Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models

Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models

Khalifa Al-Room, Farkhund Iqbal, Thar Baker, Babar Shah, Benjamin Yankson, Aine MacDermott, Patrick C. K. Hung
Copyright: © 2021 |Pages: 25
DOI: 10.4018/IJDCF.2021010101
Article PDF Download
Open access articles are freely available for download

Abstract

Drones (a.k.a. unmanned aerial vehicles – UAV) have become a societal norm in our daily lives. The ability of drones capture high-quality photos from an aerial view and store and transmit such data presents a multi-facet problem. These actions possess privacy challenges to innocent users who can be spied on or drone owner's data which may be intercepted by a hacker. With all technological paradigms, utilities can be misused, and this is an increasing occurrence with drones. As a result, it is imperative to develop a novel methodological approach for the digital forensic analysis of a seized drone. This paper investigates six brands of drones commonly used in criminal activities and extracts forensically relevant data such as location information, captured images and videos, drones' flight paths, and data related to the ownership of the confiscated drone. The experimental results indicate that drone forensics would facilitate law enforcement in collecting significant information necessary for criminal investigations.
Article Preview
Top

1. Introduction

Recently there has been a rapid growth in the interest of UAV technology. Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, are aircraft with no pilots that can be controlled either remotely or autonomously based on a pre-programmed flight path. Due to the varied uses in civil life, the technology once reserved for military use has evolved greatly. Such uses include area surveillance, inspection, surveying, unarmed cargo, and aerial photography. As airspace becomes more congested, the risk of collisions increases. Safeguards against drone incidents are likely to be considerably more challenging than for conventional aircraft. This increased congestion can result in high levels of signal interference, and hence generating unreliable and intermittent data and control-streams. In controlled airspace, drones create new challenges for the interactions between pilots and air traffic controllers (Matyszozyk, 2016).

Drones are becoming a popular thing to see in shared use space or whenever visitingpublic events. To most people, a drone is one of two very different oftypes of pilotless aircraft: a toy, or a weapon. It is either a small insect-like device flying around in parks or on beaches or a large aircraft spying on civilians equipped with a weapon. The first category ‘recreational drones’ is aimed at consumers. There were around two million items sold around the world in 2014, and this is increasing swiftly (Clarke & Moses, 2014). The second category, ‘military drones’, accounts for nearly 90% of the worldwide sales of drones (Clarke & Moses, 2014).

The DJI Phantom 4, is one of the most popular drones on the market. The DJI Phantom 4 weighs 3 pounds in total and can fly at least 4 miles away from its operator without losing its video stream or remote controls. While the Phantom can carry just over 1 pound while in flight, its beefier brother, the DJI S900, has a maximum payload of just under 7 pounds. Anyone looking to spend about $2000 dollars to purchase one can likely fly over a prison yard, and deliver a sizeable illicit contraband packageto their friends on the inside (Fox News, 2017). Drones allow their users to accomplish certain tasks such as taking in aerial views, or hard to access spaces; which in the past has proven difficult due to physical restriction or barrier. The main motivation behind using drones in this manner is to explore a new way of gaining access to unchartered environments to capture (filming or taking pictures) or deploy resources.

The unique features of drone application are its’ capacity to be deployed almostanywhere (in theory) to conduct reconnaissance, retrieve data or resources, deploy resources, and its flexibility in carrying different payloads. These functionalities explain why different agencies and organizations have looked towards implementing the use of drones within their services. For example, the American Red Cross is looking toward using drones in their search and rescue missions (McFarland, 2015; Preston, 2015). In the state of Virginia (USA), fire departments are considering the use of drones in the essence of spotting emerging fire and locating lost tourists (Preston, 2015).

With the ability to reach places that cannot be accessed physically, and in a stealthy manner, the drone can be used to perform criminal activities for reconnaissance. For example, an enemy military intelligence can use drones to take pictures of sensitive local territories. Someone could use a drone to violate the privacy of other people by taking pictures of their own home backyard. On January 26th in 2015, a drone crashed on the White House lawn but the incident was ruled as an accident (Sanchez, 2015) . This incident highlighted a clear vulnerability that a terrorist could have used the function of the drone, such as a camera to breach privacy. The matter is not only limited to the camera being used but also the drone could have been carrying a payload to commit the malicious act on the White House grounds. Such notable issues for the US government is drug smuggling using drones is an issue for the American and Mexican border since 2010 (Sanchez, 2015).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing