ebook img

UAV (aka drone) Forensics PDF

40 Pages·2017·9.06 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview UAV (aka drone) Forensics

UAV (aka drone) Forensics “Ok, you’ve shot it down, now what?” Why is the Relevant? Controlled Use Technologies •  Counter UAS (CUAS) soluEons beyond detecEon are currently illegal to use domesEcally with very limited excepEons •  Lots of pressure to enable full CUAS use for prisons, criEcal infrastructure, major public events •  “Ok, you’ve shot it down, now what?” Growing CollecEons of Found UAVs •  UAVs found on property in many sectors •  LiNle understanding of inherent value •  LiNle means to recognize value •  You can start understanding the threat actors and their moEvaEons even without CUAS Sources of UAV Forensic ArEfacts PotenEal Sources – Three Views There are three ways of thinking about Unmanned Aerial Systems that help an invesEgator idenEfy all of the potenEal sources of forensic arEfacts. –  Physical –  Process –  Flow What Physical Evidence is Available? UAV OperaEonal Process Mission Approval Execu4on Analysis Delivery Planning ‣  Business ‣  LogisEcs ‣  Data validaEon ‣  Product delivery ‣  Criteria ‣  Site logisEcs ‣  Flight crew ‣  Product ‣  Product support ‣  Airframe generaEon ‣  Safety ‣  Weather ‣  Lessons learned ‣  Payload ‣  Quality ‣  Legal ‣  Flight ‣  ReporEng ‣  Operator assurance operaEons ‣  Risk ‣  Billing ‣  LocaEon ‣  Flight ‣  Time frame operaEons Each step, each component, leaves evidence and generates intelligence UAV data flows GPS signals Data uplink to cloud PIC to UAV FC via radio controller Telemetry to corporate network Payload operator via data link GCS via data link to UAV mission payload to UAV FC Each link, each component, leaves evidence and generates intelligence Evidence CollecEon

Description:
Controlled Use Technologies. • Counter UAS (CUAS) soluvons Data uplink to cloud. PIC to UAV FC via radio controller. Telemetry to corporate network. Each link, each component, leaves evidence and generates intelligence media, use write blockers. • Mobile device forensic analysis tools for GCS
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.