Skip to content
Go back

Design of a Drone Forensics SOP (coursework)

Edit page

Table of contents

Open Table of contents

Some Initial Notes

Drone functionalities can be classified to include (Al-Dhaqm et al., 2021)

Complexity - drone forensics is more complicated because it needs to integrate multiple data types (Abdulrahman Debas, Albuali and Hafizur Rahman, 2024)

Drone Investigations Literature Review

Before creating a Standard Operating Procedure regarding the investigation of a drone, I conducted a literature review of several papers that discussed drone forensics and demonstrated various analytical frameworks as a reference for my procedure steps.

In ‘Research Challenges and Opportunities in Drone Forensics Models’ by Al-Dhaqm et al. 2021, many of the aspects of a drone forensic investigation were highlighted, specifically the artefacts that differ from a traditional forensic investigation such as Electromagnetic Wave Data taken from the Transciever Control Unit (TCU) and the reliance on volatile memory over non-volatile. Typical forensic software may not be prepared to handle this data.

An Integrated UAV forensic investigation model is provided, which breaks the investigation down into four stages: Pre-incident Preparatory Phase; Post-Incident Preparatory Phase; Data Acquisition Phase; and Data Analysis Phase. This model could be a good framework to base the steps of a SOP on.

Integrated UAV Forensic Investigation Model by Al-Dhaqm et al. 2021 Figure 1: Integrated UAV Forensic Investigation Model by Al-Dhaqm et al. 2021

‘Forensic Examination of Drones: A Comprehensive Study of Frameworks, Challenges, and Machine Learning Applications’ by Abdulrahman Debas, Albuali, and Hafizur Rahman 2024 provides a list of the different types of data that could provide indicators of compromise in an investigation and may be relevant for the investigator to look for. This includes things such as: Flight Logs; GPS Coordinates; Recordings; Telemetry Data; and more.

This paper also suggests multiple other forensic models for drone investigations. CCAFM (F. M. Alotaibi, Al-Dhaqm, Al-Otaibi, and Alsewari 2022) is described by the paper as “A Comprehensive Collection and Analysis Model […] encompassing three key processes: Acquisition and Presentation, Reconstruction and Analysis, and Post-investigation.” Another, the Drone Forensics Readiness Framework (DRFRF) (F. M. Alotaibi, Al-Dhaqm, and Al-Otaibi 2022), is described as “a novel contribution achieved through the design science method. This framework emphasizes proactive forensic readiness in the drone domain”.

CCAFM is discussed fully in ‘A Comprehensive Collection and Analysis Model for the Drone Forensics Field’ by F. M. Alotaibi, Al-Dhaqm, Al-Otaibi, and Alsewari 2022. This framework is in three parts: Schema Reconstruction, Acquisition, and Preservation; Evidence Reconstruction and Analysis Process; and Post Investigation Process. The inclusion of the post-investigation processes differentiates it from other models. It was developed by extracting the processes found in other models and organising them into a new framework. The features were organised into groups and stages to form an analysis model that could be broken down into steps in an SOP.

CCAFM (F. M. Alotaibi, Al-Dhaqm, Al-Otaibi, and Alsewari 2022

Figure 2: CCAFM (F. M. Alotaibi, Al-Dhaqm, Al-Otaibi, and Alsewari 2022)

DRFRF is developed in the paper ‘A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field’ by F. M. Alotaibi, Al-Dhaqm, and Al-Otaibi 2022. This paper also identified the features present in other drone forensics models to create a framework. It divides the framework in two stages: the proactive forensics stage and the reactive forensics stage. The proactive stage divides into the Monitoring and Capturing Phase and the Preservation Phase. This involves collecting the data to be investigated and making sure nothing happens to change it. The reactive forensics stage is divided into the Examination and Analysis Process and the Documentation and Reporting Process. These four stages would make a good framework for a first-responder or investigator to follow, as it cleanly divides the responsibilties up with each stage and highlights the main goals of each.

Drone Forensics Readiness Framework (F. M. Alotaibi, Al-Dhaqm, and Al-Otaibi 2022

Figure 3: Drone Forensics Readiness Framework (F. M. Alotaibi, Al-Dhaqm, and Al-Otaibi 2022)

‘Drone Forensics: Challenges and New Insights’ by Bouafif et al. 2018 contains a discussion on the challenges specific to drone forensics due to the unique factors of drones. It considers the problem that data may be split over multiple locations such as the drone, radio controller, and server, and without all components it may be difficult to come to a a conclusion. There is also depth given into the problems with reading the internal memory of a drone, as there is no standardisation of firmware, and so standard format for protocols or flight data. The flight data is also often encrypted, creating more problems when investigating.

The paper is useful in defining the objectives of the investigation, which is useful for the creation of an SOP, as it clearly lays out that “The ultimate goal of the forensic investigation is to validate the requirements of a digital nonrepudiation by corroborating the drone’s ownership with the evidence of deliberate usage.” The research methodology provided backs up this idea, staying focused on the goal of the forensic investigation.

Research Methodology by Bouafif et al. 2018

Figure 4: Research Methodology by Bouafif et al. 2018

‘UAV Forensics: DJI Mini 2 Case Study’ by Stankovi´c, Mirza, and Karabiyik 2021 consists of a case study of the data created by a specific drone. It mainly considers the data recovered from the SD card and the mobile phone used as a controller. The data takes the form of encrypted .DAT files and .txt files, containing the flight logs taken from the phone; and video and photo data taken from the SD card. Several tools are suggested during the process such as Cellebrite and Magnet ACQUIRE, which could be used to facilitate this method of data extraction, but other drone components are not examined in detail.

Standard Operating Procedure

Purpose

The purpose of this SOP is:

Scope

This SOP includes the procedures to be taken by a first responder on the scene of a drone incident, and the methodology they should follow to ensure the data held on the drone is preserved. Also included is the actions a forensic specialist should take to extract and analyse the data for use in an investigation. The focus is on the technology used and the risks to be aware of, not on the wider administrative side that would be covered elsewhere.

Responsibilities

First Responder: Responsible for ensuring relevant data is collected from the scene and that the drone is not interfered with from the time of discovery.

Drone Digital Forensics Specialist: Responsible for extracting as much complete data from the drone as possible, and any other identified artefacts. Must maintain the integrity of the data found and keep detailed logs of any changes made. Responsible for producing a report of the findings.

Procedure

%• Detailed/specific procedure. This must include references to tools and procedures used.

First Response

The following should be completed by the first responders on the scene, who may not have the knowledge to conduct a forensic investigation but will be responsible for ensuring the data is preserved.

Data Preservation

Evidence Acquisition

The following should be completed by a Drone Digital Forensics Specialist in a network shielded room.

Evidence Integrity Verification and Preservation

Evidence Analysis

A tool such as Autopsy is useful for this stage.

###Timeline Reconstruction

Analysis Report

Glossary

From INTERPOL 2020.

References

Reference listAbdulrahman Debas, E., Albuali, A. and Hafizur Rahman, M.M. (2024). Forensic Examination of Drones: A Comprehensive Study of Frameworks, Challenges, and Machine Learning Applications. IEEE Access, [online] 12, pp.111505–111522. doi:https://doi.org/10.1109/access.2024.3426028.

Al-Dhaqm, A., Ikuesan, R.A., Kebande, V.R., Razak, S. and Ghabban, F.M. (2021). Research Challenges and Opportunities in Drone Forensics Models. Electronics, [online] 10(13), p.1519. doi:https://doi.org/10.3390/electronics10131519.

Alotaibi, F., Al-Dhaqm, A. and Al-Otaibi, Y.D. (2023). A Conceptual Digital Forensic Investigation Model Applicable to the Drone Forensics Field. Engineering, Technology & Applied Science Research, [online] 13(5), pp.11608–11615. doi:https://doi.org/10.48084/etasr.6195.

Alotaibi, F.M., Al-Dhaqm, A. and Al-Otaibi, Y.D. (2022). A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field. Computational Intelligence and Neuroscience, 2022, pp.1–13. doi:https://doi.org/10.1155/2022/8002963.

Alotaibi, F.M., Al-Dhaqm, A., Al-Otaibi, Y.D. and Alsewari, A.A. (2022). A Comprehensive Collection and Analysis Model for the Drone Forensics Field. Sensors, 22(17), p.6486. doi:https://doi.org/10.3390/s22176486.

Bouafif, H., Kamoun, F., Iqbal, F. and Marrington, A. (2018). Drone Forensics: Challenges and New Insights. 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). doi:https://doi.org/10.1109/ntms.2018.8328747.

INTERPOL (2020). FRAMEWORK FOR RESPONDING TO A DRONE INCIDENT For First Responders and Digital Forensics Practitioners. [online] Available at: https://www.interpol.int/content/download/17307/file/IC_DFL_DroneIncident_Final_EN.pdf?inLanguage=eng-GB [Accessed 2 Dec. 2024].

Kao, D.-Y., Chen, M.-C., Wu, W.-Y., Lin, J.-S., Chen, C.-H. and Tsai, F. (2019). Drone Forensic Investigation: DJI Spark Drone as A Case Study. Procedia Computer Science, 159, pp.1890–1899. doi:https://doi.org/10.1016/j.procs.2019.09.361.

Lan, J.K.W. and Lee, F.K.W. (2021). Drone Forensics: A Case Study on DJI Mavic Air 2. 2021 23rd International Conference on Advanced Communication Technology (ICACT). doi:https://doi.org/10.23919/icact51234.2021.9370578.

Stanković, M., Mirza, M.M. and Karabiyik, U. (2021). UAV Forensics: DJI Mini 2 Case Study. Drones, 5(2), p.49. doi:https://doi.org/10.3390/drones5020049.


Edit page
Share this post on:

Next Post
Application Server Vulnerability Analysis (coursework)