Page 62 - Veritas Vol 3, Issue 2
P. 62

54





                  Each  tool  has  its  own  unique  role  and  strengths,  contributing  to  a

                  comprehensive defence strategy against the misuse of drones.


                  FORENSIC ANALYSIS OF CAPTURED DRONES
                  Forensic analysis of captured drones is a crucial process that involves
                  the systematic examination of drone hardware, software, and data to

                  extract  information  for  investigative  or  legal  purposes.  This  analysis
                  can  provide  valuable  insights  into  the  drone's  origin,  purpose,  and

                  operator, aiding law enforcement, the military, or other authorities in
                  understanding the circumstances surrounding the drone's capture.
                    1. Physical  Examination:  Frame  and  Components:  Inspect  the

                       physical  structure  of  the  drone,  including  the  frame,  motors,
                       propellers,  and  other  components.  This  examination  may  reveal

                       serial  numbers,  manufacturing  details,  or  modifications  made  to
                       the drone.

                    2. Payloads  and  Attachments:  Examine  any  payloads,  cameras,  or
                       other  attachments  mounted  on  the  drone.  Analyzing  these

                       components  may  provide  information  about  the  drone's  intended
                       use.
                    3. Flight  Data:  Retrieve  flight  data  stored  on  the  drone's  internal

                       memory  or  flight  controller.  This  data  can  include  GPS
                       coordinates,  altitude,  speed,  and  other  telemetry  information,

                       providing details about the drone's flight history.
                    4. Camera  Data:  Analyze  images  or  videos  stored  on  the  drone  to

                       identify  locations,  capture  times,  and  potentially  recognize
                       individuals or objects of interest.

                    5. Communication Logs: Examine communication logs to understand
                       the  drone's  interactions  with  remote  control  devices,  ground
                       stations, or other communication infrastructure.

                    6. Firmware  Examination:  Analyze  the  drone's  firmware  to  identify
                       its make and model, as well as any custom modifications. This can

                       also reveal vulnerabilities or evidence of tampering.
                    7. Operating System Analysis: If the drone uses an operating system,

                       examine its files and configurations for any relevant information.
                       This  analysis  may  reveal  traces  of  malware  or  unauthorized

                       software modifications.




     VERITAS VOLUME: 3, ISSUE: 2                                                  WRITER: RIYA GHOSH
   57   58   59   60   61   62   63   64   65   66   67