Page 63 - Veritas Vol 3, Issue 2
P. 63

55




                 8. Communication Analysis: Investigate the communication protocols used

                     by the drone to communicate with remote control devices or other
                     networks. This may help trace the origin of commands or data

                     transmissions.
                 9. Wi-Fi or RF Analysis: If applicable, analyze Wi-Fi or radio frequency

                    signals used for communication. This can provide insights into the drone's
                    communication range and identify any unauthorized access points.
                 10. Metadata Analysis: Examine metadata in files for accurate dates and

                     time stamps. This information can be crucial in establishing a timeline of
                     events related to the drone's operation.














































                               Image 3: A picture of the crime scene investigation.


                 CONCLUSION



                 Drone  forensic  technology  has  become  a  critical  component  in

                 countering the evolving threats posed by unmanned aerial vehicles
                 (UAVs). As the utilization of drones continues to proliferate across

                 various  sectors,  including  both  civilian  and  military  domains,  the
                 need for effective countermeasures has grown exponentially.


     VERITAS VOLUME: 3, ISSUE: 2                                                  WRITER: RIYA GHOSH
   58   59   60   61   62   63   64   65   66   67   68