SlideShare uma empresa Scribd logo
1 de 36
An update on a U.S. Department of Homeland Security R&D Project
Steve Watson, Principal Investigator
Drone Forensics
Acknowledgement & Disclaimer
This material is based on research sponsored by the United States
Department of Homeland Security (DHS) Science and Technology
Directorate, Cyber Security Division (DHS S&T/CSD) via contract number
HHSP233201700017C.
The views and conclusions contained herein are those of the authors and
should not be interpreted as necessarily representing the official policies
or endorsements, either expressed or implied, of the Department of
Homeland Security.
Team Profile
• VTO is a recent technology startup focused digital forensics, data
recovery, and cyber security.
• Small team of industry veterans with deep experience in hardware
analysis and hardware deconstruction to access data.
• Principal Investigator chairs SWGDE Forensic Committee and NIST
OSAC Working group on Mobile and Embedded Device Forensics.
Drone Forensics
Customer Need
• At the time of project proposal, no industry tools existed to retrieve
data from consumer and professional drones.
• Limited research focused on logical data acquisition.
• Drones continue to fly and land in places they should not with no
processes to identify evidentiary data.
Approach
Device Analysis
• Complete physical analysis of interrogated consumer and professional
drones including teardown.
• Identification and consolidation of existing technical information
online.
Approach
Data Acquisition
• Identification of data acquisition methodologies available
against interrogated devices.
• Logical acquisition methods. Serial/JTAG/debug
acquisition. Chip-off acquisition against flash storage and
microcontrollers on devices.
• Acquisition methods and sample data will be made
available to community for further research.
Goals
1. Establish base scientific research regarding the application of
existing digital forensics techniques against consumer and
professional level drones.
2. Identify procedures and practices that can be utilized by
digital forensics service providers (gvt/le/mil/pvt) for the
successful extraction of data from drone/suas systems.
3. Share results with the community to support and strengthen
law enforcement efforts against these devices.
Scope
Twenty 30 consumer and
professional drones.
Available to anyone for purchase.
Identify data artifacts of
evidentiary value.
Identify methods and
process to extract data.
Share results with digfor
community.
1 DJI Phantom 3
2 DJI Phantom 4
3 DJI Spark
4 DJI Inspire1
5 Yuneec Typhoon
6 Parrot Disco
7 DJI Mavic Pro
8 Parrot Bebop 2
9 DJI Inspire2
10 Yuneec Q500 4K
11 Yuneec H520
12 DJI Matrice 600
13 DJI Agras MG-1
14 DJI S1000
15 SenseFly eBee
16 SenseFly Albris
17 DJI Mavic Air
18 Ryze Telo
19 DJI Phantom 4 Pro V. 2.0
20 Aion Robots R1 Rover
21 Skydio R1
22 Handbuilt Ardupilot
23 Skyviper V2450 GPS
Process
1.Procure devices
2.Salt devices with data
3.Interrogate devices in lab
4.Apply digital forensics
techniques against devices
5.Publish results
6.Support DigFor community
Process -Procure Devices
• Identify industry penetration of
consumer and professional level
drones.
• Procure devices.
• Twenty (20) Thirty (30) device
models in scope for program.
• Three (3) devices of each model
• Sixty (60) Ninety (90)drones total
Process -Salt Devices
Control the variables
• All 60 devices are flown at same location
• 1,800 acre ranch in the mountains of
Colorado
• Geofenced location
• Time/date identified
• Geolocation/time/date variables critical
for parsing unknown data systems.
Process -Lab Interrogation
1.Documented teardown of
each device.
• DSLR and microscope
photographs
2.Identification of data
storage areas on device.
3.Investigation of every
integrated circuit package.
Process -Application of
Digital Forensic Techniques
Logical and physical acquisitions
attempted against every drone.
1. Logical acquisitions of file systems
2. Physical acquisitions of intact media
and integrated circuit packages
3. Serial attempts against devices for
data acquisition and device
compromise.
Process -Publish Results
1.Results published at
www.droneforensics.com.
2.Publication of papers to
journals to establish baseline
scientific research.
Process -Publish Results
NIST CFReDS Project
CFReDS – computer forensic
reference data sets
Drone datasets added as an
official reference set by NIST.
Process -Reports
Complete reports will be
available on each model.
Three reports completed.
Eight more to drop soon.
Slick Sheets
1. Non-Technical First Responder
2. Technical First Responder
3. Digital Forensics Lab Team
Interesting Information So Far
Successful data acquisitions on all devices attempted so far
• 23 models, 69 drones
• Over 1.3TB of data acquired so far.
Interesting data on drones, controllers, connected mobile devices.
1 security vulnerability discovered.
microSD Cards
Glued onto Circuit Board
• DJI Models typically have an internal microSD card glued onto the
circuit board
• Carefully remove the glue to loosen the microSD card
• Image the microSD per normal physical acquisitions processes
Conformal Coatings
• Immature conformal
coatings identified on
drones manufactured by
chinese companies
• Obfuscates and complicates
chip removal
• Industry standard - IPC-
7711/7721 .
Custom Asics
• Custom integrated circuit packages
designed specifically for the
manufacturer for this purpose.
• Difficult to identify adapters to read
data.
• Will be challenges to parse
unknown structures.
Parrot SkyController 2
Further Research Questions
• More drones.
• Different firmware versions – future and historical.
• Drone swarms.
www.droneforensics.co
m
stevewatson@vtolabs.co
m

Mais conteúdo relacionado

Semelhante a pres_drone_forensics_program.pptx

02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...Priyanka Aash
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docxambersalomon88660
 
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptxPhysical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptxdata68
 
10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE Presentation10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE PresentationBob Radvanovsky
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Toolsijtsrd
 
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...Felipe Prado
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
76 s201924
76 s20192476 s201924
76 s201924IJRAT
 
Defentect cbrn threat_detection system
Defentect cbrn threat_detection systemDefentect cbrn threat_detection system
Defentect cbrn threat_detection systemSandeep Kumar
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 

Semelhante a pres_drone_forensics_program.pptx (20)

02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx
 
CyberOps.pptx
CyberOps.pptxCyberOps.pptx
CyberOps.pptx
 
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptxPhysical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptx
 
10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE Presentation10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE Presentation
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Tools
 
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
76 s201924
76 s20192476 s201924
76 s201924
 
Defentect cbrn threat_detection system
Defentect cbrn threat_detection systemDefentect cbrn threat_detection system
Defentect cbrn threat_detection system
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

pres_drone_forensics_program.pptx

  • 1. An update on a U.S. Department of Homeland Security R&D Project Steve Watson, Principal Investigator Drone Forensics
  • 2. Acknowledgement & Disclaimer This material is based on research sponsored by the United States Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHS S&T/CSD) via contract number HHSP233201700017C. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Department of Homeland Security.
  • 3. Team Profile • VTO is a recent technology startup focused digital forensics, data recovery, and cyber security. • Small team of industry veterans with deep experience in hardware analysis and hardware deconstruction to access data. • Principal Investigator chairs SWGDE Forensic Committee and NIST OSAC Working group on Mobile and Embedded Device Forensics.
  • 4.
  • 6. Customer Need • At the time of project proposal, no industry tools existed to retrieve data from consumer and professional drones. • Limited research focused on logical data acquisition. • Drones continue to fly and land in places they should not with no processes to identify evidentiary data.
  • 7. Approach Device Analysis • Complete physical analysis of interrogated consumer and professional drones including teardown. • Identification and consolidation of existing technical information online.
  • 8. Approach Data Acquisition • Identification of data acquisition methodologies available against interrogated devices. • Logical acquisition methods. Serial/JTAG/debug acquisition. Chip-off acquisition against flash storage and microcontrollers on devices. • Acquisition methods and sample data will be made available to community for further research.
  • 9.
  • 10.
  • 11. Goals 1. Establish base scientific research regarding the application of existing digital forensics techniques against consumer and professional level drones. 2. Identify procedures and practices that can be utilized by digital forensics service providers (gvt/le/mil/pvt) for the successful extraction of data from drone/suas systems. 3. Share results with the community to support and strengthen law enforcement efforts against these devices.
  • 12. Scope Twenty 30 consumer and professional drones. Available to anyone for purchase. Identify data artifacts of evidentiary value. Identify methods and process to extract data. Share results with digfor community.
  • 13. 1 DJI Phantom 3 2 DJI Phantom 4 3 DJI Spark 4 DJI Inspire1 5 Yuneec Typhoon 6 Parrot Disco 7 DJI Mavic Pro 8 Parrot Bebop 2 9 DJI Inspire2 10 Yuneec Q500 4K 11 Yuneec H520 12 DJI Matrice 600 13 DJI Agras MG-1 14 DJI S1000 15 SenseFly eBee 16 SenseFly Albris 17 DJI Mavic Air 18 Ryze Telo 19 DJI Phantom 4 Pro V. 2.0 20 Aion Robots R1 Rover 21 Skydio R1 22 Handbuilt Ardupilot 23 Skyviper V2450 GPS
  • 14. Process 1.Procure devices 2.Salt devices with data 3.Interrogate devices in lab 4.Apply digital forensics techniques against devices 5.Publish results 6.Support DigFor community
  • 15. Process -Procure Devices • Identify industry penetration of consumer and professional level drones. • Procure devices. • Twenty (20) Thirty (30) device models in scope for program. • Three (3) devices of each model • Sixty (60) Ninety (90)drones total
  • 16. Process -Salt Devices Control the variables • All 60 devices are flown at same location • 1,800 acre ranch in the mountains of Colorado • Geofenced location • Time/date identified • Geolocation/time/date variables critical for parsing unknown data systems.
  • 17. Process -Lab Interrogation 1.Documented teardown of each device. • DSLR and microscope photographs 2.Identification of data storage areas on device. 3.Investigation of every integrated circuit package.
  • 18. Process -Application of Digital Forensic Techniques Logical and physical acquisitions attempted against every drone. 1. Logical acquisitions of file systems 2. Physical acquisitions of intact media and integrated circuit packages 3. Serial attempts against devices for data acquisition and device compromise.
  • 19. Process -Publish Results 1.Results published at www.droneforensics.com. 2.Publication of papers to journals to establish baseline scientific research.
  • 20. Process -Publish Results NIST CFReDS Project CFReDS – computer forensic reference data sets Drone datasets added as an official reference set by NIST.
  • 21. Process -Reports Complete reports will be available on each model. Three reports completed. Eight more to drop soon.
  • 22. Slick Sheets 1. Non-Technical First Responder 2. Technical First Responder 3. Digital Forensics Lab Team
  • 23. Interesting Information So Far Successful data acquisitions on all devices attempted so far • 23 models, 69 drones • Over 1.3TB of data acquired so far. Interesting data on drones, controllers, connected mobile devices. 1 security vulnerability discovered.
  • 24. microSD Cards Glued onto Circuit Board • DJI Models typically have an internal microSD card glued onto the circuit board • Carefully remove the glue to loosen the microSD card • Image the microSD per normal physical acquisitions processes
  • 25.
  • 26.
  • 27. Conformal Coatings • Immature conformal coatings identified on drones manufactured by chinese companies • Obfuscates and complicates chip removal • Industry standard - IPC- 7711/7721 .
  • 28.
  • 29.
  • 30.
  • 31. Custom Asics • Custom integrated circuit packages designed specifically for the manufacturer for this purpose. • Difficult to identify adapters to read data. • Will be challenges to parse unknown structures.
  • 33.
  • 34. Further Research Questions • More drones. • Different firmware versions – future and historical. • Drone swarms.