Page 63 - Veritas Vol 3, Issue 2
P. 63
55
8. Communication Analysis: Investigate the communication protocols used
by the drone to communicate with remote control devices or other
networks. This may help trace the origin of commands or data
transmissions.
9. Wi-Fi or RF Analysis: If applicable, analyze Wi-Fi or radio frequency
signals used for communication. This can provide insights into the drone's
communication range and identify any unauthorized access points.
10. Metadata Analysis: Examine metadata in files for accurate dates and
time stamps. This information can be crucial in establishing a timeline of
events related to the drone's operation.
Image 3: A picture of the crime scene investigation.
CONCLUSION
Drone forensic technology has become a critical component in
countering the evolving threats posed by unmanned aerial vehicles
(UAVs). As the utilization of drones continues to proliferate across
various sectors, including both civilian and military domains, the
need for effective countermeasures has grown exponentially.
VERITAS VOLUME: 3, ISSUE: 2 WRITER: RIYA GHOSH