on acquired drone data from different components of the Typhoon H
Summary
According to the National Institute of Standards and Technology (NIST) [1], criminal drone operations are rapidly increasing and criminals are constantly developing new approaches These criminal operations include invasion of privacy, drug smuggling [2], terrorist operations [3], and the disruption of critical infrastructure [3]. Previous research introduced a forensic analysis of the DJI Phantom 3 [6] This paper extends these results by providing a complete technical process of drone forensics. Commercial tools (e.g., Oxygen Forensic ) are in their early stages when it comes to drone forensics This is because of the the different types of drones which require a log parser and visualizer that supports all types of available softwares. We explored a case study using a hypothetical drone forensic tool to demonstrate the automated extraction process of GPS metadata from both media files and flight logs to generate an effective incident response procedure when dealing with illegal criminal activities using drones
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.